Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Open access

A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms

Published: 17 September 2021 Publication History

Abstract

Internet-of-Things (IoT) ecosystems tend to grow both in scale and complexity, as they consist of a variety of heterogeneous devices that span over multiple architectural IoT layers (e.g., cloud, edge, sensors). Further, IoT systems increasingly demand the resilient operability of services, as they become part of critical infrastructures. This leads to a broad variety of research works that aim to increase the resilience of these systems. In this article, we create a systematization of knowledge about existing scientific efforts of making IoT systems resilient. In particular, we first discuss the taxonomy and classification of resilience and resilience mechanisms and subsequently survey state-of-the-art resilience mechanisms that have been proposed by research work and are applicable to IoT. As part of the survey, we also discuss questions that focus on the practical aspects of resilience, e.g., which constraints resilience mechanisms impose on developers when designing resilient systems by incorporating a specific mechanism into IoT systems.

References

[1]
David Perez Abreu, Karima Velasquez, Marilia Curado, and Edmundo Monteiro. 2017. A resilient internet of things architecture for smart cities. Ann. Telecomm. 72, 1 (01 Feb. 2017), 19–30. https://doi.org/10.1007/s12243-016-0530-y
[2]
Achilleas P. Achilleos, Kyriakos Kritikos, Alessandro Rossini, Georgia M. Kapitsaki, Jörg Domaschka, Michal Orzechowski, Daniel Seybold, Frank Griesinger, Nikolay Nikolov, Daniel Romero, and George A. Papadopoulos. 2019. The cloud application modelling and execution language. J. Cloud Comp. 8, Article 20 (2019), 25 pages. https://doi.org/10.1186/s13677-019-0138-7
[3]
Jawad Ali, Toqeer Ali, Yazed Alsaawy, Ahmad Shahrafidz Khalid, and Shahrulniza Musa. 2019. Blockchain-based smart-iot trust zone measurement architecture. In Proceedings of the International Conference on Omni-Layer Intelligent Systems (COINS’19). ACM, New York, NY, 152–157. https://doi.org/10.1145/3312614.3312646
[4]
Kostas Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Michalis Polychronakis, Angelos Keromytis, and Evangelos Markatos. 2010. Shadow honeypots. International Journal of Computer and Network Security 2, 9 (September 2010).
[5]
James P. Anderson. 1980. Computer Security Threat Monitoring and Surveillance. Technical Report. James P. Anderson Company (1980).
[6]
Jesper Andersson, Vincenzo Grassi, Raffaela Mirandola, and Diego Perez-Palacin. 2019. A distilled characterization of resilience and its embraced properties based on state-spaces. In Proceedings of the International Workshop on Software Engineering for Resilient Systems. Springer, 11–25.
[7]
Ioannis Andrea, Chrysostomos Chrysostomou, and George Hadjichristofi. 2015. Internet of Things: Security vulnerabilities and challenges. In Proceedings of the IEEE Symposium on Computers and Commications (ISCC’15). IEEE, 180–187.
[8]
E. Anthi, L. Williams, M. Słowińska, G. Theodorakopoulos, and P. Burnap. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE IoT J. 6, 5 (2019), 9042–9053. https://doi.org/10.1109/JIOT.2019.2926365
[9]
P. Arcaini, E. Riccobene, and P. Scandurra. 2015. Modeling and analyzing MAPE-K feedback loops for self-adaptation. In Proceedings of the IEEE/ACM 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS’15). 13–23. https://doi.org/10.1109/SEAMS.2015.10
[10]
Algirdas Avižienis. 1985. The N-version approach to fault-tolerant software. IEEE Trans. Softw. Eng. SE-11, 12 (1985), 1491–1501.
[11]
Algirdas Avižienis. 2017. A visit to the jungle of terminology. In Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W’17). IEEE, 149–152.
[12]
Algirdas Avižienis, Jean-Claude Laprie, and Brian Randell. 2001. Fundamental Concepts of Dependability. University of Newcastle upon Tyne, Computing Science.
[13]
Algirdas Avižienis, J. C. Laprie, B. Randell, and C. Landwehr. 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Depend. Secur. Comput. 1, 1 (Jan. 2004), 11–33.
[14]
Sara S. Baghsorkhi and Christos Margiolas. 2018. Automating efficient variable-grained resiliency for low-power IoT systems. In Proceedings of the International Symposium on Code Generation and Optimization (CGO’18). ACM, New York, NY, 38–49. https://doi.org/10.1145/3168816
[15]
A. Bauer, N. Herbst, S. Spinner, A. Ali-Eldin, and S. Kounev. 2019. Chameleon: A hybrid, proactive auto-scaling mechanism on a level-playing field. IEEE Trans. Parallel Distr. Syst. 30, 4 (2019), 800–813.
[16]
Johannes Bauer, Ralf C. Staudemeyer, Henrich C. Pöhls, and Alexandros Fragkiadakis. 2016. ECDSA on things: IoT integrity protection in practise. In Proceedings of the Information and Communications Security (ICICS’16), Lecture Notes in Computer Science, Vol. 9977. Springer.
[17]
Muhammet Baykara and Resul Das. 2018. A novel honeypot based security approach for real-time intrusion detection and prevention systems. J. Inform. Secur. App. 41 (2018), 103–116. https://doi.org/10.1016/j.jisa.2018.06.004
[18]
Jacob Beal, Mirko Viroli, Danilo Pianini, and Ferruccio Damiani. 2017. Self-adaptation to device distribution in the internet of things. ACM Trans. Autonom. Adapt. Syst. 12, 3 (2017), 1–29.
[19]
Emanuele Bellini, Franco Bagnoli, Alexander A. Ganin, and Igor Linkov. 2019. Cyber resilience in IoT network: Methodology and example of assessment through epidemic spreading approach. In Proceedings of the IEEE World Congress on Services (SERVICES’19), Vol. 2642. IEEE, 72–77.
[20]
Kyle E. Benson, Georgios Bouloukakis, Casey Grant, Valérie Issarny, Sharad Mehrotra, Ioannis Moscholios, and Nalini Venkatasubramanian. 2018. FireDeX: A prioritized IoT data exchange middleware for emergency response. In Proceedings of the 19th ACM/IFIP International Middleware Conference.279–292.
[21]
Alysson Bessani, João Sousa, and Eduardo E. P. Alchieri. 2014. State machine replication for the masses with BFT-SMaRt. In Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’14). IEEE, 355–362.
[22]
Alysson Neves Bessani. 2011. From Byzantine fault tolerance to intrusion tolerance (a position paper). In Proceedings of the IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshop (DSN-W). IEEE, 15–18.
[23]
Matt Bishop, Marco Carvalho, Richard Ford, and Liam M. Mayron. 2011. Resilience is more than availability. In Proceedings of the New Security Paradigms Workshop.95–104.
[24]
Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Nils Ole Tippenhauer, and Yuval Elovici. 2019. HADES-IoT: A practical host-based anomaly detection system for IoT devices. In Proceedings of the ACM Asia Conferemce on Computer and Communications Security (Asia CCS’19). ACM, New York, NY, 479–484. https://doi.org/10.1145/3321705.3329847
[25]
Eric A. Brewer. Towards robust distributed systems. (Invited Talk) Principles of Distributed Computing, Portland, Oregon, July 2000.
[26]
Navin Budhiraja, Keith Marzullo, Fred B. Schneider, and Sam Toueg. 1993. The primary-backup approach. Distrib. Syst. 2 (1993), 199–216.
[27]
Miguel Castro and Barbara Liskov. 1999. Practical Byzantine fault tolerance. In Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OSDI’99). 173–186.
[28]
Z. Berkay Celik, Patrick McDaniel, and Gang Tan. 2018. Soteria: Automated IoT safety and security analysis. In Proceedings of the USENIX Annual Technical Conference (ATC’18). 147–158.
[29]
Z. Berkay Celik, Patrick McDaniel, Gang Tan, Leonardo Babun, and A. Selcuk Uluagac. 2019. Verifying internet of things safety and security in physical spaces. IEEE Sec. Priv. 17, 5 (2019), 30–37.
[30]
Hyunseok Chang, Adiseshu Hari, Sarit Mukherjee, and T. V. Lakshman. 2014. Bringing the cloud to the edge. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’14). IEEE, 346–351.
[31]
Liming Chen and Algirdas Avižienis. 1978. N-version programming: A fault-tolerance approach to reliability of software operation. In Proceedings of the 8th IEEE International Symposium on Fault-Tolerant Computing (FTCS’78), Vol. 1. 3–9.
[32]
J. Cho, P. M. Hurley, and S. Xu. 2016. Metrics and measurement of trustworthy systems. In Proceedings of the IEEE Military Communications Conference (MILCOM’16). 1237–1242. https://doi.org/10.1109/MILCOM.2016.7795500
[33]
K. Christidis and M. Devetsikiotis. 2016. Blockchains and smart contracts for the internet of things. IEEE Access 4 (2016), 2292–2303. https://doi.org/10.1109/ACCESS.2016.2566339
[34]
Alberto Compagno, Mauro Conti, and Ralph Droms. 2016. OnboardICNg: A secure protocol for on-boarding IoT devices in ICN. In Proceedings of the 3rd ACM Conference on Information-Centric Networks (ICN’16). ACM, New York, NY, 166–175. https://doi.org/10.1145/2984356.2984374
[35]
Pedro A. R. S. Costa and Marko Beko. 2019. Dependable and secure voting mechanism in edge comp.Future Internet 11, 12, Article 262 (2019), 1–11. https://www.mdpi.com/1999-5903/11/12/262.
[36]
Caio Yuri da Silva Costa and Eduardo Adilio Pelinson Alchieri. 2018. Diversity on state machine replication. In Proceedings of the 32nd Internet Conference on Advances Information Networks and Applications (AINA’18). IEEE, 429–436.
[37]
Y. S. Dai, M. Xie, K. L. Poh, and S. H. Ng. 2004. A model for correlated failures in N-version programming. IIE Trans. 36, 12 (2004), 1183–1192.
[38]
Kemal A. Delic. 2016. On resilience of IoT systems: The internet of things (Ubiquity symposium). Ubiquity 2016, Article 1 (Feb. 2016), 7 pages. https://doi.org/10.1145/2822885
[39]
Lorenzo Delledonne, Vittorio Zaccaria, Ruggero Susella, Guido Bertoni, and Filippo Melzani. 2018. CASCA: A design automation approach for designing hardware countermeasures against side-channel attacks. ACM Trans. Des. Autom. Electron. Syst. 23, 6, Article 69 (Nov. 2018), 17 pages. https://doi.org/10.1145/3241047
[40]
João Pedro Dias, Tiago Boldt Sousa, André Restivo, and Hugo Sereno Ferreira. 2020. A pattern-language for self-healing internet-of-things systems. In Proceedings of the European Conference on Pattern Languages of Programs (EuroPLoP’20). ACM, New York, NY, Article 25, 17 pages. https://doi.org/10.1145/3424771.3424804
[41]
Jörg Domaschka. 2013. A Comprehensive Approach to Transparent and Flexible Replication of Java Services and Applications. Ph.D. Dissertation. Universität Ulm.
[42]
Seamus Dowling, Michael Schukat, and Hugh Melvin. 2017. A ZigBee honeypot to assess IoT cyberattack behaviour. In Proceedings of the 28th Irish Signals and Systems Conference (ISSC’17). IEEE, 1–6.
