Communication Technologies and Specialised Communication Protocols for Ensuring Cybersecurity of the Internet of Things

Keywords: Internet of Things, Internet of Things architecture, Internet of Things security, Internet of Things security protocols, Internet of Things communication protocols, network protocols, cellular communication.

Abstract

Internet of Things devices are characterised by limited resources in terms of power, processing, memory and bandwidth. As a result, traditional protocols relating to network operations and security cannot be implemented in their current form in the specific environment of the Internet of Things.

Standardisation is necessary for the organisation of IoT interaction, because without established regulations, precise instructions and global standards, the industry will eventually face serious compatibility and security issues. In addition, many IoT devices process sensitive data that they can autonomously collect and distribute to other devices or the network. There is a need for stronger data protection measures and stricter controls for IoT devices that authenticate and interact on the network. Protecting IoT devices and communication protocols has become a priority in our increasingly connected world.

It is noted that the analysis of the security of IoT communication technologies using specialised communication protocols across networks with different topologies, communication ranges and bandwidths is a pressing issue, as the number of security and privacy breaches in the IoT ecosystem is growing, which is constantly expanding in various sectors of the economy and human life with the introduction of billions of heterogeneous smart devices. In addition, many Internet of Things networks cover a wide range of communication protocols, some of which may not have reliable security features, making them vulnerable to attacks.

The term “communication technology” is used to define communication protocols at each level of the Internet of Things platform architecture. In an effort to provide a better understanding of the architecture and use of Internet of Things technologies, the taxonomy presented in the article facilitates the effective separation of relevant Internet of Things technologies into channel-level protocols, network encapsulation protocols, and routing protocols according to their standards.

The study may encourage scientists and professionals to develop new and more effective network protocols based on the current gaps and shortcomings discussed in the article.

Downloads

Download data is not yet available.

Author Biography

P. S. Klimushyn, Kharkiv National University of Internal Affairs

Educational and Scientific Institute No. 4,

Department of Combating Cybercrime.

References

Aksoy, A., & Gunes, M. H. (2019, May 20–24). Automated IoT Device Identification using Network Traffic [Conference presentation abstract]. IEEE International Conference on Communications, Shanghai, China. https://doi.org/10.1109/ICC.2019.8761559.

Alam, M., Khan, S., & Shakil, K. A. (2020). Internet of Things (IoT): Concepts and Applications. Springer. https://doi.org/10.1007/978-3-030-37468-6.

Choudhary, S., & Kesswani, N., (2019). A Survey: Intrusion Detection Techniques for Internet of Things. International Journal of Information Security and Privacy, 13(1), 86–105. https://doi.org/10.4018/IJISP.2019010107.

Choudhary, S., & Meena, G. (2022). Internet of Things: Protocols, Applications and Security Issues. Procedia Computer Science, 215, 274–288. https://doi.org/10.1016/j.procs.2022.12.030.

Das, A. K., Zeadally, S., & He, D. (2018). Taxonomy and analysis of security protocols for the Internet of Things. Future Generation Computer Systems, 89, 110–125. https://doi.org/10.1016/j.future.2018.06.027.

Devasena, C. L. (2016). IPv6 low power wireless personal area network (6LoWPAN) for networking Internet of Things (IoT) – Analyzing its suitability for IoT. Indian Journal of Science and Technology, 9(30). https://doi.org/10.17485/ijst/2016/v9i30/98730.

Dizdarevic, J., Carpio, F., Jukan, A., & Masip-Bruin, X. (2018). A survey of communication protocols for Internet-of-Things and related challenges of fog and cloud computing integration. ACM Computing Surveys, 51(6). https://doi.org/10.1145/3292674.

Dragomir, D., Gheorghe, L., Costea, S., & Radovici, А. (2016, September 26–30). A Survey on Secure Communication Protocols for IoT Systems [Conference presentation abstract]. International Workshop on Secure Internet of Things, Heraklion, Greece. https://doi.org/10.1109/SIoT.2016.012.

Gerodimos, A., Maglaras, L, Kantzavelou, I., & Ayres, N. (2022). IoT: Communication Protocols and Security Threats. Electrical and Electronic Engineering, 1. https://doi.org/10.20944/preprints202111.0214.v2.

Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues. IEEE Communications Surveys & Tutorials, 17(3), 1293–1312. https://doi.org/10.1109/COMST.2015.2388550.

Gupta, B. B., & Quamara, M. (2020). An overview of the Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, 32(21). https://doi.org/10.1002/cpe.4946.

Hammi, M. T., Livolant, E., Bellot, P., Serhrouchni, A., & Minet, P. (2017). A lightweight IoT security protocol [Conference presentation abstract]. 1st Cyber Security in Networking Conference, Rio de Janeiro, Brazil. https://doi.org/10.1109/CSNET.2017.8242001.

Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., & Sikdar, B. (2019). A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access, 7, 82721–82743. https://doi.org/10.1109/ACCESS.2019.2924045.

Heđi, I., Špeh, I., & Šarabok, A. (2017). IoT network protocols comparison for the purpose of IoT-constrained networks [Conference presentation abstract]. 40th International Convention on Information and Communication Technology, Electronics and Microelectronics, Opatija, Croatia. https://doi.org/10.23919/MIPRO.2017.7973477.

Karthik, B. N., Parameswari, L. D., Harshini, R., & Akshaya, A. (2018). Survey on IOT & Arduino Based Patient Health Monitoring System. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 3(1), 1414–1417.

