Detecting Malicious Components in Large-Scale Internet-of-Things Systems and Architectures

Current large-scale Internet-of-Things systems and architectures incorporate many components, such as devices or services, geographic and conceptually very sparse. Thus, for final applications, it is very complicated to deeply know, manage or control the underlying components, which, at the end, generate and process the data they employ. Therefore, new tools to avoid or remove malicious components based only on the available information at high level are required. In this paper we describe a statistical framework for knowledge discovery in order to estimate the uncertainty level associated with the received data by a certain application. Moreover, these results are used as input in a reputation model focused on locating the malicious components. Finally, an experimental validation is provided in order to evaluate the performance of the proposed solution.

[1]  Liang Chen,et al.  TruSMS: A trustworthy SMS spam control system based on trust management , 2015, Future Gener. Comput. Syst..

[2]  Ramón Alcarria,et al.  An IoT based reference architecture for smart water management processes , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[3]  David Lillethun,et al.  Mobile fog: a programming model for large-scale applications on the internet of things , 2013, MCC '13.

[4]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[5]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[6]  Feng Xia,et al.  A Trust Model Based on Service Classification in Mobile Services , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[7]  Charu C. Aggarwal,et al.  The Internet of Things: A Survey from the Data-Centric Perspective , 2013, Managing and Mining Sensor Data.

[8]  Kun Wang,et al.  Trust control in heterogeneous networks for Internet of Things , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[9]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[10]  Hyun-Woo Lee,et al.  A method for co-existing heterogeneous IoT environments based on compressive sensing , 2016 .

[11]  Edward Curry,et al.  Approximate Semantic Matching of Events for the Internet of Things , 2014, ACM Trans. Internet Techn..

[12]  Quanyan Zhu,et al.  Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.

[13]  Borja Bordel,et al.  Self-configuration in humanized Cyber-Physical Systems , 2016, Journal of Ambient Intelligence and Humanized Computing.

[14]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[15]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[16]  Bran Selic,et al.  Understanding Uncertainty in Cyber-Physical Systems: A Conceptual Model , 2016, ECMFA.

[17]  A. N. Sarkar,et al.  Significance of Smart Cities in 21 st Century: An International Business Perspective , 2015 .

[18]  F. Scholz Maximum Likelihood Estimation , 2006 .