DAM: A Theoretical Framework for SensorSecurity in IoT Applications

##plugins.themes.academic_pro.article.main##

Bisma Gulzar
Ankur Gupta

Abstract

As IoT applications are pervasively deployed across multiple domains, the potential impact of their security vulnerabilities are also accentuated. Sensor nodes represent a critical security vulnerability in the IoT ecosystem as they are exposed to the environment and accessible to hackers. When compromised or manipulated, sensor nodes can transmit incorrect data which can have a damaging impact on the overall operation and effectiveness of the system. Researchers have addressed the security vulnerabilities in sensor nodes with several mechanisms being proposed to address them. This paper presents DAM (Detect, Avoid, Mitigate), a theoretical framework to evaluate the security threats and solutions for sensor security in IoT applications and deployments. The framework leads to the classification of sensor security threats and categorization of available solutions which can be used to either detect vulnerabilities and attacks, recover from them or completely avoid them. The proposed framework will be useful for evaluating sensor security in real-world IoT deployments in terms of potential threats and designing possible solution

##plugins.themes.academic_pro.article.details##

How to Cite
Gulzar, B., & Gupta, A. (2021). DAM: A Theoretical Framework for SensorSecurity in IoT Applications. International Journal of Next-Generation Computing, 12(3), 309–327. https://doi.org/10.47164/ijngc.v12i3.830

