8 research outputs found

    IoT Security Evolution: Challenges and Countermeasures Review

    Get PDF
    Internet of Things (IoT) architecture, technologies, applications and security have been recently addressed by a number of researchers. Basically, IoT adds internet connectivity to a system of intelligent devices, machines, objects and/or people. Devices are allowed to automatically collect and transmit data over the Internet, which exposes them to serious attacks and threats. This paper provides an intensive review of IoT evolution with primary focusing on security issues together with the proposed countermeasures. Thus, it outlines the IoT security challenges as a future roadmap of research for new researchers in this domain

    Routing Attacs pada Internet Of Things Berbasis Smart Intrution Detecion System

    Get PDF
    Internet of Things (IoT) telah memasuki berbagai aspek kehidupan manusia, diantaranya smart city, smart home, smart street, dan smart industry yang memanfaatkan internet untuk memantau informasi yang dibutuhkan. Meskipun sudah dienkripsi dan diautentikasi, protokol jaringan IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) yang dapat menghubungkan benda-benda yang terbatas sumber daya di IoT masih belum dapat diandalkan. Hal ini dikarenakan benda-benda tersebut masih dapat terpapar oleh routing attacks yang berasal dari jaringan 6LoWPAN dan internet. Makalah ini menyajikan kinerja Smart Intrusion Detection System berdasarkan Compression Header Analyzer untuk menganalisis model routing attacks lainnya pada jaringan IoT. IDS menggunakan compression header 6LoWPAN sebagai fitur untuk machine learning algorithm dalam mempelajari jenis routing attacks. Skenario simulasi dikembangkan untuk mendeteksi routing attacks berupa selective forwarding attack dan sinkhole attack. Pengujian dilakukan menggunakan feature selection dan machine learning algorithm. Feature selection digunakan untuk menentukan fitur signifikan yang dapat membedakan antara aktivitas normal dan abnormal. Sementara machine learning algorithm digunakan untuk mengklasifikasikan routing attacks pada jaringan IoT. Ada tujuh machine learning algorithm yang digunakan dalam klasifikasi antara lain Random Forest, Random Tree, J48, Bayes Net, JRip, SMO, dan Naive Bayes. Hasil percobaan disajikan untuk menunjukkan kinerja Smart Intrusion Detection System berdasarkan Compression Header Analyzer dalam menganalisis routing attacks. Hasil evaluasi menunjukkan bahwa IDS ini dapat mendeteksi antara serangan dan non-serangan. AbstractInternet of Things (IoT) has entered various aspects of human life including smart city, smart home, smart street, and smart industries that use the internet to get the information they need. Even though it's encrypted and authenticated, Internet protocol  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) networks that can connect limited resources to IoT are still unreliable. This is because these objects can still be exposed to attacks from 6LoWPAN and the internet. This paper presents the performance of an Smart Intrusion Detection System based on Compression Header Analyzer to analyze other routing attack models on IoT networks. IDS uses a 6LoWPAN compression header as a feature for machine learning algorithms in learning the types of routing attacks. Simulation scenario was developed to detect routing attacks in the form of selective forwarding and sinkhole. Testing is done using the feature selection and machine learning algorithm. Feature selection is used to determine significant features that can distinguish between normal and abnormal activities. While machine learning algorithm is used to classify attacks on IoT networks. There were seven machine learning algorithms used in the classification including Random Forests, Random Trees, J48, Bayes Net, JRip, SMO, and Naive Bayes. Experiment Results to show the results of the Smart Intrusion Detection System based on Compression Header Analyzer in analyzing routing attacks. The evaluation results show that this IDS can protect between attacks and non-attacks

    Static analysis for discovering IoT vulnerabilities

    Get PDF
    The Open Web Application Security Project (OWASP), released the \u201cOWASP Top 10 Internet of Things 2018\u201d list of the high-priority security vulnerabilities for IoT systems. The diversity of these vulnerabilities poses a great challenge toward development of a robust solution for their detection and mitigation. In this paper, we discuss the relationship between these vulnerabilities and the ones listed by OWASP Top 10 (focused on Web applications rather than IoT systems), how these vulnerabilities can actually be exploited, and in which cases static analysis can help in preventing them. Then, we present an extension of an industrial analyzer (Julia) that already covers five out of the top seven vulnerabilities of OWASP Top 10, and we discuss which IoT Top 10 vulnerabilities might be detected by the existing analyses or their extension. The experimental results present the application of some existing Julia\u2019s analyses and their extension to IoT systems, showing its effectiveness of the analysis of some representative case studies

    Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing

    Get PDF
    The Internet of Things (IoT) envisions a world wherein everyday objects may connect to the internet and exchange data, analyse, store, and gather data from their environment and efficiently mediate on it. Fog computing, closer to the IoT, is formulated in data processing, filtering, aggregating, and storing. In fog IoT network one of the main challenges is security. The existing security solutions are based on modern cryptography algorithms are computationally complex which causes the fog IoT network to slow down. Therefore, in fog IoT the operations must be lightweight and secure. The security considerations include attacks, especially Man in the Middle attack (MitM), challenges, requirements, and existing solutions that are deeply analyzed and reviewed. Hence, omega network key generation based on deoxyribonucleic acid (ONDNA) is proposed, which provides lightweight encryption and decryption in fog computing. The security level of ONDNA is tested using NIST test suite. ONDNA passes all the 17 recommended NIST Test Suite tests. Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. The modified protocol is noted as OCTOPUS++. We proved that the OCTOPUS++ provides confidentiality, mutual authentication, and resistance to MitM attack using the widely accepted Burrows Abdi Needham (BAN) logic. The OCTOPUS++ is evaluated in terms of execution time. The average execution time for 20-time execution of OCTOPUS++ is 1.018917 milliseconds. The average execution time for Octopus, LAMAS and Amor is 2.444324, 20.1638 and 14.1152 milliseconds respectively. The results show that the OCTOPUS++ has less execution time than other existing protocol

    Secure policies for the distributed virtual machines in mobile cloud computing

    Get PDF
    Mobile Cloud Computing (MCC) is a combination of cloud computing and mobile computing through wireless technology in order to overcome mobile devices' resource limitations. In MCC, virtualization plays a key role whereas the cloud resources are shared among many users to help them achieve an efficient performance and exploiting the maximum capacity of the cloud’s servers. However, the lack of security aspect impedes the benefits of virtualization techniques, whereby malicious users can violate and damage sensitive data in distributed Virtual Machines (VMs). Thus, this study aims to provide protection of distributed VMs and mobile user’s sensitive data in terms of security and privacy. This study proposes an approach based on cloud proxy known as Proxy-3S that combines three security policies for VMs; user’s access control, secure allocation, and secure communication. The Proxy-3S keeps the distributed VMs safe in different servers on the cloud. It enhances the grants access authorization for permitted distributed intensive applications’ tasks. Furthermore, an algorithm that enables secure communication among distributed VMs and protection of sensitive data in VMs on the cloud is proposed. A prototype is implemented on a NetworkCloudSim simulator to manage VMs security and data confidentiality automatically. Several experiments were conducted using real-world healthcare distributed application in terms of efficiency, coverage and execution time. The experiments show that the proposed approach achieved lower attacker’s efficiency and coverage ratios; equal to 0.35 and 0.41 respectively in all experimented configurations compared with existing works. In addition, the execution time of the proposed approach is satisfactory ranging from 441ms to 467ms of small and large cloud configurations. This study serves to provide integrity and confidentiality in exchanging sensitive information among multistakeholder in distributed mobile applications

    IoT device security based on proxy re-encryption

    No full text

    MAMbO5: A new Ontology Approach for Modelling and Managing Intelligent Virtual Environments Based on Multi-Agent Systems

