Securing Internet of Things (IoT) Through an Adaptive Framework

The research on Internet of Things (IoT) has made tremendous progress in the last few years. IoT is being regarded as the next big thing that is going to change human perception about daily life. Smart devices of heterogeneous nature make an essential part of modern day IoT-based system. Because of the amount and type of data handled by these devices, they are an attractive target for malicious attackers. To secure the IoT devices of heterogeneous nature, we formulated a weighted optimization problem. The objective of this problem is to secure the IoT devices while finding the best trade-off between their resource usage and throughput. For this purpose, we consider five different implementations of AES cryptographic scheme that offer varied resources and throughput. These implementation schemes are mapped to IoT devices through a novel adaptive framework. This framework considers the resource and throughput requirements of different IoT devices and uses Hungarian algorithm to map different AES implementations on them. The comparison of proposed framework with random and greedy approaches shows that the proposed framework adaptively secures the IoT-based system while providing higher average throughput and requiring fewer resources.

[1]  Chetana Prakash,et al.  Internet of Things (IoT): A vision, architectural elements, and security issues , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[2]  Shivaji Kulkarni,et al.  Internet of Things (IoT) security , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[3]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[4]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[5]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[6]  Hassan Salmani,et al.  Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion , 2016, IEEE Transactions on Information Forensics and Security.

[7]  Susmita Sur-Kolay,et al.  Physiological Information Leakage: A New Frontier in Health Information Security , 2016, IEEE Transactions on Emerging Topics in Computing.

[8]  M. Bernardine Dias,et al.  The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs , 2007 .

[9]  Kevin Fu,et al.  Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[10]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[11]  Jeremy Hilton,et al.  A Reference Model of Information Assurance & Security , 2013, 2013 International Conference on Availability, Reliability and Security.

[12]  Meng Zhang,et al.  Trustworthiness of Medical Devices and Body Area Networks , 2014, Proceedings of the IEEE.

[13]  Meng Zhang,et al.  Emerging Frontiers in Embedded Security , 2013, 2013 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems.

[14]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[15]  Umer Farooq,et al.  Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA , 2017, J. King Saud Univ. Comput. Inf. Sci..