References

  1. Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., and Gurtov, A. 2018. Overview of 5g security challenges and solutions. IEEE Communications Standards Magazine 2, 1, 36–43.
  2. Ahmad, U., Song, H., Bilal, A., Saleem, S., and Ullah, A. 2018. Securing insulin pump system using deep learning and gesture recognition. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 1716–1719.
  3. Airehrour, D., Gutierrez, J., and Ray, S. K. 2016. Secure routing for internet of things: A survey. Journal of Network and Computer Applications 66, 198–213.
  4. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. 2002. A survey on sensor networks. IEEE Communications magazine 40, 8, 102–114.
  5. Alexopoulos, N., Daubert, J., Muhlhauser, M., and Habib, S. M. 2017. Beyond the hype: On using blockchains in trust management for authentication. In 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 546– 553.
  6. Anand, M., Ives, Z., and Lee, I. 2005. Quantifying eavesdropping vulnerability in sensor networks. In Proceedings of the 2nd international workshop on Data management for sensor networks. 3–9.
  7. Atzori, L., Iera, A., and Morabito, G. 2010. The internet of things: A survey. Computer networks 54, 15, 2787–2805.
  8. Baker, F. 1995. Rfc1812: Requirements for ip version 4 routers. Balaban, E., Saxena, A., Bansal, P., Goebel, K. F., and Curran, S. 2009. Modeling, detection, and disambiguation of sensor faults for aerospace applications. IEEE Sensors Journal 9, 12, 1907–1917.
  9. Baldi, P. 2012. Autoencoders, unsupervised learning, and deep architectures. In Proceedings of ICML workshop on unsupervised and transfer learning. JMLR Workshop and Conference Proceedings, 37–49.
  10. Baza, M., Nabil, M., Lasla, N., Fidan, K., Mahmoud, M., and Abdallah, M. 2019. Blockchain-based firmware update scheme tailored for autonomous vehicles. In 2019 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 1–7.
  11. Bezawada, B., Bachani, M., Peterson, J., Shirazi, H., Ray, I., and Ray, I. 2018. Behavioral fingerprinting of iot devices. In Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security. 41–50.
  12. Brooks, R., Govindaraju, P., Pirretti, M., Vijaykrishnan, N., and Kandemir, M. T. 2007. On the detection of clones in sensor networks using random key predistribution. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 37, 6, 1246–1258.
  13. Butun, I. 2013. Prevention and detection of intrusions in wireless sensor networks.
  14. Chatterjee, B., Das, D., and Sen, S. 2018. Rf-puf: Iot security enhancement through authentication of wireless nodes using in-situ machine learning. In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 205–208.
  15. Chauhan, S. and Vig, L. 2015. Anomaly detection in ecg time signals via deep long short-term memory networks. In 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA). IEEE, 1–7.
  16. Chuang, S.-Y., Sahoo, N., Lin, H.-W., and Chang, Y.-H. 2019. Predictive maintenance with sensor data analytics on a raspberry pi-based experimental platform. Sensors 19, 18, 3884.
  17. Coetzee, L. and Eksteen, J. 2011. The internet of things-promise for the future? an introduction. In 2011 IST-Africa Conference Proceedings. IEEE, 1–9.
  18. Conti, M., Di Pietro, R., Mancini, L., and Mei, A. 2010. Distributed detection of clone attacks in wireless sensor networks. IEEE transactions on dependable and secure computing 8, 5, 685–698.
  19. da Costa, K. A., Papa, J. P., Lisboa, C. O., Munoz, R., and de Albuquerque, V. H. C. 2019. Internet of things: A survey on machine learning-based intrusion detection approaches. Computer Networks 151, 147–157.
  20. Domingos, P. 1999. Metacost: A general method for making classifiers cost-sensitive. In Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining. 155–164.
  21. Eifert, T., Eisen, K., Maiwald, M., and Herwig, C. 2020. Current and future requirements to industrial analytical infrastructure—part 2: smart sensors. Analytical and bioanalytical chemistry 412, 9, 2037–2045.
  22. Evans, C., Palmer, C., and Sleevi, R. 2015. Public key pinning extension for http. Internet Engineering Task
  23. Force. 27Available: http://www. ietf. org/internet-drafts/draft-ietf-websec-key-pinning-09. txt.
  24. Fadlullah, Z. M., Tang, F., Mao, B., Kato, N., Akashi, O., Inoue, T., and Mizutani, K. 2017. State-of-the art deep learning: Evolving machine intelligence toward tomorrow’s intelligent network traffic control systems. IEEE Communications Surveys & Tutorials 19, 4, 2432–2455.
  25. Fernandes, G., Rodrigues, J. J., Carvalho, L. F., Al-Muhtadi, J. F., and Proenc¸a, M. L. 2019. A comprehensive survey on network anomaly detection. Telecommunication Systems 70, 3, 447–489.
  26. Ferrag, M. A., Maglaras, L. A., Janicke, H., Jiang, J., and Shu, L. 2017. Authentication protocols for internet of things: a comprehensive survey. Security and Communication Networks 2017.
  27. Gaddam, A., Wilkin, T., Angelova, M., and Gaddam, J. 2020. Detecting sensor faults, anomalies and outliers in the internet of things: A survey on the challenges and solutions. Electronics 9, 3, 511.
  28. Gracioli, G. and Frohlich, A. A. ¨ 2008. An operating system infrastructure for remote code update in deeply embedded systems. In Proceedings of the 1st International Workshop on Hot Topics in Software Upgrades. 1–5.
  29. Granjal, J., Monteiro, E., and Silva, J. S. 2015. Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials 17, 3, 1294–1312.
  30. Green, I. 2005. Dns spoofing by the man in the middle.
  31. Heinrich, S. 2013. Public key infrastructure based on authentication of media attestments. arXiv preprint arXiv:1311.7182 .
  32. Hida, Y., Huang, P., and Nishtala, R. 2004. Aggregation query under uncertainty in sensor networks. Department of Electrical Engineering and Computer Science. University of California, Berkeley, Tech. Rep.
  33. Ho, J.-W., Wright, M., and Das, S. K. 2009. Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In IEEE INFOCOM 2009. IEEE, 1773–1781.
  34. Hossain, M. S., Muhammad, G., Rahman, S. M. M., Abdul, W., Alelaiwi, A., and Alamri, A. 2016. Toward end-to-end biomet rics-based security for iot infrastructure. IEEE Wireless Communications 23, 5, 44–51.
  35. Housley, R., Ashmore, S., and Wallace, C. 2010. Trust anchor management protocol (tamp). Internet Eng. Task Force, Fremont, CA, USA, RFC 5934, 1–91.
  36. Huang, L., Nguyen, X., Garofalakis, M., Jordan, M. I., Joseph, A., and Taft, N. 2006. In-network pca and anomaly detection. In NIPS. Vol. 2006. 617–624.
