A lightweight cyber security framework with context-awareness for pervasive computing environments

Abstract Internet of things (IoT) plays a key role in enabling smart sustainable cities. Pervasive computing over the IoT platform makes life more convenient by embedding sensors based on context-aware computing devices in the physical environment for the ubiquitous availability of computing resources. The sensors gather contextual information from the physical world and transmit it to receivers as per requirements or in case of environmental changes, such as temperature and humidity. However, the combination of dynamic operation and the need to handle sensitive and private data make the pervasive computing environment and IoT devices vulnerable to numerous attacks. Smart environments require a maximum level of safety assurance, such as trusted context producers and customers, which should protect sensitive information from exposure or monitoring. This paper discusses the major cyber threats in smart environments and proposes a novel lightweight security framework that authenticates and maintains the context providers and receivers. The cloud environment is adopted for user authentication at the user layer to implement access control and role assignment. Finally, the proposed security framework is implemented in the IBM cloud platform with six devices to evaluate its efficiency, sustainability, and secure communication.

[1]  Mohsen Guizani,et al.  The rise of ransomware and emerging security challenges in the Internet of Things , 2017, Comput. Networks.

[2]  Junaid Shuja,et al.  A lightweight and compromise-resilient authentication scheme for IoTs , 2019, Trans. Emerg. Telecommun. Technol..

[3]  Yaser Jararweh,et al.  Trustworthy and sustainable smart city services at the edge , 2020 .

[4]  Tim Good,et al.  A holistic approach examining RFID design for security and privacy , 2010, The Journal of Supercomputing.

[5]  Eila Ovaska,et al.  Context-awareness in smart spaces , 2010, The IEEE symposium on Computers and Communications.

[6]  Roy H. Campbell,et al.  Cerberus: a context-aware security scheme for smart spaces , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[7]  Kashif Saleem,et al.  Efficient low cost supervisory system for Internet of Things enabled smart home , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).

[8]  Ali Kashif Bashir,et al.  Internet of Threats and Context Aware Security: Part Two , 2017 .

[9]  Mahdi Aiash,et al.  Machine Learning Based Botnet Identification Traffic , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[10]  M. Shamim Hossain,et al.  Semantic Multimedia Fog Computing and IoT Environment: Sustainability Perspective , 2018, IEEE Communications Magazine.

[11]  Jadwiga Indulska,et al.  A survey of context modelling and reasoning techniques , 2010, Pervasive Mob. Comput..

[12]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[13]  Minglu Li,et al.  Context-adaptive and energy-efficient mobile transaction management in pervasive environments , 2009, The Journal of Supercomputing.

[14]  Junaid Shuja,et al.  Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs , 2018, Concurr. Comput. Pract. Exp..

[15]  Muhammad Imran,et al.  Deep learning and big data technologies for IoT security , 2020, Comput. Commun..

[16]  Svetlana Kim,et al.  MRTensorCube: tensor factorization with data reduction for context-aware recommendations , 2017, The Journal of Supercomputing.

[17]  Mehmet A. Orgun,et al.  Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art , 2018, Telematics Informatics.

[18]  Lewis Tseng,et al.  Blockchain and Fog Computing for Cyberphysical Systems: The Case of Smart Industry , 2020, Computer.

[19]  Diane J. Cook,et al.  Pervasive computing at scale: Transforming the state of the art , 2012, Pervasive Mob. Comput..

[20]  Benjamin C. M. Fung,et al.  Security and privacy challenges in smart cities , 2018 .

[21]  Kun Gao,et al.  Research on social network discovery algorithm in pervasive sensing environment , 2016, Concurr. Comput. Pract. Exp..

[22]  Byung-Gyu Kim,et al.  Reducing Security Overhead to Enhance Service Delivery in Jini IoT , 2015, Int. J. Distributed Sens. Networks.