Klimushyn, P. S. (2025). Problematic aspects of IoT cybersecurity standardisation. Law and Safety, 1(96), 53–66. https://doi.org/10.32631/pb.2025.1.05.

Klimushyn, P. S., Roh, V. Ye., & Kolisnyk, T. P. (2023). Legal aspects of functional security standardisation of the Internet of Things. Law and Safety, 3(90), 200–213. https://doi.org/10.32631/pb.2023.3.17.

Krejčí, R., Hujňák, O., & Švepeš, M. (2017). Security survey of the IoT wireless protocols [Conference presentation abstract]. 25th Telecommunication Forum, Belgrade, Serbia. https://doi.org/10.1109/TELFOR.2017.8249286.

Liao, C. H., Shuai, H. H., & Wang, L. C. (2018). Eavesdropping prevention for heterogeneous Internet of Things systems [Conference presentation abstract]. 15th IEEE Annual Consumer Communications & Networking Conference, Las Vegas, USA. https://doi.org/10.1109/CCNC.2018.8319297.

Maglaras, L., Ferrag, M. A., Derhab, A., Mukherjee, M., Janicke, H., & Rallis, S. (2019). Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. Transactions on Security and Safety, 5(16). https://doi.org/10.4108/eai.15-10-2018.155856.

Mu, J., & Han, L. (2017). Performance analysis of the ZigBee networks in 5G environment and the nearest access routing for improvement. Ad Hoc Networks, 56(4). https://doi.org/10.1016/j.adhoc.2016.10.006.

Nebbione, G., & Calzarossa, M. C. (2020). Security of IoT application layer protocols: Challenges and findings. Future Internet, 12(3). https://doi.org/10.3390/fi12030055.

Okereke, G. E., Mathew, D. E., Ukeoma, P. E., Uzo, B. C., Umaru, A. A., & Dibiaezue, N. F. (2024). IoT Device Security and Network Protocols: A Survey on the Current Challenges, Vulnerabilities, and Countermeasures. International Advanced Research Journal in Science, Engineering and Technology, 11(7). https://doi.org/10.17148/IARJSET.2024.11701.

Pooja, K., Khaparkar, S., & Sahu, P. (2018). A Literature Survey on Zigbee / IEEE 802.15.4 System Implementation. International Journal of Current Engineering and Scientific Research, 2(4), 2503–2509. https://doi.org/10.31142/ijtsrd14574.

Radan, A., Samimi, H., & Moeni, A. (2018). A new lightweight authentication protocol in IoT environment for RFID tags. International Journal of Engineering and Technology, 4(7), 344–351. https://doi.org/10.14419/ijet.v7i4.7.23028.

Rahman, R. A., & Shah, B. (2016). Security analysis of IoT protocols: A focus in CoAP [Conference presentation abstract]. 3rd MEC International Conference on Big Data and Smart Cities, Muscat, Oman. https://doi.org/10.1109/ICBDSC.2016.7460363.

Ramirez, J., & Pedraza, C. (2017). Performance analysis of communication protocols for Internet of things platforms [Conference presentation abstract]. IEEE Colombian Conference on Communications and Computing, Cartagena, Colombia. https://doi.org/10.1109/ColComCon.2017.8088198.

Rani, D., & Gill, N. S. (2019). Review of Various IoT Standards and Communication Protocols. International Journal of Engineering Research and Technology, 12(5), 647–657.

Salman, T., & Jain, R. (2017a). A Survey of Protocols and Standards for Internet of Things. Advanced Computing and Communications, 1(1). https://doi.org/10.48550/arXiv.1903.11549.

Salman, T., & Jain, R. (2017b). Networking Protocols and Standards for Internet of Things. In H. Geng (Ed.), Internet of Things and Data Analytics Handbook (pp. 215–238). John Wiley & Sons. https://doi.org/10.1002/9781119173601.

Sardeshmukh, H., & Ambawade, D. (2017). Internet of Things: Existing protocols and technological challenges in security [Conference presentation abstract]. International Conference on Intelligent Computing and Control, Coimbatore, India. https://doi.org/10.1109/I2C2.2017.8321835.

Sonawala, N. M., Tank, B., & Patel, H. (2017). IoT Protocol based environmental data monitoring [Conference presentation abstract]. International Conference on Computing Methodologies and Communication, Erode, India. https://doi.org/10.1109/ICCMC.2017.8282629.

Tournier, J., Lesueur, F., Le Mouël, F., Guyon, L., & Ben-Hassine, H. (2021). A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things, 16(4). https://doi.org/10.1016/j.iot.2020.100264.

Triantafyllou, A., Sarigiannidis, P., & Lagkas, T. D. (2018). Network protocols, schemes, and mechanisms for Internet of Things (IoT): Features, open challenges, and trends. Wireless Communications and Mobile Computing, 2. https://doi.org/10.1155/2018/5349894.

Tukade, T. M., & Banakar, R. M. (2018). Data Transfer Protocols in IoT-An overview. International Journal of Pure and Applied Mathematics, 118(16), 121–138.

Yugha, R., & Chithra, S. (2020). A survey on technologies and security protocols: Reference for future generation IoT. Journal of Network and Computer Applications, 169. https://doi.org/10.1016/j.jnca.2020.102763.

Published
2025-06-30
How to Cite
Klimushyn, P. S. (2025) “Communication Technologies and Specialised Communication Protocols for Ensuring Cybersecurity of the Internet of Things”, Law and Safety, 97(2), pp. 52-68. doi: 10.32631/pb.2025.2.05.