Abstract

The Internet of Things (IoT) context brings new security issues due to billions of smart end-devices both interconnected in wireless networks and connected to the Internet by using different technologies. In this paper, we propose an attack-detection method, named Data Intrusion Detection System (DataIDS), based on real-time data analysis. As end devices are mainly resource constrained, Fog Computing (FC) is introduced to implement the DataIDS. FC increases storage, computation capabilities, and processing capabilities, allowing it to detect promptly an attack with respect to security solutions on the Cloud. This paper also considers an attack tree to model threats and vulnerabilities of Fog/IoT scenarios with heterogeneous devices and suggests countermeasure costs. We verify the performance of the proposed DataIDS, implementing a testbed with several devices that measure different physical quantities and by using standard data-gathering protocols.

Highlights

  • The advent of the Internet of Things (IoT) opens up new vulnerabilities for both security and privacy due to the massive number of resource-constrained devices connected to the Internet by using various technologies.The IoT paradigm is worsening the overall security issues due to the heterogeneity of connectedIoT hardware platforms and to the variety of network technologies for interconnections (e.g., Bluetooth, 802.15.4, NarrowBand IoT (NB-IoT), etc.), all with potential flaws and vulnerability to attacks

  • We proposed a novel IDS based on the analysis of data acquired in real-time by different Fog/IoT devices

  • Data Intrusion Detection System (DataIDS) can promptly detect a cyber attack affecting a device of the Fog Computing (FC)/IoT

Read more

Summary

Introduction

The advent of the Internet of Things (IoT) opens up new vulnerabilities for both security and privacy due to the massive number of resource-constrained devices connected to the Internet by using various technologies.The IoT paradigm is worsening the overall security issues due to the heterogeneity of connectedIoT hardware platforms (i.e., different firmware types, revisions, etc.) and to the variety of network technologies for interconnections (e.g., Bluetooth, 802.15.4, NarrowBand IoT (NB-IoT), etc.), all with potential flaws and vulnerability to attacks. The advent of the Internet of Things (IoT) opens up new vulnerabilities for both security and privacy due to the massive number of resource-constrained devices connected to the Internet by using various technologies. An IoT device (a thing) can be a light bulb, a thermostat, a smartphone, a personal computer, or potentially everything. IoT devices have to face many threats originating from the Internet and can become a source of attacks towards the Internet. A fairly recent example of this issue is a Distributed Denial of Service (DDoS) attack that occurred in 2016 against the service DynDNS [2]: the malware Mirai [3] was responsible of the botnet creation composed by “innocent” IoT devices such as IP cameras, printers, and baby monitors. Jackware is a ransomware version designed for IoTs to hit smart devices, and as a consequence, millions of users would be willing to pay the ransom if unable to carry out daily commands at home or in the car

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.