Measurement of Component Performance (Sensor) on Internet of Thing (IoT)

This study presents the testing of several devices (sensors) in obtaining sensor performance, there are several experiments and evaluations of the results obtained in the topology. Each sensor must be able to provide some results in the form of accuracy, reliability, range, and resolution. The accuracy and reliability have very important role in producing accurate data. With several explanations and analysis, it is expected to produce a reference for advanced development and policies making in the deployment of IoT system, especially in multi-sensing IoT systems. This work obtain the dataset through several stages, namely building topology (system design), data capture, and feature extraction. Wi-Fi and XBee communication protocols are used. In Wi-Fi protocol, the TCP traffic gives the greatest value compared to other traffic on normal data as well as attack data. In XBee protocol, the Low Rate Wireless PAN IEEE 802.15.4 protocol has an average of 83.96 percent for normal data and 98.73 percent for attack data, respectively. The results of attribute reading experiments, the XBee protocol achieves eighteen attributes whereas the Wi-Fi protocol only seventeen attributes.

[1]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[2]  Raheem A. Beyah,et al.  Examining the characteristics and implications of sensor side channels , 2013, 2013 IEEE International Conference on Communications (ICC).

[3]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[4]  Amir Moradi,et al.  Side-channel attacks from static power: When should we care? , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[5]  Hiroki Takakura,et al.  A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts , 2008, 2008 International Symposium on Applications and the Internet.

[6]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[7]  David A. Wagner,et al.  Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.

[8]  Salim Hariri,et al.  Anomaly behavior analysis for IoT sensors , 2018, Trans. Emerg. Telecommun. Technol..