Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
sensors-logo

Journal Browser

Journal Browser

Cybersecurity in the Internet of Things

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (25 March 2023) | Viewed by 59452

Special Issue Editors


E-Mail Website
Guest Editor
Department of Digital Systems, University of Piraeus, Karaoli and Dimitriou 80, PC 18534 Piraeus, Greece
Interests: network security; authentication; mobile security; IoT security; computer security; smart grid security

E-Mail Website
Guest Editor
Ubitech Ltd, Digital Security & Trusted Computing Group, Thessalias 8 & Etolias 10, 15232 Chalandri, Athesn, Greece
Interests: trusted computing; applied cryptography; information security; privacy; Internet of Things; secure systems; intrusion detection
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

With the ever-increasing applications of Internet of Things (IoT) in the wild, there is an abundance of possible vulnerable targets. This IoT revolution has benefited both industrial organizations and multiple vertical sectors, but it has also created unprecedented opportunities for the exploitation of new attack vectors. The aim of this Special Issue is to provide the necessary grounds for discussion and advancement towards enhancing the security and functional safety properties of IoT and their emerging applications. Although most efforts, when it comes to cybersecurity, have the limitation of constrained resources in low-powered devices, the advancement of technology and the paradigm of edge and fog computing have proven that this is not the case anymore, with deployments becoming more decentralized and complex. Advanced critical applications and a wide gamut of mixed-criticality services are deployed in edge devices in increasing frequency, and traditional security should be considered in tandem with IoT security so that solutions deployed in such environments are properly protected. With this in mind, this Special Issue will focus on advanced IoT cybersecurity technologies that not only take into account the per-device security but also their grid-interconnected network as a whole towards establishing “communities of trust”. Its main target is to modernize the approach of cybersecurity in IoT schemas with outreaches to edge and fog computing.

Technical contribution papers, industrial case studies, and review papers are welcome. Topics can include (but are not limited to):

  • Traditional and IoT cybersecurity;
  • Access control, authentication, and authorization;
  • Trust establishment, relationships and propagation, and reputation systems;
  • Attestation technologies and decentralized roots-of-trust;
  • Key management and key recovery;
  • Control-flow binary tracing and RISC-V security;
  • Trusted execution environments and/or TPM security applications in IoT networks;
  • Security in smart grid;
  • Security in edge and fog computing;
  • Usable security and privacy in IoT;
  • Formal verification of security protocols;
  • Data protection in transit and in storage for IoT networks;
  • Blockchain-based cybersecurity applications;
  • Cryptographic trust anchors for secure on- and off-chain knowledge management and data sharing;
  • Malware detection and propagation;
  • Adversarial machine learning;
  • Intrusion detection;
  • Efficient cryptography.

Prof. Dr. Christos Xenakis
Dr. Thanassis Giannetsos
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (14 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