[43]
Arnaud Durand, Pascal Gremaud, and Jacques Pasquier. 2018. Resilient, crowd-sourced LPWAN infrastructure using blockchain. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. 25–29.
[44]
Philipp Eichhammer, Christian Berger, Hans P. Reiser, Jörg Domaschka, Franz J. Hauck, Gerhard Habiger, Frank Griesinger, and Jakob Pietron. 2019. Towards a robust, self-organizing IoT platform for secure and dependable service execution. Tagungsbd. FB-SYS Herbsttr. (2019).
[45]
O. Erdene-Ochir, A. Kountouris, M. Minier, and F. Valois. 2012. A new metric to quantify resiliency in networking. IEEE Comm. Lett. 16, 10 (2012), 1699–1702. https://doi.org/10.1109/LCOMM.2012.081612.121191
[46]
Tiago M. Fernández-Caramés and Paula Fraga-Lamas. 2018. A review on the use of blockchain for the internet of things. IEEE Access 6 (2018), 32979–33001.
[47]
Luca Ferretti, Mirco Marchetti, and Michele Colajanni. 2019. Fog-based secure comm. for low-power IoT devices. ACM Trans. Internet Technol. 19, 2, Article 27 (Mar. 2019), 21 pages. https://doi.org/10.1145/3284554
[48]
Juan Carlos Fuentes Carranza and Philip W. L. Fong. 2019. Brokering policies and execution monitors for IoT middleware. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT’19). ACM, New York, NY, USA, 49–60. https://doi.org/10.1145/3322431.3325098
[49]
Alexander A. Ganin, Emanuele Massaro, Alexander Gutfraind, Nicolas Steen, Jeffrey M. Keisler, Alexander Kott, Rami Mangoubi, and Igor Linkov. 2016. Operational resilience: Concepts, design and analysis. Sci. Rep. 6, 1 (2016), 1–12.
[50]
Miguel Garcia, Alysson Bessani, and Nuno Neves. 2019. Lazarus: Automatic management of diversity in BFT systems. In Proceedings of the 20th ACM/IFIP International Middleware Conference.241–254.
[51]
Tal Garfinkel and Mendel Rosenblum. 2003. A virtual machine introspection based architecture for intrusion detection. In Proceedings of the Networks and Distributed Systems Security Symposium.191–206.
[52]
Arthur Gatouillat and Youakim Badr. 2017. Verifiable and resource-aware component model for IoT devices. In Proceedings of the 9th International Conference on Mangement of Digital EcoSystems (MEDES’17). ACM, New York, NY, 235–242. https://doi.org/10.1145/3167020.3167056
[53]
T. N. Gia, A. Rahmani, T. Westerlund, P. Liljeberg, and H. Tenhunen. 2015. Fault tolerant and scalable IoT-based architecture for health monitoring. In Proceedings of the IEEE Sensors Applications Symposium (SAS’15). 1–6. https://doi.org/10.1109/SAS.2015.7133626
[54]
M. Glass, M. Lukasiewycz, C. Haubelt, and J. Teich. 2009. Incorporating graceful degradation into embedded system design. In Proceedings of the Design Automation, and Test in Europe Conference and Exhibition (DATE’09). 320–323. https://doi.org/10.1109/DATE.2009.5090681
[55]
Jonathan Goldstein, Ahmed Abdelhamid, Mike Barnett, Sebastian Burckhardt, Badrish Chandramouli, Darren Gehring, Niel Lebeck, Christopher Meiklejohn, Umar Farooq Minhas, Ryan Newton, Rahee Ghosh Peshawaria, Tal Zaccai, and Irene Zhang. 2020. A.M.B.R.O.S.I.A: Providing performant virtual resiliency for distributed applications. Proc. VLDB Endow. 13, 5 (Jan. 2020), 588–601. https://doi.org/10.14778/3377369.3377370
[56]
Hongxiang Gu and Miodrag Potkonjak. 2018. Efficient and secure group key management in IoT using multistage interconnected PUF. In Proceedings of the International Symposium on Low Power Electronics and Design (ISPLED’18). ACM, New York, NY, Article 8, 6 pages. https://doi.org/10.1145/3218603.3218646
[57]
Juan David Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, and Yuval Elovici. 2017. Siphon: Towards scalable high-interaction physical honeypots. In Proceedings of the 3rd ACM Workshops on Cyber-Physical Systems Security. 57–68.
[58]
Runchao Han, Vincent Gramoli, and Xiwei Xu. 2018. Evaluating blockchains for IoT. In Proceedings of the 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS’18). IEEE, 1–5.
[59]
Yotam Harchol, Aisha Mushtaq, Vivian Fang, James McCauley, Aurojit Panda, and Scott Shenker. 2020. Making edge-computing resilient. In Proceedings of the 11th ACM Symposium on Cloud Computing (SoCC’20). ACM, New York, NY, 253–266. https://doi.org/10.1145/3419111.3421278
[60]
M. Z. Hasan and F. Al-Turjman. 2017. Optimizing multipath routing with guaranteed fault tolerance in internet of things. IEEE Sensors J. 17, 19 (Oct. 2017), 6463–6473. https://doi.org/10.1109/JSEN.2017.2739188
[61]
Jose L. Hernandez-Ramos, Marcin Piotr Pawlowski, Antonio J. Jara, Antonio F. Skarmeta, and Latif Ladid. 2015. Toward a lightweight authentication and authorization framework for smart objects. IEEE J. Select. Areas Commun. 33, 4 (2015), 690–702.
[62]
Saurabh Hukerikar and Christian Engelmann. 2017. Resilience design patterns: A structured approach to resilience at extreme scale. arXiv:1708.07422. arXiv:1708.07422 [cs.DC].
