Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach

Sensing devices acting as interconnected data sources are becoming increasingly ubiquitous in concepts of Internet of Things (IoT)-enabled smart cities, but they typically lack physical protection and are susceptible to being compromised. To address this issue, a great-alternative-region (GAR)-based approach for deploying network monitors to locate compromised data sources is proposed. The GAR concept is introduced according to the network topology and connectivity characteristics, and the GARs with the most complete connectivity are identified as the candidate monitor locations, thereby transforming the problem of monitor deployment into a traditional $K$-center problem. Based on the demonstrated relationship between the monitor locations and the locating accuracy, the optimization objective for reasonably deploying monitors is designed to minimize the maximum number of hops between the data sources and their nearest monitors, and the optimal deployment pattern is achieved using an improved genetic algorithm. Finally, simulation-based results are presented to illustrate the performance of this approach.

[1]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[2]  Wuqiong Luo,et al.  How to Identify an Infection Source With Limited Observations , 2013, IEEE Journal of Selected Topics in Signal Processing.

[3]  Vincent K. N. Lau,et al.  Energy-efficient transmission strategy for Cognitive Radio systems , 2012, 2012 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[4]  Yang Li,et al.  SA-PSO based optimizing reader deployment in large-scale RFID Systems , 2015, J. Netw. Comput. Appl..

[5]  Mianxiong Dong,et al.  RMER: Reliable and Energy-Efficient Data Collection for Large-Scale Wireless Sensor Networks , 2016, IEEE Internet of Things Journal.

[6]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[7]  Minyi Guo,et al.  Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.

[8]  Dina S. Deif,et al.  Classification of Wireless Sensor Networks Deployment Techniques , 2014, IEEE Communications Surveys & Tutorials.

[9]  R. C. Luo,et al.  Wireless and Pyroelectric Sensory Fusion System for Indoor Human/Robot Localization and Monitoring , 2013, IEEE/ASME Transactions on Mechatronics.

[10]  Christos V. Verikoukis,et al.  Misbehavior detection in the Internet of Things: A network-coding-aware statistical approach , 2016, 2016 IEEE 14th International Conference on Industrial Informatics (INDIN).

[11]  Hsiao-Hwa Chen,et al.  Sensing-Energy Tradeoff in Cognitive Radio Networks With Relays , 2013, IEEE Systems Journal.

[12]  Mianxiong Dong,et al.  Reliability guaranteed efficient data gathering in wireless sensor networks , 2015, IEEE Access.

[13]  Andrea Vitaletti,et al.  Smart City: An Event Driven Architecture for Monitoring Public Spaces with Heterogeneous Sensors , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.

[14]  Martin Vetterli,et al.  Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.

[15]  Mo-Yuen Chow,et al.  Attack detection and mitigation for resilient distributed DC optimal power flow in the IoT environment , 2016, 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE).

[16]  Meie Shen,et al.  Optimizing RFID Network Planning by Using a Particle Swarm Optimization Algorithm With Redundant Reader Elimination , 2012, IEEE Transactions on Industrial Informatics.

[17]  Mianxiong Dong,et al.  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.