24 pages, 1387 KiB  
Article
Role-Driven Clustering of Stakeholders: A Study of IoT Security Improvement
by Latifah Almalki, Amany Alnahdi and Tahani Albalawi
Sensors 2023, 23(12), 5578; https://doi.org/10.3390/s23125578 - 14 Jun 2023
Cited by 1 | Viewed by 1787
Abstract
This study aims to address the challenges of managing the vast amount of data generated by Internet of Things (IoT) devices by categorizing stakeholders based on their roles in IoT security. As the number of connected devices increases, so do the associated security [...] Read more.
This study aims to address the challenges of managing the vast amount of data generated by Internet of Things (IoT) devices by categorizing stakeholders based on their roles in IoT security. As the number of connected devices increases, so do the associated security risks, highlighting the need for skilled stakeholders to mitigate these risks and prevent potential attacks. The study proposes a two-part approach, which involves clustering stakeholders according to their responsibilities and identifying relevant features. The main contribution of this research lies in enhancing decision-making processes within IoT security management. The proposed stakeholder categorization provides valuable insights into the diverse roles and responsibilities of stakeholders in IoT ecosystems, enabling a better understanding of their interrelationships. This categorization facilitates more effective decision making by considering the specific context and responsibilities of each stakeholder group. Additionally, the study introduces the concept of weighted decision making, incorporating factors such as role and importance. This approach enhances the decision-making process, enabling stakeholders to make more informed and context-aware decisions in the realm of IoT security management. The insights gained from this research have far-reaching implications. Not only will they benefit stakeholders involved in IoT security, but they will also assist policymakers and regulators in developing effective strategies to address the evolving challenges of IoT security. Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Taxonomy of IoT attacks based on different features.</p>
Full article ">Figure 2
<p>Methodology for smarter decision making and resource allocation.</p>
Full article ">Figure 3
<p>Five models to select the best features from the relevant features.</p>
Full article ">Figure 4
<p>Stakeholders and roles.</p>
Full article ">Figure 5
<p>The bar chart shows data for nine stakeholders, reprinted with permission from [<a href="#B86-sensors-23-05578" class="html-bibr">86</a>].</p>
Full article ">Figure 6
<p>Scatter plot illustrating the clustering of nine stakeholders into three groups.</p>
Full article ">Figure 7
<p>Relevant features for each group based on expert selection.</p>
Full article ">Figure 8
<p>Comparison of the impact of using only the best features vs. other features: analysis of groups G1, G2, and G3 in the Bot_IoT dataset.</p>
Full article ">Figure 9
<p>Comparison of the impact of using only the best features vs. other features: analysis of groups G1, G2, and G3 in UNSW-NB15 dataset.</p>
Full article ">Figure A1
<p>Description of datasets.</p>
Full article ">
36 pages, 6696 KiB  
Article
Hybrid IoT Cyber Range
by Karl Edvard Balto, Muhammad Mudassar Yamin, Andrii Shalaginov and Basel Katt
Sensors 2023, 23(6), 3071; https://doi.org/10.3390/s23063071 - 13 Mar 2023
Cited by 4 | Viewed by 3743
Abstract
The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT devices are now trusted [...] Read more.
The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT devices are now trusted with more critical tasks, and it is important that they behave as intended and that the information they process is protected. It is not always the IoT device itself that is the target of a cyber attack, but rather, it can be a tool for another attack. Home consumers, in particular, expect these devices to be easy to use and set up. However, to reduce costs, complexity, and time, security measures are often cut down. To increase awareness and knowledge in IoT security, education, awareness, demonstrations, and training are necessary. Small changes may result in significant security benefits. With increased awareness and knowledge among developers, manufacturers, and users, they can make choices that can improve security. To increase knowledge and awareness in IoT security, a proposed solution is a training ground for IoT security, an IoT cyber range. Cyber ranges have received more attention lately, but not as much in the IoT field, at least not what is publicly available. As the diversity in IoT devices is large with different vendors, architectures, and components and peripherals, it is difficult to find one solution that fits all IoT devices. To some extent, IoT devices can be emulated, but it is not feasible to create emulators for all types of devices. To cover all needs, it is necessary to combine digital emulation with real hardware. A cyber range with this combination is called a hybrid cyber range. This work surveys the requirements for a hybrid IoT cyber range and proposes a design and implementation of a range that fulfills those requirements. Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Cyber range taxonomy by Yamin et al. [<a href="#B2-sensors-23-03071" class="html-bibr">2</a>].</p>
Full article ">Figure 2
<p>Activities in design science research.</p>
Full article ">Figure 3
<p>Portal view example.</p>
Full article ">Figure 4
<p>Work flow in creating a scenario.</p>
Full article ">Figure 5
<p>Design of IoT cyber range.</p>
Full article ">Figure 6
<p>Aqara SSM-U01 switch screenshot and wiring.</p>
Full article ">Figure 7
<p>WB2S board dismounted from the Cleverio 51701.</p>
Full article ">Figure 8
<p>Connection on Linksys E900 N300.</p>
Full article ">Figure 9
<p>Switch.</p>
Full article ">Figure 10
<p>Screenshot Wireshark–Zigbee network key while configuring the device in Home Assistant.</p>
Full article ">
22 pages, 5162 KiB  
Article
Intrusion Detection System for IoT: Analysis of PSD Robustness
by Lamoussa Sanogo, Eric Alata, Alexandru Takacs and Daniela Dragomirescu
Sensors 2023, 23(4), 2353; https://doi.org/10.3390/s23042353 - 20 Feb 2023
Cited by 1 | Viewed by 1546
Abstract
The security of internet of things (IoT) devices remains a major concern. These devices are very vulnerable because of some of their particularities (limited in both their memory and computing power, and available energy) that make it impossible to implement traditional security mechanisms. [...] Read more.
