skip to main content
10.1145/2947626.2947639acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing

Authors Info & Claims
Published:20 July 2016Publication History

ABSTRACT

Internet of Things (IoT) is one of the most rapidly developing information technology concept in the world. Ensuring the safety of IoT is a complex task which has not been completely solved so far. A prospective approach for security providing in IoT is development of a security information and event management (SIEM) system for IoT. For realizing this approach, it is necessary to solve tasks of data volume reduction, data integrity, and guaranteed data transportation to SIEM system. This paper proposes a solution for all of these tasks using data aggregation, data digital signing, and swarm routing algorithm.

References

  1. Connected World: The Internet of Things and Connected Devices in 2020. Scenario for 2020 by Cisco. Strategy Analytics. October 9th, 2014.Google ScholarGoogle Scholar
  2. Xing, K., Srinivasan, S. S. R., Rivera, M., Li, J., Cheng, X. Z. 2005. Attacks and Countermeasures in Sensor Networks: A Survey. Springer, Network Security, pp. 534--548.Google ScholarGoogle Scholar
  3. D. Cappelli, A. Moore, and R. Trzeciak, The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Addison-Wesley Professional, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Minin, A., Kalinin, M. 2015. Information security in computer networks with dynamic topology. Proceedings of the 8th International Conference on Security of Information and Networks, ACM New York, NY, USA, pp. 127--130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. Lavrova, A. Pechenkin. Applying Correlation and Regression Analysis Methods for Security Incidents Detection in the Internet of Things. International journal of communication networks and information security (IJCNIS), Vol.7, No.3, pp.2015.Google ScholarGoogle Scholar
  6. Somanath Tripathy, Debasish Sahoo. WAKE: Authentication and Key Establishment for Wireless Mesh Network. Recent Trends in Computer Networks and Distributed Systems Security, Vol. 335, Communications in Computer and Information Science, pp 64--74.Google ScholarGoogle Scholar
  7. Zhang, Y., Fang, Y. 2006. ARSA: An Attack-Resilient Security Architecture for. Multihop Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications, Vol. 24, No.10, October 2006, pp. 1916--1928 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Niranjan Babu T., Vamsi Krishna V., Chandra Sekhar K., Data security in wireless mesh networks. Asian Journal of Computer Science And Information Technology, 2015, pp. 67--69.Google ScholarGoogle Scholar
  9. Yuexin Zhang, Yang Xiang, Xinyi Huang, Li Xu. A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks. Computer Security - ESORICS 2014, Vol. 8712, Lecture Notes in Computer Science, pp. 526--541.Google ScholarGoogle Scholar
  10. P. Saraswathi, M. Prabha. Multi-Objective Evolutionary Algorithm for Routing in Wireless Mesh Networks. International Journal of Soft Computing and Engineering, Vol. 4, pp. 38--41, 2014.Google ScholarGoogle Scholar
  11. Li Yingxiong, Henry C. B. Chan, Patrick Lam, Peter. H. J. Chong, Channel Allocation Method for Multi-radio Wireless Mesh Networks based on a Genetic Algorithm. In Proc. Of IMECS, Vol. II, 2016.Google ScholarGoogle Scholar
  12. Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B. N., Shields, C., Belding-Royer, E. M. 2005. Authenticated Routing for Ad hoc Networks. IEEE J. Select. Areas Commun., Vol. 23, No. 3, pp. 598--610. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Yi, S., Naldurg, P., Kravets, R. 2001. Security-aware ad hoc routing for wireless networks. Proceedings of ACM MobiHoc'01, pp. 299--302. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SIN '16: Proceedings of the 9th International Conference on Security of Information and Networks
    July 2016
    186 pages
    ISBN:9781450347648
    DOI:10.1145/2947626

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 20 July 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    SIN '16 Paper Acceptance Rate12of46submissions,26%Overall Acceptance Rate102of289submissions,35%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader