scholarly journals Smart Devices Security Enhancement via Power Supply Monitoring

2020 ◽  
Vol 12 (3) ◽  
pp. 48
Author(s):  
Dimitrios Myridakis ◽  
Georgios Spathoulas ◽  
Athanasios Kakarountas ◽  
Dimitrios Schinianakis

The continuous growth of the number of Internet of Things (IoT) devices and their inclusion to public and private infrastructures has introduced new applciations to the market and our day-to-day life. At the same time, these devices create a potential threat to personal and public security. This may be easily understood either due to the sensitivity of the collected data, or by our dependability to the devices’ operation. Considering that most IoT devices are of low cost and are used for various tasks, such as monitoring people or controlling indoor environmental conditions, the security factor should be enhanced. This paper presents the exploitation of side-channel attack technique for protecting low-cost smart devices in an intuitive way. The work aims to extend the dataset provided to an Intrusion Detection Systems (IDS) in order to achieve a higher accuracy in anomaly detection. Thus, along with typical data provided to an IDS, such as network traffic, transmitted packets, CPU usage, etc., it is proposed to include information regarding the device’s physical state and behaviour such as its power consumption, the supply current, the emitted heat, etc. Awareness of the typical operation of a smart device in terms of operation and functionality may prove valuable, since any deviation may warn of an operational or functional anomaly. In this paper, the deviation (either increase or decrease) of the supply current is exploited for this reason. This work aimed to affect the intrusion detection process of IoT and proposes for consideration new inputs of interest with a collateral interest of study. In parallel, malfunction of the device is also detected, extending this work’s application to issues of reliability and maintainability. The results present 100% attack detection and this is the first time that a low-cost security solution suitable for every type of target devices is presented.

Computation ◽  
2021 ◽  
Vol 9 (2) ◽  
pp. 19
Author(s):  
Dimitrios Myridakis ◽  
Paul Myridakis ◽  
Athanasios Kakarountas

Recently, there has been a sharp increase in the production of smart devices and related networks, and consequently the Internet of Things. One concern for these devices, which is constantly becoming more critical, is their protection against attacks due to their heterogeneity and the absence of international standards to achieve this goal. Thus, these devices are becoming vulnerable, with many of them not even showing any signs of malfunction or suspicious behavior. The aim of the present work is to introduce a circuit that is connected in series with the power supply of a smart device, specifically an IP camera, which allows analysis of its behavior. The detection circuit operates in real time (real-time detection), sampling the supply current of the device, processing the sampled values and finally indicating any detection of abnormal activities, based on a comparison to normal operation conditions. By utilizing techniques borrowed by simple power analysis side channel attack, it was possible to detect deviations from the expected operation of the IP camera, as they occurred due to intentional attacks, quarantining the monitored device from the rest of the network. The circuit is analyzed and a low-cost implementation (under 5US$) is illustrated. It achieved 100% success in the test results, showing excellent performance in intrusion detection.


2018 ◽  
Vol 10 (3) ◽  
pp. 61-83 ◽  
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


Electronics ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 300 ◽  
Author(s):  
Vincenzo Randazzo ◽  
Jacopo Ferretti ◽  
Eros Pasero

Smart devices are more and more present in every aspect of everyday life. From smartphones, which are now like mini-computers, through systems for monitoring sleep or fatigue, to specific sensors for the recording of vital parameters. A particular class of the latter regards health monitoring. Indeed, through the use of such devices, several vital parameters can be acquired and automatically monitored, even remotely. This paper presents the second generation of VITAL-ECG, a smart device designed to monitor the most important vital parameters as a “one touch” device, anywhere, at low cost. It is a wearable device that coupled with a mobile app can track bio-parameters such as: electrocardiogram, SpO2, skin temperature, and physical activity of the patient. Even if it not yet a medical device, a comprehensive comparison with a golden standard electrocardiograph is presented to demonstrate the quality of the recorded signals and the validity of the proposed approach.


