Mitigação de Ataques IDFs no Serviço de Agrupamento de Disseminação de Dados em Redes IoT Densas
Abstract
The growth of IoT has made possible the creation of increasingly personalized services, among them, the industrial services, that often deal with massive amounts of data. However, as IoT grows, its threats are even greater. Among these threats, the false data injection attacks (FDI) stand out as being one of the most aggressive to data networks such as IoT. Although there are several mechanisms that deal with it they do not take into account the validation of the data, especially on the cluster data service. This work proposes an intrusion detection mechanism, called CONFINIT, against FDI attacks on the data dissemination service in IoT dense. It combines strategies of watchdog surveillance and collaborative consensus for the detection of attackers, guaranteeing the authenticity of the data collected by the devices. CONFINIT was evaluated in NS-3 and attained 99% of detection rate, 3.2% of false negative and 3.6% of false positive rates, and increased by 30% the clustering without FDI attacks.References
Akpakwu, G. A., Silva, B. J., Hancke, G. P., and Abu-Mahfouz, A. M. (2018). A survey on 5g networks for the internet of things: Communication technologies and challenges. IEEE Access, 6:3619–3647.
Borgia, E. (2014). The internet of things vision: Key features, applications and open issues. Computer Communications, 54:1–31.
Bostami, B., Ahmed, M., and Choudhury, S. (2019). False data injection attacks in internet of things. In Performability in Internet of Things, pages 47–58. Springer.
Cervantes, C., Nogueira, M., and Santos, A. (2018). Mitigação de ataques no roteamento em iot densa e móvel baseada em agrupamento e confiabilidade dos dispositivos. In Anais do XXXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. SBC.
Colistra, G., Pilloni, V., and Atzori, L. (2014). Task allocation in group of nodes in the iot: A consensus approach. In 2014 IEEE International Conference on Communications (ICC), pages 3848–3853. IEEE.
Deng, R., Xiao, G., Lu, R., Liang, H., and Vasilakos, A. V. (2016). False data injection on state estimation in power systems—attacks, impacts, and defense: A survey. IEEE Transactions on Industrial Informatics, 13(2):411–423.
Gielow, F., Jakllari, G., Nogueira, M., and Santos, A. (2015). Data similarity aware dynamic node clustering in wireless sensor networks. Ad Hoc Networks, 24:29–45.
Gubbi, J., Buyya, R., Marusic, S., and Palaniswami, M. (2013). Internet of things (iot): A vision, architectural elements, and future directions. Future generation computer systems, 29(7):1645–1660.
Kailkhura, B., Brahma, S., and Varshney, P. K. (2015). Consensus based detection in the presence of data falsification attacks. arXiv preprint arXiv:1504.03413.
Kouicem, D. E., Bouabdallah, A., and Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Networks.
Kumar, A. and Pais, A. R. (2018). Deterministic en-route filtering of false reports: A combinatorial design based approach. IEEE Access, 6:74494–74505.
Kumar, S. A., Vealey, T., and Srivastava, H. (2016). Security in internet of things: Challenges, solutions and future directions. In 49th HICSS, pages 5772–5781. IEEE.
Li, B., Lu, R., Wang, W., and Choo, K.-K. R. (2017). Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. Journal of Parallel and Distributed Computing, 103:32–41.
Lu, R., Lin, X., Zhu, H., Liang, X., and Shen, X. (2012). Becan: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE transactions on parallel and distributed systems, 23(1):32–43.
Mendez, D. M., Papapanagiotou, I., and Yang, B. (2017). Internet of things: Survey on security and privacy. arXiv preprint arXiv:1707.01879.
Minoli, D., Sohraby, K., and Occhiogrosso, B. (2017). Iot considerations, requirements, and architectures for smart buildings—energy optimization and next-generation building management systems. IEEE Internet of Things Journal, 4(1):269–283.
Miorandi, D., Sicari, S., De Pellegrini, F., and Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad hoc networks, 10(7):1497–1516.
Mumtaz, S., Alsohaily, A., Pang, Z., Rayes, A., Tsang, K. F., and Rodriguez, J. (2017). Massive internet of things for industrial applications: Addressing wireless iiot connectivity challenges and ecosystem fragmentation. IEEE Industrial Electronics Magazine, 11(1):28–33.
Qiu, T., Chen, N., Li, K., Atiquzzaman, M., and Zhao,W. (2018). How can heterogeneous internet of things build our future: A survey. IEEE Communications Surveys & Tutorials, 20(3):2011–2027.
Sen, A. and Madria, S. (2017). Risk assessment in a sensor cloud framework using attack graphs. IEEE Transactions on Services Computing, 10(6):942–955.
Toulouse, M., Minh, B. Q., and Curtis, P. (2015). A consensus based network intrusion detection system. In 2015 5th International Conference on IT Convergence and Security (ICITCS), pages 1–6. IEEE.
UCI, C. (2013). Estatisticas de acesso web. https://archive.ics.uci.edu/ml/datasets/Gas+Sensor+Array+Drift+Dataset. Acessado em 21/05/2018.
Wang, J., Liu, Z., Zhang, S., and Zhang, X. (2014). Defending collaborative false data injection attacks in wireless sensor networks. Information Sciences, 254:39–53.
Yang, L., Ding, C., Wu, M., and Wang, K. (2017). Robust detection of false data injection attacks for data aggregation in an internet of things-based environmental surveillance. Comp. Net., 129:410–428.
