{"id":"https://openalex.org/W4406416625","doi":"https://doi.org/10.1109/ic3i61595.2024.10829198","title":"Fortifying IoT: A Cybersecurity Model for Secure Implementation","display_name":"Fortifying IoT: A Cybersecurity Model for Secure Implementation","publication_year":2024,"publication_date":"2024-09-18","ids":{"openalex":"https://openalex.org/W4406416625","doi":"https://doi.org/10.1109/ic3i61595.2024.10829198"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i61595.2024.10829198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i61595.2024.10829198","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 7th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062181201","display_name":"B. T. Geetha","orcid":null},"institutions":[{"id":"https://openalex.org/I85461943","display_name":"Saveetha University","ror":"https://ror.org/0034me914","country_code":"IN","type":"education","lineage":["https://openalex.org/I85461943"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"B. T. Geetha","raw_affiliation_strings":["Saveetha University,Saveetha School of Engineering, SIMATS,Department of ECE,Tamil Nadu,India"],"affiliations":[{"raw_affiliation_string":"Saveetha University,Saveetha School of Engineering, SIMATS,Department of ECE,Tamil Nadu,India","institution_ids":["https://openalex.org/I85461943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019723793","display_name":"Dipen Bhuva","orcid":"https://orcid.org/0000-0002-8982-6209"},"institutions":[{"id":"https://openalex.org/I102607778","display_name":"Cleveland State University","ror":"https://ror.org/002tx1f22","country_code":"US","type":"education","lineage":["https://openalex.org/I102607778"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dipen Bhuva","raw_affiliation_strings":["Cleveland State University,Department of EECS,Cleveland,Ohio,USA"],"affiliations":[{"raw_affiliation_string":"Cleveland State University,Department of EECS,Cleveland,Ohio,USA","institution_ids":["https://openalex.org/I102607778"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102768662","display_name":"Abhishek Bhuva","orcid":"https://orcid.org/0000-0002-1035-203X"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]},{"id":"https://openalex.org/I33434090","display_name":"University of Massachusetts Boston","ror":"https://ror.org/04ydmy275","country_code":"US","type":"education","lineage":["https://openalex.org/I33434090"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abhishek Bhuva","raw_affiliation_strings":["University of Massachusetts Boston, Massachusetts,Department of Computer Science,Boston,USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Boston, Massachusetts,Department of Computer Science,Boston,USA","institution_ids":["https://openalex.org/I33434090","https://openalex.org/I111088046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115939813","display_name":"Maulik Devendrabhai Trivedi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Maulik Devendrabhai Trivedi","raw_affiliation_strings":["Darshan University,Computer Science and Engineering,Rajkot"],"affiliations":[{"raw_affiliation_string":"Darshan University,Computer Science and Engineering,Rajkot","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002055605","display_name":"Manoj Sathe","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dr. Manoj Sathe","raw_affiliation_strings":["PES Modern Institute of Business Studies,Computer Science,Pune,India"],"affiliations":[{"raw_affiliation_string":"PES Modern Institute of Business Studies,Computer Science,Pune,India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058717339","display_name":"Ritesh Kumar Singhal","orcid":null},"institutions":[{"id":"https://openalex.org/I166533956","display_name":"Institute of Management Technology","ror":"https://ror.org/05k0kb696","country_code":"IN","type":"education","lineage":["https://openalex.org/I166533956"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ritesh Kumar Singhal","raw_affiliation_strings":["Management, Ajay Kumar Garg Institute of Management,Ghaziabad"],"affiliations":[{"raw_affiliation_string":"Management, Ajay Kumar Garg Institute of