scholarly journals IoT-Flock: An Open-source Framework for IoT Traffic Generation

2020 ◽  
Author(s):  
Syed Ghazanfar ◽  
Faisal Hussain ◽  
Atiq Ur Rehman ◽  
Ubaid U. Fayyaz ◽  
Farrukh Shahzad ◽  
...  

Abstract Network traffic generation is one of the primary techniques that is used to design and analyze the performance of network security systems. However, due to the diversity of IoT networks in terms of devices, applications and protocols, the traditional network traffic generator tools are unable to generate the IoT specific protocols traffic. Hence, the traditional traffic generator tools cannot be used for designing and testing the performance of IoT-specific security solutions. In order to design an IoT-based traffic generation framework, two main challenges include IoT device modelling and generating the IoT normal and attack traffic simultaneously. Therefore, in this work, we propose an open-source framework for IoT traffic generation which supports the two widely used IoT application layer protocols, i.e., MQTT and CoAP. The proposed framework allows a user to create an IoT use case, add customized IoT devices into it and generate normal and malicious IoT traffic over a real-time network. Furthermore, we set up a real-time IoT smart home use case to manifest the applicability of the proposed framework for developing the security solutions for IoT smart home by emulating the real world IoT devices. The experimental results demonstrate that the proposed framework can be effectively used to develop better security solutions for IoT networks without physically deploying the real-time use case.

IoT ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 140-162
Author(s):  
Hung Nguyen-An ◽  
Thomas Silverston ◽  
Taku Yamazaki ◽  
Takumi Miyoshi

We now use the Internet of things (IoT) in our everyday lives. The novel IoT devices collect cyber–physical data and provide information on the environment. Hence, IoT traffic will count for a major part of Internet traffic; however, its impact on the network is still widely unknown. IoT devices are prone to cyberattacks because of constrained resources or misconfigurations. It is essential to characterize IoT traffic and identify each device to monitor the IoT network and discriminate among legitimate and anomalous IoT traffic. In this study, we deployed a smart-home testbed comprising several IoT devices to study IoT traffic. We performed extensive measurement experiments using a novel IoT traffic generator tool called IoTTGen. This tool can generate traffic from multiple devices, emulating large-scale scenarios with different devices under different network conditions. We analyzed the IoT traffic properties by computing the entropy value of traffic parameters and visually observing the traffic on behavior shape graphs. We propose a new method for identifying traffic entropy-based devices, computing the entropy values of traffic features. The method relies on machine learning to classify the traffic. The proposed method succeeded in identifying devices with a performance accuracy up to 94% and is robust with unpredictable network behavior with traffic anomalies spreading in the network.


Author(s):  
Kashif Kifayat ◽  
Thar Baker Shamsa ◽  
Michael Mackay ◽  
Madjid Merabti ◽  
Qi Shi

The rise of Cloud Computing represents one of the most significant shifts in Information technology in the last 5 years and promises to revolutionise how we view the availability and consumption of computing storage and processing resources. However, it is well-known that along with the benefits of Cloud Computing, it also presents a number of security issues that have restricted its deployment to date. This chapter reviews the potential vulnerabilities of Cloud-based architectures and uses this as the foundation to define a set of requirements for reassessing risk management in Cloud Computing. To fulfill these requirements, the authors propose a new scheme for the real-time assessment and auditing of risk in cloud-based applications and explore this with the use case of a triage application.


Author(s):  
Syed Ghazanfar ◽  
Faisal Hussain ◽  
Atiq Ur Rehman ◽  
Ubaid U. Fayyaz ◽  
Farrukh Shahzad ◽  
...  

2017 ◽  
Vol 117 (9) ◽  
pp. 1890-1905 ◽  
Author(s):  
Yingfeng Zhang ◽  
Lin Zhao ◽  
Cheng Qian

Purpose The huge demand for fresh goods has stimulated lots of research on the perishable food supply chain. The characteristics of perishable food and the cross-regional transportation have brought many challenges to the operation models of perishable food supply chain. The purpose of this paper is to address these challenges based on the real-time data acquired by the Internet of Things (IoT) devices. Design/methodology/approach IoT and the modeling of the Supply Hub in Industrial Parks were adopted in the perishable food supply chain. Findings A conceptual model was established for the IoT-enabled perishable food supply chain with two-echelon supply hubs. The performance of supply chain has improved when implementing the proposed model, as is demonstrated by a case study. Originality/value By our model, the supply hubs which act as the dominators of the supply chain can respond to the real-time information captured from the operation processes of an IoT-enabled supply chain, thus to provide public warehousing and logistic services.