Yaqoob, I., Ahmed, E., ur Rehman, M. H., Ahmed, A. I. A., Al-garadi, M. A., Imran, M., and Guizani, M. (2017). The rise of ransomware and emerging security challenges in the internet of things. Computer Networks, 129:444–458.
Yu, Z. and Guan, Y. (2010). A dynamic en-route filtering scheme for data reporting in wireless sensor networks. IEEE/ACM Transactions on Networking (ToN), 18(1):150–163.
Borgia, E. (2014). The internet of things vision: Key features, applications and open issues. Computer Communications, 54:1–31.
Bostami, B., Ahmed, M., and Choudhury, S. (2019). False data injection attacks in internet of things. In Performability in Internet of Things, pages 47–58. Springer.
Cervantes, C., Nogueira, M., and Santos, A. (2018). Mitigação de ataques no roteamento em iot densa e móvel baseada em agrupamento e confiabilidade dos dispositivos. In Anais do XXXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. SBC.
Colistra, G., Pilloni, V., and Atzori, L. (2014). Task allocation in group of nodes in the iot: A consensus approach. In 2014 IEEE International Conference on Communications (ICC), pages 3848–3853. IEEE.
Deng, R., Xiao, G., Lu, R., Liang, H., and Vasilakos, A. V. (2016). False data injection on state estimation in power systems—attacks, impacts, and defense: A survey. IEEE Transactions on Industrial Informatics, 13(2):411–423.
Gielow, F., Jakllari, G., Nogueira, M., and Santos, A. (2015). Data similarity aware dynamic node clustering in wireless sensor networks. Ad Hoc Networks, 24:29–45.
Gubbi, J., Buyya, R., Marusic, S., and Palaniswami, M. (2013). Internet of things (iot): A vision, architectural elements, and future directions. Future generation computer systems, 29(7):1645–1660.
Kailkhura, B., Brahma, S., and Varshney, P. K. (2015). Consensus based detection in the presence of data falsification attacks. arXiv preprint arXiv:1504.03413.
Kouicem, D. E., Bouabdallah, A., and Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Networks.
Kumar, A. and Pais, A. R. (2018). Deterministic en-route filtering of false reports: A combinatorial design based approach. IEEE Access, 6:74494–74505.
Kumar, S. A., Vealey, T., and Srivastava, H. (2016). Security in internet of things: Challenges, solutions and future directions. In 49th HICSS, pages 5772–5781. IEEE.
Li, B., Lu, R., Wang, W., and Choo, K.-K. R. (2017). Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. Journal of Parallel and Distributed Computing, 103:32–41.
Lu, R., Lin, X., Zhu, H., Liang, X., and Shen, X. (2012). Becan: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE transactions on parallel and distributed systems, 23(1):32–43.
Mendez, D. M., Papapanagiotou, I., and Yang, B. (2017). Internet of things: Survey on security and privacy. arXiv preprint arXiv:1707.01879.
Minoli, D., Sohraby, K., and Occhiogrosso, B. (2017). Iot considerations, requirements, and architectures for smart buildings—energy optimization and next-generation building management systems. IEEE Internet of Things Journal, 4(1):269–283.
Miorandi, D., Sicari, S., De Pellegrini, F., and Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad hoc networks, 10(7):1497–1516.
Mumtaz, S., Alsohaily, A., Pang, Z., Rayes, A., Tsang, K. F., and Rodriguez, J. (2017). Massive internet of things for industrial applications: Addressing wireless iiot connectivity challenges and ecosystem fragmentation. IEEE Industrial Electronics Magazine, 11(1):28–33.
Qiu, T., Chen, N., Li, K., Atiquzzaman, M., and Zhao,W. (2018). How can heterogeneous internet of things build our future: A survey. IEEE Communications Surveys & Tutorials, 20(3):2011–2027.
Sen, A. and Madria, S. (2017). Risk assessment in a sensor cloud framework using attack graphs. IEEE Transactions on Services Computing, 10(6):942–955.
Toulouse, M., Minh, B. Q., and Curtis, P. (2015). A consensus based network intrusion detection system. In 2015 5th International Conference on IT Convergence and Security (ICITCS), pages 1–6. IEEE.
UCI, C. (2013). Estatisticas de acesso web. https://archive.ics.uci.edu/ml/datasets/Gas+Sensor+Array+Drift+Dataset. Acessado em 21/05/2018.
Wang, J., Liu, Z., Zhang, S., and Zhang, X. (2014). Defending collaborative false data injection attacks in wireless sensor networks. Information Sciences, 254:39–53.
Yang, L., Ding, C., Wu, M., and Wang, K. (2017). Robust detection of false data injection attacks for data aggregation in an internet of things-based environmental surveillance. Comp. Net., 129:410–428.
Yaqoob, I., Ahmed, E., ur Rehman, M. H., Ahmed, A. I. A., Al-garadi, M. A., Imran, M., and Guizani, M. (2017). The rise of ransomware and emerging security challenges in the internet of things. Computer Networks, 129:444–458.
Yu, Z. and Guan, Y. (2010). A dynamic en-route filtering scheme for data reporting in wireless sensor networks. IEEE/ACM Transactions on Networking (ToN), 18(1):150–163.
Published
2019-09-02
How to Cite
PEDROSO, Carlos; GIELOW, Fernando; SANTOS, Aldri; NOGUEIRA, Michele.
Mitigação de Ataques IDFs no Serviço de Agrupamento de Disseminação de Dados em Redes IoT Densas. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 19. , 2019, São Paulo.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2019
.
p. 211-224.
DOI: https://doi.org/10.5753/sbseg.2019.13973.
