Abstract

The identification of vulnerabilities in a mission-critical system is one of the challenges faced by a cyber-physical system (CPS). The incorporation of embedded Internet of Things (IoT) devices makes it tedious to identify vulnerability and difficult to control the service-interruptions and manage the operations losses. Rule-based mechanisms have been considered as a solution in the past. However, rule-based solutions operate on the goodwill of the generated rules and perform assumption-based detection. Such a solution often is far from the actual realization of the IoT runtime performance and can be fooled by zero-day attacks. Thus, this paper takes this issue as motivation and proposes better lightweight behavior rule specification-based misbehavior detection for the IoT-embedded cyber-physical systems (BRIoT). The key concept of our approach is to model a system with which misbehavior of an IoT device manifested as a result of attacks exploiting the vulnerability exposed may be detected through automatic model checking and formal verification, regardless of whether the attack is known or unknown. Automatic model checking and formal verification are achieved through a 2-layer Fuzzy-based hierarchical context-aware aspect-oriented Petri net (HCAPN) model, while effective misbehavior detection to avoid false alarms is achieved through a Barycentric-coordinated-based center of mass calculation method. The proposed approach is verified by an unmanned aerial vehicle (UAV) embedded in a UAV system. The feasibility of the proposed model is demonstrated with high reliability, low operational cost, low false-positives, low false-negatives, and high true positives in comparison with existing rule-based solutions.

Highlights

  • Misbehavior detection techniques for Internet of Things (IoT) embedded cyber-physical systems (CPS) in general can be classified into three types: signature-based, anomaly-based and specification-based techniques [12], [28]

  • We argue that contemporary anomaly-based misbehavior detection methods for IoT-embedded CPSs based on profiling and machine learning through correlation and statistical analysis of a large amount of data or logs for classifying misbehavior (e.g., [2], [6]–[7], [10]–[11], [14]–[15], [29]) will not work for IoT-embedded CPSs because of high memory, run time, communication, and computational overhead, considering the fact that many embedded IoT devices are severely constrained in resources

  • BRIoT is capable of formally verifying the correctness of behavior rules for any embedded IoT device and collecting/ analyzing compliance data for misbehavior detection

Read more

Summary

INTRODUCTION

Misbehavior detection techniques for Internet of Things (IoT) embedded cyber-physical systems (CPS) in general can be classified into three types: signature-based, anomaly-based and specification-based techniques [12], [28]. The goal of this work is to develop a Behavior Rule specification-based embedded-IoT misbehavior detection technique (called BRIoT for short) to achieve high accuracy in detecting misbehavior of an embedded IoT device in a CPS against zero-day attacks, without incurring high memory, run time, communication, or computation overhead by avoiding the high cost of profiling and learning anomaly patterns as in anomaly detection. VOLUME 7, 2019 indicators’’ (ABIs) and into a state machine for misbehavior detection at runtime; (4) design and implementation of a lightweight runtime collection module for collecting compliance degree data from runtime monitoring of an IoT device based on its derived state machine; (5) design and implementation of a lightweight statistical analysis module for effective misbehavior detection to avoid false alarms through a novel Barycentric-coordinated based center of mass calculation method; and (6) experimental verification by an unmanned aerial vehicle cyber physical system (UAV-CPS) demonstrating its superior performance over a contemporary specification-based intrusion detection solution called BRUIDS [18].

RRELATED WORK
VERIFICATION OF SPECIFICATION-BASED INTRUSION DETECTION
25. End While
30. End While
22. End If
APPLYING BRIOT TO UAV CPS
EVALUATION
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call