Abstract

In this paper, we develop a methodology to capture and analyze the interplay of attack-defense strategies for intrusion detection in an autonomous distributed Internet of Things (IoT) system. In our formulation, every node must participate in lightweight intrusion detection of a neighbor target node. Consequently, every good node would play a set of defense strategies to faithfully defend the system while every bad node would play a set of attack strategies for achieving their own goals. We develop an analytical model based on Stochastic Petri Net (SPN) modeling techniques. Our methodology allows the optimal defense strategies to be played by good nodes to maximize the system lifetime when given a set of parameter values characterizing the distributed IoT system operational environment. We conduct a detailed performance evaluation based on an experiment dataset deriving from a reference autonomous distributed IoT system comprising 128 sensor-carrying mobile nodes and show how IDS defense mechanisms can counter malicious attack mechanisms under the ADIoTS system while considering multiple failure conditions.

Highlights

  • Security of Internet of Things (IoT) is of paramount importance given its widespread adoption

  • Our work has the following unique contributions: 1) We develop a methodology to capture and analyze the interplay of attack-defense strategies while attackers/defenders execute their required IDS functions in the form of voting-based intrusion detection in an autonomous distributed IoT system (ADIoTS). 2) We develop an analytical model based on Stochastic Petri Net (SPN) modeling techniques [1] to describe the dynamics of IDS attack/defense strategies and examine their effect on system lifetime

  • Compared to the works cited above [15]–[18], our work adopts model-based analysis, i.e., we develop an analytical model based on Stochastic Petri Nets (SPNs) [19] to analyze the interplay of attack-defense strategies employed by voting members during IDS voting and identifying the best defense strategies to be employed to maximize the IoT system lifetime, given system failure conditions as input

Read more

Summary

Introduction

Security of Internet of Things (IoT) is of paramount importance given its widespread adoption. This is especially critical for security-sensitive IoT systems tasked with disaster recovery, evacuation, and military operations. An instance of ADIoTS is a mission-oriented IoT system populated with autonomous, smart IoT devices including smart sensors, actuators, and control nodes, for executing a specific mission. Possible application scenarios may involve a team of Unmanned Aerial Vehicles (UAVs), soldiers, automobiles, or robots monitoring and patrolling a combat area, and relaying critical information to the base for combat advantages.

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call