Indian Journal of Science and Technology
DOI: 10.17485/IJST/v16i33.1262
Year: 2023, Volume: 16, Issue: 33, Pages: 2609-2621
Original Article
Mansoor Farooq1*, Rafi Khan2, Mubashir Hassan Khan3
1Assistant Professor, Department of Management Studies, University of Kashmir, India
2Scientist B, Department of Management Studies, University of Kashmir, India
3Assistant Professor, Department of Computer Application, GWC M.A. Road, Srinagar, India
*Corresponding Author
Email: [email protected]
Received Date:25 May 2023, Accepted Date:19 July 2023, Published Date:01 September 2023
Objectives: To develop algorithms for different types of firewalls and their implementation for securing IoT devices. Assess the effectiveness of the developed algorithms and highlights the importance of a comprehensive approach to securing IoT devices, including maintaining strong authentication and encryption, secure communication protocols, and keeping devices updated with the latest security measures. Methods: The present study focuses on creating algorithms that can be used to secure IoT devices through various types of firewalls, including traditional firewalls, Next-generation (NGFW), stateful inspection, packet filtering firewalls, application-level gateways, and network segmentation. These algorithms can be integrated into existing infrastructure or used to design a completely new system. The firewalls are then configured to properly filter network traffic, monitor communication trends, and implement IoT-specific security regulations. The integrated firewall system is thoroughly tested and evaluated to assess its functionality, performance, and effectiveness in securing IoT devices. Findings: To evaluate the effectiveness of the developed algorithms, several experiments were conducted and the system achieved an accuracy of 99% which results a high level of success in protecting IoT devices from cyber threats. These algorithms are specifically designed to address the vulnerabilities and security challenges associated with IoT devices. Novelty and applications: The novelty of this paper lies in the development of algorithms for different types of firewalls and their implementation specifically for securing IoT devices. The focus on IoT devices and their unique vulnerabilities is an important aspect of this research. Each type of firewall has its strengths and weaknesses, and the paper likely discusses how they can be effectively employed to secure IoT devices. This suggests that the proposed firewall algorithms are effective in mitigating cyber threats and enhancing the security of IoT devices.
Keywords: Firewalls; NGFW; Stateful Inspection Firewalls; IoT; Cyberattacks; cybersecurity; VPN; AES; IKE; L2TP; NAC; 8021X Authentication and DHCP
© 2023 Farooq et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)
Subscribe now for latest articles and news.