Abstract

The rapid development of connected devices and the sensitive data, which they produce, is a major challenge for manufacturers seeking to fully protect their devices from attack. Consumers expect their IoT devices and data to be adequately protected against a wide range of vulnerabilities and exploits. Successful attacks target IoT devices, cause security problems, and pose new challenges. Successful attacks from botnets residing on mastered IoT devices increase significantly in number and the severity of the damage they cause is similar to that of a war. The characteristics of attacks vary widely from attack to attack and from time to time. The warnings about the severity of the attacks indicate that there is a need for solutions to address the attacks from birth. In addition, there is a need to quarantine infected IoT devices, preventing the spread of the virus and thus the formation of the botnet. This work introduces the exploitation of side-channel attack techniques to protect the low-cost smart devices intuitively, and integrates a machine learning-based algorithm for Intrusion Detection, exploiting current supply characteristic dissipation. The results of this work showed successful detection of abnormal behavior of smart IoT devices.

Highlights

  • The Internet of Things (IoT) is a new paradigm that is rapidly gaining ground in the scenario of capturing data and making them available for analysis from datacenters distributed worldwide.The basic idea behind this concept is the pervasive presence around people of a variety of computation objects—such as RFID tags, sensors, motors, cell phones, etc.—which, through unique addressing systems, are capable of interacting with each other, store and exchange data, and collaborate with their ’neighbors’ to achieve common goals [1]

  • The following installation will be considered for performing the intrusion detection tests

  • A custom surveillance digital IP camera serves as a ‘Target IoT device’ properly programmed to broadcast the captured video over the Internet

Read more

Summary

Introduction

The Internet of Things (IoT) is a new paradigm that is rapidly gaining ground in the scenario of capturing data and making them available for analysis from datacenters distributed worldwide.The basic idea behind this concept is the pervasive presence around people of a variety of computation objects (or things)—such as RFID tags, sensors, motors, cell phones, etc.—which, through unique addressing systems, are capable of interacting with each other, store and exchange data, and collaborate with their ’neighbors’ to achieve common goals [1]. IoT appeared in 1999, but since it has seen rapid growth in recent years, which raises high expectations and predictions of 500 billion devices to be online by 2030 [2] Considering this exponential growth of the Internet connected devices, which sometimes are weak computing systems (without dedicated to security software and hardware), various issues arise that are problems needing to be addressed, mainly on major security concerns for the designers and manufacturers of IoT devices [3,4,5,6].

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call