2019 ◽  
pp. 1927-1951
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


Energies ◽  
2018 ◽  
Vol 11 (8) ◽  
pp. 2089 ◽  
Author(s):  
Rehman Abdul ◽  
Anand Paul ◽  
Junaid Gul M. ◽  
Won-Hwa Hong ◽  
Hyuncheol Seo

Internet of Things (IoT) has been at the center of attention among researchers for the last two decades. Their aim was to convert each real-world object into a virtual object. Recently, a new idea of integrating the Social Networking concept into the Internet of Things has merged and is gaining popularity and attention in the research society due to its vast and flexible nature. It comprises of the potential to provide a platform for innovative applications and network services with efficient and effective manners. In this paper, we provide the sustenance for the Social Internet of Things (SIoT) paradigm to jump to the next level. Currently, the SIoT technique has been proven to be efficient, but heterogeneous smart devices are growing exponentially. This can develop a problematic scenario while searching for the right objects or services from billions of devices. Small world phenomena have revealed some interesting facts and motivated many researchers to find the hidden links between acquaintances in order to reach someone across the world. The contribution of this research is to integrate the SIoT paradigm with the small world concept. By integrating the small world properties in SIoT smart devices, we empower the Smart Social Agent (SSA). The Smart Social Agent ensures the finding of appropriate friends (i.e., the IoT devices used by our friend circle) and services that are required by the user, without human intervention. The Smart Social Agent can be any smart device in SIoTs, e.g., mobile phones.


2019 ◽  
Vol 2019 ◽  
pp. 1-10 ◽  
Author(s):  
Fei Xiao ◽  
Zhaowen Lin ◽  
Yi Sun ◽  
Yan Ma

The Internet of Things (IoT) provides various benefits, which makes smart device even closer. With more and more smart devices in IoT, security is not a one-device affair. Many attacks targeted at traditional computers in IoT environment may also aim at other IoT devices. In this paper, we consider an approach to protect IoT devices from being attacked by local computers. In response to this issue, we propose a novel behavior-based deep learning framework (BDLF) which is built in cloud platform for detecting malware in IoT environment. In the proposed BDLF, we first construct behavior graphs to provide efficient information of malware behaviors using extracted API calls. We then use a neural network-Stacked AutoEncoders (SAEs) for extracting high-level features from behavior graphs. The layers of SAEs are inserted one after another and the last layer is connected to some added classifiers. The architecture of the SAEs is 6,000-2,000-500. The experiment results demonstrate that the proposed BDLF can learn the semantics of higher-level malicious behaviors from behavior graphs and further increase the average detection precision by 1.5%.


Electronics ◽  
2021 ◽  
Vol 10 (5) ◽  
pp. 600
Author(s):  
Gianluca Cornetta ◽  
Abdellah Touhafi

Low-cost, high-performance embedded devices are proliferating and a plethora of new platforms are available on the market. Some of them either have embedded GPUs or the possibility to be connected to external Machine Learning (ML) algorithm hardware accelerators. These enhanced hardware features enable new applications in which AI-powered smart objects can effectively and pervasively run in real-time distributed ML algorithms, shifting part of the raw data analysis and processing from cloud or edge to the device itself. In such context, Artificial Intelligence (AI) can be considered as the backbone of the next generation of Internet of the Things (IoT) devices, which will no longer merely be data collectors and forwarders, but really “smart” devices with built-in data wrangling and data analysis features that leverage lightweight machine learning algorithms to make autonomous decisions on the field. This work thoroughly reviews and analyses the most popular ML algorithms, with particular emphasis on those that are more suitable to run on resource-constrained embedded devices. In addition, several machine learning algorithms have been built on top of a custom multi-dimensional array library. The designed framework has been evaluated and its performance stressed on Raspberry Pi III- and IV-embedded computers.


