[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Intelligent Intrusion Detection in Low-Power IoTs

Published: 09 December 2016 Publication History

Abstract

Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they cannot secure such systems effectively, having limited resources. Programming languages permitting immediate memory accesses through pointers often result in applications having memory-related errors, which may lead to unpredictable failures and security vulnerabilities. Furthermore, energy efficient IoT devices running on batteries cannot afford the implementation of cryptography algorithms as such techniques have significant impact on the system power consumption. Therefore, in order to operate IoT in a secure manner, the system must be able to detect and prevent any kind of intrusions before the network (i.e., sensor nodes and base station) is destabilised by the attackers. In this article, we have presented an intrusion detection and prevention mechanism by implementing an intelligent security architecture using random neural networks (RNNs). The application’s source code is also instrumented at compile time in order to detect out-of-bound memory accesses. It is based on creating tags, to be coupled with each memory allocation and then placing additional tag checking instructions for each access made to the memory. To validate the feasibility of the proposed security solution, it is implemented for an existing IoT system and its functionality is practically demonstrated by successfully detecting the presence of any suspicious sensor node within the system operating range and anomalous activity in the base station with an accuracy of 97.23%. Overall, the proposed security solution has presented a minimal performance overhead.

References

[1]
Hossam Abdelbaki, Erol Gelenbe, and Said E. El-Khamy. 2000. Analog hardware implementation of the random neural network model. In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN’00), Vol. 4. IEEE, 197--201.
[2]
J. Aguilar and A. Colmenares. 1998. Resolution of pattern recognition problems using a hybrid genetic/random neural network learning algorithm. Pattern Analysis and Applications 1, 1 (1998), 52--61.
[3]
Periklis Akritidis, Manuel Costa, Miguel Castro, and Steven Hand. 2009. Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors. In Proceedings of the USENIX Security Symposium. 51--66.
[4]
Vicente Alarcon-Aquino, Javier Barria, and others. 2006. Multiresolution FIR neural-network-based learning algorithm applied to network traffic prediction. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 36, 2 (2006), 208--220.
[5]
Syed Obaid Amin, Muhammad Shoaib Siddiqui, Choong Seon Hong, and Sungwon Lee. 2009. RIDES: Robust intrusion detection system for IP-based ubiquitous sensor networks. Sensors 9, 5 (2009), 3447--3468.
[6]
Kumar Avijit and Prateek Gupta. 2006. Binary rewriting and call interception for efficient runtime protection against buffer overflows. Software: Practice and Experience 36, 9 (2006), 971--998.
[7]
Kumar Avijit, Prateek Gupta, and Deepak Gupta. 2004. TIED, LibsafePlus: Tools for runtime buffer overflow protection. In Proceedings of the USENIX Security Symposium. 45--56.
[8]
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita. 2014. Network anomaly detection: Methods, systems and tools. IEEE Communications Surveys Tutorials 16, 1 (First Quarter 2014), 303--336.
[9]
I. Butun, S. D. Morgera, and R. Sankar. 2014. A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys Tutorials 16, 1 (First Quarter 2014), 266--282.
[10]
C. Callegari, S. Giordano, and M. Pagano. 2014. Neural network based anomaly detection. In Proceedings of the 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD’14). 310--314.
[11]
Dinakar Dhurjati, Sumant Kowshik, and Vikram Adve. 2006. SAFECode: Enforcing alias analysis for weakly typed languages. In Proceedings of the 27th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, New York, NY, 144--157.
[12]
Ioannis Doudalis, James Clause, Guru Venkataramani, Milos Prvulovic, and Alessandro Orso. 2012. Effective and efficient memory protection using dynamic tainting. IEEE Transactions on Computers 61, 1 (2012), 87--100.
[13]
Erol Gelenbe. 1989. Random neural networks with negative and positive signals and product form solution. Neural Computation 1, 4 (1989), 502--510.
[14]
Erol Gelenbe. 1990. Stability of the random neural network model. Neural Computation 2, 2 (1990), 239--247.
[15]
Erol Gelenbe. 1991. Product-form queueing networks with negative and positive customers. Journal of Applied Probability (1991), 656--663.
[16]
Erol Gelenbe. 1993. Learning in the recurrent random neural network. Neural Computation 5, 1 (1993), 154--164.
[17]
E. Gelenbe and K. F. Hussain. 2002. Learning in the multiple class random neural network. IEEE Transactions on Neural Networks 13, 6 (Nov. 2002), 1257--1267.
[18]
Michael Georgiopoulos, Cong Li, and Taskin Kocak. 2011. Learning in the feed-forward random neural network: A critical review. Performance Evaluation 68, 4 (2011), 361--384.
[19]
J. Granjal, E. Monteiro, and J. Sa Silva. 2015. Security for the internet of things: A survey of existing protocols and open research issues. IEEE Communications Surveys Tutorials 17, 3, 1294--1312.
[20]
Sang-Jun Han and Sung-Bae Cho. 2005. Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 36, 3 (2005), 559--570.
[21]
Niranjan Hasabnis, Ashish Misra, and R. Sekar. 2012. Light-weight bounds checking. In Proceedings of the 10th International Symposium on CGO (CGO’12). ACM, New York, NY, 135--144.
[22]
HOPERF. Accessed: 15-9-2015. RFM69 ISM Transceiver Module. Retrieved from http://www.hoperf.cn/upload/rf/RFM69-V1.3.pdf.
[23]
A. Javed, H. Larijani, A. Ahmadinia, R. Emmanuel, D. Gibson, and C. Clark. 2015. Experimental testing of a random neural network smart controller using a single zone test chamber. Networks, IET 4, 6 (2015), 350--358.
