Monitoring Supply Current Thresholds for Smart Device's Security Enhancement

The rapid growth of connected devices and the sensitive data they generate poses a significant challenge for manufacturers seeking to comprehensively protect their devices from attack. This paper presents a study and its results from the correlation of the supply current of a smart device to its functional characteristics in order to detect a manufacturing or an operational anomaly. This concept was originated from the fact that most of the available smart devices in the market (connected to the Internet, establishing thus the so-called Internet of Things - IoT), are Application Specific devices thus having limited functionality. Issues on IoT applications, urging for solutions, are security, availability, and reliability. Awareness of the typical operation of a smart device in terms of operation and functionality may prove valuable, since any deviation may warn for an operational or functional anomaly. In this paper, the deviation (either increase or decrease) of the supply current is exploited for this reason. This work aims to affect the intrusion detection process for IoT and proposes for consideration new inputs of interest with a collateral interest of study. The results present 100% of attack detection.

[1]  Amarsinh Vidhate,et al.  Security attacks in IoT: A survey , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[2]  Neil Genzlinger A. and Q , 2006 .

[3]  Paris Kitsos,et al.  Ring Oscillators and Hardware Trojan Detection , 2017 .

[4]  Nikolaos S. Voros,et al.  Components and Services for IoT Platforms: Paving the Way for IoT Standards , 2016 .

[5]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[6]  Qiang Liu,et al.  A survey of hardware Trojan threat and defense , 2016, Integr..

[7]  Fayez Gebali,et al.  A New Characterization of Hardware Trojans , 2016, IEEE Access.

[8]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[9]  Kishore Angrishi,et al.  Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets , 2017, ArXiv.

[10]  Theodore Tryfonas,et al.  The Internet of Things: a security point of view , 2016, Internet Res..

[11]  W. Marsden I and J , 2012 .

[12]  Klaus Wehrle,et al.  Privacy in the Internet of Things: threats and challenges , 2014, Secur. Commun. Networks.

[13]  G. Bolton Reliability , 2003, Medical Humanities.

[14]  Athanasios V. Vasilakos,et al.  The Quest for Privacy in the Internet of Things , 2016, IEEE Cloud Computing.

[15]  M. Wirthlin,et al.  SEU-induced persistent error propagation in FPGAs , 2005, IEEE Transactions on Nuclear Science.

[16]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[17]  Danna Zhou,et al.  d. , 1934, Microbial pathogenesis.

[18]  Cristina Alcaraz,et al.  A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services , 2018, IEEE Communications Surveys & Tutorials.