Skip to main content
Top
Published in: Wireless Networks 4/2019

07-11-2017

IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis

Authors: Norisvaldo Ferraz Junior, Anderson Silva, Adilson Guelfi, Sergio Takeo Kofuji

Published in: Wireless Networks | Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless sensor and actuator devices with direct IPv6 Internet access with no human interaction compose the IP-connected Internet of Things (IoT). These devices are resource constrained in processing, memory, and energy—battery operated. IoT devices can have various applications. Although, when directly connected to the Internet they are susceptible to threats (e.g., malicious tamper of packet content to reduce the reliability of device data, the flood of requisitions for the devices to drain their energy). In this way, the literature shows the use of end-to-end security to provide confidentiality, authenticity, and integrity of IoT devices data. However, even with the benefit of secure IoT data, they are not enough to ensure reliable measurements. For this reason, this work presents a reliability model for IoT, focused on the identification of anomalous measurements (using multivariate statistics). In the experiments, we use spatial (proximity) and temporal (time interval variation) correlation, and datasets with true and false data. Additionally, we use an end-to-end secure scenario and analysis of energy consumption. The results prove the feasibility of the triad: reliability (within a system that identifies the type of the anomalous measurements), security, and low energy consumption.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Device software font code (with IPSec), example keys, and host configuration files are available at https://​github.​com/​norisjunior/​IoT6Sec
 
2
The normal and anomalous generated measurements, and the validation clusters (data series at all interval time) are available at https://​github.​com/​norisjunior/​IoT6Sec. In the available datasets we use the following description: AD.AP (All Devices with All Physical quantities with anomaly), 1D.AP (One device with All Physical quantities with anomalies), 1D.1P (One Device with One Physical quantity with anomaly).
 