[24]
A. Javed, H. Larijani, A. Ahmadinia, and D. Gibson. 2016. Smart random neural network controller for HVAC using cloud computing technology. IEEE Transactions on Industrial Informatics PP, 99 (2016), 1--1.
[25]
Richard W. M. Jones and Paul H. J. Kelly. 1997. Backwards-compatible bounds checking for arrays and pointers in C programs. In Proceedings of the 3rd International Workshop on Automatic Debugging. Citeseer, 13--26.
[26]
Georgios Kornaros and Dionisios Pnevmatikatos. 2013. A survey and taxonomy of on-chip monitoring of multicore systems-on-chip. ACM Transactions on Design Automation of Electronic Systems 18, 2, Article 17 (2013), 38 pages.
[27]
Sandeep Kumar and Eugene H. Spafford. 1994. An Application of Pattern Matching in Intrusion Detection. Technical Report. Department of Computer Sciences, Purdue University.
[28]
Wenchao Li, Ping Yi, Yue Wu, Li Pan, and Jianhua Li. 2014. A new intrusion detection system based on KNN classification algorithm in wireless sensor network. Journal of Electrical and Computing Engineering (2014).
[29]
Aristidis Likas and Andreas Stafylopatis. 2000. Training the random neural network using quasi-Newton methods. European Journal of Operational Research 126, 2 (2000), 331--339.
[30]
Shan Lu, Zhenmin Li, Feng Qin, Lin Tan, Pin Zhou, and Yuanyuan Zhou. 2005. Bugbench: Benchmarks for evaluating bug detection tools. In Proceedings of the Workshop on the Evaluation of Software Defect Detection Tools. 1--5.
[31]
Shufu Mao and T. Wolf. 2010. Hardware support for secure processing in embedded systems. IEEE Transactions on Computers 59, 6 (2010), 847--854.
[32]
Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, and Imrich Chlamtac. 2012. Internet of things: Vision, applications and research challenges. Ad Hoc Networks 10, 7 (2012), 1497--1516.
[33]
Samir Mohamed and Gerardo Rubino. 2002. A study of real-time packet video quality using random neural networks. IEEE Transactions on Circuits and Systems for Video Technology 12, 12 (2002), 1071--1083.
[34]
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Martin, and Steve Zdancewic. 2009. SoftBound: Highly compatible and complete spatial memory safety for C. In ACM Sigplan Notices, Vol. 44. ACM, 245--258.
[35]
George C. Necula, Jeremy Condit, Matthew Harren, Scott McPeak, and Westley Weimer. 2005. CCured: Type-safe retrofitting of legacy software. ACM Transactions on Programming Languages and Systems 27, 3 (2005), 477--526.
[36]
NIST. 2001. Advanced Encryption Standard: U.S. National Institute of Standards and Technology (NIST): Federal Information Processing Standards Publication (FIPS PUBS) 197. Retrievevd from http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
[37]
Aleph One. 1996. Smashing the stack for fun and profit. Phrack Magazine 7, 49 (1996), 14--16.
[38]
M. Rahmatian, H. Kooti, I. G. Harris, and E. Bozorgzadeh. 2012. Hardware-assisted detection of malicious software in embedded systems. Embedded Systems Letters, IEEE 4, 4 (2012), 94--97.
[39]
Shahid Raza, Linus Wallgren, and Thiemo Voigt. 2013. SVELTE: Real-time intrusion detection in the internet of things. Ad Hoc Networks 11, 8 (2013), 2661--2674.
[40]
RSA. 2003. Public-Key Cryptography Standards (PKCS): RSA Cryptography Specifications Version 2.1. Retrieved from https://tools.ietf.org/html/rfc3447.
[41]
Olatunji Ruwase and Monica S. Lam. 2004. A practical dynamic buffer overflow detector. In Proceedings of the 11th Annual Network and Distributed System Security Symposium.
[42]
Edward J. Schwartz, Thanassis Avgerinos, and David Brumley. 2010. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In Proceedings of the 2010 IEEE Symposium onSecurity and Privacy (SP’10). IEEE, 317--331.
[43]
Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitry Vyukov. 2012. AddressSanitizer: A fast address sanity checker. In USENIX ATC, Vol. 2012.
[44]
G. Edward Suh, Jae W. Lee, David Zhang, and Srinivas Devadas. 2004. Secure program execution via dynamic information flow tracking. SIGARCH Comput. Archit. News 32, 5 (Oct. 2004), 85--96.
[45]
Stelios Timotheou. 2008. Nonnegative least squares learning for the random neural network. In Artificial Neural Networks-ICANN 2008. Springer, 195--204.
[46]
Stelios Timotheou. 2010. The random neural network: A survey. The Computer Journal 53, 3 (2010), 251--267.
[47]
W. Trappe, R. Howard, and R. S. Moore. 2015. Low-energy security: Limits and opportunities in the internet of things. IEEE Security Privacy 13, 1 (Jan. 2015), 14--21.
[48]
Kleber Vieira, Alexandre Schulter, Carlos Westphall, and Carla Westphall. 2010. Intrusion detection for grid and cloud computing. IT Professional 12, 4 (2010), 38--43.
[49]
John Wilander, Nick Nikiforakis, Yves Younan, Mariam Kamkar, and Wouter Joosen. 2011. RIPE: Runtime intrusion prevention evaluator. In Proceedings of the 27th Annual Computer Security Applications Conference. ACM.
[50]
Shelly Xiaonan Wu and Wolfgang Banzhaf. 2010. The use of computational intelligence in intrusion detection systems: A review. Applied Soft Computing 10, 1 (2010), 1--35.
[51]
Li Da Xu, Wu He, and Shancang Li. 2014. Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics 10, 4 (Nov. 2014), 2233--2243.
[52]
Man-Ki Yoon, S. Mohan, Jaesik Choi, Jung-Eun Kim, and Lui Sha. 2013. SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems. In Proceedings of the 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS’13). 21--32.
[53]
Yves Younan. 2014. 25 Years of Vulnerabilities: 1988-2012. Retrieved from http://labs.snort.org/blogfiles/Sourcefire\\-25-Years-of-Vulnerabilities-Research-Report.pdf.
[54]
Yves Younan, Pieter Philippaerts, Lorenzo Cavallaro, R. Sekar, Frank Piessens, and Wouter Joosen. 2010. PAriCheck: An efficient pointer arithmetic checker for C programs. In Proceedings of the 5th ACM Symposium on Computer and Communication Security. ACM, 145--156.

