Nanotechnology in Cybersecurity Detection Systems
DOI:
https://doi.org/10.47611/jsrhs.v13i3.7469Keywords:
Nanotechnology, Cybersecurity, Intrusion Detection Systems, Nanosensors, Cryptographic Hardware, Self-healing Nanomaterials, Nano-based Encrypted CommunicationAbstract
This paper goes over the uses of how nanotechnology can be used to contribute towards the development of cybersecurity Intrusion Detection Systems. By looking through different studies and research papers the identified gap was of how nanosensors, nano-based encrypted communications, and self-healing nanomaterials can benefit Intrusion Detection Systems and are what is discussed and developed through the paper. The results from the research show that while most of these ideas are still in the stage of conceptualization, there are still some promising ideas that can be further developed. Nanosensors and neuromorphic computers are both able to improve the speed and accuracy of detecting intrusions. Alongside that, cryptographic hardware and optical encryption can assist in providing more security for the protected data. Organic Field-Effect Transistors and triboelectric nanogenerators can also be looked into as they both are forms of power supplies that allow for a more stable system that is also low maintenance. As such, these results bring forth the conclusion that nanotechnology holds promise for the future for contributing towards the development of Intrusion Detection Systems. This research paper provides ideas and technologies that can be further looked into as these conceptualizations of combined nanotechnology ideas become made into actual technologies.
Downloads
References or Bibliography
AIFlowchart. (n.d.). https://aiflowchart.io/
AZoNano. (2023, July 18). Nanosensors: definition, applications and how they work. https://www.azonano.com/article.aspx?ArticleID=1840
Barney, N., & Lutkevich, B. (2023, April 24). neuromorphic computing. Enterprise AI. https://www.techtarget.com
Bayda, S., Adeel, M., Tuccinardi, T., Cordani, M., & Rizzolio, F. (2019). The history of nanoscience and nanotechnology: From chemical–physical applications to nanomedicine. Molecules, 25(1), 112. https://doi.org/10.3390/molecules25010112
Brode, B. (2023, December 8). How nanotechnology will disrupt cybersecurity. https://www.darkreading.com/threat-intelligence/how-nanotechnology-will-disrupt-cybersecurity
Corporation, C. (n.d.). What is optical encryption? https://www.ciena.com.
Gao, Y., He, L., Liu, D., Zhang, J., Zhou, L., Wang, Z. L., & Wang, J. (2024b). Spontaneously established reverse electric field to enhance the performance of triboelectric nanogenerators via improving Coulombic efficiency. Nature Communications, 15(1). https://doi.org/10.1038/s41467-024-48456-1
GeeksforGeeks. (2022, July 12). Difference between HIDs and NIDs. GeeksforGeeks. https://www.geeksforgeeks.org/difference-between-hids-and-nids/
Gillis, A. S. (2022, January 28). quantum cryptography. Security. https://www.techtarget.com
History of Intrusion Detection & Prevention. (n.d.). Secureworks. https://www.secureworks.com/blog/the-evolution-of-intrusion-detection-prevention
Javaid, M., Haleem, A., Singh, R. P., Rab, S., & Suman, R. (2021). Exploring the potential of nanosensors: A brief overview. Sensors International, 2, 100130. https://doi.org/10.1016/j.sintl.2021.100130
Jones, A. K., Sielken, R. S., & Department of Computer Science, University of Virginia. (2000). Computer System Intrusion Detection: a survey. https://www.princeton.edu
Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2(1). https://doi.org/10.1186/s42400-019-0038-7
Mashkoor, F., Lee, S. J., Yi, H., Noh, S. M., & Jeong, C. (2022). Self-Healing materials for electronics applications. International Journal of Molecular Sciences, 23(2), 622. https://doi.org/10.3390/ijms23020622
Masoumi, M., Shi, W., & Xu, L. (2015b). Nanoscale cryptography: opportunities and challenges. Nano Convergence, 2(1). https://doi.org/10.1186/s40580-015-0052-8
Nanotechnology and National Security - International Institute for Nanotechnology. (2021, June 30). International Institute for Nanotechnology. https://www.iinano.org/security/
Optica Publishing Group. (n.d.). https://opg.optica.org/aop/fulltext.cfm?uri=aop-9-2-218&id=362741
Regali, V. (2022, October 20). History of Cyber Security - Cyber Security degree. Cyber Security Degree. https://cyber-security.degree/resources/history-of-cyber-security/
Reeve, A. (2013). Conclusion to managing data in motion. In Elsevier eBooks (pp. 157–166). https://doi.org/10.1016/b978-0-12-397167-8.00022-4
Taha, T. B., Barzinjy, A. A., Hussain, F. H. S., & Nurtayeva, T. (2022). Nanotechnology and Computer Science: Trends and advances. Memories, Materials, Devices, Circuits and Systems, 2, 100011. https://doi.org/10.1016/j.memori.2022.100011
What is Nanotechnology? - International Institute for Nanotechnology. (2022, September 2). International Institute for Nanotechnology. https://www.iinano.org/what-is-nanotechnology/
What is cybersecurity? (2024, February 22). Cisco. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
Yue, H., Wang, Z., & Zhen, Y. (2022b). Recent advances of Self-Healing electronic materials applied in organic Field-Effect transistors. ACS Omega, 7(22), 18197–18205. https://doi.org/10.1021/acsomega.2c00580
Zhai, L., Narkar, A., & Ahn, K. (2020). Self-healing polymers with nanomaterials and nanostructures. Nano Today, 30, 100826. https://doi.org/10.1016/j.nantod.2019.100826
Published
How to Cite
Issue
Section
Copyright (c) 2024 Sagarika Senthilkumar; Dr. Kristina Lilova, Virgel Torremocha, Jothsna Kethar

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.


