Hostname: page-component-89b8bd64d-9prln Total loading time: 0 Render date: 2026-05-06T19:30:25.481Z Has data issue: false hasContentIssue false

Enhancing resilience in IoT cybersecurity: the roles of obfuscation and diversification techniques for improving the multilayered cybersecurity of IoT systems

Published online by Cambridge University Press:  13 December 2024

Sampsa Rauti*
Affiliation:
Department of Computing, University of Turku, Turku, Finland
Samuli Laato
Affiliation:
Department of Computing, University of Turku, Turku, Finland Faculty of Information Technology and Communication Science, Tampere University, Tampere, Finland
*
Corresponding author: Sampsa Rauti; Email: sjprau@utu.fi

Abstract

In our digitalized modern society where cyber-physical systems and internet-of-things (IoT) devices are increasingly commonplace, it is paramount that we are able to assure the cybersecurity of the systems that we rely on. As a fundamental policy, we join the advocates of multilayered cybersecurity measures, where resilience is built into IoT systems by relying on multiple defensive techniques. While existing legislation such as the General Data Protection Regulation (GDPR) also takes this stance, the technical implementation of these measures is left open. This invites research into the landscape of multilayered defensive measures, and within this problem space, we focus on two defensive measures: obfuscation and diversification. In this study, through a literature review, we situate these measures within the broader IoT cybersecurity landscape and show how they operate with other security measures built on the network and within IoT devices themselves. Our findings highlight that obfuscation and diversification show promise in contributing to a cost-effective robust cybersecurity ecosystem in today’s diverse cyber threat landscape.

Information

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0), which permits unrestricted re-use, distribution and reproduction, provided the original article is properly cited.
Copyright
© The Author(s), 2024. Published by Cambridge University Press
Figure 0

Table 1. Key cybersecurity characteristics of IoT devices

Figure 1

Figure 1. An overview of the research process in this study.

Figure 2

Table 2. The search terms

Figure 3

Figure 2. The publication years of the studies on IoT cybersecurity (black columns) compared to the publication years of diversification and obfuscation for IoT cybersecurity (red line). Both trends are similar in trajectory with no notable observable differences.

Figure 4

Figure 3. Visualizing the bibliometric co-word analysis.

Figure 5

Table 3. The obfuscation targets

Figure 6

Figure 4. An example of the practical architecture of the multilayered software security scheme. NOTE: This is not an exhaustive summary of all possible cybersecurity measures, but rather, it is an exemplar of cybersecurity architecture.

Figure 7

Table 4. Existing popular privacy policies discussed in this study

Figure 8

Table 5. Future research agenda on obfuscation and diversification techniques for IoT devices

Submit a response

Comments

No Comments have been published for this article.