Cited By

View all
  • (2024)Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game TheorySensors10.3390/s2413415224:13(4152)Online publication date: 26-Jun-2024
  • (2024)An optimization method for enterprise user anomaly detection based on FCMThird International Conference on Electronic Information Engineering and Data Processing (EIEDP 2024)10.1117/12.3032958(141)Online publication date: 5-Jul-2024
  • (2024)An Ensemble Edge Computing Approach for SD-IoT security Using Ensemble of Feature Selection Methods and ClassificationArabian Journal for Science and Engineering10.1007/s13369-024-08835-849:9(12953-12974)Online publication date: 26-Mar-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 16, Issue 4
Special Issue on Internet of Things (IoT): Smart and Secure Service Delivery
December 2016
168 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3023158
  • Editor:
  • Munindar P. Singh
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 December 2016
Accepted: 01 August 2016
Revised: 01 August 2016
Received: 01 November 2015
Published in TOIT Volume 16, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IoT security
  2. buffer overflows
  3. code instrumentation
  4. data integrity
  5. illegal memory accesses
  6. neural networks

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)38
  • Downloads (Last 6 weeks)3
Reflects downloads up to 09 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game TheorySensors10.3390/s2413415224:13(4152)Online publication date: 26-Jun-2024
  • (2024)An optimization method for enterprise user anomaly detection based on FCMThird International Conference on Electronic Information Engineering and Data Processing (EIEDP 2024)10.1117/12.3032958(141)Online publication date: 5-Jul-2024
  • (2024)An Ensemble Edge Computing Approach for SD-IoT security Using Ensemble of Feature Selection Methods and ClassificationArabian Journal for Science and Engineering10.1007/s13369-024-08835-849:9(12953-12974)Online publication date: 26-Mar-2024
  • (2024)A Novel Comparison Validation Framework for IDS and IPSAI Applications in Cyber Security and Communication Networks10.1007/978-981-97-3973-8_22(351-371)Online publication date: 18-Sep-2024
  • (2024)Enhancing Embedded IoT Systems for Intrusion Detection Using a Hybrid ModelArtificial Intelligence for Security10.1007/978-3-031-57452-8_15(345-366)Online publication date: 17-Apr-2024
  • (2023)Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain TechnologyFuture Internet10.3390/fi1505017815:5(178)Online publication date: 11-May-2023
  • (2023)Toward Improved Machine Learning-Based Intrusion Detection for Internet of Things TrafficComputers10.3390/computers1208014812:8(148)Online publication date: 27-Jul-2023
  • (2023)A Multilayer Deep Learning Approach for Malware Classification in 5G-Enabled IIoTIEEE Transactions on Industrial Informatics10.1109/TII.2022.320536619:2(1495-1503)Online publication date: Feb-2023
  • (2023)Blockchain-Based Privacy Preservation Scheme for Misbehavior Detection in Lightweight IoMT DevicesIEEE Journal of Biomedical and Health Informatics10.1109/JBHI.2022.318703727:2(710-721)Online publication date: Feb-2023
  • (2023)A Lightweight Intrusion Detection System against IoT Memory Corruption Attacks2023 26th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)10.1109/DDECS57882.2023.10139718(118-123)Online publication date: 3-May-2023
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media