The security of internet of things (IoT) devices remains a major concern. These devices are very vulnerable because of some of their particularities (limited in both their memory and computing power, and available energy) that make it impossible to implement traditional security mechanisms. Consequently, researchers are looking for new security mechanisms adapted to these devices and the networks of which they are part. One of the most promising new approaches is fingerprinting, which aims to identify a given device by associating it with a unique signature built from its unique intrinsic characteristics, i.e., inherent imperfections, introduced by the manufacturing processes of its hardware. However, according to state-of-the-art studies, the main challenge that fingerprinting faces is the nonrelevance of the fingerprinting features extracted from hardware imperfections. Since these hardware imperfections can reflect on the RF signal for a wireless communicating device, in this study, we aim to investigate whether or not the power spectral density (PSD) of a device’s RF signal could be a relevant feature for its fingerprinting, knowing that a relevant fingerprinting feature should remain stable regardless of the environmental conditions, over time and under influence of any other parameters. Through experiments, we were able to identify limits and possibilities of power spectral density (PSD) as a fingerprinting feature. Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Comparison of different PSDs before and after the normalization. Parameter <math display="inline"><semantics> <mi>d</mi> </semantics></math> is frequency-dependent and is given by<math display="inline"><semantics> <mrow> <mo> </mo> <mi>d</mi> <mo>=</mo> <mfenced close="|" open="|"> <mrow> <mi>P</mi> <mi>S</mi> <msubsup> <mi>D</mi> <mn>1</mn> <mo>*</mo> </msubsup> <mfenced> <mi>f</mi> </mfenced> <mo>−</mo> <mi>P</mi> <mi>S</mi> <msubsup> <mi>D</mi> <mn>2</mn> <mo>*</mo> </msubsup> <mfenced> <mi>f</mi> </mfenced> </mrow> </mfenced> </mrow> </semantics></math>, where * denotes the normalized amplitude. In this figure,<math display="inline"><semantics> <mrow> <mo> </mo> <mi>d</mi> </mrow> </semantics></math> is shown at <math display="inline"><semantics> <mrow> <mi>f</mi> <mo>=</mo> <mn>2.4255</mn> <mo> </mo> <mi>GHz</mi> </mrow> </semantics></math> as an example.</p>
Full article ">Figure 2
<p>The BLE devices used in our experiments. These devices were designed in the context of the same project; they are different versions of the same product whose hardware and software architectures have evolved over time. Thus, v1 (the board at the left end) refers to the first ever version; v2 (the two boards in the middle) and v3 (the two boards at the right end) refer to the second and third versions, respectively.</p>
Full article ">Figure 3
<p>Experimental setup in the anechoic chamber. The BLE device emits the signal at 2 m from the RSA306B. The latter is equipped with a BLE antenna and driven by the Tektronix SignalVu-PC software. This way, we can capture the BLE signal in real time and record it as IQ samples on the PC in order to be used later in the script for estimating the power spectral density using Welch’s average periodogram method.</p>
Full article ">Figure 4
<p>Experiment schematic.</p>
Full article ">Figure 5
<p>Profile of the power consumption of the BLE device during advertising, i.e., the broadcast of the advertising packet on each of the three primary advertising channels, one after another. Each peak corresponds to the advertising on a channel.</p>
Full article ">Figure 6
<p>Twenty PSDs of a same BLE device in a static experimental setting. The region between the red lines is the band <span class="html-italic">B</span> where the PSDs are compared; we chose <span class="html-italic">B</span> = 2 MHz, which is the channel bandwidth of the BLE. So, we ignored the background noise to have a more relevant analysis.</p>
Full article ">Figure 7
<p>(<b>a</b>) PSDs of anechoic chamber experiment (<b>b</b>) PSDs of open-space experiment.</p>
Full article ">Figure 8
<p>PSDs of the same BLE device but measured with two different identifiers.</p>
Full article ">Figure 9
<p>(<b>a</b>) PSDs of four different BLE devices using the same identifier (the one of dev48) and, thus, always transmitting exactly the same data. Graph (<b>a</b>) plots are an overlapping of graph (<b>b</b>) four groups of plots.</p>
Full article ">Figure 10
<p>PSDs of dev48 (green plots) and devCA (brown plots) devices using the same identifier (the one of dev48) and, thus, always transmitting exactly the same data.</p>
Full article ">
21 pages, 1075 KiB  
Article
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things
by Xingwen Zhao, Dexin Li and Hui Li
Sensors 2022, 22(19), 7510; https://doi.org/10.3390/s22197510 - 3 Oct 2022
Cited by 15 | Viewed by 1971
Abstract
Because the majority of information in the industrial Internet of things (IIoT) is transmitted over an open and insecure channel, it is indispensable to design practical and secure authentication and key agreement protocols. Considering the weak computational power of sensors, many scholars have [...] Read more.
Because the majority of information in the industrial Internet of things (IIoT) is transmitted over an open and insecure channel, it is indispensable to design practical and secure authentication and key agreement protocols. Considering the weak computational power of sensors, many scholars have designed lightweight authentication protocols that achieve limited security properties. Moreover, these existing protocols are mostly implemented in a single-gateway scenario, whereas the multigateway scenario is not considered. To deal with these problems, this paper presents a novel three-factor authentication and key agreement protocol based on elliptic curve cryptography for IIoT environments. Based on the elliptic curve Diffie–Hellman problem, we present a protocol achieving desirable forward and backward secrecy. The proposed protocol applies to single-gateway and is also extended to multigateway simultaneously. A formal security analysis is described to prove the security of the proposed scheme. Finally, the comparison results demonstrate that our protocol provides more security attributes at a relatively lower computational cost. Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Architecture for an IIoT.</p>
Full article ">Figure 2
<p>Single-gateway model.</p>
Full article ">Figure 3
<p>Multigateway model.</p>
Full article ">Figure 4
<p>Points over the elliptic curve.</p>
Full article ">Figure 5
<p>User registration phase.</p>
Full article ">Figure 6
<p>Sensor registration phase.</p>
Full article ">Figure 7
<p>User login phase.</p>
Full article ">Figure 8
<p>Authentication and key agreement in the HGWN.</p>
Full article ">Figure 9
<p>Authentication and key agreement phase 1 in the FGWN.</p>
Full article ">Figure 10
<p>Authentication and key agreement phase 2 in the FGWN.</p>
Full article ">Figure 11
<p>Simulation result in HGWN.</p>
Full article ">Figure 12
<p>Simulation result in FGWN.</p>
Full article ">
22 pages, 3693 KiB  
Article
Towards Robustifying Image Classifiers against the Perils of Adversarial Attacks on Artificial Intelligence Systems
by Theodora Anastasiou, Sophia Karagiorgou, Petros Petrou, Dimitrios Papamartzivanos, Thanassis Giannetsos, Georgia Tsirigotaki and Jelle Keizer
Sensors 2022, 22(18), 6905; https://doi.org/10.3390/s22186905 - 13 Sep 2022
Cited by 4 | Viewed by 2585
Abstract
Adversarial machine learning (AML) is a class of data manipulation techniques that cause alterations in the behavior of artificial intelligence (AI) systems while going unnoticed by humans. These alterations can cause serious vulnerabilities to mission-critical AI-enabled applications. This work introduces an AI architecture [...] Read more.
Adversarial machine learning (AML) is a class of data manipulation techniques that cause alterations in the behavior of artificial intelligence (AI) systems while going unnoticed by humans. These alterations can cause serious vulnerabilities to mission-critical AI-enabled applications. This work introduces an AI architecture augmented with adversarial examples and defense algorithms to safeguard, secure, and make more reliable AI systems. This can be conducted by robustifying deep neural network (DNN) classifiers and explicitly focusing on the specific case of convolutional neural networks (CNNs) used in non-trivial manufacturing environments prone to noise, vibrations, and errors when capturing and transferring data. The proposed architecture enables the imitation of the interplay between the attacker and a defender based on the deployment and cross-evaluation of adversarial and defense strategies. The AI architecture enables (i) the creation and usage of adversarial examples in the training process, which robustify the accuracy of CNNs, (ii) the evaluation of defense algorithms to recover the classifiers’ accuracy, and (iii) the provision of a multiclass discriminator to distinguish and report on non-attacked and attacked data. The experimental results show promising results in a hybrid solution combining the defense algorithms and the multiclass discriminator in an effort to revitalize the attacked base models and robustify the DNN classifiers. The proposed architecture is ratified in the context of a real manufacturing environment utilizing datasets stemming from the actual production lines. Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Variability of <span class="html-italic">Dataset_1</span>.</p>
Full article ">Figure 2
<p>Variability of <span class="html-italic">Dataset_2</span>.</p>
Full article ">Figure 3
<p>AI-based quality inspection architecture.</p>
Full article ">Figure 4
<p>Manufacturing ecosystem and adversarial threat model.</p>
Full article ">Figure 5
<p>Histogram of oriented gradients applied to <span class="html-italic">Dataset_1</span> in order to extract useful information and disregard the unnecessary information from the image.</p>
Full article ">Figure 6
<p>Otsu’s threshold applied to <span class="html-italic">Dataset_2</span> to apply image thresholding for image binarization based on pixel intensities and contribute to better pattern recognition.</p>
Full article ">Figure 7
<p>Original vs. FGD attack—<span class="html-italic">Dataset_1</span>. The attacked image includes perturbations that were used to distort the original image.</p>
Full article ">Figure 8
<p>Original vs. square attack—<span class="html-italic">Dataset_1</span>. The original image is attacked using localized square-shaped updates at random positions.</p>
Full article ">Figure 9
<p>Original (<b>left</b>) vs. FGD (<b>middle</b>) and PGD (<b>right</b>) attacks—<span class="html-italic">Dataset_2</span>. FGD attack is slight, while PGD adds a significant amount of noise and color alteration.</p>
Full article ">Figure 10
<p>Original and pre-processed images vs. recovered images using the corresponding defenses—<span class="html-italic">Dataset_1</span>. The recovered images are used to evaluate a model’s accuracy after the recovery from an attack.</p>
Full article ">Figure 11
<p>Original and pre-processed vs. recovered images using the corresponding defenses—<span class="html-italic">Dataset_2</span>. The recovered images are used to evaluate a model’s accuracy after the recovery from an attack.</p>
Full article ">Figure 12
<p>Binary classification—adversarial examples—<span class="html-italic">Dataset_1</span>.</p>
Full article ">Figure 13
<p>Binary classification—adversarial examples—<span class="html-italic">Dataset_2</span>.</p>
Full article ">Figure 14
<p>Binary classification—defenses—<span class="html-italic">Dataset_1</span>.</p>
Full article ">Figure 15
<p>Binary classification—defenses—<span class="html-italic">Dataset_2</span>.</p>
Full article ">Figure 16
<p>Multiclass classification—adversarial examples—<span class="html-italic">Dataset_1</span>.</p>
Full article ">Figure 17
<p>Multiclass Classification—Adversarial Examples—<span class="html-italic">Dataset_2</span>.</p>
Full article ">Figure 18
<p>Multiclass classification—defenses—<span class="html-italic">Dataset_1</span>.</p>
Full article ">Figure 19
<p>Multi-class classification—defenses—<span class="html-italic">Dataset_2</span>.</p>
Full article ">Figure 20
<p>Binary discriminator—<span class="html-italic">Dataset_1</span>.</p>
Full article ">Figure 21
<p>Binary discriminator—<span class="html-italic">Dataset_2</span>.</p>
Full article ">Figure 22
<p>Multi-class discriminator—<span class="html-italic">Dataset_1</span>.</p>
Full article ">Figure 23
<p>Multi-class discriminator—<span class="html-italic">Dataset_2</span>.</p>
Full article ">
25 pages, 1007 KiB  
Article
Lightweight On-Device Detection of Android Malware Based on the Koodous Platform and Machine Learning
by Mateusz Krzysztoń, Bartosz Bok, Marcin Lew and Andrzej Sikora
Sensors 2022, 22(17), 6562; https://doi.org/10.3390/s22176562 - 31 Aug 2022
Cited by 5 | Viewed by 2461
Abstract
Currently, Android is the most popular operating system among mobile devices. However, as the number of devices with the Android operating system increases, so does the danger of using them. This is especially important as smartphones increasingly authenticate critical activities(e-banking, e-identity). BotSense Mobile [...] Read more.
Currently, Android is the most popular operating system among mobile devices. However, as the number of devices with the Android operating system increases, so does the danger of using them. This is especially important as smartphones increasingly authenticate critical activities(e-banking, e-identity). BotSense Mobile is a tool already integrated with some critical applications (e-banking, e-identity) to increase user safety. In this paper, we focus on the novel functionality of BotSense Mobile: the detection of malware applications on a user device. In addition to the standard blacklist approach, we propose a machine learning-based model for unknown malicious application detection. The lightweight neural network model is deployed on an edge device to avoid sending sensitive user data outside the device. For the same reason, manifest-related features can be used by the detector only. We present a comprehensive empirical analysis of malware detection conducted on recent data (May–June, 2022) from the Koodous platform, which is a collaborative platform where over 70 million Android applications were collected. The research highlighted the problem of machine learning model aging. We evaluated the lightweight model on recent Koodous data and obtained f1=0.77 and high precision (0.9). Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>BotSense mobile deployment scheme.</p>
Full article ">Figure 2
<p>Malware detection module architecture.</p>
Full article ">Figure 3
<p>Data distribution in the Koodous platform from 2016 to 2021 (note a logarithmic scale).</p>
Full article ">Figure 4
<p>Neural network structure (<b>left</b>) with and (<b>right</b>) without dropout layer.</p>
Full article ">Figure 5
<p>The architecture of the automated model generation mechanism.</p>
Full article ">Figure 6
<p>The process of assessing a newly installed application as malicious or benign.</p>
Full article ">Figure 7
<p>Labeled data distribution in Koodous from 28 April to 21 June.</p>
Full article ">Figure 8
<p>Labeled malicious data distribution in Koodous from the 28 April to the 21 June.</p>
Full article ">Figure 9
<p>Comparisonof three updating model strategies (left-side axis) and the number of samples on each day of the experiment (right-side axis). Gradient boosting classifier was used to build classifiers.</p>
Full article ">Figure 10
<p>Top 20% trials of the hyperparameters search.</p>
Full article ">Figure 11
<p>Comparing the results of chosen neural network and gradient boosting classifier.</p>
Full article ">Figure 12
<p>RMSE score for the predictor output predicting the degree of maliciousness of the application.</p>
Full article ">Figure 13
<p>The RSME value obtained by the regression model in variants without and with applying bias value.</p>
Full article ">
26 pages, 9940 KiB  
Article
Vulnerabilities of Live-Streaming Services in Korea
by Sun-Hong Hwang, Ga-Yeong Kim, Su-Hwan Myeong, Tai-Sic Yun, Seung-Min Yoon, Tai-Ho Kim and Ieck-Chae Euom
Sensors 2022, 22(10), 3766; https://doi.org/10.3390/s22103766 - 15 May 2022
Cited by 2 | Viewed by 2548
Abstract
Recently, the number of users and the demand for live-streaming services have increased. This has exponentially increased the traffic to such services, and live-streaming service platforms in Korea use a grid computing system that distributes traffic to users and reduces traffic loads. However, [...] Read more.
Recently, the number of users and the demand for live-streaming services have increased. This has exponentially increased the traffic to such services, and live-streaming service platforms in Korea use a grid computing system that distributes traffic to users and reduces traffic loads. However, ensuring security with a grid computing system is difficult because the system exchanges general user traffic in a peer-to-peer (P2P) manner instead of receiving data from an authenticated server. Therefore, in this study, to explore the vulnerabilities of a grid computing system, we investigated a vulnerability discovery framework that involves a three-step analysis process and eight detailed activities. Four types of zero-day vulnerabilities, namely video stealing, information disclosure, denial of service, and remote code execution, were derived by analyzing a live-streaming platform in Korea, as a representative service, using grid computing. Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Top 10 video platforms in terms of the number of visitors in Korea.</p>
Full article ">Figure 2
<p>Grid computing method in a tree overlay network structure.</p>
Full article ">Figure 3
<p>Grid computing method in a mesh overlay network structure.</p>
Full article ">Figure 4
<p>Streaming service data transmission path.</p>
Full article ">Figure 5
<p>Client process flow.</p>
Full article ">Figure 6
<p>Grid computing operation structure in live-streaming services.</p>
Full article ">Figure 7
<p>Vulnerability discovery framework composition.</p>
Full article ">Figure 8
<p>DFD of a tree-structure-based grid computing system.</p>
Full article ">Figure 9
<p>DFD of mesh-structure-based grid computing system.</p>
Full article ">Figure 10
<p>Derived attack tree.</p>
Full article ">Figure 11
<p>Attack surface discovered based on identified threats.</p>
Full article ">Figure 12
<p>Security’s fundamental principles (CIA) that each attack violates.</p>
Full article ">Figure A1
<p>Example of DoS attack through video data tampering (picture distortion).</p>
Full article ">Figure A2
<p>Initial data sent by the receiving client to the sending client.</p>
Full article ">Figure A3
<p>Process of receiving streaming data by connecting after sending all initial data.</p>
Full article ">Figure A4
<p>Data processing after calling recv().</p>
Full article ">Figure A5
<p>Code of process execution.</p>
Full article ">Figure A6
<p>Verification script execution result.</p>
Full article ">Figure A7
<p>Example of DoS attack through video data tempering (picture distortion).</p>
Full article ">
17 pages, 438 KiB  
Article
Compact Finite Field Multiplication Processor Structure for Cryptographic Algorithms in IoT Devices with Limited Resources
by Atef Ibrahim and Fayez Gebali
Sensors 2022, 22(6), 2090; https://doi.org/10.3390/s22062090 - 8 Mar 2022
Cited by 1 | Viewed by 1951
Abstract
The rapid evolution of Internet of Things (IoT) applications, such as e-health and the smart ecosystem, has resulted in the emergence of numerous security flaws. Therefore, security protocols must be implemented among IoT network nodes to resist the majority of the emerging threats. [...] Read more.
The rapid evolution of Internet of Things (IoT) applications, such as e-health and the smart ecosystem, has resulted in the emergence of numerous security flaws. Therefore, security protocols must be implemented among IoT network nodes to resist the majority of the emerging threats. As a result, IoT devices must adopt cryptographic algorithms such as public-key encryption and decryption. The cryptographic algorithms are computationally more complicated to be efficiently implemented on IoT devices due to their limited computing resources. The core operation of most cryptographic algorithms is the finite field multiplication operation, and concise implementation of this operation will have a significant impact on the cryptographic algorithm’s entire implementation. As a result, this paper mainly concentrates on developing a compact and efficient word-based serial-in/serial-out finite field multiplier suitable for usage in IoT devices with limited resources. The proposed multiplier structure is simple to implement in VLSI technology due to its modularity and regularity. The suggested structure is derived from a formal and systematic technique for mapping regular iterative algorithms onto processor arrays. The proposed methodology allows for control of the processor array workload and the workload of each processing element. Managing processor word size allows for control of system latency, area, and consumed energy. The ASIC experimental results indicate that the proposed processor structure reduces area and energy consumption by factors reaching up to 97.7% and 99.2%, respectively. Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>DG of the recommended multiplication algorithm for <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>Scheduling time for <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>l</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Scheduling time for <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>l</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Multiplier SISO processor Structure.</p>