[23]  Schahram Dustdar,et al.  Data Quality Observation in Pervasive Environments , 2012, 2012 IEEE 15th International Conference on Computational Science and Engineering.

[24]  Janet Light,et al.  Context-Aware Data Association and Authenticity in Pervasive Healthcare , 2009, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.

[25]  L. Jean Camp,et al.  Aging, Privacy, and Home-Based Computing: Developing a Design Framework , 2012, IEEE Pervasive Computing.

[26]  Paramvir Bahl,et al.  Advancing the state of mobile cloud computing , 2012, MCS '12.

[27]  Simon Elias Bibri,et al.  The IoT for smart sustainable cities of the future: An analytical framework for sensor-based big data applications for environmental sustainability , 2018 .

[28]  Guanling Chen,et al.  A Survey of Context-Aware Mobile Computing Research , 2000 .

[29]  Claudio Bettini,et al.  Privacy protection in pervasive systems: State of the art and technical challenges , 2015, Pervasive Mob. Comput..

[30]  Sajal K. Das,et al.  Adaptive and context-aware privacy preservation exploiting user interactions in smart environments , 2014, Pervasive Mob. Comput..

[31]  Mustaque Ahamad,et al.  A context-aware security architecture for emerging applications , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[32]  Muhammad Imran,et al.  A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems , 2018, IEEE Access.

[33]  Mark Weiser,et al.  The computer for the 21st Century , 1991, IEEE Pervasive Computing.

[34]  Carles Gomez,et al.  Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology , 2012, Sensors.

[35]  In Lee,et al.  The Internet of Things for enterprises: An ecosystem, architecture, and IoT service business model , 2019, Internet Things.

[36]  Jalal Al-Muhtadi,et al.  ConSec: Context-Aware Security Framework for Smart Spaces , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[37]  Muhammad Imran,et al.  Perception layer security in Internet of Things , 2019, Future Gener. Comput. Syst..

[38]  Athanasios V. Vasilakos,et al.  Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.

[39]  Mohammad Sayad Haghighi,et al.  Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.

[40]  Thar Baker,et al.  Providing secure and reliable communication for next generation networks in smart cities , 2020, Sustainable Cities and Society.

[41]  Gregory D. Abowd,et al.  Securing context-aware applications using environment roles , 2001, SACMAT '01.

[42]  Roy H. Campbell,et al.  A flexible, privacy-preserving authentication framework for ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.

[43]  Pascal Lorenz,et al.  Security Model for Pervasive Multimedia Environment , 2014 .

[44]  Jiannong Cao,et al.  Application mobility in pervasive computing: A survey , 2013, Pervasive Mob. Comput..

[45]  Mustaque Ahamad,et al.  Generalized Role-Based Access Control for Securing Future Applications , 2000 .

[46]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[47]  Mamoun Alazab,et al.  A Visualized Botnet Detection System Based Deep Learning for the Internet of Things Networks of Smart Cities , 2020, IEEE Transactions on Industry Applications.

[48]  Uwe Hansmann,et al.  Pervasive Computing Handbook , 2001, Springer Berlin Heidelberg.

[49]  Yu Liu,et al.  Pervasive location acquisition technologies: Opportunities and challenges for geospatial studies , 2012, Comput. Environ. Urban Syst..

[50]  InJung Kim,et al.  National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment , 2017, The Journal of Supercomputing.

[51]  Nadjib Badache,et al.  Fast authentication in wireless sensor networks , 2016, Future Gener. Comput. Syst..

[52]  Ben Bradford,et al.  Security and the smart city: A systematic review , 2020 .

[53]  Abdelouahid Derhab,et al.  Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society , 2015, Comput. Hum. Behav..

[54]  Kashif Saleem,et al.  Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol , 2014, IEEE Sensors Journal.

[55]  Victor C. M. Leung,et al.  A Survey of Recent Developments in Home M2M Networks , 2014, IEEE Commun. Surv. Tutorials.