Naif Alsharabi , Akashdeep Bhardwaj , Talal Alshammari , Shoayee alotaibi , Dhahi Alshammari , Amr Jadi
{"title":"IAPN: Framework to secure IoT-based infrastructures using Private APN","authors":"Naif Alsharabi , Akashdeep Bhardwaj , Talal Alshammari , Shoayee alotaibi , Dhahi Alshammari , Amr Jadi","doi":"10.1016/j.eij.2025.100671","DOIUrl":null,"url":null,"abstract":"<div><div>Private access point network (APN) routes data from mobile apps and devices directly into the vendor’s corporate data networks. Thus the mobile-to-mobile IoT deployments provide options for APN, VPN, and Fixed IP. These deployments transmit data using private APNs and do not share data on the Internet. This research proposes a secure, sustainable IoT framework to implement under a real-world IoT ecosystem by using APN or Private Access Point Name. The proposed APN model focuses on delivering better visibility, security, and network traffic flow control from devices to Cloud portals. By use of Common Vulnerability Scoring System (CVSS) metrics the authors observed the presence of exploits and specific vulnerabilities in IoT environments as per the security score. Fewer vulnerabilities do not always guarantee a lower security score. The authors discuss the management and sustenance of IoT Security and architecture, vulnerability metrics, and process to measure IoT device security is also proposed by the use of Private APN. The authors performed visualization on the Kaggle dataset for IoT sensor and tolerance values, creating scatterplots and counterplots. These confirmed the values are uniform and consistent along with the distribution plot. T-test null hypothesis was calculated to validate the two independent means. The proposed design has been implemented by an Indian startup organization to monitor and secure critical infrastructure and devices in real-world scenarios.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":"30 ","pages":"Article 100671"},"PeriodicalIF":5.0000,"publicationDate":"2025-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866525000647","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
Private access point network (APN) routes data from mobile apps and devices directly into the vendor’s corporate data networks. Thus the mobile-to-mobile IoT deployments provide options for APN, VPN, and Fixed IP. These deployments transmit data using private APNs and do not share data on the Internet. This research proposes a secure, sustainable IoT framework to implement under a real-world IoT ecosystem by using APN or Private Access Point Name. The proposed APN model focuses on delivering better visibility, security, and network traffic flow control from devices to Cloud portals. By use of Common Vulnerability Scoring System (CVSS) metrics the authors observed the presence of exploits and specific vulnerabilities in IoT environments as per the security score. Fewer vulnerabilities do not always guarantee a lower security score. The authors discuss the management and sustenance of IoT Security and architecture, vulnerability metrics, and process to measure IoT device security is also proposed by the use of Private APN. The authors performed visualization on the Kaggle dataset for IoT sensor and tolerance values, creating scatterplots and counterplots. These confirmed the values are uniform and consistent along with the distribution plot. T-test null hypothesis was calculated to validate the two independent means. The proposed design has been implemented by an Indian startup organization to monitor and secure critical infrastructure and devices in real-world scenarios.
期刊介绍:
The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.