[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3415958.3433033acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
research-article

Thing Mutation as a Countermeasure to Safeguard IoT

Published: 27 November 2020 Publication History

Abstract

In the Internet of Things (IoT), mutation aims to enhance functionality and survivability of a thing in the context of dynamic environments by allowing the thing to satisfy a need or seize a potential opportunity. In this paper, we propose a framework based on thing mutation as a countermeasure to certain security threats that could impact things' operations (e.g., sensing and communicating). We then provide a case study which focuses on battery draining attack and propose a mutation-based strategy as a countermeasure to this attack.

References

[1]
Hezam Akram Abdul-Ghani, Dimitri Konstantas, and Mohammed Mahyoub. 2018. A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model. International Journal of Advanced Computer Science and Applications 9, 3 (2018).
[2]
Amin Azmoodeh, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2019. Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning. T-SUSC 4, 1 (2019), 88--95. https://doi.org/10.1109/TSUSC.2018.2809665
[3]
Reshma Banu, G. F. Ali Ahammed, and Nasreen Fathima. 2016. A review on biologically inspired approaches to security for Internet of Things (IoT). In 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT). 1062--1066. https://doi.org/10.1109/ICEEOT.2016.7754848
[4]
Mohammad Behdad, Luigi Barone, Mohammed Bennamoun, and Tim French. 2012. Nature-Inspired Techniques in the Context of Fraud Detection. IEEE Trans. Systems, Man, and Cybernetics, Part C 42, 6 (2012), 1273--1290. https://doi.org/10.1109/TSMCC.2012.2215851
[5]
Anders Brandt, Jakob Buron, and Giorgio Porcu. 2010. Home Automation Routing Requirements in Low-Power and Lossy Networks. RFC 5826 (2010), 1--17. https://doi.org/10.17487/RFC5826
[6]
Mehiar Dabbagh and Ammar Rayes. 2019. Internet of Things Security and Privacy. Springer International Publishing, Cham, 211--238.
[7]
Vasily Desnitsky, Igor Kotenko, and Danil Zakoldaev. 2019. Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices. Electronics 8, 5 (2019).
[8]
Muna Elsadig and Azween Abdullah. 2008. Biological inspired approach in parallel immunology system for network security. In 2008 International Symposium on Information Technology, Vol. 1. 1--6.
[9]
Noura Faci, Zakaria Maamar, Thar Baker, Emir Ugljanin, and Mohamed Sellami. 2018. In Situ Mutation for Active Things in the IoT Context. In Proceedings of the 13th International Conference on Software Technologies, ICSOFT 2018, Porto, Portugal, July 26-28, 2018., Leszek A. Maciaszek and Marten van Sinderen (Eds.). SciTePress, 759--766. https://doi.org/10.5220/0006840607590766
[10]
Diogo A. B. Fernandes, Mário M. Freire, Paulo A. P. Fazendeiro, and Pedro R. M. Inácio. 2017. Applications of artificial immune systems to computer security: A survey. Journal of Information Security and Applications 35 (2017), 138--159. https://doi.org/10.1016/j.jisa.2017.06.007
[11]
Mohammad Fouladlou and Ahmad Khademzadeh. 2017. An energy efficient clustering algorithm for Wireless Sensor devices in Internet of Things. In 2017 Artificial Intelligence and Robotics (IRANOPEN). 39--44.
[12]
Julie Greensmith. 2015. Securing the Internet of Things with Responsive Artificial Immune Systems. In Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2015, Madrid, Spain, July 11-15, 2015, Sara Silva and Anna Isabel Esparcia-Alcázar (Eds.). ACM, 113--120. https://doi.org/10.1145/2739480.2754816
[13]
