Skip to main content
Log in

An analysis of the Gateway Integrity Checking Protocol from the perspective of Intrusion Detection Systems

  • Published:
Design Automation for Embedded Systems Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) gateways bridging resource-constrained devices and the internet, running conventional operating systems and communication protocols, are valuable targets for malicious attackers. Once compromised, the gateway can no longer be trusted to deliver data accurately to the applications running on the Cloud. In this work we present an analysis of the Gateway Integrity Checking Protocol, a gossip protocol that collects data from subsets of IoT devices, to answer a challenge sent by an External Security Agent. The response is used to check the integrity of data arriving at the Cloud from the gateway. The evaluation of the time and energy overhead, and the impact of the proposed solution on the lifetime of the network through simulations is presented. A detailed qualitative comparison against other Intrusion Detection Systems in the IoT domain is made, showing that the proposed solution can provide customizable security levels with little overhead in terms of processing power and network traffic.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

References

  1. Lucena M, Scheffel RM, Frohlich AA (2019) IoT gateway integrity checking protocol. In: 2019 IX Brazilian symposium on computing systems engineering (SBESC). IEEE, https://doi.org/10.1109/sbesc49506.2019.9046077

  2. International Telecommunication Union (ITU) (2005) ITU internet reports: the internet of things. Technical Reports

  3. Sadeghi A-R, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial internet of things. In: Proceedings of the 52nd annual design automation conference on—DAC ’15. ACM Press, https://doi.org/10.1145/2744769.2747942

  4. Zhu Q, Wang R , Chen Q, Liu Y, Qin W (2010) IOT gateway: bridging wireless sensor networks into internet of things. In: 2010 IEEE/IFIP international conference on embedded and ubiquitous computing.IEEE, https://doi.org/10.1109/euc.2010.58

  5. Hung CW, Hsu W-T (2018) Power consumption and calculation requirement analysis of AES for WSN IoT. Sensors 18(6):1675. https://doi.org/10.3390/s18061675

    Article  Google Scholar 

  6. Resner D (2018) Performance evaluation of the trustful space-time protocol. Master’s Thesis, Federal University of Santa Catarina, Florianópolis, M.Sc. Thesis. http://www.lisha.ufsc.br/pub/Resner_MSC_2018.pdf

  7. Fröhlich AA, Scheffel RM, Kozhaya D, Veríssimo PE (2018) Byzantine resilient protocol for the IoT. IEEE Int Things J 6:2506–2517

    Article  Google Scholar 

  8. Fröhlich AA (2018) SmartData: an IoT-ready API for sensor networks. Int J Sens Netw 28(3):202–210

    Article  Google Scholar 

  9. Resner D, Fröhlich AA(2016) Speculative precision time protocol: submicrosecond clock synchronization for the IoT. In: 21st IEEE international conference on emerging technologies and factory automation (ETFA 2016). Berlin, pp 1–8

  10. IEEE standard for a precision clock synchronization protocol for networked measurement and control systems. https://doi.org/10.1109/ieeestd.2002.94144

  11. Reghelin R, Fröhlich AA (2006) A decentralized location system for sensor networks using cooperative calibration and heuristics. In: Proceedings of the 9th ACM international symposium on modeling analysis and simulation of wireless and mobile systems—MSWiM ’06. ACM Press, https://doi.org/10.1145/1164717.1164742

  12. Scheffel R, Fröhlich AA (2018) FT-TSTP: a multi-gateway fully reactive geographical routing protocol to improve WSN reliability. In: IEEE international conference on advanced networks and telecommunications systems (ANTS). Indore, pp 1–6

  13. Certicom (2010) Sec 1: Elliptic curve cryptography. http://www.secg.org/sec1-v2.pdf

  14. Certicom (2010) Sec 2: Recommended elliptic curve domain parameters. https://www.secg.org/sec2-v2.pdf

  15. Bernstein DJ (2005) The Poly1305-AES message-authentication code. In: Proceedings of fast software encryption. France, February, Paris, pp 32–49

  16. Needham RM, Schroeder MD (1978) Using encryption for authentication in large networks of computers. Commun ACM 21(12):993–999. https://doi.org/10.1145/359657.359659

    Article  MATH  Google Scholar 

  17. Dolev D, Yao AC (1981) On the security of public key protocols. In: 22nd annual symposium on foundations of computer science (SFCS 1981). IEEE, https://doi.org/10.1109/sfcs.1981.32

  18. Lowe G (1996) Breaking and fixing the Needham–Schroeder public-key protocol using FDR. In: Proceedings of the second international workshop on tools and algorithms for construction and analysis of systems, ser. TACAs ’96. Springer, London, pp 147–166. http://dl.acm.org/citation.cfm?id=646480.693776

