scholarly journals IoT Traffic: Modeling and Measurement Experiments

IoT ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 140-162
Author(s):  
Hung Nguyen-An ◽  
Thomas Silverston ◽  
Taku Yamazaki ◽  
Takumi Miyoshi

We now use the Internet of things (IoT) in our everyday lives. The novel IoT devices collect cyber–physical data and provide information on the environment. Hence, IoT traffic will count for a major part of Internet traffic; however, its impact on the network is still widely unknown. IoT devices are prone to cyberattacks because of constrained resources or misconfigurations. It is essential to characterize IoT traffic and identify each device to monitor the IoT network and discriminate among legitimate and anomalous IoT traffic. In this study, we deployed a smart-home testbed comprising several IoT devices to study IoT traffic. We performed extensive measurement experiments using a novel IoT traffic generator tool called IoTTGen. This tool can generate traffic from multiple devices, emulating large-scale scenarios with different devices under different network conditions. We analyzed the IoT traffic properties by computing the entropy value of traffic parameters and visually observing the traffic on behavior shape graphs. We propose a new method for identifying traffic entropy-based devices, computing the entropy values of traffic features. The method relies on machine learning to classify the traffic. The proposed method succeeded in identifying devices with a performance accuracy up to 94% and is robust with unpredictable network behavior with traffic anomalies spreading in the network.

2021 ◽  
Author(s):  
Sarah Asiri

The Internet of Things (IoT) is a heterogeneous network of interconnected objects or ‘things’ that are typically connected via the Internet. Trust in most IoT networks is presumed implicitly. This implicit trust assumption can be abused by adversaries to disrupt the network and manipulate reputations of trusted devices. To tackle IoT trust issues, we use permissioned blockchains that utilize Smart Contracts (executable policies) to evaluate and refine IoT devices’ trust. Blockchains replicate a permanent append-only record of all transactions occurring on a network on multiple devices. This prevents adversaries from modifying previous transactions to influence trust evaluations. In this thesis, we propose an IoT trust model that uses Blockchains to record and validate IoT devices’ identities and dynamically evaluates the trustworthiness of devices in the IoT network. Moreover, our model allows for different levels of security based on the sensitivity of data being transmitted across the IoT network.


Author(s):  
Dan-Radu Berte

Abstract IoT, or the Internet of Things, has been in use since circa 1999. It defines a next chapter in the evolution of the Internet where computing devices embedded in everyday objects are able to send and receive data themselves. In recent years miniaturization and economies of scale brought a boon of new devices to the consumer and enterprise market, prompting Gartner to predict over 20bln live IoT devices by 2020. However, the definition of IoT is loose and, for the purpose of predicting trends or discussing security, formulating a clear understanding of the term is crucial. In fact, Internet of Things is a term only mostly used by the media, academia and the industry. Customers in the consumer space refer to the technologies by their benefit describing term of “Smart Home”. A quick analysis of this gap shows how it’s entirely possible no knowledge permeates the business and market worlds because of the incompatible terms used. As more devices, OSes and heterogeneous platforms entrench the concept of a new digital lifestyle, the new “Digital Kingdom” opens its doors to radical disruption, such as the latest massive Mirai and Reaper attacks. Our ability to correctly define the IoT, it’s platforms and components, should lead to better market dynamics and better preparedness, as one can’t secure something that can’t be defined. This paper proposes to further understand the IoT by exploring available definitions, reiterating misuse and equivocal perception, concluding with a more suiting, contemporary definition.


2020 ◽  
Vol 2020 (3) ◽  
pp. 276-1-276-15
Author(s):  
Franziska Schwarz ◽  
Klaus Schwarz ◽  
Reiner Creutzburg

Since its invention, the Internet has changed the world, but above all, it has connected people. With the advent of the Internet of Things, the Internet connects things today much more than people do. A large part of the Internet of Things consists of IoT controlled Smart Home devices. The Internet of Things and the Smart Home have become an increasingly important topic in recent years. The growing popularity of Smart Home devices such as Smart TVs, Smart Door Locks, Smart Light Bulbs, and others is causing a rapid increase in vulnerable areas. In the future, many IoT devices could be just as many targets. The many new and inexperienced manufacturers and the absence of established uniform standards also contribute to the precarious situation. Therefore, new methods are needed to sensitize and detect these threats. In this paper, different existing approaches like those of the National Institute of Standards and Technology (NIST) and the Open Web Application Security Project (OWASP) are combined with concepts of this work like the Smart Home Device Life Cycle. In the context of this paper, a universal 31-page question-based test procedure is developed that can be applied to any Smart Home device. Based on this new, innovative security checklist, the communication between device, app, and the manufacturer's servers, as well as the firmware of IoT devices, can be analyzed and documented in detail. In the course of this paper, also a handout in the abbreviated form will be created, which serves the same purpose.


Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Runchen Gao ◽  
Shen Li ◽  
Yuqi Gao ◽  
Rui Guo

AbstractWith the large-scale application of 5G in industrial production, the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing. In the modern industry, the user often stores data collected by IoT devices in the cloud, but the data at the edge of the network involves a large of the sensitive information, which increases the risk of privacy leakage. In order to address these two challenges, we propose a security strategy in the edge computing. Our security strategy combines the Feistel architecture and short comparable encryption based on sliding window (SCESW). Compared to existing security strategies, our proposed security strategy guarantees its security while significantly reducing the computational overhead. And our GRC algorithm can be successfully deployed on a hardware platform.


2020 ◽  
Vol 62 (5-6) ◽  
pp. 215-226
Author(s):  
Ege Korkan ◽  
Sebastian Kaebisch ◽  
Sebastian Steinhorst

AbstractThe Internet of Things (IoT) is bringing Internet connectivity to a wide range of devices which results in an increasing number of products for smart home, industry 4.0 and/or smart cities. Even though IoT has the ambition to reach an increasing amount of devices and be scalable across different domains, lack of interoperability inhibits this scope to be attained. Recent standardization efforts by the World Wide Web Consortium (W3C) are addressing the interoperability problem by the means of Thing Description (TD) that allows humans and machines to understand the capabilities and communication interfaces of IoT devices. In this paper, we show a more systematic and streamlined development of IoT devices and systems that relies on the TD standard. We introduce three different complementary methods that can be applied independently in the different stages of the development, or as a framework to streamline the development of IoT devices and systems. As a result of using the TD standard, interoperability between IoT devices of various stakeholders is ensured from early stages and the time to market is reduced.


2019 ◽  
Vol 6 (6) ◽  
pp. 703
Author(s):  
Eri Haryanto ◽  
Imam Riadi

<p>Perangkat Internet of Things (IoT) merupakan perangkat cerdas yang memiliki interkoneksi dengan jaringan internet global. Investigasi kasus yang menyangkut perangkat IoT akan menjadi tantangan tersendiri bagi investigator forensik. Keberagaman jenis perangkat dan teknologi akan memunculkan tantangan baru bagi investigator forensik. Dalam penelitian ini dititikberatkan forensik di level internal device perangkat IoT. Belum banyak bahkan belum penulis temukan penelitian sejenis yang fokus dalam analisis forensik perangkat IoT pada level device. Penelitian yang sudah dilakukan sebelumnya lebih banyak pada level jaringan dan level cloud server perangkat IoT. Pada penelitian ini dibangun environment perangkat IoT berupa prototype smart home sebagai media penelitian dan kajian tentang forensik level device. Pada penelitian ini digunakan analisis model forensik yang meliputi collection, examination, analysis, dan reporting dalam investigasi forensik untuk menemukan bukti digital. Penelitian ini berhasil mengungkap benar-benar ada serangan berupa injeksi malware terhadap perangkat IoT yang memiliki sistem operasi Raspbian, Fedberry dan Ubuntu Mate. Pengungkapan fakta kasus mengalami kesulitan pada perangkat IoT yang memiliki sistem operasi Kali Linux. Ditemukan 1 IP Address komputer penyerang yang diduga kuat menanamkan malware dan mengganggu sistem kerja perangkat IoT.</p><p><em><strong>Abstract</strong></em></p><p class="Abstract"><em>The Internet of Things (IoT) is an smart device that has interconnection with global internet networks. Investigating cases involving IoT devices will be a challenge for forensic investigators. The diversity of types of equipment and technology will create new challenges for forensic investigators. In this study focused on forensics at the IoT device's internal device level, there have not been many similar research that focuses on forensic analysis of IoT devices at the device level. Previous research has been done more at the network level and cloud level of IoT device's. In this study an IoT environment was built  a smart home prototype as a object for research and studies on forensic level devices. This study, using forensic model analysis which includes collection, examination, analysis, and reporting in finding digital evidence. This study successfully revealed that there was really an attack in the form of malware injection against IoT devices that have Raspbian, Fedberry and Ubuntu Mate operating systems. Disclosure of the fact that the case has difficulties with IoT devices that have the Kali Linux operating system. Found 1 IP Address of an attacker's computer that is allegedly strongly infusing malware and interfering with the work system of IoT devices.</em></p><p><em><strong><br /></strong></em></p>


