• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2023, Volume: 16, Issue: 33, Pages: 2609-2621

Original Article

Stout Implementation of Firewall and Network Segmentation for Securing IoT Devices

Received Date:25 May 2023, Accepted Date:19 July 2023, Published Date:01 September 2023

Abstract

Objectives: To develop algorithms for different types of firewalls and their implementation for securing IoT devices. Assess the effectiveness of the developed algorithms and highlights the importance of a comprehensive approach to securing IoT devices, including maintaining strong authentication and encryption, secure communication protocols, and keeping devices updated with the latest security measures. Methods: The present study focuses on creating algorithms that can be used to secure IoT devices through various types of firewalls, including traditional firewalls, Next-generation (NGFW), stateful inspection, packet filtering firewalls, application-level gateways, and network segmentation. These algorithms can be integrated into existing infrastructure or used to design a completely new system. The firewalls are then configured to properly filter network traffic, monitor communication trends, and implement IoT-specific security regulations. The integrated firewall system is thoroughly tested and evaluated to assess its functionality, performance, and effectiveness in securing IoT devices. Findings: To evaluate the effectiveness of the developed algorithms, several experiments were conducted and the system achieved an accuracy of 99% which results a high level of success in protecting IoT devices from cyber threats. These algorithms are specifically designed to address the vulnerabilities and security challenges associated with IoT devices. Novelty and applications: The novelty of this paper lies in the development of algorithms for different types of firewalls and their implementation specifically for securing IoT devices. The focus on IoT devices and their unique vulnerabilities is an important aspect of this research. Each type of firewall has its strengths and weaknesses, and the paper likely discusses how they can be effectively employed to secure IoT devices. This suggests that the proposed firewall algorithms are effective in mitigating cyber threats and enhancing the security of IoT devices.

Keywords: Firewalls; NGFW; Stateful Inspection Firewalls; IoT; Cyberattacks; cybersecurity; VPN; AES; IKE; L2TP; NAC; 8021X Authentication and DHCP

References

  1. Chen W, Qiu X, Cai T, Dai HNN, Zheng Z, Zhang Y. Deep Reinforcement Learning for Internet of Things: A Comprehensive Survey. IEEE Communications Surveys & Tutorials. 2021;23(3):1659–1692. Available from: http://dx.doi.org/10.1109/comst.2021.3073036
  2. Gupta K, Pandey A, Chan L, Yadav A, Staats B, Borkin MA. Portola: A Hybrid Tree and Network Visualization Technique for Network Segmentation. 2022 IEEE Symposium on Visualization for Cyber Security (VizSec). 2022;p. 1–5. Available from: https://doi.org/10.1109/VizSec56996.2022.9941388
  3. Farooq M, Hassan M. IoT smart homes security challenges and solution. International Journal of Security and Networks. 2021;16(4):235. Available from: https://doi.org/10.1504/IJSN.2021.119395
  4. Mhaskar N, Alabbad M, Khedri R. A Formal Approach to Network Segmentation. Computers & Security. 2021;103:102162. Available from: https://doi.org/10.1016/j.cose.2020.102162
  5. Liang J, Kim Y. Evolution of Firewalls: Toward Securer Network Using Next Generation Firewall. 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC). 2022;p. 752–0759. Available from: https://doi.org/10.1109/CCWC54503.2022.9720435
  6. Farooq M. Supervised Learning Techniques for Intrusion Detection System based on Multi-layer Classification Approach. International Journal of Advanced Computer Science and Applications. 2022;13(3):311–315. Available from: https://doi.org/10.14569/IJACSA.2022.0130338
  7. Togay C, Kasif A, Catal C, Tekinerdogan B. A Firewall Policy Anomaly Detection Framework for Reliable Network Security. IEEE Transactions on Reliability. 2022;71(1):339–347. Available from: https://doi.org/10.1109/TR.2021.3089511
  8. Uçtu G, Alkan M, Doğru İA, Dörterler M. A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls. Future Generation Computer Systems. 2021;124:56–67. Available from: https://doi.org/10.1016/j.future.2021.05.013
  9. Tudosi ADD, Balan DG, Potorac AD. Secure network architecture based on distributed firewalls. 2022 International Conference on Development and Application Systems (DAS). 2022;p. 85–90. Available from: https://doi.org/10.1109/DAS54948.2022.9786092

Copyright

© 2023 Farooq et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)

DON'T MISS OUT!

Subscribe now for latest articles and news.