Zonglin Guo, Ian G. Harris, Yutong Jiang, and Lih-feng Tsaur. 2017. An efficient approach to prevent Battery Exhaustion Attack on BLE-based mesh networks. In 2017 International Conference on Computing, Networking and Communications, ICNC 2017, Silicon Valley, CA, USA, January 26-29, 2017. IEEE Computer Society, 1--5. https://doi.org/10.1109/ICCNC.2017.7876092
[14]
Philokypros P. Ioulianou, Vassilios G. Vassilakis, and Micheal D. Logothetis. 2019. Battery Drain Denial-of-Service Attacks and Defenses in the Internet of Things. Journal of Telecommunications and Information Technology 2 (2019), 37--45.
[15]
Farzad Kamrani, Mikael Wedlin, and Ioana Rodhe. 2016. Internet of Things: Security and Privacy Issues. Report FOI-R-4362-SE. FOI.
[16]
A.R. Leach. 2007. 4.05 - Ligand-Based Approaches: Core Molecular Modeling. In Comprehensive Medicinal Chemistry II, John B. Taylor and David J. Triggle (Eds.). Elsevier, Oxford, 87--118. https://doi.org/10.1016/B0-08-045044-X/00246-7
[17]
Caiming Liu, Yan Zhang, and Huaqiang Zhang. 2013. A Novel Approach to IoT Security Based on Immunology. In Ninth International Conference on Computational Intelligence and Security, CIS 2013, Emei Mountain, Sichan Province, China, December 14-15, 2013. IEEE Computer Society, 771--775. https://doi.org/10.1109/CIS.2013.168
[18]
Zakaria Maamar, Thar Baker, Mohamed Sellami, Muhammad Asim, Emir Ugljanin, and Noura Faci. 2018. Cloud vs edge: Who serves the Internet-of-Things better? Internet Technol. Lett. 1, 5 (2018). https://doi.org/10.1002/itl2.66
[19]
Zakaria Maamar, Khouloud Boukadi, Emir Ugljanin, Thar Baker, Muhammad Asim, Mohammed Al-Khafajiy, Djamal Benslimane, and Hasna El Alaoui El Abdallaoui. 2018. Thing Federation as a Service: Foundations and Demonstration. In Model and Data Engineering - 8th International Conference, MEDI 2018, Marrakesh, Morocco, October 24-26, 2018, Proceedings (Lecture Notes in Computer Science), El Hassan Abdelwahed, Ladjel Bellatreche, Matteo Golfarelli, Dominique Méry, and Carlos Ordonez (Eds.), Vol. 11163. Springer, 184--197. https://doi.org/10.1007/978-3-030-00856-7_12
[20]
Zakaria Maamar, Saoussen Cheikhrouhou, Muhammad Asim, Attia Qamar, Thar Baker, and Emir Ugljanin. 2019. Towards a Resource-aware Thing Composition Approach. In The 2019 International Conference on High Performance Computing & Simulation (HPCS 2019).
[21]
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, and Jayan Krishnaswami. 2004. Denial-of-Service Attacks on Battery-powered Mobile Computers. In Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), 14-17 March 2004, Orlando, FL, USA. IEEE Computer Society, 309--318. https://doi.org/10.1109/PERCOM.2004.1276868
[22]
Arsalan Mosenia and Niraj K. Jha. 2017. A Comprehensive Study of Security of Internet-of-Things. IEEE Trans. Emerging Topics Comput. 5, 4 (2017), 586--602. https://doi.org/10.1109/TETC.2016.2606384
[23]
Nima Namvar, Walid Saad, Niloofar Bahadori, and Brian Kelley. 2016. Jamming in the Internet of Things: A Game-Theoretic Perspective. In 2016 IEEE Global Communications Conference, GLOBECOM 2016, Washington, DC, USA, December 4-8, 2016. IEEE, 1--6. https://doi.org/10.1109/GLOCOM.2016.7841922
[24]
M. Ogata, J. Franklin, J. Voas, V. Sritapan, and S. Quirolgico. April 2019. Vetting the Security of Mobile Applications. https://doi.org/10.6028/NIST.SP.800- 163r1 DRAFT NIST Special Publication 800-163 (Revision 1). [Online accessed 20-March-2020].
[25]
S. Periyanayagi, V. Sumathy, and Ramya Kulandaivel. 2011. A Defense Technique for Jamming Attacks in Wireless Sensor Networks Based on SI. In 2011 International Conference on Process Automation, Control and Computing. 1--5.
[26]
Deepak Puthal, Saraju P. Mohanty, Sanjivani Ashok Bhavake, Graham Morgan, and Rajiv Ranjan. 2019. Fog Computing Security Challenges and Future Directions [Energy and Security]. IEEE Consumer Electronics Magazine 8, 3 (2019), 92--96. https://doi.org/10.1109/MCE.2019.2893674
[27]
Ayyaz-Ul-Haq Qureshi, Hadi Larijani, Abbas Javed, Nhamoinesu Mtetwa, and Jawad Ahmad. 2019. Intrusion Detection Using Swarm Intelligence. In UK/China Emerging Technologies, UCET 2019, Glasgow, UK, August 21-22, 2019. IEEE, 1--5. https://doi.org/10.1109/UCET.2019.8881840
[28]
Mikail Mohammed Salim, Shailendra Rathore, and Jong Hyuk Park. 2020. Distributed denial of service attacks and its defenses in IoT: a survey. The Journal of Supercomputing 76 (2020), 5320--5363.
[29]
Stefaan Seys and Bart Preneel. 2003. Authenticated and efficient key management for wireless ad hoc networks. In 24th Symposium on Information Theory Benelux. 195--202.
[30]
Kamran Shafi, Tim Kovacs, Hussein A. Abbass, and Weiping Zhu. 2009. Intrusion detection with evolutionary learning classifier systems. Natural Computing 8, 1 (2009), 3--27. https://doi.org/10.1007/s11047-007-9053-9
[31]
David Simoncini and Kam Y.J. Zhang. 2019. Population-Based Sampling and Fragment-Based De Novo Protein Structure Prediction. In Encyclopedia of Bioinformatics and Computational Biology, Shoba Ranganathan, Michael Gribskov, Kenta Nakai, and Christian SchÃŭnbach (Eds.). Academic Press, Oxford, 774--784. https://doi.org/10.1016/B978-0-12-809633-8.20507-4
[32]
Andrew N. Sloss and Steven Gustafson. 2019. 2019 Evolutionary Algorithms Review. CoRR abs/1906.08870 (2019). arXiv:1906.08870 http://arxiv.org/abs/1906.08870
[33]
Ryan J. Urbanowicz and Jason H. Moore. 2009. Learning classifier systems: a complete introduction, review, and roadmap. Journal of Artificial Evolution and Applications 1 (2009).
[34]
Maneesh Kumar Verma, Shankar Yadav, Bhoopesh Kumar Goyal, Bakshi Rohit Prasad, and Sonali Agarawal. 2019. Phishing Website Detection Using Neural Network and Deep Belief Network. In Recent Findings in Intelligent Computing Techniques, Pankaj Kumar Sa, Sambit Bakshi, Ioannis K. Hatzilygeroudis, and Manmath Narayan Sahoo (Eds.). Springer Singapore, Singapore, 293--300.
[35]
John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vishwamitra Chaudhary. 2007. Wireless sensor network security: A survey. Security in Distributed, Grid, and Pervasive Computing (2007).
[36]
Chuanlong Yin, Yuefei Zhu, Jin-long Fei, and Xin-Zheng He. 2017. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks. IEEE Access 5 (2017), 21954--21961. https://doi.org/10.1109/ACCESS.2017.2762418

Index Terms

  1. Thing Mutation as a Countermeasure to Safeguard IoT

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MEDES '20: Proceedings of the 12th International Conference on Management of Digital EcoSystems
    November 2020
    170 pages
    ISBN:9781450381154
    DOI:10.1145/3415958
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 November 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Countermeasure
    2. IoT
    3. Mutation
    4. Security

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    MEDES '20
    MEDES '20: 12th International Conference on Management of Digital EcoSystems
    November 2 - 4, 2020
    Virtual Event, United Arab Emirates

    Acceptance Rates

    MEDES '20 Paper Acceptance Rate 19 of 27 submissions, 70%;
    Overall Acceptance Rate 267 of 682 submissions, 39%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 44
      Total Downloads
    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 14 Dec 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media