Management,Ghaziabad","institution_ids":["https://openalex.org/I166533956"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5062181201"],"corresponding_institution_ids":["https://openalex.org/I85461943"],"apc_list":null,"apc_paid":null,"fwci":0.3653,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66176051,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"415","last_page":"420"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.8131600618362427},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6608985662460327},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.610152006149292}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8131600618362427},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6608985662460327},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.610152006149292}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i61595.2024.10829198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i61595.2024.10829198","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 7th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2009495439","https://openalex.org/W2043579558","https://openalex.org/W2050588495","https://openalex.org/W2091673436","https://openalex.org/W2561342496","https://openalex.org/W2594816977","https://openalex.org/W2618136360","https://openalex.org/W2700774434","https://openalex.org/W2902825235","https://openalex.org/W2907055189","https://openalex.org/W2951840990","https://openalex.org/W2972919318","https://openalex.org/W2973414607","https://openalex.org/W2980701762","https://openalex.org/W2998841584","https://openalex.org/W3042397424","https://openalex.org/W3101185229","https://openalex.org/W3118551121","https://openalex.org/W3152184839","https://openalex.org/W3172336096","https://openalex.org/W3179737025","https://openalex.org/W4206713037","https://openalex.org/W4241467181","https://openalex.org/W4313481445","https://openalex.org/W4366590727","https://openalex.org/W4392746043","https://openalex.org/W4392746170"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2390279801","https://openalex.org/W2625093826","https://openalex.org/W4391913857","https://openalex.org/W2358668433"],"abstract_inverted_index":{"The":[0,31],"advancement":[1],"of":[2,5,28,155,161,169,178],"the":[3,25,115,139,159,162,170,183,197],"Internet":[4,154],"Things":[6,156],"(IoT)":[7],"has":[8,14],"developed":[9],"many":[10],"opportunities,":[11],"but":[12,48],"it":[13,56],"also":[15],"generated":[16],"new":[17,128],"attack":[18],"vectors":[19],"and":[20,40,98,119,146,175,180,195],"vulnerabilities":[21],"that":[22,37,54,89,125,137],"could":[23],"jeopardise":[24],"availability,":[26],"confidentiality":[27],"linked":[29],"systems.":[30],"IoT":[32,44,83,207],"is":[33,46,65,85],"a":[34,81,86,92,152,167,172,190],"prospective":[35],"technology":[36],"links":[38],"living":[39],"non-living":[41],"objects":[42],"globally.":[43],"adoption":[45],"accelerating,":[47],"there":[49],"are":[50,109],"still":[51],"security":[52,101,123,135],"gaps":[53],"leave":[55],"vulnerable":[57],"to":[58,67,76,96,150],"several":[59],"cyberattacks.":[60],"A":[61],"properly":[62],"secure":[63,82,153],"network":[64],"essential":[66],"any":[68],"network\u2019s":[69],"success;":[70],"otherwise,":[71],"users":[72],"may":[73,164],"be":[74,165],"unwilling":[75],"use":[77],"this":[78,104],"technology.":[79],"Creating":[80],"environment":[84],"difficult":[87],"task":[88],"calls":[90],"for":[91,117,141,182,192,203],"methodical,":[93],"comprehensive":[94,174],"strategy":[95],"recognise":[97],"address":[99],"possible":[100],"risks.":[102],"In":[103],"sense,":[105],"cybersecurity":[106],"research":[107],"considerations":[108],"crucial":[110],"since":[111],"they":[112],"serve":[113],"as":[114,189,200,202],"basis":[116,140],"creating":[118,142],"putting":[120],"into":[121],"practice":[122],"solutions":[124],"can":[126],"handle":[127],"threats.":[129],"Scientists":[130],"must":[131],"first":[132],"create":[133,151],"strict":[134],"criteria":[136],"provide":[138],"safe":[143],"chipsets,":[144],"devices,":[145],"networks":[147],"in":[148],"order":[149],"ecosystem.":[157],"Consequently,":[158],"product":[160],"effort":[163],"called":[166],"\u201cconclusion":[168],"conclusions,\u201d":[171],"more":[173],"condensed":[176],"set":[177],"data":[179],"suggestions":[181],"scientific":[184],"community.":[185],"This":[186],"content":[187],"acts":[188],"baseline":[191],"stakeholders":[193],"utilising":[194],"implementing":[196],"recommended":[198],"strategies,":[199],"well":[201],"future":[204],"study":[205],"on":[206],"cybersecurity.":[208]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