[63]
Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik, and Shaza Zeitouni. 2016. DARPA: Device attestation resilient to physical attacks. In Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’16). ACM, New York, NY, 171–182. https://doi.org/10.1145/2939918.2939938
[64]
Alexey Ilyushkin, Ahmed Ali-Eldin, Nikolas Herbst, André Bauer, Alessandro V. Papadopoulos, Dick Epema, and Alexandru Iosup. 2018. An experimental performance evaluation of autoscalers for complex workflows. ACM Trans. Model. Perform. Eval. Comp. Syst. 3, 2, Article 8 (Apr. 2018), 32 pages. https://doi.org/10.1145/3164537
[65]
International Electrotechnical Commission. 2015. International Electrotechnical Vocabulary–Part 192: Dependability. Standard IEC 60050-192:2015. International Electrotechnical Commission. https://webstore.iec.ch/publication/21886
[66]
Scott Jackson and Timothy L. J. Ferris. 2013. Resilience principles for engineered systems. Syst. Eng. 16, 2 (2013), 152–164.
[67]
Sharmin Jahan, Ian Riley, Charles Walter, Rose F. Gamble, Matt Pasco, Philip K. McKinley, and Betty H. C. Cheng. 2020. MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases. Fut. Gen. Comput. Syst. 109 (2020), 197–209. https://doi.org/10.1016/j.future.2020.03.031
[68]
Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, and Radu Sion. 2014. SoK: Introspections on trust and the semantic gap. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 605–620.
[69]
Asad Javed, Keijo Heljanko, Andrea Buda, and Kary Främling. 2018. CEFIoT: A fault-tolerant IoT architecture for edge and cloud. In Proceedings of the IEEE 4th World Forum on Internet of Things (WF-IoT’18). IEEE, 813–818.
[70]
Asad Javed, Jérémy Robert, Keijo Heljanko, and Kary Främling. 2020. IoTEF: A federated edge-cloud architecture for fault-tolerant IoT applications. J. Grid Comput. (2020), 1–24.
[71]
Xiaoyu Ji, Chaohao Li, Xinyan Zhou, Juchuan Zhang, Yanmiao Zhang, and Wenyuan Xu. 2020. Authenticating smart home devices via home limited channels. ACM Trans. IoT 1, 4, Article 24 (Aug. 2020), 24 pages. https://doi.org/10.1145/3399432
[72]
Hongyu Jin and Panos Papadimitratos. 2019. Resilient privacy protection for location-based services through decentralization. ACM Trans. Priv. Secur. 22, 4, Article 21 (Sep. 2019), 36 pages. https://doi.org/10.1145/3319401
[73]
Rüdiger Kapitza, Johannes Behl, Christian Cachin, Tobias Distler, Simon Kuhnle, Seyed Vahid Mohammadi, Wolfgang Schröder-Preikschat, and Klaus Stengel. 2012. CheapBFT: Resource-efficient byzantine fault tolerance. In Proceedings of the 7th ACM Europeam Conference on Computer Systems (EuroSys’12). 295–308.
[74]
Jeffrey O. Kephart and David M. Chess. 2003. The vision of autonomic computing. Computer 36, 1 (2003), 41–50.
[75]
Zeeshan Ali Khan, Johanna Ullrich, Artemios G. Voyiatzis, and Peter Herrmann. 2017. A Trust-Based Resilient Routing Mechanism for the Internet of Things. In Proceedings of the 12th International Conference on Availability, Reliability, and Security (ARES’17). ACM, New York, NY, Article 27, 6 pages. https://doi.org/10.1145/3098954.3098963
[76]
Nodira Khoussainova, Magdalena Balazinska, and Dan Suciu. 2006. Towards correcting input data errors probabilistically using integrity constraints. In Proceedings of the 5th ACM International Workshops on Data Engineering for Wireless and Mobile Access. 43–50.
[77]
Hokeun Kim, Eunsuk Kang, David Broman, and Edward A. Lee. 2017. An architectural mechanism for resilient IoT services. In Proceedings of the 1st ACM Workshops on the Internet of Safe Things (SafeThings’17). ACM, New York, NY, 8–13. https://doi.org/10.1145/3137003.3137010
[78]
Hokeun Kim, Eunsuk Kang, David Broman, and Edward A. Lee. 2020. Resilient authentication and authorization for the internet of Things (IoT) using edge computing. ACM Trans. IoT 1, 1, Article 4 (Mar. 2020), 27 pages. https://doi.org/10.1145/3375837
[79]
John C. Knight and Elisabeth A. Strunk. 2004. Achieving critical system survivability through software architectures. In Architecting Dependable Systems II, Lecture Notes in Computer Science, Rogério de Lemos, Cristina Gacek, and Alexander Romanovsky (Eds.). Springer, 51–78. https://doi.org/10.1007/978-3-540-25939-8_3
[80]
Richard Koo and Sam Toueg. 1987. Checkpointing and rollback-recovery for distributed systems. IEEE Trans. Softw. Eng. SE-13, 1 (1987), 23–31.
[81]
Igor Kopestenski and Peter Van Roy. 2019. Erlang as an enabling technology for resilient general-purpose applications on edge IoT networks. In Proceedings of the 18th ACM SIGPLAN International Workshop on Erlang. ACM, New York, NY, 1–12. https://doi.org/10.1145/3331542.3342567
[82]
Daniel Kuemper, Thorben Iggena, Ralf Toenjes, and Elke Pulvermueller. 2018. Valid.IoT: A framework for sensor data quality analysis and interpolation. In Proceedings of the 9th ACM Multimedia Systems Conference.294–303.
[83]
Dimosthenis Kyriazis and Theodora Varvarigou. 2013. Smart, autonomous and reliable internet of things. Proc. Comp. Sci. 21 (2013), 442–448.
[84]
Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The Byzantine generals problem. Trans. Program. Lang. Syst. 4, 3 (1982), 382–401.
[85]
Jean-Claude Laprie. 1985. Dependable computing and fault-tolerance. Digest of Papers FTCS-15 (1985), 2–11.
[86]
Jean-Claude Laprie. 2008. From dependability to resilience. In Proceedings of the 38th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’08). G8–G9.
[87]
Jun-Ya Lee, Wei-Cheng Lin, and Yu-Hung Huang. 2014. A lightweight authentication protocol for internet of things. In Proceedings of the International Symposium on Next-Generation Electronics (ISNE’14). IEEE, 1–2.
[88]
Xiaopeng Li, Fengyao Yan, Fei Zuo, Qiang Zeng, and Lannan Luo. 2019. Touch well before use: Intuitive and secure authentication for IoT devices. In Proceedings of the 25th Annual International Conference on Mobile Computing and Networking (MobiCom’19). 1–17.
[89]
Xiaopeng Li, Qiang Zeng, Lannan Luo, and Tongbo Luo. 2020. T2Pair: Secure and usable pairing for heterogeneous IoT devices. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’20). ACM, New York, NY, 309–323. https://doi.org/10.1145/3372297.3417286
[90]
Wei-Tsung Lin, Fatih Bakir, Chandra Krintz, Rich Wolski, and Markus Mock. 2019. Data repair for Distributed, event-based IoT applications. In Proceedings of the 13th ACM International Conference on Distributed and Event-based Systems (DEBS’19). 139–150.
[91]
Faiza Loukil, Chirine Ghedira-Guegan, Khouloud Boukadi, Aïcha-Nabila Benharkat, and Elhadj Benkhelifa. 2021. Data privacy based on IoT device behavior control using blockchain. ACM Trans. Internet Technol. 21, 1, Article 23 (Jan. 2021), 20 pages. https://doi.org/10.1145/3434776
[92]
Tongbo Luo, Zhaoyan Xu, Xing Jin, Yanhui Jia, and Xin Ouyang. 2017. IoTCandyJar: Towards an Intelligent-Interaction Honeypot for IoT Devices. Retrieved from https://www.blackhat.com/docs/us-17/thursday/us-17-Luo-Iotcandyjar-Towa rds-An-Intelligent-Interaction-Honeypot-For-IoT-Devices-wp.pdf.
[93]
Cristian Martín, Daniel Garrido, Manuel Díaz, and Bartolomé Rubio. 2019. From the Edge to the Cloud: Enabling reliable IoT applications. In Proceedings of the 7th International Conference on Future Intern. of Things and Cloud (FiCloud). IEEE, 17–22.
[94]
Victor S. Miller. 1985. Use of elliptic curves in cryptography. In Proceedings of the Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’85). Springer, 417–426.
[95]
Amir Modarresi and James P. G. Sterbenz. 2017. Multilevel IoT model for smart cities resilience. In Proceedings of the 12th International Conference on Future Internet Technologies (CFI’17). ACM, New York, NY, Article 7, 7 pages. https://doi.org/10.1145/3095786.3095793
[96]
Mahyar Tourchi Moghaddam and Henry Muccini. 2019. Fault-tolerant IoT. In Software Engineering for Resilient Systems, Radu Calinescu and Felicita Di Giandomenico (Eds.). Springer, Cham, 67–84.
[97]
Max Mössinger, Benedikt Petschkuhn, Johannes Bauer, Ralf C. Staudemeyer, Marcin Wójcik, and Henrich C. Pöhls. 2016. Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device. In Proceedings of the IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM’16). IEEE, 1–6.
[98]
Henry Muccini, Romina Spalazzese, Mahyar T. Moghaddam, and Mohammad Sharaf. 2018. Self-Adaptive IoT Architectures: An emergency handling case study. In Proceedings of the 12th European Conference on Software Architecture (ECSA’18).ACM, New York, NY, Article 19, 6 pages. https://doi.org/10.1145/3241403.3241424
[99]
William Nace and Philip Koopman. 2001. A graceful degradation framework for distributed embedded systems. In Proceedings of the Workshop on Reliability in Embedded Systems (In Conjunction with Symposium on Reliable Distributed Systems/SRDS-2001).
[100]
William Nace and Philip Koopman. 2001. A product family approach to graceful degradation. In Proceedings of the Architecture and Design of Distributed Embedded Systems (IFIP WG10.3/WG10.4/WG10.5) and the International Workshop on Distributed and Parallel Embedded Systems (DIPES’01), Bernd Kleinjohann (Ed.). Springer, 131–140. https://doi.org/10.1007/978-0-387-35409-5_13
[101]
Rajeev Nagar. 1997. Windows NT File System Internals: A Developer’s Guide. O’Reilly.
[102]
Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Edward J. M. Colbert, and Patrick McDaniel. 2018. IoTSan: Fortifying the safety of IoT systems. In Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies. 191–203.
[103]
Doohwan Oh, Deokho Kim, and Won Woo Ro. 2014. A malicious pattern detection engine for embedded security systems in the Internet of Things. Sensors 14, 12 (2014), 24188–24211.
[104]
Dan O’Keeffe, Theodoros Salonidis, and Peter Pietzuch. 2018. Frontier: Resilient edge processing for the internet of things. Proc. VLDB Endow. 11, 10 (Jun. 2018), 1178–1191. https://doi.org/10.14778/3231751.3231767
[105]
Umar Ozeer, Xavier Etchevers, Loïc Letondeur, François-Gaël Ottogalli, Gwen Salaün, and Jean-Marc Vincent. 2018. Resilience of stateful IoT applications in a dynamic fog environment. In Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services (MobiQuitous’18). ACM, New York, NY, 332–341. https://doi.org/10.1145/3286978.3287007
[106]
Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, and Christian Rossow. 2016. IoTPOT: A novel honeypot for revealing current IoT threats. J. Inform. Proc. 24, 3 (2016), 522–533.
[107]
Luke R. Parker, Paul D. Yoo, Taufiq A. Asyhari, Lounis Chermak, Yoonchan Jhi, and Kamal Taha. 2019. DEMISe: Interpretable deep extraction and mutual information selection techniques for IoT intrusion detection. In Proceedings of the 14th International Conference on Availability, Reliability, and Security (ARES’19). ACM, New York, NY, Article 98, 10 pages. https://doi.org/10.1145/3339252.3340497
[108]
Henrich C. Pöhls. 2015. JSON sensor signatures (JSS): End-to-end integrity protection from constrained device to IoT application. In Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computer. IEEE, 306–312.
[109]
Dhiraj K. Pradhan and Nitin H. Vaidya. 1994. Roll-forward checkpointing scheme: A novel fault-tolerant architecture. IEEE Trans. Comp. 43, 10 (1994), 1163–1174.
[110]
Subhav Pradhan, Abhishek Dubey, Shweta Khare, Saideep Nannapaneni, Aniruddha Gokhale, Sankaran Mahadevan, Douglas C. Schmidt, and Martin Lehofer. 2018. CHARIOT: Goal-Driven orchestration middleware for resilient IoT systems. ACM Trans. Cyber-Phys. Syst. 2, 3, Article 16 (Jun. 2018), 37 pages. https://doi.org/10.1145/3134844
[111]
Chenhao Qu, Rodrigo N. Calheiros, and Rajkumar Buyya. 2018. Auto-Scaling web applications in clouds: A taxonomy and survey. ACM Comp. Surv. 51, 4, Article 73 (Jul. 2018), 33 pages. https://doi.org/10.1145/3148149
[112]
D. Ratasich, F. Khalid, F. Geissler, R. Grosu, M. Shafique, and E. Bartocci. 2019. A roadmap toward the resilient internet of things for cyber-physical systems. IEEE Access 7 (2019), 13260–13283. https://doi.org/10.1109/ACCESS.2019.2891969
[113]
Shahid Raza, Linus Wallgren, and Thiemo Voigt. 2013. SVELTE: Real-time intrusion detection in the internet of things. Ad Hoc Netw. 11, 8 (2013), 2661–2674.
[114]
Risk Steering Committee. 2010. DHS Risk Lexicon 2010 Edition. Retrieved from https://www.dhs.gov/xlibrary/assets/dhs-risk-lex icon-2010.pdf.
[115]
Ronald L. Rivest, Adi Shamir, and Leonard Adleman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (1978), 120–126.
[116]
Marcel Rumez, Jürgen Dürrwang, Johannes Braun, and Reiner Kriesten. 2018. Security hardening of automotive networks through the implementation of attribute-based plausibility checks. Int. J. Adv. Sec. 11, 1&2 (2018), 52–59.
[117]
Eric Rutten, Nicolas Marchand, and Daniel Simon. 2017. Feedback control as MAPE-K loop in autonomic computing. In Software Engineering for Self-Adaptive Systems III: Assurances, Rogério de Lemos, David Garlan, Carlo Ghezzi, and Holger Giese (Eds.). Springer, Cham, 349–373.
[118]
Fred B. Schneider. 1990. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Comp. Surv. 22, 4 (1990), 299–319.
[119]
Jan Seeger, Arne Bröring, and Georg Carle. 2020. Optimally self-healing IoT choreographies. ACM Trans. Internet Technol. 20, 3, Article 27 (Jul. 2020), 20 pages. https://doi.org/10.1145/3386361
[120]
João B. F. Sequeiros, Francisco T. Chimuco, Musa G. Samaila, Mário M. Freire, and Pedro R. M. Inácio. 2020. Attack and system modeling applied to IoT, cloud, and mobile ecosystems: embedding security by design. ACM Comput. Surv. 53, 2, Article 25 (Mar. 2020), 32 pages. https://doi.org/10.1145/3376123
[121]
D. Seybold, S. Volpert, S. Wesner, A. Bauer, N. Herbst, and J. Domaschka. 2019. Kaa: Evaluating elasticity of cloud-hosted DBMS. In Proceedings of the IEEE International Conference on Cloud Computing Technology and Science (CloudCom’19). 54–61.
[122]
Marc Shapiro, Nuno Preguiça, Carlos Baquero, and Marek Zawirski. 2011. Conflict-free replicated data types. In Stabilization, Safety, and Security of Distributed Systems, Xavier Défago, Franck Petit, and Vincent Villain (Eds.). Springer, 386–400.
[123]
Yang Shi, Wujing Wei, Zongjian He, and Hongfei Fan. 2016. An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices. In Proceedings of the 32nd Annual Conference on Computer Security Applications (ACSAC’16). ACM, New York, NY, 16–29. https://doi.org/10.1145/2991079.2991086
[124]
Syed Noorulhassan Shirazi, Antonios Gouglidis, Arsham Farshad, and David Hutchison. 2017. The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE J. Select. Areas Commun. 35, 11 (2017), 2586–2595.
[125]
Soraya Sinche, Oswaldo Polo, Duarte Raposo, Marcelo Femandes, Fernando Boavida, André Rodrigues, Vasco Pereira, and Jorge Sá Silva. 2018. Assessing redundancy models for IoT reliability. In Proceedings of the IEEE 19th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM’18). IEEE, 14–15.
[126]
Saurabh Singh, Pradip Kumar Sharma, Seo Yeon Moon, and Jong Hyuk Park. 2017. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J. Amb. Intel. Human. Comput. (2017), 1–18.
[127]
Vijay Sivaraman, Hassan Habibi Gharakheili, Arun Vishwanath, Roksana Boreli, and Olivier Mehani. 2015. Network-level security and privacy control for smart-home IoT devices. In Proceedings of the IEEE 11th International Conference on Wireless and Mobile Computing, Networking, and Communication (WiMob’15). IEEE, 163–167.
[128]
Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, and Paulo Verissimo. 2009. Highly available intrusion-tolerant services with proactive-reactive recovery. IEEE Trans. Parallel Distrib. Syst. 21, 4 (2009), 452–465.
[129]
James P. G. Sterbenz, David Hutchison, Egemen K. Çetinkaya, Abdul Jabbar, Justin P. Rohrer, Marcus Schöller, and Paul Smith. 2010. Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Comput. Netw. 54, 8 (2010), 1245–1265.
[130]
Lorenzo Strigini. 2012. Fault tolerance and resilience: Meanings, measures and assessment. In Resilience Assessment and Evaluation of Computing Systems. Springer, 3–24.
[131]
Latanya Sweeney. 2002. k-anonymity: A model for protecting privacy. Int. J. Uncert. Fuzz. Knowl.-Bas. Syst. 10, 05 (2002), 557–570.
[132]
Farid Molazem Tabrizi and Karthik Pattabiraman. 2019. Design-Level and code-level security analysis of IoT devices. ACM Trans. Embed. Comput. Syst. 18, 3, Article 20 (May 2019), 25 pages. https://doi.org/10.1145/3310353
[133]
A. Taivalsaari and T. Mikkonen. 2017. A roadmap to the programmable world: Software challenges in the IoT Era. IEEE Softw. 34, 1 (Jan. 2017), 72–80. https://doi.org/10.1109/MS.2017.26
[134]
Rui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, Katsunari Yoshioka, Tsutomu Matsumoto, Carlos Gañán, and Michel van Eeten. 2020. Disposable Botnets: Examining the anatomy of IoT botnet infrastructure. In Proceedings of the 15th International Conference on Availability, Reliability, and Security (ARES’20). ACM, New York, NY, Article 7, 10 pages. https://doi.org/10.1145/3407023.3409177
[135]
Lakshya Tandon, Philip W. L. Fong, and Reihaneh Safavi-Naini. 2018. HCAP: A history-based capability system for IoT devices. In Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies (SIGMAT’18). ACM, New York, NY, 247–258. https://doi.org/10.1145/3205977.3205978
[136]
Martin Tappler, Bernhard K. Aichernig, and Roderick Bloem. 2017. Model-based testing IoT communication via active automata learning. In Proceedings of the IEEE International Conference on Software Testing, Verification and Validation (ICST’17). IEEE, 276–287.
[137]
D. Terry. 2016. Toward a new approach to IoT fault tolerance. Computer 49, 8 (Aug. 2016), 80–83. https://doi.org/10.1109/MC.2016.238
[138]
Marcus Thompson, Mike Ryan, Jill Slay, and Alan Mclucas. 2016. A new resilience taxonomy. In Proceedings of the INCOSE Annual International Symposium. 1318–1330. https://doi.org/10.1002/j.2334-5837.2016.00229.x
[139]
Z. Tong, R. Y. Kain, and W. T. Tsai. 1989. A low overhead checkpointing and rollback recovery scheme for distributed systems. In Proceedings of the 8th Symposium on Reliable Distributed Systems (SRDS’89). 12–20.
[140]
Christos Tsigkanos, Stefan Nastic, and Schahram Dustdar. 2019. Towards resilient Internet of Things: Vision, challenges, and research roadmap. In Proceedings of the 39th IEEE International Conference Distributed Computing Systems (ICDCS’19). 1–11.
[141]
Marco Vieira, Henrique Madeira, Kai Sachs, and Samuel Kounev. 2012. Resilience benchmarking. In Resilience Assessment and Evaluation of Computing Systems. Springer, 283–301.
[142]
Eric D. Vugrin, Drake E. Warren, and Mark A. Ehlen. 2011. A resilience assessment framework for infrastructure and economic systems: Quantitative and qualitative resilience analysis of petrochemical supply chains to a hurricane. Process Safe. Progr. 30, 3 (2011), 280–290.
[143]
Marko Vukolić. 2015. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In Proceedings of the International Workshops on Open Problems in Network Security. Springer, 112–125.
[144]
Thomas Welsh and Elhadj Benkhelifa. 2020. On resilience in cloud computing: A survey of techniques across the Cloud Domain. ACM Comp. Surv. 53, 3, Article 59 (May 2020), 36 pages. https://doi.org/10.1145/3388922
[145]
Michiel Willocx, Ilse Bohé, and Vincent Naessens. 2019. QoS-by-Design in reconfigurable IoT ecosystems. In Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT’19). IEEE, 628–632.
[146]
Moussa Witti and Dimitri Konstantas. 2018. A secure and privacy-preserving internet of things framework for smart city. In Proceedings of the 6th International Conference on Information Technology: IoT and Smart City (ICIT’18). ACM, New York, NY, 145–150. https://doi.org/10.1145/3301551.3301607
[147]
Ying Xiong, Yulin Sun, Li Xing, and Ying Huang. 2018. Extend cloud to edge with kubeedge. In Proceedings of the IEEE/ACM Symposium on Edge Computing (SEC’18). IEEE, 373–377.
[148]
Chugui Xu, Ju Ren, Deyu Zhang, and Yaoxue Zhang. 2018. Distilling at the edge: A local differential privacy obfuscation framework for IoT data analytics. IEEE Commun. Mag. 56, 8 (2018), 20–25.
[149]
Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li, and Hongbin Zhao. 2017. A survey on security and privacy issues in Internet-of-Things. IEEE IoT J. 4, 5 (2017), 1250–1258.