    Full text link
    [EN] An intelligent virtual environment simulates a physical world inhabited by autonomous intelligent entities. Multi-agent systems have been usually employed to design systems of this kind. One of the key aspects in the design of intelligent virtual environments is the use of appropriate ontologies which offer a richer and more expressive representation of knowledge. In this sense, this paper proposes an ontology comprising concepts for modelling intelligent virtual environments enhanced with concepts for describing agent-based organisational features. This new ontology, called MAMbO5, is used as an input of the JaCalIVE framework, which is a toolkit for the design and implementation of agent-based intelligent virtual environments.This work was supported by the project TIN2015-65515-C4-1-R of the Spanish government. This work has been supported in part by the Croatian Science Foundation under the project number 8537.Duric, BO.; Rincon, JA.; Carrascosa Casamayor, C.; Schatten, M.; Julian Inglada, VJ. (2019). MAMbO5: A new Ontology Approach for Modelling and Managing Intelligent Virtual Environments Based on Multi-Agent Systems. Journal of Ambient Intelligence and Humanized Computing. 10(9):3629-3641. https://doi.org/10.1007/s12652-018-1089-4S36293641109Ahmed Abbas H (2015) Organization of multi-agent systems: an overview. Int J Intell Inf Syst 4(3):46 (ISSN: 2328-7675)Amiribesheli M, Bouchachia H (2017) A tailored smart home for dementia care. J Ambient Intell Hum Comput 1:1–28 (ISSN: 1868-5137, 1868-5145)Amiribesheli M, Benmansour A, Bouchachia A (2015) A review of smart homes in healthcare. J Ambient Intell Hum Comput 6(4):495–517 (ISSN: 18685145) arXiv: TSMCC.2012.2189204 [10.1109]Barella A, Ricci A, Boissier O, Carrascosa C (2012) MAM5: multi-agent model for intelligent virtual environments. In: 10th European workshop on multi-agent systems (EUMAS 2012), pp 16–30Bordel B (2017) Self-configuration in humanized cyber-physical systems. J Ambient Intell Hum Comput 8(4):485–496 (ISSN: 1868-5137)Chaib A, Boussebough I, Chaoui A (2018) Adaptive service composition in an ambient environment with a multi-agent system. J Ambient Intell Hum Comput 9(2):367–380 (ISSN: 1868-5137)Chen X (2017) A multiagent-based model for pedestrian simulation in subway stations. Simul Modell Pract Theory 71:134–148 (ISSN: 1569-190X)Chen T, Chiu MC (2018) Smart technologies for assisting the life quality of persons in a mobile environment: a review. J Ambient Intell Hum Comput 9(2):319–327 (ISSN: 1868-5137)Corkill DD, Lander SE (1998) Diversity in agent organizations. Obj Mag 8(4):41–47De Wolf T (2004) Emergence and self-organisation: a statement of similarities and differences. In: Proceedings of of the 2nd international workshop on engineering self, pp 96–110Dignum V (2009) The role of organization in agent systems. English. In: Dignum V (ed) Handbook of research on multi-agent systems. Hershey, IGI Global, pp 1–16 (ISBN: 9781605662565)Fishwick PA, Miller JA (2004) Ontologies for modeling and simulation: issues and approaches. In: Simulation conference, 2004. Proceedings of the 2004 Winter, vol 1. IEEEFurfaro A (2016) Using virtual environments for the assessment of cybersecurity issues in IoT scenarios. Simul Modell Pract Theory 0:1–12Gabriele D, Ferretti S, Ghini V (2016) Multi-level simulation of Internet of Things on smart territories. Simul Modell Pract Theory 0:1–19Hadfi R, Ito T (2016) Holonic multiagent simulation of complex adaptive systems. In: Javier B(Ed) Highlights of practical applications of scalable multi-agent systems. The PAAMS collection: international workshops of PAAMS 2016, Sevilla, Spain, June 1-3, 2016. Proceedings. Springer, Cham, pp 137-147 (ISBN: 978-3-319-39387-2)Hofmann M, Palii J, Mihelcic G (2011) Epistemic and normative aspects of ontologies in modelling and simulation. J Simul 5(3):135–146Hui TKL, Sherratt RS (2017) Towards disappearing user interfaces for ubiquitous computing: human enhancement from sixth sense to super senses. J Ambient Intell Hum Comput 8(3):449–465 (ISSN: 1868-5137, 1868-5145)Kim S, Lee I (2018) IoT device