2021 ◽  
Author(s):  
Sarah Asiri

The Internet of Things (IoT) is a heterogeneous network of interconnected objects or ‘things’ that are typically connected via the Internet. Trust in most IoT networks is presumed implicitly. This implicit trust assumption can be abused by adversaries to disrupt the network and manipulate reputations of trusted devices. To tackle IoT trust issues, we use permissioned blockchains that utilize Smart Contracts (executable policies) to evaluate and refine IoT devices’ trust. Blockchains replicate a permanent append-only record of all transactions occurring on a network on multiple devices. This prevents adversaries from modifying previous transactions to influence trust evaluations. In this thesis, we propose an IoT trust model that uses Blockchains to record and validate IoT devices’ identities and dynamically evaluates the trustworthiness of devices in the IoT network. Moreover, our model allows for different levels of security based on the sensitivity of data being transmitted across the IoT network.


Author(s):  
Tanishka and Prof. Shikha Gupta

The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Internet of Things (IoT) is rapidly gaining momentum in the scenario of telecommunications. Conventional networks allow for interactivity and data exchange, but these networks have not been designed for the new features and functions of IoT devices. In this paper, an algorithm is proposed to share common recourse among Things, that is, between different types of smart appliances. . Purpose is to analyze deeper the cases separating the network and IoT layout, giving a deeper explanation of the purpose of the simulations, presenting all the information needed to utilize the exercises but also giving suggestion how to expand the exercises further. This implementation can be implemented effectively using package tracking software that includes IoT functions to control and simulate a smart home. IoT technology can be applied to many real life issues, such as: homework, treatment, campus, office, etc.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xu Yuan ◽  
Fang Luo ◽  
Muhammad Zeeshan Haider ◽  
Zhikui Chen ◽  
Yucheng Li

Blockchain technology has advanced rapidly in recent years and is now widely used in a variety of fields. Blockchain appears to be one of the best solutions for managing massive heterogeneous devices while achieving advanced data security and data reputation, particularly in the field of large-scale IoT (Internet of Things) networks. Despite the numerous advantages, there are still challenges while deploying IoT applications on blockchain systems due to the limited storage, power, and computing capability of IoT devices, and some of these problems are caused by the consensus algorithm, which plays a significant role in blockchain systems by ensuring overall system reliability and robustness. Nonetheless, most existing consensus algorithms are prone to poor node reliability, low transaction per second (TPS) rates, and scalability issues. Aiming at some critical problems in the existing consensus algorithms, this paper proposes the Efficient Byzantine Reputation-based Consensus (EBRC) mechanism to resolve the issues raised above. In comparison to traditional algorithms, we reinvented ways to evaluate node reliability and robustness and manage active nodes. Our experiments show that the EBRC algorithm has lower consensus delay, higher throughput, improved security, and lower verification costs. It offers new reference ideas for solving the Internet of Things+blockchain+Internet court construction problem.


Author(s):  
Víctor H. Benítez ◽  
◽  
Gustavo C. Soto ◽  
Luis C. Félix-Herrán ◽  
Jesús Pacheco

Nowadays, the Internet of Things is used to transfer information from human to human and from human to machine. In this paper, we propose the use of IoT platforms to link those homes that are equipped with IoT capabilities, in order to increase security and prevent from a crime to a fire, and even monitor health status of a person. Using a microcontroller, it is possible to send information to a cloud server capable of sharing this information with other households connected to the platform, as well as allowing linking this data to one of the most used social networks in the world: Facebook. Linking smart homes with social network, allows to consult the status of sensors and IoT devices empowering citizen security against crime, violence and events that could put the integrity of people at risk both in their property and their health. The study is carried out for a particular region of Latin America, given its high rates of violence against citizens that have occurred in recent years.


Sign in / Sign up

Export Citation Format

Share Document