SECURITY CHALLENGES OF IOT INTEGRATION IN NATIONAL AND STATE CRITICAL INFRASTRUCTURES
DOI:
https://doi.org/10.54658/ps.28153324.2025.13.3.pp.82-94Keywords:
Internet of Things (IoT), Critical Infrastructure Protection, Cybersecurity, Distributed Denial-of-Service (DDoS), Malware and Data ManipulationAbstract
This investigation scrutinizes the incorporation of Internet of Things (IoT) systems within national infrastructures, accentuating both operational advantages and notable security challenges. It delves into the stratified architecture of IoT, underscoring vulnerabilities that emerge from device constraints, varied deployment environments, and inadequate cybersecurity practices. The examination addresses external threats such as distributed denial-of-service attacks, malware, and data manipulation, in conjunction with internal risks including insider threats and misconfigurations. The ramifications of these threats on critical infrastructure sectors, such as energy, transportation, and healthcare, are evaluated, with a focus on operational disruptions and economic impacts. Emergent defense strategies involving Software-Defined Networking and machine learning-based anomaly detection are assessed for their capability to bolster security posture. Furthermore, the role of national cybersecurity strategies and regulatory frameworks is analyzed, concentrating on multi-stakeholder coordination, legal measures, and adaptive governance to manage evolving risks. The findings highlight the imperative of integrating technical, organizational, and policy approaches to protect IoT-enabled critical systems and sustain national security resilience.
Downloads
References
Ahmed, M. F., Molla, A. H., Uddin, M. R., & Chowdhury, T. R. (2023). Advancing cyber resilience: Bridging the divide between cyber security and cyber defense. International Journal for Multidisciplinary Research (IJFMR), 5(6), 1. http://www.ijfmr.com
Al-Garadi, M. A., Mohamed, A., Al-Ali, A., Du, X., & Guizani, M. (2020). A survey of machine and deep learning methods for internet of things (IoT) security.
Amro, A. (2024). IoT vulnerability scanning: A state of the art.
Ani, U. D., Watson, J. D. McK., Nurse, J. R. C., Cook, A., & Maple, C. (2019). A review of critical infrastructure protection approaches: improving security through responsiveness to the dynamic modelling landscape.
Attkan, A., & Ranga, V. (2022). Cyber-physical security for IoT networks: A comprehensive review on traditional, blockchain and artificial intelligence based key-security. Complex & Intelligent Systems, 8, 3559–3591. https://doi.org/10.1007/s40747-022-00667-z
Aufner, P. (2020). The IoT security gap: A look down into the valley between threat models and their implementation. International Journal of Information Security, 19(1), 3–14. https://doi.org/10.1007/s10207-019-00445-y
Budiman, I. (2022). National cyber defense of the indonesian government in protecting the society. MANDALA: Jurnal Ilmu Hubungan Interna Sional, 5(2), 231.
Buiya, M. R., Laskar, A. K. M. N., Islam, M. R., Shil, S. K., Chowdhury, M. S. R., Shawon, R. E. R., & Sumsuzoha, M. (2024). Detecting IoT cyberattacks: Advanced machine learning models for enhanced security in network traffic. Journal of Computer Science and Technology Studies, 6(4), 142. https://doi.org/10.32996/jcsts.2024.6.4.16
Chen, Z., Liu, J., Shen, Y., Simsek, M., Kantarci, B., Mouftah, H. T., & Djukic, P. (2022). Machine learning-enabled IoT security: Open issues and challenges under advanced persistent threats. ACM Computing Surveys, 35.
El-Sofany, H., El-Seoud, S. A., Karam, O. H., & Bouallegue, B. (2024). Using machine learning algorithms to enhance IoT system security. Scientific Reports, 14, 12077. https://doi.org/10.1038/s41598-024-62861-y
Garcia-Morchon, O., Kumar, S., & Sethi, M. (2019). Internet of things (IoT) security: State of the art and challenges. In Internet Research Task Force (IRTF) Request for Comments (8576; p. 1).
Group, I. I. C. S. W. (2018). Interagency report on the status of international cybersecurity standardization for the internet of things (IoT). https://doi.org/10.6028/NIST.IR.8200
Hadi, Q. A., Alfoudi, A. S., & Mahdi, A. M. (2023). IoT cybersecurity threats and detection mechanisms: A review. Wasit Journal for Pure Sciences, 2(2), 231.
Kudini, A. A. (2024). Internet of things based data integration ontology in cyber security. International Journal of Engineering Research and Applications, 14(11), 01–04. https://doi.org/10.9790/9622-14110104
Mohamed, N., Oubelaid, A., & Almazrouei, S. K. (2023). Staying ahead of threats: A review of AI and cyber security in power generation and distribution. International Journal of Electrical and Electronics Research (IJ EER), 11(1), 143–147. https://doi.org/10.37391/IJEER.110120
Oredola, C., & Ashraf, A. (2024). A systematic mapping study on SDN controllers for enhancing security in IoT networks. https://arxiv.org/abs/2408.01303v1
P0̆103tra0̆219cu, P. (2021). EMERGING TECHNOLOGIES AND NATIONAL SECURITY: THE IMPACT OF IoT IN CRITICAL INFRASTRUCTURES PROTECTION AND DEFENCE SECTOR. Land Forces Academy Review, XXVI(4(104)), 423. https://doi.org/10.2478/raft-2021-0055
Petrișor, P. (2021). Emerging technologies and national security: The impact of IoT in critical infrastructures protection and defence sector. Land Forces Academy Review, XXVI(4(104)), 423. https://doi.org/10.2478/raft-2021-0055
Rizky, R., Samuel, L. T. T., Handayani, K. S. N., & Zakky, A. H. (2023). Analysis of presidential regulations concerning cyber security to bolster defense policy management. Defense and Security Studies, 4, 84–93. https://doi.org/10.37868/dss.v4.id244
Schaberreiter, T., Röning, J., Quirchmayr, G., Kupfersberger, V., Wills, C., Bregonzio, M., Koumpis, A., Sales, J. E., Vasiliu, L., Gammelgaard, K., Papanikolaou, A., Rantos, K., & Spyros, A. A cybersecurity situational awareness and information-sharing solution for local public administrations based on advanced big data analysis: The CS-AWARE project.
Voronko, I. (2024). The security of IoT systems in railway transport. Transport Systems and Technologies, 4(3), 90. https://doi.org/10.32703/2617-9059-2024-43-7
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Rafał Lizut

This work is licensed under a Creative Commons Attribution 4.0 International License.

