Security for Internet of Things: The SerIoT Project

Attacks on the content and quality of service of IoT platforms have economic and physical consequences well beyond the Internet's lack of security. This paper describes a new research project on “Secure and Safe Internet of Things” (SerIoT) to improve both the information and physical security of IoT applications platforms in a holistic and cross-layered manner. The purpose is to be able to create secure operational IoT platfnrms for diverse applieations.

[1]  Erol Gelenbe,et al.  The impact of information technology on energy consumption and carbon emissions , 2015, UBIQ.

[2]  Michele Pagano,et al.  Delays in IP Routers, a Markov Model , 2016, ISCIS.

[3]  Erol Gelenbe Réseaux neuronaux aléatoires stables , 1990 .

[4]  Dimitrios Tzovaras,et al.  A Consistency-Based Multimodal Graph Embedding Method for Dimensionality Reduction , 2017, 2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA).

[5]  Erol Gelenbe,et al.  Counter based detection and mitigation of signalling attacks , 2015, 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE).

[6]  Erol Gelenbe,et al.  Learning in the Recurrent Random Neural Network , 1992, Neural Computation.

[7]  Athanasios V. Vasilakos,et al.  Software-Defined Networking for Internet of Things: A Survey , 2017, IEEE Internet of Things Journal.

[8]  Fatih Alagöz,et al.  Defense Mechanisms against DDoS Attacks in SDN Environment , 2017, IEEE Communications Magazine.

[9]  Erol Gelenbe,et al.  A diffusion model for packet travel time in a random multihop medium , 2007, TOSN.

[10]  Erol Gelenbe Dealing with software viruses: A biological paradigm , 2007, Inf. Secur. Tech. Rep..

[11]  Yasir Mehmood,et al.  Internet-of-Things-Based Smart Cities: Recent Advances and Challenges , 2017, IEEE Communications Magazine.

[12]  Ruppa K. Thulasiram,et al.  Guest Editorial: Special Issue on Green Pervasive and Ubiquitous Systems , 2017, IEEE Syst. J..

[13]  Erol Gelenbe,et al.  Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach , 2013, ISCIS.

[14]  Dimitrios Tzovaras,et al.  A Novel Graph-Based Descriptor for the Detection of Billing-Related Anomalies in Cellular Mobile Networks , 2016, IEEE Transactions on Mobile Computing.

[15]  Dimitrios Tzovaras,et al.  NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem , 2013, ISCIS.

[16]  Aviv Zohar Bitcoin , 2015, Commun. ACM.

[17]  Erol Gelenbe,et al.  Steps toward self-aware networks , 2009, CACM.

[18]  Dimitrios Tzovaras,et al.  A multi-objective clustering approach for the detection of abnormal behaviors in mobile networks , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[19]  Karl N. Levitt,et al.  A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[20]  Daojing He,et al.  Imminent Communication Security for Smart Communities , 2018, IEEE Communications Magazine.

[21]  Mahmut T. Kandemir,et al.  The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense , 2006, Int. J. Distributed Sens. Networks.

[22]  Erol Gelenbe,et al.  Optimizing Secure SDN-Enabled Inter-Data Centre Overlay Networks through Cognitive Routing , 2016, 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS).

[23]  Helga E. Melcherts The Internet of Everything and Beyond: The Interplay between Things and Humans , 2017 .

[24]  Tadeusz Czachórski,et al.  Diffusion Approximation Model for the Distribution of Packet Travel Time at Sensor Networks , 2008, EuroNGI Workshop.

[25]  Michele Pagano,et al.  The Fluid Flow Approximation of the TCP Vegas and Reno Congestion Control Mechanism , 2016, ISCIS.

[26]  Dimitrios Tzovaras,et al.  An enhanced Graph Analytics Platform (GAP) providing insight in Big Network Data , 2016, J. Innov. Digit. Ecosyst..

[27]  Erol Gelenbe,et al.  Towards a cognitive routing engine for software defined networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[28]  Erol Gelenbe,et al.  Learning in the multiple class random neural network , 2002, IEEE Trans. Neural Networks.

[29]  Guo Da,et al.  Study of WAPI technology and security , 2010, 2010 IEEE 2nd Symposium on Web Society.

[30]  Erol Gelenbe,et al.  Biological Metaphors for Agent Behavior , 2004, ISCIS.

[31]  Erol Gelenbe,et al.  Opportunistic Communications for Emergency Support Systems , 2011, ANT/MobiWIS.

[32]  Erol Gelenbe,et al.  Energy Life-Time of Wireless Nodes with Network Attacks and Mitigation , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[33]  Erol Gelenbe,et al.  Virus Tests to Maximize Availability of Software Systems , 1994, Theor. Comput. Sci..

[34]  Erol Gelenbe,et al.  Modeling and Analysis of RRC-Based Signalling Storms in 3G Networks , 2016, IEEE Transactions on Emerging Topics in Computing.

[35]  Sherali Zeadally,et al.  Securing Internet of Things with Software Defined Networking , 2018, IEEE Communications Magazine.

[36]  Erol Gelenbe,et al.  Signalling storms in 3G mobile networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[37]  Dimitrios Tzovaras,et al.  GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control , 2018, Euro-CYBERSEC.

[38]  Amitava Ghosh,et al.  Recent advancements in M2M communications in 4G networks and evolution towards 5G , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.

[39]  Erol Gelenbe Keeping Viruses Under Control , 2005, ISCIS.

[40]  Essaid Sabir,et al.  Self-Organized Connected Objects: Rethinking QoS Provisioning for IoT Services , 2017, IEEE Communications Magazine.

[41]  Zhili Sun,et al.  Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.

[42]  J. W Cohen Introduction aux réseaux de files d'attente: E. GELENBE and G. PUJOLLE Collection Techniques et Scientifique des Télécommunications, Eyrolles, Paris, 1982, ix + 192 pages , 1983 .