IoT Security Framework for Smart Water System

The Internet of Things (IoT) will connect not only computers and mobile devices, but it will also interconnect smart buildings, homes, and cities. The IoT take advantage of the latest communication technologies in order to provide optimal and reliable services to Smart Cities (SC). The backbone of SC are the Critical Infrastructures such as the city's water system. In SC, the water system benefits from the development of automation and communication technologies to create smart environments which are more efficient in the use of the available resources; we call it Smart Water System (SWS). In this paper we present a multilayer architecture to integrate the SWS to the IoT, making it available from everywhere at any time. However, with the introduction of IoT we will be experiencing grand challenges to secure and protect its advanced information services due to the significant increase of the attack surface, complexity, heterogeneity, and number of interconnected resources. We also introduce an IoT Framework for SWSs to build trustworthy and secure applications and services. The framework enables developers to consider security issues at all IoT layers and integrate security algorithms with the functions and services offered in each layer instead of considering security in an ad-hoc and after thought manner. We show how this framework can be used to develop highly secure and trustworthy SWS services and how to apply our Anomaly Behavior Analysis methodology to secure and protect these services against any type of attacks.

[1]  Anuradha M. Annaswamy,et al.  Emerging research topics in control for smart infrastructures , 2016, Annu. Rev. Control..

[2]  Vipin Kumar,et al.  A Comparative Study of Classification Techniques for Intrusion Detection , 2013, 2013 International Symposium on Computational and Business Intelligence.

[3]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[4]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[5]  Adam Shostack,et al.  Threat Modeling: Designing for Security , 2014 .

[6]  Chung-Horng Lung,et al.  Smart Home: Integrating Internet of Things with Web Services and Cloud Computing , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[7]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.

[8]  Edna Dias Canedo,et al.  IoT architecture to enable intercommunication through REST API and UPnP using IP, ZigBee and arduino , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[9]  A. H. Buckman,et al.  What is a Smart Building , 2014 .

[10]  Ping Zhang,et al.  Detection of replay attacks in cyber-physical systems , 2016, 2016 American Control Conference (ACC).

[11]  Yusuf Abdullahi Badamasi The working principle of an Arduino , 2014, 2014 11th International Conference on Electronics, Computer and Computation (ICECCO).

[12]  Dianxiang Xu,et al.  Automated Security Test Generation with Formal Threat Models , 2012, IEEE Transactions on Dependable and Secure Computing.

[13]  Yang Lijun,et al.  Security Architecture and Key Technologies for IoT/CPS , 2011 .

[14]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[15]  Salim Hariri,et al.  IoT Security Framework for Smart Cyber Infrastructures , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).

[16]  Lingfeng Wang,et al.  Multi-agent control system with information fusion based comfort model for smart buildings , 2012 .

[17]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[18]  Gareth Halfacree,et al.  Raspberry Pi User Guide , 2012 .

[19]  Johannes Schneider,et al.  Structured system threat modeling and mitigation analysis for industrial automation systems , 2015, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN).

[20]  Vinod Namboodiri,et al.  Toward a Secure Wireless-Based Home Area Network for Metering in Smart Grids , 2014, IEEE Systems Journal.

[21]  Youakim Badr,et al.  Risk management and security in service-based architectures , 2009, 2009 International Conference on Advances in Computational Tools for Engineering Applications.

[22]  Salim Hariri,et al.  Anomaly behavior analysis for IoT sensors , 2018, Trans. Emerg. Telecommun. Technol..

[23]  Salim Hariri,et al.  Anomaly-Based Behavior Analysis of Wireless Network Security , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[24]  Marimuthu Palaniswami,et al.  An Information Framework for Creating a Smart City Through Internet of Things , 2014, IEEE Internet of Things Journal.

[25]  Matthew N. O. Sadiku,et al.  Cloud Computing: Opportunities and Challenges , 2014, IEEE Potentials.

[26]  A. J. Jerri The Shannon sampling theorem—Its various extensions and applications: A tutorial review , 1977, Proceedings of the IEEE.

[27]  Yaser Jararweh,et al.  A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).

[28]  อนิรุธ สืบสิงห์,et al.  Data Mining Practical Machine Learning Tools and Techniques , 2014 .

[29]  I. Sasase,et al.  Detection of HTTP-GET flood Attack Based on Analysis of Page Access Behavior , 2007, 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.

[30]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[31]  Ayan Banerjee,et al.  Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber–Physical Systems , 2012, Proceedings of the IEEE.

[32]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[33]  Ozgur Koray Sahingoz,et al.  A survey of intrusion detection systems in wireless sensor networks , 2015, 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO).

[34]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .