I am student of Master of Science (Cybersecurity and Forensic Computing). Now I have to write a Thesis for my masters. I need an advice on which topic should I write Thesis. Please advice
various security aspects of IoT are currently very interesting areas of research. In particular, the following three broad IoT security research areas (SRAs) are important:
· SRA_1: Detecting anomalies in the IoT – Self Adaptive IDS (Intrusion Detection System)
· SRA_2: Machine learning for IoT Security & Privaty support
· SRA_3: Adaptive Trust Systems in the IoT; Adaptive trust estimation
Here are some sources of literature on these security research areas.
Much success and best regards
Anatol Badach
SRA_1
V. A. Desnitsky, I. V. Kotenko and S. B. Nogin:Detection of Anomalies in Data for Monitoring of Security Components in the Internet of Thingshttps://ieeexplore.ieee.org/document/7190452/
R. Ferrando and P. Stacey: Classification of Device Behaviour in Internet of Things Infrastructures: Towards Distinguishing the Abnormal From Security Threatshttps://arrow.dit.ie/cgi/viewcontent.cgi?article=1156&context=engscheleart2
S. Ahmad, A. Lavin, S. Purdy and Z. Agha: Unsupervised real-time anomaly detection for streaming datahttps://www.sciencedirect.com/science/article/pii/S0925231217309864
S. Ahmad, S. Purdy: Real-Time Anomaly Detection for Streaming Analyticshttps://arxiv.org/pdf/1607.02480.pdf
H. HWJ Bosman, G. Iacca, A. Tejada, H. J. Wörtche, A. Liotta: Spatial anomaly detection in sensor networks using neighborhood informationhttps://www.sciencedirect.com/science/article/pii/S1566253516300252
H. HWJ Bosman: Anomaly detection in networked embedded sensor systemshttps://pure.tue.nl/ws/files/31668745/20160912_Bosman.pdfAnomaly
JP Vasseur and M.G. Seewald: Threat Detection and Mitigation for IoT Systems using Self Learning Networks (SLN)https://docbox.etsi.org/Workshop/2016/201606_SECURITYWS/S05_MITIGATINGMECHANISMS/CISCO_SEEWALD.pdf
SRA_2
F. Restuccia, Member, S. D’Oro and T. Melodia: "Securing the Internet of Things: New Perspectives and Research Challenges" https://arxiv.org/pdf/1803.05022.pdf
S. Kaplantzis, A. Shilton, N. Mani and Y. Sekercioglu: Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machineshttps://pdfs.semanticscholar.org/1364/90cbfdec54735532a977a6d36d488eb14dca.pdf
J. Ca˜nedo and A. Skjellum: Using Machine Learning to Secure IoT Systemshttps://ieeexplore.ieee.org/document/7906930/
A. Balaji Buduru: An Adaptive Approach to Securing Ubiquitous Smart Devices in IoT Environment with Probabilistic User Behavior Predictionhttps://repository.asu.edu/attachments/176569/content/Buduru_asu_0010E_16584.pdf
SRA_3
H. Son, N. Kang, B. Gwak and D. Lee: An Adaptive IoT Trust Estimation Scheme Combining Interaction History and Stereotypical Reputationhttps://ieeexplore.ieee.org/document/7983132/
I suggest the following questions and research problems in the above topic:
Is cybercrime a significant barrier to the development of online information technologies?
Is cybercrime a significant barrier to the development of online information services and advanced information processing techniques?
Yes, a significant percentage of internet users have been victims of cybercriminal attacks only that a significant part of these Internet users do not know it yet, because some of the malicious programs that have been infected with computers may not have been activated yet.
In the area of development of online techniques of information services and advanced information processing, the issue of cyber security, security and information transfer on the Internet has appeared.
However, the scale of the risk of cybercrime is low, and therefore the positive aspects of the development of online information technology and advanced information processing techniques outweigh the negative aspects.
In addition, I suggest the following questions and research problems in the above topic:
Will cybercrime in the coming years affect hacker attacks aimed at technology devices of the Internet of Things?
Will cybercrime in the future mainly concern the technology of the Internet of Things?
Will the improvement of the risk management process of the Internet information transfer in the future concern mobile devices and Internet of Things technology?
Is the online mobile banking currently offered mainly on smartphones also extended to other devices functioning as part of the Internet of Things technology?
Another proposal for a research topic in this field:
What types of security are currently used to protect smartphones from cybercrime?
What kind of IT tools do you use to protect your computer, laptop, tablet or smartphone against cybercrime and viruses sent, for example, in e-mails by hackers?
Some users use anti-virus software, farewall, precautionary methods in the use of e-mail, etc., but this has not been prevented, for example, by attacks from cybercriminals using ransomware that encrypt and block access to disks on the computer.
The current question is: What IT tools do you use to protect your computer, laptop, tablet or smartphone against cybercrime and viruses sent, for example, in e-mails by hackers?
In addition, I propose the following research question in this area:
Is the question of cybercrime currently the key topic of the development of online e-banking?
Is the security of information transfer on the Internet, the issue of cybercrime are currently one of the most important topics in the issue of the development of online e-banking?
Is the question of the security of information transfer on the Internet, the issue of cybercrime in the development of online mobile banking and electronic banking risk management are currently one of the most important topics in the development of online e-banking?
In my opinion, the issue of the security of information transfer on the Internet, the issue of cybercrime in the development of online mobile banking and electronic banking risk management are currently one of the most important topics in the topic of the possibility of developing online electronic banking.