ABSTRACT
Internet of Things (IoT) infrastructures and applications are gaining increased entry into various areas of everyday life. Closely coupled to this development resilience, self-adjusting and security of such systems is experiencing a growth in popularity. Ensuring those properties sufficient monitoring and surveillance is a fundamental requirement. However, heterogeneity and complexity of IoT pose challenges traditional resilience and monitoring mechanisms are struggling to conquer with. This paper features our current and future research on a divers selection of different security and monitoring approaches adopted to the requirements of IoT with the focus on mutual support, thus, laying the foundation for autonomous security in IoT systems.
- Hassan Artail, Haidar Safa, Malek Sraj, Iyad Kuwatly, and Zaid Al-Masri. 2006. A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. Computers & Security 25, 4 (2006), 274--288.Google ScholarDigital Library
- Muhammet Baykara and Resul Das. 2018. A novel honeypot based security approach for real-time intrusion detection and prevention systems. Journal of Information Security and Applications 41 (2018), 103--116.Google ScholarCross Ref
- Christian Berger, Philipp Eichhammer, Hans P. Reiser, Jörg Domaschka, Franz J. Hauck, and Gerhard Habiger. 2020. A Survey on Resilience in the IoT: Taxonomy, Classification and Discussion of Resilience Mechanisms. In [Manuscript under Review].Google Scholar
- Jörg Domaschka, Christian Berger, Hans P. Reiser, Philipp Eichhammer, Frank Griesinger, Jakob Pietron, Matthias Tichy, Franz J. Hauck, and Gerhard Habiger. 2019. SORRIR: A Resilient Self-Organizing Middleware for IoT Applications [Position Paper]. In Proceedings of the 6th International Workshop on Middleware and Applications for the Internet of Things (Davis, CA, USA) (M4IoT '19). Association for Computing Machinery, New York, NY, USA, 13--16. https://doi.org/10.1145/3366610.3368098Google ScholarDigital Library
- Philipp Eichhammer, Christian Berger, Hans P. Reiser, Jörg Domaschka, Franz J. Hauck, Gerhard Habiger, Frank Griesinger, and Jakob Pietron. 2019. Towards a Robust, Self-Organizing IoT Platform for Secure and Dependable Service Execution. In Tagungsband des FB-SYS Herbsttreffens 2019. Gesellschaft für Informatik e.V., Bonn. https://doi.org/10. 18420/fbsys2019-03Google Scholar
- Mohamed Faisal Elrawy, Ali Ismail Awad, and Hesham FA Hamed. 2018. Intrusion detection systems for IoT-based smart environments: a survey. Journal of Cloud Computing 7, 1 (2018), 21.Google ScholarDigital Library
- Zeeshan Ali Khan and Ubaid Abbasi. 2020. Reputation Management Using Honeypots for Intrusion Detection in the Internet of Things. Electronics 9, 3 (2020), 415.Google ScholarCross Ref
- Hanane Lamaazi, Nabil Benamar, Antonio J Jara, Latif Ladid, and Driss El Ouadghiri. 2014. Challenges of the Internet of Things: IPv6 and Network Management. In 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. IEEE, 328--333.Google Scholar
- Subhas Chandra Mukhopadhyay. 2014. Internet of Things, Challenges and Opportunities. Smart Sensors, Measurement and Instrumentation, Vol. 9. Springer Int. Publishing.Google Scholar
- Marcin Nawrocki, Matthias Wählisch, Thomas C Schmidt, Christian Keil, and Jochen Schönfelder. 2016. A survey on honeypot software and data analysis. arXiv preprint arXiv:1608.06249 (2016).Google Scholar
- Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, and Christian Rossow. 2016. IoTPOT: A novel honeypot for revealing current IoT threats. Journal of Information Processing 24, 3 (2016), 522--533.Google ScholarCross Ref
- Ahmed Patel, Qais Qassim, and Christopher Wills. 2010. A survey of intrusion detection and prevention systems. Information Management & Computer Security (2010).Google Scholar
- Sparsh Sharma and Ajay Kaul. 2018. A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud. Vehicular communications 12 (2018), 138--164.Google Scholar
- Christos Tsigkanos, Stefan Nastic, and Schahram Dustdar. 2019. Towards resilient Internet of Things: Vision, challenges, and research roadmap. In Proc. 39th IEEE International Conference on Distributed Computing Systems(ICDCS). 1754--1764. https://doi.org/10.1109/ICDCS.2019.00174Google ScholarCross Ref
- Bruno Bogaz Zarpelão, Rodrigo Sanches Miani, Cláudio Toshio Kawakani, and Sean Carlisto de Alvarenga. 2017. A survey of intrusion detection in Internet of Things. Journal Network and Computer Applications 84 (2017), 25--37.Google ScholarDigital Library
Index Terms
- Towards Autonomous Security Monitoring in Internet-of-Things Infrastructures
Recommendations
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Internet of things security: challenges and perspectives
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud ComputingNo one can deny that the Internet of Things (IOT) will revolutionize our daily thanks to its many benefits in order to improve and simplify people's lives. Us any new technology the internet of things has a number of problems that prevents it to reach ...
Cyberentity Security in the Internet of Things
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
Comments