3
 
Literature
3.
11.
go back to reference IEEE: IEEE 802.15.4, vol. 2011. IEEE WPAN TG4 (2011). IEEE: IEEE 802.15.4, vol. 2011. IEEE WPAN TG4 (2011).
13.
go back to reference Johnson, R. A., & Wichern, D. W. (2007). Applied multivariate statistical analysis (6th ed.). Upper Saddle River: Pearson Prentice Hall.MATH Johnson, R. A., & Wichern, D. W. (2007). Applied multivariate statistical analysis (6th ed.). Upper Saddle River: Pearson Prentice Hall.MATH
14.
go back to reference Kasinathan, P., Pastrone, C., Spirito, M.A., & Vinkovits, M. (2013). Denial-of-Service detection in 6LoWPAN based Internet of Things. In 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp. 600–607. https://doi.org/10.1109/WiMOB.2013.6673419. Kasinathan, P., Pastrone, C., Spirito, M.A., & Vinkovits, M. (2013). Denial-of-Service detection in 6LoWPAN based Internet of Things. In 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp. 600–607. https://​doi.​org/​10.​1109/​WiMOB.​2013.​6673419.
16.
go back to reference Loureiro, A. A., Nogueira, J. M. S., Ruiz, L. B., Mini, R. A. D. F., Nakamura, E. F., & Figueiredo, C. M. S. (2003). Redes de Sensores Sem Fio. In: XXI Simpósio Brasileiro de Redes de Computadores, pp. 179–226. Loureiro, A. A., Nogueira, J. M. S., Ruiz, L. B., Mini, R. A. D. F., Nakamura, E. F., & Figueiredo, C. M. S. (2003). Redes de Sensores Sem Fio. In: XXI Simpósio Brasileiro de Redes de Computadores, pp. 179–226.
17.
go back to reference Mayzaud, A., Badonnel, R., & Chrisment, I. (2016). A taxonomy of attacks in RPL-based internet of things. International Journal of Network Security, 18(3), 459–473. Mayzaud, A., Badonnel, R., & Chrisment, I. (2016). A taxonomy of attacks in RPL-based internet of things. International Journal of Network Security, 18(3), 459–473.
18.
go back to reference Mingoti, S. A. (2013). Análise de dados através de métodos de estatística multivariada: uma abordagem aplicada. Belo Horizonte: Editora UFMG. Mingoti, S. A. (2013). Análise de dados através de métodos de estatística multivariada: uma abordagem aplicada. Belo Horizonte: Editora UFMG.
20.
go back to reference Morettin, P. A., & Bussab, W. O. (2004). Estatística Básica. São Paulo: Editora Saraiva. Morettin, P. A., & Bussab, W. O. (2004). Estatística Básica. São Paulo: Editora Saraiva.
21.
go back to reference Moshtaghi, M., Leckie, C., Karunasekera, S., Bezdek, J. C., Rajasegarar, S., & Palaniswami, M. (2011). Incremental elliptical boundary estimation for anomaly detection in wireless sensor networks. In: 2011 IEEE 11th international conference on data mining, 1, pp. 467–476. IEEE. https://doi.org/10.1109/ICDM.2011.80. Moshtaghi, M., Leckie, C., Karunasekera, S., Bezdek, J. C., Rajasegarar, S., & Palaniswami, M. (2011). Incremental elliptical boundary estimation for anomaly detection in wireless sensor networks. In: 2011 IEEE 11th international conference on data mining, 1, pp. 467–476. IEEE. https://​doi.​org/​10.​1109/​ICDM.​2011.​80.
22.
25.
go back to reference Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., & Roedig, U. (2011). Securing communication in 6LoWPAN with compressed IPsec. In 2011 international conference on distributed computing in sensor systems and workshops (DCOSS). IEEE, pp. 1–8. https://doi.org/10.1109/DCOSS.2011.5982177. Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., & Roedig, U. (2011). Securing communication in 6LoWPAN with compressed IPsec. In 2011 international conference on distributed computing in sensor systems and workshops (DCOSS). IEEE, pp. 1–8. https://​doi.​org/​10.​1109/​DCOSS.​2011.​5982177.
26.
go back to reference Raza, S., Duquennoy, S., & Selander, G. (2016). Work-in-progress—Internet draft. Compression of IPsec AH and ESP headers for 6LoWPAN networks. Raza, S., Duquennoy, S., & Selander, G. (2016). Work-in-progress—Internet draft. Compression of IPsec AH and ESP headers for 6LoWPAN networks.
29.
go back to reference Shelby, Z., & Bormann, C. (2011). 6LoWPAN: The wireless embedded internet. New York: Wiley. Shelby, Z., & Bormann, C. (2011). 6LoWPAN: The wireless embedded internet. New York: Wiley.
31.
go back to reference Suthaharan, S., Alzahrani, M., Rajasegarar, S., Leckie, C., & Palaniswami, M. (2010). Labelled data collection for anomaly detection in wireless sensor networks. In 2010 sixth international conference on intelligent sensors, sensor networks and information processing. IEEE, pp. 269–274. https://doi.org/10.1109/ISSNIP.2010.5706782. Suthaharan, S., Alzahrani, M., Rajasegarar, S., Leckie, C., & Palaniswami, M. (2010). Labelled data collection for anomaly detection in wireless sensor networks. In 2010 sixth international conference on intelligent sensors, sensor networks and information processing. IEEE, pp. 269–274. https://​doi.​org/​10.​1109/​ISSNIP.​2010.​5706782.
32.
go back to reference Vasseur, J. P., & Dunkels, A. (2010). Interconnecting smart objects with IP: The next internet. New York: Elsevier. Vasseur, J. P., & Dunkels, A. (2010). Interconnecting smart objects with IP: The next internet. New York: Elsevier.
33.
Metadata
Title
IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis
Authors
Norisvaldo Ferraz Junior
Anderson Silva
Adilson Guelfi
Sergio Takeo Kofuji
Publication date
07-11-2017
Publisher
Springer US
Published in
Wireless Networks / Issue 4/2019
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-017-1610-2

Other articles of this Issue 4/2019

Wireless Networks 4/2019 Go to the issue