Immune System for the Internet of Things Using Edge Technologies

The Internet of Things (IoT) and edge computing are starting to go hand in hand. By providing cloud services close to end-users, edge paradigms enhance the functionality of IoT deployments, and facilitate the creation of novel services such as augmented systems. Furthermore, the very nature of these paradigms also enables the creation of a proactive defense architecture, an immune system, which allows authorized immune cells (e.g., virtual machines) to traverse edge nodes and analyze the security and consistency of the underlying IoT infrastructure. In this paper, we analyze the requirements for the development of an immune system for the IoT, and propose a security architecture that satisfies these requirements. We also describe how such a system can be instantiated in edge computing infrastructures using existing technologies. Finally, we explore the potential application of immune systems to other scenarios and purposes.

[1]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[2]  John K. Zao,et al.  OpenFog security requirements and approaches , 2017, 2017 IEEE Fog World Congress (FWC).

[3]  Sherali Zeadally,et al.  Security and Privacy in Ubiquitous Sensor Networks , 2018, J. Inf. Process. Syst..

[4]  Stephanie Forrest,et al.  Principles of a computer immune system , 1998, NSPW '97.

[5]  Zhiqiang Lin,et al.  IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing , 2018, NDSS.

[6]  Hannu Tenhunen,et al.  An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach , 2016 .

[7]  Wiem Tounsi,et al.  A survey on technical threat intelligence in the age of sophisticated cyber attacks , 2018, Comput. Secur..

[8]  Ning Zhang,et al.  LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context , 2017, IEEE Access.

[9]  Dong Hyun Jeong,et al.  A survey of cloud-based network intrusion detection analysis , 2016, Human-centric Computing and Information Sciences.

[10]  Chaitanya Aggarwal,et al.  Securing IOT devices using SDN and edge computing , 2016, 2016 2nd International Conference on Next Generation Computing Technologies (NGCT).

[11]  Ruirui Zhang,et al.  Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment , 2018, J. Inf. Process. Syst..

[12]  Rahil Hosseini,et al.  A state-of-the-art survey of malware detection approaches using data mining techniques , 2018, Human-centric Computing and Information Sciences.

[13]  Vijay Sivaraman,et al.  Systematically Evaluating Security and Privacy for Consumer IoT Devices , 2017, IoT S&P@CCS.

[14]  Ralph E. Droms,et al.  Manufacturer Usage Description Specification , 2019, RFC.

[15]  Jörg Ott,et al.  Consolidate IoT Edge Computing with Lightweight Virtualization , 2018, IEEE Network.

[16]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[17]  Edward A. Lee,et al.  The Cloud is Not Enough: Saving IoT from the Cloud , 2015, HotStorage.

[18]  Karen A. Scarfone,et al.  Implementing Trusted Geolocation Services in the Cloud | NIST , 2016 .

[19]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[20]  Martin Gilje Jaatun,et al.  Accountability for cloud and other future Internet services , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[21]  Mikko Hypponen,et al.  The Internet of (Vulnerable) Things: On Hypponen's Law, Security Engineering, and IoT Legislation , 2017 .

[22]  Partha Pratim Ray,et al.  A survey of IoT cloud platforms , 2016 .

[23]  Ehab Al-Shaer,et al.  IoTChecker: A data-driven framework for security analytics of Internet of Things configurations , 2017, Comput. Secur..

[24]  Matthew Roughan,et al.  Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report) , 2018, ArXiv.

[25]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[26]  Ali A. Ghorbani,et al.  A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.

[27]  Julie Greensmith,et al.  Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.

[28]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[29]  Xinyu Yang,et al.  A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.