ABSTRACT
Internet of Things (IoT) is one of the most rapidly developing information technology concept in the world. Ensuring the safety of IoT is a complex task which has not been completely solved so far. A prospective approach for security providing in IoT is development of a security information and event management (SIEM) system for IoT. For realizing this approach, it is necessary to solve tasks of data volume reduction, data integrity, and guaranteed data transportation to SIEM system. This paper proposes a solution for all of these tasks using data aggregation, data digital signing, and swarm routing algorithm.
- Connected World: The Internet of Things and Connected Devices in 2020. Scenario for 2020 by Cisco. Strategy Analytics. October 9th, 2014.Google Scholar
- Xing, K., Srinivasan, S. S. R., Rivera, M., Li, J., Cheng, X. Z. 2005. Attacks and Countermeasures in Sensor Networks: A Survey. Springer, Network Security, pp. 534--548.Google Scholar
- D. Cappelli, A. Moore, and R. Trzeciak, The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Addison-Wesley Professional, 2012. Google ScholarDigital Library
- Minin, A., Kalinin, M. 2015. Information security in computer networks with dynamic topology. Proceedings of the 8th International Conference on Security of Information and Networks, ACM New York, NY, USA, pp. 127--130. Google ScholarDigital Library
- D. Lavrova, A. Pechenkin. Applying Correlation and Regression Analysis Methods for Security Incidents Detection in the Internet of Things. International journal of communication networks and information security (IJCNIS), Vol.7, No.3, pp.2015.Google Scholar
- Somanath Tripathy, Debasish Sahoo. WAKE: Authentication and Key Establishment for Wireless Mesh Network. Recent Trends in Computer Networks and Distributed Systems Security, Vol. 335, Communications in Computer and Information Science, pp 64--74.Google Scholar
- Zhang, Y., Fang, Y. 2006. ARSA: An Attack-Resilient Security Architecture for. Multihop Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications, Vol. 24, No.10, October 2006, pp. 1916--1928 Google ScholarDigital Library
- Niranjan Babu T., Vamsi Krishna V., Chandra Sekhar K., Data security in wireless mesh networks. Asian Journal of Computer Science And Information Technology, 2015, pp. 67--69.Google Scholar
- Yuexin Zhang, Yang Xiang, Xinyi Huang, Li Xu. A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks. Computer Security - ESORICS 2014, Vol. 8712, Lecture Notes in Computer Science, pp. 526--541.Google Scholar
- P. Saraswathi, M. Prabha. Multi-Objective Evolutionary Algorithm for Routing in Wireless Mesh Networks. International Journal of Soft Computing and Engineering, Vol. 4, pp. 38--41, 2014.Google Scholar
- Li Yingxiong, Henry C. B. Chan, Patrick Lam, Peter. H. J. Chong, Channel Allocation Method for Multi-radio Wireless Mesh Networks based on a Genetic Algorithm. In Proc. Of IMECS, Vol. II, 2016.Google Scholar
- Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B. N., Shields, C., Belding-Royer, E. M. 2005. Authenticated Routing for Ad hoc Networks. IEEE J. Select. Areas Commun., Vol. 23, No. 3, pp. 598--610. Google ScholarDigital Library
- Yi, S., Naldurg, P., Kravets, R. 2001. Security-aware ad hoc routing for wireless networks. Proceedings of ACM MobiHoc'01, pp. 299--302. Google ScholarDigital Library
Recommendations
Context-aware security in the internet of things: a survey
Internet of things (IoT) applications encompass home-automation, health, transportation, etc. The main objective of these applications is to improve user's lives. However, security and privacy threats and the lack of adapted security mechanisms could ...
Cyberentity Security in the Internet of Things
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
SIEM-IoT: A Blockchain-Based and Distributed SIEM for the Internet of Things
Applied Cryptography and Network Security WorkshopsAbstractThe paper at hand proposes SIEM-IoT, a Security Information and Event Management solution (SIEM) for the Internet of Things (IoT) relying on blockchain to store and access security events. The security events included in the blockchain are ...
Comments