Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches


  • Mahmood Al-Bahri Faculty of Computing and Information Technology, Sohar University, Sohar 311, Oman.
  • Wasin Alkishri Faculty of Computer Studies, Arab Open University, Muscat 130, Oman.
  • Falah Y. H. Ahmed Faculty of Computing and Information Technology, Sohar University, Sohar 311, Oman.
  • Marwan Alshar'e Faculty of Computing and Information Technology, Sohar University, Sohar 311, Oman.
  • Sanad Al Maskari Faculty of Computing and Information Technology, Sohar University, Sohar 311, Oman.




The Internet of Things (IoT) encompasses a network of different devices, both stationary and mobile, that may interact with the physical world. Ensuring the security of the Internet of Things (IoT) is of utmost importance in a world where devices are interconnected at various levels, including wearables, home automation, smart cities, industrial sectors, and more. Ensuring the security of this interconnected network of "things" and devices is imperative, leaving no space for mistakes or inadequacies. The purpose of this article is to present an approach that utilizes Digital Object Architecture (DOA) to identify Internet of Things (IoT) devices and applications within communication networks. This study investigates various methodologies for incorporating the DOA identifier into Internet of Things (IoT) devices that are equipped with a range of wireless data transmission modules. Furthermore, this study presents a security model that aims to strengthen the resolution system based on data transmission security. The objective is to reduce the number of service messages exchanged between internetwork parts and decrease network latency. The essay finishes by examining some strategies for modernizing DOA in order to improve the quality of service.


Download data is not yet available.


Lakhan, A., Mohammed, M. A., Zebari, D. A., Abdulkareem, K. H., Deveci, M., Marhoon, H. A., ... & Martinek, R. (2024). Augmented IoT Cooperative Vehicular Framework Based on Distributed Deep Blockchain Networks. IEEE Internet of Things Journal.

Abualkishik, A., Alzyadat, W., Al Share, M., Al-Khaifi, S., & Nazari, M. (2023). Intelligent Gesture Recognition System for Deaf People by using CNN and IoT. International Journal of Advances in Soft Computing & Its Applications, 15(1).

Yousif, J. H., & Abdalgader, K. (2022). Experimental and mathematical models for real-time monitoring and auto watering using IoT architecture. Computers, 11(1), 7.

Mohammed, M. A., Lakhan, A., Zebari, D. A., Abd Ghani, M. K., Marhoon, H. A., Abdulkareem, K. H., ... & Martinek, R. (2024). Securing healthcare data in industrial cyber-physical systems using combining deep learning and blockchain technology. Engineering Applications of Artificial Intelligence, 129, 107612.

Dayong, W., Bakar, K. B. A., & Isyaku, B. (2023). A Survey on IoT Task Offloading Decisions in Multi-access Edge Computing: A Decision Content Perspective. Qubahan Academic Journal, 3(4), 422-436.

Mohammed, M. A., Lakhan, A., Zebari, D. A., Abdulkareem, K. H., Nedoma, J., Martinek, R., ... & Tiwari, P. (2023). Adaptive secure malware efficient machine learning algorithm for healthcare data. CAAI Transactions on Intelligence Technology.

Zahid, H. M., Saleem, Y., Hayat, F., Khan, F. Z., Alroobaea, R., Almansour, F., ... & Ali, I. (2022). A framework for identification and classification of iot devices for security analysis in heterogeneous network. Wireless Communications and Mobile Computing, 2022.

Mohammed, M. A., Lakhan, A., Abdulkareem, K. H., et al. (2023). Homomorphic federated learning schemes enabled pedestrian and vehicle detection system. Internet of Things, 23, 100903.

Meidan, Y., Bohadana, M., Shabtai, A., Guarnizo, J. D., Ochoa, M., Tippenhauer, N. O., & Elovici, Y. (2017, April). ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis. In Proceedings of the symposium on applied computing (pp. 506-509).

Mohammed, M. A., Lakhan, A., Abdulkareem, K. Het al. (2023). Energy-efficient distributed federated learning offloading and scheduling healthcare system in blockchain based networks. Internet of Things, 22, 100815.

Al-Bahri, M., Ateya, A., Muthanna, A., Algarni, A. D., & Soliman, N. F. (2023). Digital Object Architecture for IoT Networks. Intelligent Automation & Soft Computing, 35(1).

Al-Bahri, M., Yankovsky, A., Kirichek, R., & Borodin, A. (2019). Smart system based on DOA & IoT for products monitoring & anti-counterfeiting. In 2019 4th MEC International Conference on Big Data and Smart City (ICBDSC) (pp. 1-5). IEEE.

Jubair, M. A., Mostafa, S. A., Zebari, D. A., et al. (2022). A QoS aware cluster head selection and hybrid cryptography routing protocol for enhancing efficiency and security of VANETs. IEEE Access, 10, 124792-124804.

Durand, A. (2019). Digital object architecture and the handle system. Los Angeles: ICANN—Office of the CTO.

Al-Bahri, M., & Al Kishri, W. (2022). DOA Based Identification for Devices and Applications of IoT in Heterogeneous Networks. In The International Conference on Innovations in Computing Research (pp. 417-428). Cham: Springer International Publishing.

Koball, C., Rimal, B. P., Wang, Y., Salmen, T., & Ford, C. (2023). IoT Device Identification Using Unsupervised Machine Learning. Information, 14(6), 320.

Kostas, K., Just, M., & Lones, M. A. (2022). IoTDevID: A behavior-based device identification method for the IoT. IEEE Internet of Things Journal, 9(23), 23741-23749.

Kolcun, R., Popescu, D. A., Safronov, V., Yadav, P., Mandalari, A. M., Mortier, R., & Haddadi, H. (2021). Revisiting iot device identification. arXiv preprint arXiv:2107.07818.

Khalil, U., Ahmad, A., Abdel-Aty, A. H., Elhoseny, M., El-Soud, M. W. A., & Zeshan, F. (2021). Identification of trusted IoT devices for secure delegation. Computers & Electrical Engineering, 90, 106988.

Kirubadevi, T., Ramamoorthy, S., & Rajavarman, V. N. (2019, November). Device identification and authentication for internet of things using predefined characteristics. In Journal of Physics: Conference Series (Vol. 1362, No. 1, p. 012067). IOP Publishing.

Al-Garadi, M. A., Mohamed, A., Al-Ali, A. K., Du, X., Ali, I., & Guizani, M. (2020). A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Communications Surveys & Tutorials, 22(3), 1646-1685.

Ahmed, F. Y., Yousif, J. H., Alshar’e, M., El Sheikh, M., Al-Ajmi, E., & Al-Bahri, M. (2024). Smart In-Cabin Air Monitoring System using IoT Technologies. Qubahan Academic Journal, 4(1), 78-90.



How to Cite

Al-Bahri, M., Alkishri, W. ., Y. H. Ahmed, F., Alshar’e, M. ., & Al Maskari, S. . (2024). Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches . Qubahan Academic Journal, 4(1), 224–239. https://doi.org/10.48161/qaj.v4n1a413




Most read articles by the same author(s)