[150]
Rozhin Yasaei, Felix Hernandez, and Mohammad Abdullah Al Faruque. 2020. IoT-CAD: Context-aware adaptive anomaly detection in IoT Systems through Sensor Association. In Proceedings of the 39th International Conference on Computer-Aided Design (ICCAD’20). ACM, New York, NY, Article 9, 9 pages. https://doi.org/10.1145/3400302.3415672
[151]
Sze Zheng Yong, Minghui Zhu, and Emilio Frazzoli. 2018. Switching and data injection attacks on stochastic cyber-physical systems: Modeling, resilient estimation, and attack mitigation. ACM Trans. Cyber-Phys. Syst. 2, 2 (2018), 1–2.
[152]
Man-Ki Yoon, Bo Liu, Naira Hovakimyan, and Lui Sha. 2017. VirtualDrone: Virtual sensing, actuation, and communication for attack-resilient unmanned aerial systems. In Proceedings of the 8th International Conference on Cyber-Physical Systems (ICCPS’17). ACM, New York, NY, 143–154. https://doi.org/10.1145/3055004.3055010
[153]
Bruno Bogaz Zarpelão, Rodrigo Sanches Miani, Cláudio Toshio Kawakani, and Sean Carlisto de Alvarenga. 2017. A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84 (2017), 25–37.
[154]
S. Zhou, K. Lin, J. Na, C. Chuang, and C. Shih. 2015. Supporting service adaptation in fault tolerant internet of things. In Proceedings of the IEEE 8th International Conference on Service-Oriented Comp. and App. (SOCA). 65–72. https://doi.org/10.1109/SOCA.2015.38

Cited By

View all
  • (2025)Edgelet computing: enabling privacy-preserving decentralized data processing at the network edgePersonal and Ubiquitous Computing10.1007/s00779-024-01821-929:1(45-75)Online publication date: 1-Feb-2025
  • (2024)STRATEGIC MARKERS OF INVESTMENT IN CRITICAL INFRASTRUCTURE OBJECTS IN THE CONTEXT OF THE ECONOMIC SECURITY OF UKRAINEСТРАТЕГІЧНІ МАРКЕРИ ІНВЕСТУВАННЯ В ОБ'ЄКТИ КРИТИЧНОЇ ІНФРАСТРУКТУРИ В КОНТЕКСТІ ЕКОНОМІЧНОЇ БЕЗПЕКИ УКРАЇНИSocio-economic relations in the digital society10.55643/ser.3.53.2024.5763:53(10-21)Online publication date: 30-Sep-2024
  • (2024)Impact of Public Private Partnership on the Development of Critical Infrastructure in Nigeria during the Fourth RepublicJournal of Applied And Theoretical Social Sciences10.37241/jatss.2024.1126:3(233-246)Online publication date: 29-Sep-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 54, Issue 7
September 2022
778 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3476825
Issue’s Table of Contents
This work is licensed under a Creative Commons Attribution-NonCommercial International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 September 2021
Accepted: 01 April 2021
Revised: 01 February 2021
Received: 01 September 2020
Published in CSUR Volume 54, Issue 7

Check for updates

Author Tags

  1. Internet of Things
  2. dependability
  3. resilience
  4. security

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Federal Ministry of Education and Research of Germany
  • Deutsche Forschungsgemeinschaft (DFG, German Research Foundation)

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,233
  • Downloads (Last 6 weeks)132
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Edgelet computing: enabling privacy-preserving decentralized data processing at the network edgePersonal and Ubiquitous Computing10.1007/s00779-024-01821-929:1(45-75)Online publication date: 1-Feb-2025
  • (2024)STRATEGIC MARKERS OF INVESTMENT IN CRITICAL INFRASTRUCTURE OBJECTS IN THE CONTEXT OF THE ECONOMIC SECURITY OF UKRAINEСТРАТЕГІЧНІ МАРКЕРИ ІНВЕСТУВАННЯ В ОБ'ЄКТИ КРИТИЧНОЇ ІНФРАСТРУКТУРИ В КОНТЕКСТІ ЕКОНОМІЧНОЇ БЕЗПЕКИ УКРАЇНИSocio-economic relations in the digital society10.55643/ser.3.53.2024.5763:53(10-21)Online publication date: 30-Sep-2024
  • (2024)Impact of Public Private Partnership on the Development of Critical Infrastructure in Nigeria during the Fourth RepublicJournal of Applied And Theoretical Social Sciences10.37241/jatss.2024.1126:3(233-246)Online publication date: 29-Sep-2024
  • (2024)A Cross-Layer Secure and Energy-Efficient Framework for the Internet of Things: A Comprehensive SurveySensors10.3390/s2422720924:22(7209)Online publication date: 11-Nov-2024
  • (2024)Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research TrendsSensors10.3390/s2406196824:6(1968)Online publication date: 20-Mar-2024
  • (2024)IoT-Based Framework for Digital Twins in the Industry 5.0 EraSensors10.3390/s2402059424:2(594)Online publication date: 17-Jan-2024
  • (2024)IoT-Driven Transformation of Circular Economy Efficiency: An OverviewMathematical and Computational Applications10.3390/mca2904004929:4(49)Online publication date: 28-Jun-2024
  • (2024)Reliablity and Security for Fog Computing SystemsInformation10.3390/info1506031715:6(317)Online publication date: 29-May-2024
  • (2024)Desarrollo de una Arquitectura IoT para monitoreo ambiental: integración de tecnologías de código abierto con proyección de aplicación en el sector mineroDYNA10.15446/dyna.v91n231.11209391:231(163-168)Online publication date: 19-Mar-2024
  • (2024)A Survey on Resilience in Information Sharing on Networks: Taxonomy and Applied TechniquesACM Computing Surveys10.1145/365994456:12(1-36)Online publication date: 20-Apr-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media