  37. Jain, A. K. and Pankanti, S. 2006. A touch of money [biometric authentication systems]. IEEE spectrum 43, 7, 22–27.
  38. Jayasinghe, U., Lee, G. M., Um, T.-W., and Shi, Q. 2018. Machine learning based trust computational model for iot services. IEEE Transactions on Sustainable Computing 4, 1, 39–52.
  39. Kabir, E., Hu, J., Wang, H., and Zhuo, G. 2018. A novel statistical technique for intrusion detection systems. Future Generation Computer Systems 79, 303–318.
  40. Kapitanova, K., Hoque, E., Stankovic, J. A., Whitehouse, K., and Son, S. H. 2012. Being smart about failures: assessing repairs in smart homes. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. 51–60.
  41. Keromytis, A. D., Misra, V., and Rubenstein, D. 2002. Sos: Secure overlay services. ACM SIGCOMM Computer Communication Review 32, 4, 61–72.
  42. Kim, J. and Chou, P. H. 2010. Energy-efficient progressive remote update for flash-based firmware of networked embedded systems. ACM Transactions on Design Automation of Electronic Systems (TODAES) 16, 1, 1–26.
  43. Kraus, G. and Kozaczuk, W. 1988. Enigma. how the german machine cipher was broken, and how it was read by the allies in world war ii. Naval War College Review 41, 4, 12.
  44. Kshetri, N. 2017. Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications policy 41, 10, 1027–1038.
  45. Lane, N. D., Miluzzo, E., Lu, H., Peebles, D., Choudhury, T., and Campbell, A. T. 2010. A survey of mobile phone sensing. IEEE Communications magazine 48, 9, 140–150.
  46. Liu, J., Xiao, Y., and Chen, C. P. 2012. Internet of things’ authentication and access control. International Journal of Security and Networks 7, 4, 228–241.
  47. Liu, Y., Li, Y., and Man, H. 2005. Mac layer anomaly detection in ad hoc networks. In Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop. IEEE, 402–409.
  48. Mahjabin, T., Xiao, Y., Sun, G., and Jiang, W. 2017. A survey of distributed denial-of-service attack, prevention, and mitigation techniques. International Journal of Distributed Sensor Networks 13, 12, 1550147717741463.
  49. McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., and Turner, J. 2008. Openflow: enabling innovation in campus networks. ACM SIGCOMM computer communication review 38, 2, 69–74.
  50. Merkle, R. C. 1978. Secure communications over insecure channels. Communications of the ACM 21, 4, 294–299.
  51. Miorandi, D., Sicari, S., De Pellegrini, F., and Chlamtac, I. 2012. Internet of things: Vision, applications and research challenges. Ad hoc networks 10, 7, 1497–1516.
  52. Mohamudally, N. and Peermamode-Mohaboob, M. 2018. Building an anomaly detection engine (ade) for iot smart applications. Procedia computer science 134, 10–17.
  53. Munir, M., Siddiqui, S. A., Chattha, M. A., Dengel, A., and Ahmed, S. 2019. Fusead: unsupervised anomaly detection in streaming sensors data by fusing statistical and deep learning models. Sensors 19, 11, 2451.
  54. Munir, S. and Stankovic, J. A. 2014. Failuresense: Detecting sensor failure using electrical appliances in the home. In 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems. IEEE, 73–81.
  55. Muraleedharan, R. and Osadciw, L. A. 2006. Cross layer denial of service attacks in wireless sensor network using swarm intelligence. In 2006 40th Annual Conference on Information Sciences and Systems. IEEE, 1653– 1658.
  56. Padmavathi, D. G., Shanmugapriya, M., et al. 2009. A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576 .
  57. Papamartzivanos, D., Marmol, F. G. ´ , and Kambourakis, G. 2019. Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7, 13546–13560.
  58. Rajasegarar, S., Leckie, C., and Palaniswami, M. 2008. Anomaly detection in wireless sensor networks. IEEE Wireless Communications 15, 4, 34–40.
  59. Rajasegarar, S., Leckie, C., Palaniswami, M., and Bezdek, J. C. 2006. Distributed anomaly detection in wireless sensor networks. In 2006 10th IEEE Singapore international conference on communication systems. IEEE, 1–5.
  60. Rajesh, S., Paul, V., Menon, V. G., and Khosravi, M. R. 2019. A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded iot devices. Symmetry 11, 2, 293.
  61. Rathore, H. and Jha, S. 2013. Bio-inspired machine learning based wireless sensor network security. In 2013 World Congress on Nature and Biologically Inspired Computing. IEEE, 140–146.
  62. Salkin, C., Oner, M., Ustundag, A., and Cevikcan, E. 2018. A conceptual framework for industry 4.0. In Industry 4.0: Managing the Digital Transformation. Springer, 3–23.
  63. Sari, A. et al. 2015. A review of anomaly detection systems in cloud networks and survey of cloud security measures in cloud storage applications. Journal of Information Security 6, 02, 142.
  64. Shu, Z., Wan, J., Li, D., Lin, J., Vasilakos, A. V., and Imran, M. 2016. Security in software-defined networking: Threats and countermeasures. Mobile Networks and Applications 21, 5, 764–776.
  65. Sun, B., Jin, X., Wu, K., and Xiao, Y. 2007. Integration of secure in-network aggregation and system monitoring for wireless sensor networks. In 2007 IEEE International Conference on Communications. IEEE, 1466–1471.
  66. Tiwari, M., Arya, K. V., Choudhari, R., and Choudhary, K. S. 2009. Designing intrusion detection to detect black hole and selective forwarding attack in wsn based on local information. In 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology. IEEE, 824–828.
  67. Wang, J. P., Bin, S., Yu, Y., and Niu, X. X. 2013. Distributed trust management mechanism for the internet of things. In Applied Mechanics and Materials. Vol. 347. Trans Tech Publ, 2463–2467.
  68. Wang, X., Ding, L., and Wang, S. 2011. Trust evaluation sensing for wireless sensor networks. IEEE Transactions on instrumentation and measurement 60, 6, 2088–2095.
  69. Weiler, N. 2002. Honeypots for distributed denial-of-service attacks. In Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. IEEE, 109–114.
  70. Westhoff, D., Girao, J., and Acharya, M. 2006. Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. IEEE Transactions on mobile computing 5, 10, 1417–1431.
  71. Zarca, A. M., Bernabe, J. B., Trapero, R., Rivera, D., Villalobos, J., Skarmeta, A., Bianchi, S., Zafeiropoulos, A., and Gouvas, P. 2019. Security management architecture for nfv/sdn-aware iot systems. IEEE Internet of Things Journal 6, 5, 8005–8020.
  72. Zhu, B., Addada, V. G. K., Setia, S., Jajodia, S., and Roy, S. 2007. Efficient distributed detection of node replication attacks in sensor networks. In Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). IEEE, 257–267.