2021 ◽  
Vol 5 (1) ◽  
pp. 38-61
Author(s):  
Batur Alp Akgül ◽  
Bülent HAZNEDAR ◽  
Abdurrahman YAŞAR ◽  
Mustafa Ersan ÇİNKILIÇ

Rapid advancements in mobile industry have emerged new technological ideas and applications for researchers by allowing smart devices over the last decade. In recent years, the need for Indoor Position Routing (IPR) and Location-Based Advertisements (LBA) systems are increasingly common, IPR and LBA systems have been becoming very popular. Nowadays, it has become possible to create software and hardware applications for IPR and LBA in indoor environments, thanks to developments of different technologies. The development of the system should be based on low-cost technology, it should be suitable for integration and indoors operation. New options and possibilities for indoor locations are presented by the iBeacon-Bluetooth Low Energy (BLE) radio protocol. iBeacon-BLE supports portable battery-powered system that can be smoothly distributed at low cost giving it distinct advantages over Wi-Fi. Therefore, in this study, a technological infrastructure is created to solve the navigation problem in closed locations using iBeacon-BLE technology, a data monitoring information system is proposed for smart devices of currently available technology for IPR, LBA with using iBeacon-BLE. The localization of the objects based on iBeacon-BLE and their combination are determined using the measured data with the developed application. To build an IPR system for indoor environments, the available hardware, software, and network technologies are presented. The concept of the indoor monitoring system and the technologies can be used to develop the IPR system are presented. This system is made up of iBeacon-BLE sensor nodes, a smart device and a mobile application that provides IPR and LBA services by measuring the distance between Transmitter (TX) and Receiver (RX). The proposed model uses the trilateration method, it allows the mobile application to determine the exact location of the object at the micro-level size. The proposed model uses sensory data to identify and trilateration the object’s position.


Author(s):  
Ahmed Saeed Alzahrani

The Internet of Things model envisions the widespread interconnection and collaboration of smart devices over the present and future Internet environment. Threats and attacks against IoT devices and services are on the rise due to their rapid development. Distributed-Denial-of-Service (DDoS) attacks are one of the main dangerous malwares that attack targeted organizations through infected devices. Many mechanisms are developed for IoT devices in order to detect DDoS attacks. Nonetheless, the prevailing DDoS Attack Detection (DAD) methods involve time-delay and a lower detection rate. This paper proposed an efficient approach using the Levenberg-Marquardt Neural Network (LMDANN) algorithm for detecting the DDoS attacks in order to enhance prediction accuracy. In the proposed system, a MapReduce technique is used to eliminate the redundant copies. In addition, the Entropy-based Fisher’s Discriminate Function (ENTFDF) method was developed to reduce the features from the extracted features, and the system suggests an LMDANN algorithm to classify DDoS attack data separately from the normal data. In this, 80% of the data is used for training, and 20% of the data is used for testing. The performance of the proposed LMDANN method was evaluated in contrast to other art of state algorithms (ANN, SVM, KNN, and ANFIS) in terms of some specific qualitative performance metrics (recall, sensitivity, f-measure, specificity, precision, accuracy, and training time). The results show that the proposed detection approach can efficiently detect the DDoS attack in the IoT environment, achieving 96.35% accuracy.


Author(s):  
Fazlullah Khan ◽  
Ateeq ur Rehman ◽  
Abid Yahya ◽  
Mian Ahmad Jan ◽  
Josef Chuma ◽  
...  

The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks play an important role in the designing of IoT-enabled platforms due to their efficient, flexible, low-cost, and dynamic infrastructures. These networks utilize the available resources efficiently to maintain the Quality of Service (QoS) in a multi-hop communication. However, in a multi-hop communication, the relay nodes can be malicious, thus requiring a secured and reliable data transmission. In this paper, we propose a QoS-aware secured communication scheme for IoT-based networks (QoS-IoT). In QoS-IoT, a Sybil attack detection mechanism is used for the identification of Sybil nodes and their forged identities in multi-hop communication. %by high-power and mobile nodes. After Sybil nodes detection, an optimal contention window (CW) is selected for QoS provisioning, i.e., to achieve per-flow fairness and efficient utilization of the available bandwidth. In a multi-hop communication, the MAC layer protocols do not perform well in terms of fairness and throughput, especially when the nodes generate a large amount of data. It is because the MAC layer has no capability of providing QoS to prioritized or forwarding flows. We evaluate the performance of QoS-IoT in terms of Sybil attack detection, fairness, throughput, and buffer utilization. The simulation results show that the proposed scheme outperforms the existing schemes and significantly enhances the performance of the network with a large volume of data. Moreover, the proposed scheme is resilient against Sybil attack.


Sign in / Sign up

Export Citation Format

Share Document