2002 ◽  
Author(s):  
Δημήτριος Λουκάτος

The information volume and the application variety are constantly increasing imposing new demands on the telecommunication networks. Due to these reasons the problem of efficient network design, monitoring and control is more apparent than ever. Traffic generation and/or analysis tools, if properly applied, can assist in finding suitable solutions. The PhD thesis focuses on the development and usage methods of similar tools and is structured in ten chapters. In the first chapter the main components of the QoS delivery problem are mentioned while the emerging need for sufficient traffic generation and/or analysis tools is justified. The second chapter presents in detail the main characteristics of the environment where the proposed tools may be used. This environment consists mainly of ATM and IP topologies. The emphasis is put on the similarities between the discussed different platforms. At chapter 3 starts the detailed description of the proposed tools. More specifically in chapter 3 an advanced software architecture for ATM traffic generation is presented. This architecture exploits a stable and reliable hardware so as to provide the generation of traffic flows compliant with high level traffic model specifications. The basic advantage of the proposed generator is that it guarantees a fast and accurate traffic generation process. The software part introduces several innovations towards minimizing speed and memory constrains related to the hardware. Chapter 4 is dedicated to the presentation of the software supporting a prototype ATM traffic analyzer. The software exploits the experience acquired during the implementation of the ATM traffic generator counterpart. The software architecture of the proposed ATM analyzer exploits and controls the enhanced capabilities of the promising underlying hardware module the role of which is expanded in order to provide real time QoS metrics at relatively low computational cost. Apart from this, the software architecture directly creates models containing some cases of traffic being monitored. In chapter 5, an IP traffic generator is described. The remarkably successful use of the prototype ATM traffic generator, in conjunction with its well-balanced architecture led to the adoption of the presented generator’s logic in IP environments as well. It must be noticed that the whole effort does not ignore the idiosyncrasies of the Internet. The IP traffic generator, despite the simplicity of its first version, was proved as very useful to many testing cases where the exact reproduction of captured traffic was crucial or the hiring of real sources too expensive or complicated. Chapter 6 is dedicated to the description of traffic analyzers, especially designed for IP networks. As a first attempt, the ATM analyzer engine was further exploited, after the necessary modifications in its software architecture, while a sufficient «IP over ATM» mechanism was hired. At next stage, a native IP analyzer was designed and implemented. The later tool hires external clock units for solving the synchronization problem between source and destination nodes. The capabilities the two analyzers can be enhanced by injecting appropriate monitoring traffic into the network under evaluation. The «IP over ATM» based IP analyzer is capable of performing accurate and fast real time measurements without overloading the hosting system. One of its main advantages is the direct delivery of histograms presenting the inter-packet distance (or the packet size) distribution. The proposed native IP analyzer solves the problem performing real time reliable measurements of end-to-end delays or losses of IP packets. Chapter 7 is dedicated to another group of performance evaluation tools that work under looser real time constrains. They perform post-processing using log files captured by various traffic analysis tools. Via post-processing more testing cases can be assessed while more complex metrics can be incorporated into the analyzer’s logic. The computational load required for measurement processing is completely disconnected from the relevant load for data gathering. Chapter 8 presents an analyzer tool that is based on the logging capabilities exhibited by advanced network elements. Although the proposed tool does not differ in its high level architecture from the other traffic analysis tools being presented, data uploading mechanism is based on the SNMP MIBs supported by network elements like an IP router or an ATM switch. The specific tool is targeted towards assisting the rest of the analyzers. The main advantage of this tool is its flexibility as it can be transferred easily from one network platform to another. Chapter 9 presents several characteristic cases where the proposed tools are involved. Indeed, traffic generation and analysis tools have been exhaustively tested during a large number of experiments. The easy use of the tools and the complementarity of their features led to the appropriate solutions very fast in all cases. Furthermore, all the tools are cost-effective. The experiments being performed indicated for one more time that there are no solutions that are both integral and optimal, but only partial ones implied by the promised QoS and cost requirements. Finally, chapter 10 summarizes the thesis’s innovative points and contribution and indicates some open issues for further research.


Proceedings ◽  
2019 ◽  
Vol 42 (1) ◽  
pp. 50 ◽  
Author(s):  
Óscar Blanco-Novoa ◽  
Paula Fraga-Lamas ◽  
Miguel Vilar-Montesinos ◽  
Tiago Fernández-Caramés

The latest Augmented Reality (AR) and Mixed Reality (MR) systems are able to provide innovative methods for user interaction, but their full potential can only be achieved when they are able to exchange bidirectional information with the physical world that surround them, including the objects that belong to the Internet of Things (IoT). The problem is that elements like AR display devices or IoT sensors/actuators often use heterogeneous technologies that make it difficult to intercommunicate them in an easy way, thus requiring a high degree of specialization to carry out such a task. This paper presents an open-source framework that eases the integration of AR and IoT devices as well as the transfer of information among them, both in real time and in a dynamic way. The proposed framework makes use of widely used standard protocols and open-source tools like MQTT, HTTPS or Node-RED. In order to illustrate the operation of the framework, this paper presents the implementation of a practical home automation example: an AR/MR application for energy consumption monitoring that allows for using a pair of Microsoft HoloLens smart glasses to interact with smart power outlets.


2005 ◽  
Vol 7 (1) ◽  
pp. 54-64 ◽  
Author(s):  
Dimitrios Loukatos ◽  
Lambros Sarakis ◽  
Kimon Kontovasilis ◽  
Nikolas Mitrou

Sign in / Sign up

Export Citation Format

Share Document