From Perimeter to Posture: Securing Physical Devices in IoT with Adaptive Cyber Defense

Authors

  • Suman Thapaliya Department of IT, Lincoln University College, Kathmandu, Nepal Author
  • Dipak Adhikari Department of IT, Lincoln University College, Kathmandu, Nepal Author
  • Sangita Panta Department of Management, Lincoln University College, Kathmandu, Nepal Author

DOI:

https://doi.org/10.64229/92qar538

Keywords:

IoT Security, Physical Devices, Adaptive Cyber Defense, Zero Trust, Network Access Control, AI-driven Security, Device Posture, Cyber Resilience

Abstract

The rapid proliferation of the Internet of Things (IoT) has transformed digital ecosystems, enabling pervasive connectivity across industries, healthcare, smart homes, and financial infrastructures. However, the physical devices that underpin IoT ecosystems remain highly vulnerable, often constrained by limited computational capacity and weak native security mechanisms. Traditional perimeter-based defenses, designed for static enterprise networks, fail to address dynamic device-level threats, insider risks, and sophisticated adversarial tactics. This paper proposes a posture-centric adaptive cyber defense framework that leverages Zero Trust principles, Network Access Control (NAC), and Artificial Intelligence (AI)-driven anomaly detection to safeguard physical IoT devices. A mixed-methods approach, combining systematic literature review, architecture modeling, and simulated threat scenarios, was employed to evaluate the framework. Findings reveal that posture-based continuous validation enhances resilience by reducing insider risks, mitigating device-level compromise, and automating incident response. By shifting from perimeter-based to posture-centric defense, this study contributes a scalable, adaptive, and intelligence-driven security model essential for future-proofing IoT ecosystems.

References

[1]R. H. Weber, “Internet of Things - New security and privacy challenges,” Computer Law & Security Review, vol. 26, no. 1, pp. 23-30, 2010.

[2]F. A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, “Internet of Things security: A survey,” Journal of Network and Computer Applications, vol. 88, pp. 10-28, Jun. 2017.

[3]S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Computer Networks, vol. 76, pp. 146-164, 2015.

[4]R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed Internet of Things,” Computer Networks, vol. 57, no. 10, pp. 2266-2279, Jul. 2013.

[5]Shahid, N. Aneja, and H. Kim, “IoT security perspectives and challenges: Future directions,” Journal of Cloud Computing, vol. 9, no. 1, pp. 1-19, 2020.

[6]J. Kindervag, Build Security into Your Network’s DNA: The Zero Trust Network Architecture, Forrester Research, 2010.

[7]S. Rose, O. Borchert, S. Mitchell, and S. Connelly, Zero Trust Architecture, NIST Special Publication 800-207, 2020.

[8]S. Raj and B. Shanmugam, “IoT device posture assessment for security compliance,” Journal of Information Security and Applications, vol. 59, p. 102828, 2021.

[9]L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153-1176, 2016.

[10]Y. Liu, J. Zhang, and X. Chen, “Machine learning for IoT security: Threat detection and adaptive response,” ACM Computing Surveys, vol. 55, no. 3, pp. 1-38, 2022.

[11]R. Sadeghi, C. Wachsmann, and M. Waidner, “Security and privacy challenges in industrial Internet of Things,” in Proc. 52nd Annual Design Automation Conf. (DAC), 2015, pp. 1-6.

[12]Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, “Kitsune: An ensemble of autoencoders for online network intrusion detection,” in Proc. NDSS Symposium, 2018, pp. 1-15.

[13]Y. Meidan et al., “N-BaIoT: Network-based detection of IoT botnet attacks using deep autoencoders,” IEEE Pervasive Computing, vol. 17, no. 3, pp. 12-22, 2018.

[14]Dorri, S. S. Kanhere, and R. Jurdak, “Blockchain in Internet of Things: Challenges and solutions,” in Proc. IEEE Int. Conf. Distributed Computing Systems Workshops, 2017, pp. 173-180.

[15]ETSI, Cyber Security for Consumer Internet of Things: Baseline Requirements, ETSI EN 303 645 V2.1.1, 2020.

[16]ENISA, Baseline Security Recommendations for IoT, European Union Agency for Cybersecurity, 2017.

[17]OWASP, OWASP IoT Top 10, Open Worldwide Application Security Project, 2021.

[18]IEEE, IEEE Std 802.1X™-2020: Port-Based Network Access Control, IEEE Standards Association, 2020.

[19]NIST, Foundational Cybersecurity Activities for IoT Device Manufacturers, NISTIR 8259, 2020.

[20]NIST, IoT Device Cybersecurity Guidance for the Federal Government, NIST SP 800-213, 2021.

Downloads

Published

2025-09-23

Issue

Section

Articles