Full article ">Figure 5
<p>The structure of Multiplier SISO processor array.</p>
Full article ">Figure 6
<p>PE logic details.</p>
Full article ">
16 pages, 5591 KiB  
Article
A Hybrid Intelligent Framework to Combat Sophisticated Threats in Secure Industries
by Danish Javeed, Tianhan Gao, Muhammad Taimoor Khan and Duaa Shoukat
Sensors 2022, 22(4), 1582; https://doi.org/10.3390/s22041582 - 17 Feb 2022
Cited by 31 | Viewed by 2860
Abstract
With the new advancements in Internet of Things (IoT) and its applications in different sectors, such as the industrial sector, by connecting billions of devices and instruments, IoT has evolved as a new paradigm known as the Industrial Internet of Things (IIoT). Nonetheless, [...] Read more.
With the new advancements in Internet of Things (IoT) and its applications in different sectors, such as the industrial sector, by connecting billions of devices and instruments, IoT has evolved as a new paradigm known as the Industrial Internet of Things (IIoT). Nonetheless, its benefits and applications have been approved in different areas, but there are possibilities for various cyberattacks because of its extensive connectivity and diverse nature. Such attacks result in financial loss and data breaches, which urge a consequential need to secure IIoT infrastructure. To combat the threats in the IIoT environment, we proposed a deep-learning SDN-enabled intelligent framework. A hybrid classifier is used for threat detection purposes, i.e., Cu-LSTMGRU + Cu-BLSTM. The proposed model achieved a better detection accuracy with low false-positive rate. We have conducted 10-fold cross-validation to show the unbiasdness of the results. The proposed scheme results are compared with Cu-DNNLSTM and Cu-DNNGRU classifiers, which were tested and trained on the same dataset. We have further compared the proposed model with other existing standard classifiers for a thorough performance evaluation. Results achieved by our proposed scheme are impressive with respect to speed efficiency, F1 score, accuracy, precision, and other evaluation metrics. Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Network Model.</p>
Full article ">Figure 2
<p>Detection Scheme.</p>
Full article ">Figure 3
<p>ROC curves of the models.</p>
Full article ">Figure 4
<p>Confusion metrics of the models.</p>
Full article ">Figure 5
<p>Accuracy, recall, F1-score, and precision.</p>
Full article ">Figure 6
<p>FPR, FNR, FDR and FOR Results.</p>
Full article ">Figure 7
<p>TPR, TNR, and MCC.</p>
Full article ">Figure 8
<p>Speed efficiency of the models.</p>
Full article ">
27 pages, 5767 KiB  
Article
A Trust Management Model for IoT Devices and Services Based on the Multi-Criteria Decision-Making Approach and Deep Long Short-Term Memory Technique
by Yara Alghofaili and Murad A. Rassam
Sensors 2022, 22(2), 634; https://doi.org/10.3390/s22020634 - 14 Jan 2022
Cited by 40 | Viewed by 10849
Abstract
Recently, Internet of Things (IoT) technology has emerged in many aspects of life, such as transportation, healthcare, and even education. IoT technology incorporates several tasks to achieve the goals for which it was developed through smart services. These services are intelligent activities that [...] Read more.
Recently, Internet of Things (IoT) technology has emerged in many aspects of life, such as transportation, healthcare, and even education. IoT technology incorporates several tasks to achieve the goals for which it was developed through smart services. These services are intelligent activities that allow devices to interact with the physical world to provide suitable services to users anytime and anywhere. However, the remarkable advancement of this technology has increased the number and the mechanisms of attacks. Attackers often take advantage of the IoTs’ heterogeneity to cause trust problems and manipulate the behavior to delude devices’ reliability and the service provided through it. Consequently, trust is one of the security challenges that threatens IoT smart services. Trust management techniques have been widely used to identify untrusted behavior and isolate untrusted objects over the past few years. However, these techniques still have many limitations like ineffectiveness when dealing with a large amount of data and continuously changing behaviors. Therefore, this paper proposes a model for trust management in IoT devices and services based on the simple multi-attribute rating technique (SMART) and long short-term memory (LSTM) algorithm. The SMART is used for calculating the trust value, while LSTM is used for identifying changes in the behavior based on the trust threshold. The effectiveness of the proposed model is evaluated using accuracy, loss rate, precision, recall, and F-measure on different data samples with different sizes. Comparisons with existing deep learning and machine learning models show superior performance with a different number of iterations. With 100 iterations, the proposed model achieved 99.87% and 99.76% of accuracy and F-measure, respectively. Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>IoT applications and services.</p>
Full article ">Figure 2
<p>Trust management model components.</p>
Full article ">Figure 3
<p>Proposed Model.</p>
Full article ">Figure 4
<p>Trust value calculation using the SMART technique.</p>
Full article ">Figure 5
<p>Packets loss sample.</p>
Full article ">Figure 6
<p>Delay sample.</p>
Full article ">Figure 7
<p>Throughput sample.</p>
Full article ">Figure 8
<p>DT results for each sample: (<b>a</b>) 25% sample size, (<b>b</b>) 50% sample size, and (<b>c</b>) 100% sample size.</p>
Full article ">Figure 9
<p>Results of the 25% sample size: (<b>a</b>) loss of 50 iterations, (<b>b</b>) accuracy of 50 iterations, (<b>c</b>) loss of 100 iterations, (<b>d</b>) accuracy of 100 iterations.</p>
Full article ">Figure 9 Cont.
<p>Results of the 25% sample size: (<b>a</b>) loss of 50 iterations, (<b>b</b>) accuracy of 50 iterations, (<b>c</b>) loss of 100 iterations, (<b>d</b>) accuracy of 100 iterations.</p>
Full article ">Figure 10
<p>Results of the 50% sample size: (<b>a</b>) loss of 50 iterations, (<b>b</b>) accuracy of 50 iterations, (<b>c</b>) loss of 100 iterations, (<b>d</b>) accuracy of 100 iterations.</p>
Full article ">Figure 11
<p>Results of the 100% sample size: (<b>a</b>) loss of 50 iterations, (<b>b</b>) accuracy of 50 iterations, (<b>c</b>) loss of 100 iterations, (<b>d</b>) accuracy of 100 iterations.</p>
Full article ">Figure 12
<p>Comparison with Deep Learning Results (<b>a</b>) shows results for 25% sample size with 50 iterations (<b>b</b>) show results for 25% sample size with 100 iterations.</p>