  19. Mitchell R, Chen I-R (2014) A survey of intrusion detection techniques for cyber-physical systems. ACM Comput Surv 46(4):1–29. https://doi.org/10.1145/2542049

    Article  Google Scholar 

  20. Pundir S, Wazid M, Singh DP, Das AK, Rodrigues JJ, Park Y (2019) Intrusion detection protocols in wireless sensor networks integrated to internet of things deployment: survey and future challenges. IEEE Access 8:3343–3683

    Article  Google Scholar 

  21. Sharma R, Athavale VA (2019) Survey of intrusion detection techniques and architectures in wireless sensor networks. Int J Adv Netw Appl 10(4):3925–3937

    Google Scholar 

  22. Richa CH, de Lucena MM, Horstmann LP, Hoffmann JLC, Fröhlich AA (2020) Modeling time requirements of CPS in wireless networks. Sensors 20(7):1818. https://doi.org/10.3390/s20071818

    Article  Google Scholar 

  23. Beraldi R, Canali C, Lancellotti R, Mattia GP (2020) Distributed load balancing for heterogeneous fog computing infrastructures in smart cities. Pervasive Mob Comput 67:101221. https://doi.org/10.1016/j.pmcj.2020.101221

    Article  Google Scholar 

  24. Hijab M, Damodaram A (2020) Weighted randomized algorithms for efficient load balancing in distributed computing environments. Mater Today Proc. https://doi.org/10.1016/j.matpr.2020.06.216

    Article  Google Scholar 

  25. Kumar M, Bhushan B (2020) A methodological comparison of the most efficient load balancing algorithms in cloud computing. SSRN Electron J. https://doi.org/10.2139/ssrn.3598908

    Article  Google Scholar 

  26. OpenSim (2017) OMNeT++—Objective Modular Network Testbed in C++. https://omnetpp.org/

  27. Boulis A (2017) Castalia a simulator for wireless sensor networks and body area networks. https://github.com/boulis/Castalia

  28. LISHA (XXXX) EPOS embedded parallel operating system. https://epos.lisha.ufsc.br/HomePage

  29. Instruments, T “Cc2538 powerful wireless microcontroller system-on-chip for 2.4-ghz ieee 802.15.4, 6lowpan, and zigbee\(\textregistered \) applications.” [Online]. Available: http://www.ti.com/lit/ds/symlink/cc2538.pdf

  30. Nguyen T, Marchal S, Miettinen M, Hoang Dang M , Asokan N , Sadeghi A-R (2018) Diot: a crowdsourced self-learning approach for detecting compromised iot devices. 04

  31. Abhishek NV, Lim TJ, Sikdar B, Tandon A (2018) An intrusion detection system for detecting compromised gateways in clustered IoT networks. In: 2018 IEEE international workshop technical committee on communications quality and reliability (CQR). IEEE, https://doi.org/10.1109/cqr.2018.8445985

  32. Eskandari M, Janjua ZH, Vecchio M, Antonelli F (2020) Passban IDS: an intelligent anomaly based intrusion detection system for IoT edge devices. IEEE Internet of Things J. https://doi.org/10.1109/jiot.2020.2970501

    Article  Google Scholar 

  33. da Silva APR, Martins MHT, Rocha BPS, Loureiro AAF, Ruiz LB, Wong HC (2005) Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on quality of service and security in wireless and mobile networks—Q2SWinet ’05. ACM Press, https://doi.org/10.1145/1089761.1089765

  34. Wazid M, Dsouza PR, Das AK, Kumar VBKN, Rodrigues JJPC (2019) RAD-EI: a routing attack detection scheme for edge-based internet of things environment. Int J Commun Syst 32(15):e4024. https://doi.org/10.1002/dac.4024

    Article  Google Scholar 

  35. Ozcelik MM, Irmak E, Ozdemir S (2017) A hybrid trust based intrusion detection system for wireless sensor networks. In: 2017 international symposium on networks, computers and communications (ISNCC). IEEE, https://doi.org/10.1109/isncc.2017.8071998

Download references

Acknowledgements

This study was financed in part by the Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - Brasil (CAPES) - Finance Code 001.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mateus Martínez de Lucena.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This research was partially funded by CAPES and by CNPq, Brazil.

This paper was originally published in the 2019 IX Brazilian Symposium on Computing Systems Engineering (SBESC) [1].

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Martínez de Lucena, M., Scheffel, R.M. & Fröhlich, A.A. An analysis of the Gateway Integrity Checking Protocol from the perspective of Intrusion Detection Systems. Des Autom Embed Syst 25, 89–111 (2021). https://doi.org/10.1007/s10617-020-09240-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10617-020-09240-8

Keywords