security based on proxy re-encryption. J Ambient Intell Hum Comput 9(4):1267–1273 (ISSN: 1868-5137, 1868-5145)Ko E, Kim T, Kim H (2018) Management platform of threats information in IoT environment. J Ambient Intell Hum Comput 9(4):1167–1176 (ISSN: 1868-5137, 1868-5145)Liu Y, Xu C, Zhan Y, Liu Z, Guan J, Zhang H (2017) Incentive mechanism for computation offloading using edge computing: a stackelberg game approach. Comput Netw 129:399–409Liu Y, Bashar AAE, Wu B, Wu H (2018a) Delay-constrained profit maximization for data deposition in mobile opportunistic device-to-device networks. In: 2018 IEEE 19th international symposium on” a world of wireless, mobile and multimedia networks (WoWMoM), IEEE, pp 1–10Liu Y, et al (2018b) Delay-constrained utility maximization for video ads push in mobile opportunistic D2D networks. IEEE Internet Things JLuck M, Aylett R (2000) Applying artificial intelligence to virtual reality: intelligent virtual environments. Appl Artif Intell 14(1):3–32Marcon E (2017) A multi-agent system based on reactive decision rules for solving the caregiver routing problem in home health care. Simul Modell Pract Theory 74:134–151 (ISSN: 1569-190X)Mulero R (2018) Towards ambient assisted cities using linked data and data analysis. J Ambient Intell Hum Comput 9(5):1573–1591 (ISSN: 1868-5137, 1868-5145)Okreơa Đ B, Schatten M (2016) Defining ontology combining concepts of massive multi-player online role playing games and organization of large-scale multi-agent systems. In: Opatija HR (ed) 39th international convention on information and communication technology, electronics and microelectronics (MIPRO). IEEE, pp 1330–1335 (ISBN: 978-953-233-086-1)Ricci A, Viroli M, Omicini A (2007) Give agents their artifacts: the A&A approach for engineering working environments in MAS. In: Proceedings of the 6th international joint conference on autonomous agents and multiagent systems, p 150Rincon JA, Carrascosa C, Garcia E (2014) Developing intelligent virtual environments using MAM5 meta-model. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) 8473 LNAI, pp 379–382 (ISSN: 16113349)Rincon J (2016) Extending MAM5 meta-model and JaCalIV E framework to integrate smart devices from real environments. PLoS One 11:e0149665. https://doi.org/10.1371/journal.pone.0149665Rincon J, Garcia E, Julian V, Carrascosa C (2018) The jacalive framework for mas in IVE: a case study in evolving modular robotics. Neurocomputing 275:608–617Rodriguez S (2011) Holonic multi-agent systems. In: Di Marzo SG, Gleizes MP, Karageorgos A (eds) Natural computing series, natural computing series, vol 37. Springer, Heidelberg, pp 251–279 (ISBN: 978-3-642-17347-9)Samara A, et al. (2017) Affective state detection via facial expression analysis within a human–computer interaction context. J Ambient Intell Hum Comput (ISSN: 1868-5137, 1868-5145)Schatten M (2014) Organizational architectures for large-scale multi-agent systems’ development: an initial ontology. In: Sigeru O, et al (Ed) Advances in intelligent systems and computing, vol 290, pp 261–268Schatten M (2014) Towards a formal conceptualization of organizational design techniques for large scale multi agent systems. Procedia Technol 15:577–586 (ISSN: 22120173)Sharpanskykh A, Treur J (2012) An ambient agent architecture exploiting automated cognitive analysis. J Ambient Intell Hum Comput 3(3):219–237 (ISSN: 1868-5137, 1868-5145)Weyns D, Haesevoets R, Helleboogh A (2010) The MACODO organization model for context-driven dynamic agent organizations. ACM Trans Auton Adapt Syst 5(4):1–29 (ISSN: 15564665)Yang G, Kifer M, Zhao C (2003) Flora-2: a rule-based knowledge representation and inference infrastructure for the semantic web. In: Robert M, Zahir T, Douglas CS(Ed) On the move to meaningful internet systems 2003: CoopIS, DOA, and ODBASE: OTM confederated international conferences, CoopIS, DOA, and ODBASE 2003, Catania, Sicily, Italy, November 3-7, 2003. Proceedings. Springer, Berlin, pp 671-688 (ISBN: 978-3-540-39964-3)Zehe D, et al (2015) SEMSim cloud service: large-scale urban systems simulation in the cloud. In: 58, pp 157–17
    corecore