Full article ">Figure 13
<p>Comparison with deep learning results: (<b>a</b>) results for the 50% sample size with 50 iterations, (<b>b</b>) results for the 50% sample size with 100 iterations.</p>
Full article ">Figure 14
<p>Comparison with deep learning results: (<b>a</b>) results for the 100% sample size with 50 iterations, (<b>b</b>) results for the 100% sample size with 100 iterations.</p>
Full article ">Figure 15
<p>Comparison with machine learning results: (<b>a</b>) results for the 25% sample size, (<b>b</b>) results for the 50% sample size, (<b>c</b>) results for the 100% sample size.</p>
Full article ">
27 pages, 1420 KiB  
Article
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge
by Mayuresh Sunil Pardeshi, Ruey-Kai Sheu and Shyan-Ming Yuan
Sensors 2022, 22(2), 607; https://doi.org/10.3390/s22020607 - 13 Jan 2022
Cited by 8 | Viewed by 3086
Abstract
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there have been several years of growing [...] Read more.
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there have been several years of growing concerns regarding their security. Therefore, a novel model is designed that is stronger and effective against any kind of unauthorized attack, as IoT devices’ vulnerability is on the rise due to the mass production of IoT devices (embedded processors, camera, sensors, etc.), which ignore the basic security requirements (passwords, secure communication), making them vulnerable and easily accessible. Furthermore, crackable passwords indicate that the security measures taken are insufficient. As per the recent studies, several applications regarding its requirements are the IoT distributed denial of service attack (IDDOS), micro-cloud, secure university, Secure Industry 4.0, secure government, secure country, etc. The problem statement is formulated as the “design and implementation of dynamically interconnecting fog servers and edge devices using the mode-based hash chain for secure mutual authentication protocol”, which is stated to be an NP-complete problem. The hash-chain fog/edge implementation using timestamps, mode-based hash chaining, the zero-knowledge proof property, a distributed database/blockchain, and cryptography techniques can be utilized to establish the connection of smart devices in large numbers securely. The hash-chain fog/edge uses blockchain for identity management only, which is used to store the public keys in distributed ledger form, and all these keys are immutable. In addition, it has no overhead and is highly secure as it performs fewer calculations and requires minimum infrastructure. So, we designed the hash-chain fog/edge (HCFE) protocol, which provides a novel mutual authentication scheme for effective session key agreement (using ZKP properties) with secure protocol communications. The experiment outcomes proved that the hash-chain fog/edge is more efficient at interconnecting various devices and competed favorably in the benchmark comparison. Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Fog/edge architecture for the university scenario.</p>
Full article ">Figure 2
<p>System model for the hash-chain fog/edge protocol.</p>
Full article ">Figure 3
<p>Challenge model. (<b>a</b>) Balanced tree with a superfluous sub-branch having 4 × 4 nodes. (<b>b</b>) Directed graph transition matrix in each node. (<b>c</b>) Hash-chain flow.</p>
Full article ">Figure 4
<p>Time generation analysis of session keys.</p>
Full article ">Figure 5
<p>Session key generation time on the workstation for (<b>a</b>) Session Key 1, (<b>b</b>) Session Key 2, and (<b>c</b>) Session Key 3, the AWS Cloud for (<b>d</b>) Session Key 1, (<b>e</b>) Session Key 2, and (<b>f</b>) Session Key 3, and the Raspberry Pi (<b>g</b>) Session Key 1, (<b>h</b>) Session Key 2, and (<b>i</b>) Session Key 3.</p>
Full article ">Figure 6
<p>Independent protocol performance time on the (<b>a</b>) workstation, (<b>b</b>) AWS Cloud, and (<b>c</b>) Raspberry Pi.</p>
Full article ">Figure 7
<p>Performance with respect to the hash-chain fog/edge protocol total time on the (<b>a</b>) workstation, (<b>b</b>) AWS Cloud, and (<b>c</b>) Raspberry Pi and (<b>d</b>) for message exchange with cryptography.</p>
Full article ">Figure 8
<p>Performance with respect to the hash-chain fog/edge protocol in (<b>a</b>) Mode 1 and (<b>b</b>) Mode 2 time on the workstation, AWS Cloud, and Raspberry Pi.</p>
Full article ">
18 pages, 794 KiB  
Article
Realguard: A Lightweight Network Intrusion Detection System for IoT Gateways
by Xuan-Ha Nguyen, Xuan-Duong Nguyen, Hoang-Hai Huynh and Kim-Hung Le
Sensors 2022, 22(2), 432; https://doi.org/10.3390/s22020432 - 7 Jan 2022
Cited by 73 | Viewed by 7348
Abstract
Cyber security has become increasingly challenging due to the proliferation of the Internet of things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the Internet. However, these devices possess various security flaws resulting from the lack [...] Read more.
Cyber security has become increasingly challenging due to the proliferation of the Internet of things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the Internet. However, these devices possess various security flaws resulting from the lack of defense mechanisms and hardware security support, therefore making them vulnerable to cyber attacks. In addition, IoT gateways provide very limited security features to detect such threats, especially the absence of intrusion detection methods powered by deep learning. Indeed, deep learning models require high computational power that exceeds the capacity of these gateways. In this paper, we introduce Realguard, an DNN-based network intrusion detection system (NIDS) directly operated on local gateways to protect IoT devices within the network. The superiority of our proposal is that it can accurately detect multiple cyber attacks in real time with a small computational footprint. This is achieved by a lightweight feature extraction mechanism and an efficient attack detection model powered by deep neural networks. Our evaluations on practical datasets indicate that Realguard could detect ten types of attacks (e.g., port scan, Botnet, and FTP-Patator) in real time with an average accuracy of 99.57%, whereas the best of our competitors is 98.85%. Furthermore, our proposal effectively operates on resource-constraint gateways (Raspberry PI) at a high packet processing rate reported about 10.600 packets per second. Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>The workflow of the Realguard IDS.</p>
Full article ">Figure 2
<p>The architecture of the attack detection model.</p>
Full article ">Figure 3
<p>The experiment results of the binary-class attack detection.</p>
Full article ">Figure 4
<p>The experiment results of the multi-class classification.</p>
Full article ">Figure 5
<p>Comparing the TPR value of the multi-class attack detection between Realguard and its competitors.</p>
Full article ">Figure 6
<p>Comparing the FPR value of the multi-class attack detection between Realguard and its competitors.</p>
Full article ">

Review

Jump to: Research

24 pages, 672 KiB  
Review
A Survey of Machine and Deep Learning Methods for Privacy Protection in the Internet of Things
by Eva Rodríguez, Beatriz Otero and Ramon Canal
Sensors 2023, 23(3), 1252; https://doi.org/10.3390/s23031252 - 21 Jan 2023
Cited by 25 | Viewed by 7209
Abstract
Recent advances in hardware and information technology have accelerated the proliferation of smart and interconnected devices facilitating the rapid development of the Internet of Things (IoT). IoT applications and services are widely adopted in environments such as smart cities, smart industry, autonomous vehicles, [...] Read more.
Recent advances in hardware and information technology have accelerated the proliferation of smart and interconnected devices facilitating the rapid development of the Internet of Things (IoT). IoT applications and services are widely adopted in environments such as smart cities, smart industry, autonomous vehicles, and eHealth. As such, IoT devices are ubiquitously connected, transferring sensitive and personal data without requiring human interaction. Consequently, it is crucial to preserve data privacy. This paper presents a comprehensive survey of recent Machine Learning (ML)- and Deep Learning (DL)-based solutions for privacy in IoT. First, we present an in depth analysis of current privacy threats and attacks. Then, for each ML architecture proposed, we present the implementations, details, and the published results. Finally, we identify the most effective solutions for the different threats and attacks. Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>IoT architecture.</p>
Full article ">Figure 2
<p>IoT system architecture.</p>
Full article ">Figure 3
<p>Overview of ML privacy based solutions in IoT.</p>
Full article ">
38 pages, 1869 KiB  
Review
Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT
by Bandar Alamri, Katie Crowley and Ita Richardson
Sensors 2023, 23(1), 218; https://doi.org/10.3390/s23010218 - 25 Dec 2022
Cited by 10 | Viewed by 4954
Abstract
Blockchain (BC) has recently paved the way for developing Decentralized Identity Management (IdM) systems for different information systems. Researchers widely use it to develop decentralized IdM systems for the Health Internet of Things (HIoT). HIoT is considered a vulnerable system that produces and [...] Read more.
Blockchain (BC) has recently paved the way for developing Decentralized Identity Management (IdM) systems for different information systems. Researchers widely use it to develop decentralized IdM systems for the Health Internet of Things (HIoT). HIoT is considered a vulnerable system that produces and processes sensitive data. BC-based IdM systems have the potential to be more secure and privacy-aware than centralized IdM systems. However, many studies have shown potential security risks to using BC. A Systematic Literature Review (SLR) conducted by the authors on BC-based IdM systems in HIoT systems showed a lack of comprehensive security and risk management frameworks for BC-based IdM systems in HIoT. Conducting a further SLR focusing on risk management and supplemented by Grey Literature (GL), in this paper, a security taxonomy, security framework, and cybersecurity risk management framework for the HIoT BC-IdM systems are identified and proposed. The cybersecurity risk management framework will significantly assist developers, researchers, and organizations in developing a secure BC-based IdM to ensure HIoT users’ data privacy and security. Full article
(This article belongs to the Special Issue Cybersecurity in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>The research methodology phases: (<b>Step 1</b>) conduct a literature review. (<b>Step 2</b>); taxonomy design.; (<b>Step 3</b>) map the data from the taxonomy to the HIoT BC-IdM system.; (<b>Step 4</b>) develop the cybersecurity risk management framework.</p>
Full article ">Figure 2
<p>The article selection steps.</p>
Full article ">Figure 3
<p>The percentages of the study classifications are based on the covered assets and the main contributions.</p>
Full article ">Figure 4
<p>The security risk taxonomy for HIoT BC-IdM systems.</p>
Full article ">Figure 5
<p>HIoT BC-IdM system security framework.</p>
Full article ">Figure 6
<p>HIoT BC-IdM cybersecurity risk management framework.</p>
Full article ">
Back to TopTop