Skip to main content

An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT

  • Chapter
  • First Online:

Part of the book series: Internet of Things ((ITTCC))

Abstract

Security and dependability are the most crucial challenges for the IoT implementation into the military domain. Insufficiently secured military IoT can provide adversary possibility of manipulation or disruption of data transmitted between units or even taking control of or disabling automated systems. On the other hand, if we already apply certain security mechanisms, IoT network should work reliably, even with faults arising out of unreliable hardware, and harsh or even hostile physical environment. In the paper it was pointed out that security mechanisms and fault-tolerant techniques to be effective in military applications should be tightly integrated. An approach for integrating security techniques on the access layer and the fault-tolerant techniques which are based on faulty (or misbehaving) sensor nodes diagnosis and reconfiguration was proposed. Presented solutions for securing the military IoT network ensure strong nodes authentication within network clusters and securing data transmissions between sensor nodes (SN) and gateways with the use of COTS IoT platforms equipped with TPM modules. Fault diagnosis (or detection) is based on the comparison method within network clusters. The method for determining effective diagnosable structures within clusters was presented. An experimentally constructed network called SFTN was build to demonstrate the proposed approach. Also, some results from a study of the experimental network in Cooja simulator were conducted.

This work is an extended version of the paper Integrating Some Security and Fault Tolerant Techniques for Military Applications of Internet of Things [1].

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    TPM is an implementation of a standard developed by the Trusted Computing Group [18]. This module is designed to support the cryptographic procedures and protocols that can be used for securing data [19].

References

  1. Zieliński, Z., Chudzikiewicz, J., Furtak, J., Głebocki, P.: Integrating some security and fault tolerant techniques for military applications of Internet of Things. In: IEEE World Forum on Internet of Things, 12–14 Dec 2016, Reston, VA, USA (2016)

    Google Scholar 

  2. Zheng, D.E., Carter, W.A.: Leveraging the Internet of Things for a More Efficient and Effective Military, A Report of the CSIS Strategic Technologies Program (2015)

    Google Scholar 

  3. Suri, N., et al.: Analyzing the applicability of Internet of Things to the battlefield environment. In: Proceedings of ICMCIS Conference, Brussel (2016)

    Google Scholar 

  4. Yishi, L., Fei, J., Hui, Y.: Study on application modes of military Internet of Things (MIOT). In: Proceedings of 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), vol. 3, pp. 25–27 (2012)

    Google Scholar 

  5. Qian, Y., Joshi, J., Tipper, D., Krishnamurthy, P.: Information Assurance: Dependability and Security in Networked Systems, pp. 113–170. Morgan Kaufmann Publishers (2018)

    Google Scholar 

  6. Avizienis, A., Laprie, J.C., Randell, B., Landwhehr, C.: Basic concepts and taxonomy of dependable and secure comuting. IEEE Trans. Dependable Secur. Comput. 1, 11–33 (2004)

    Article  Google Scholar 

  7. Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices. In: WiMob’15

    Google Scholar 

  8. Bohli, J.M., Skarmeta, A., Victoria Moreno, M., García, D., Langendörfer, P.: SMARTIE project: secure IoT data management for smart cities. In: International Conference on Recent Advances in Internet of Things (RIoT), Singapore, pp. 1–6 (2015)

    Google Scholar 

  9. Rao, M., Newe, T., Grout, I., Lewis, E., Mathur, A.: FPGA Based Reconfigurable IPSec AH Core Suitable for IoT Applications. In: CIT/IUCC/DASC/PICOM’15 (2015)

    Google Scholar 

  10. Altolini, D., Lakkundi, V., Bui, N., Tapparello, C., Rossi, M.: Low power link layer security for IoT: implementation and performance analysis. In: IWCMC’13 (2013)

    Google Scholar 

  11. Wrona, K.: Securing the Internet of Things a military perspective. In: Proceedings of 2nd IEEE World Forum on Internet of Things—WF-IoT’15 (2015)

    Google Scholar 

  12. Chudzikiewicz, J., Furtak, J., Zielinski, Z.: Secure protocol for wireless communication within Internet of Military Things. In: Proceedings of 2nd IEEE World Forum on Internet of Things—WF-IoT’16 (2016)

    Google Scholar 

  13. Koushanfar, F., Potkonjak, M., Sangiovanni-Vincentelli, M.A.: Fault-tolerance in sensor networks. In: Mahgoub, I., Ilyas, M. (eds.) Handbook of Sensor Networks, Section VIII, no. 36. CRC Press (2004)

    Google Scholar 

  14. Jiang, P.: A new method for node fault detection in wireless sensor networks. Sensors 9, 1282–1294 (2012)

    Article  Google Scholar 

  15. Chen, J., Kher, S., Somani, A.: Distributed fault detection of wireless sensor networks. In: DIWANS ’06 Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad hoc Networks and Sensor Networks, pp. 65–72 (2006)

    Google Scholar 

  16. Maeng, J., Malek, M.: A comparison connection assignment for self-diagnosis of multiprocessor systems. Digest International Symposium on Fault Tolerant Computing, pp. 173–175 (1981)

    Google Scholar 

  17. Chudzikiewicz, J., Furtak, J., Zielinski, Z.: Fault-tolerant techniques for the Internet of Military Things. In: Proceedings of 2nd IEEE World Forum on Internet of Things—WF-IoT’16 (2016)

    Google Scholar 

  18. TPM Main Part 1 Design Principles. Specification Version 1.2. Revision 116, Trusted Computing Group, Incorporated (2011)

    Google Scholar 

  19. Kinney, S.: Trusted Platform Module Basics: Using TPM in Embedded Systems. Elsevier Inc, Embedded Technology Series (2006)

    Google Scholar 

  20. Chudzikiewicz, J., Zieliński, Z.: On some resources placement schemes in the 4-dimensional soft degradable hypercube processors network. In: Proceedings of DepCoSRELCOMEX Conference, Poland, pp. 133–143 (2014)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zbigniew Zieliski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zieliski, Z., Chudzikiewicz, J., Furtak, J. (2019). An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT. In: Chakraborty, R., Mathew, J., Vasilakos, A. (eds) Security and Fault Tolerance in Internet of Things. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-02807-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02807-7_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02806-0

  • Online ISBN: 978-3-030-02807-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics