Online citations, reference lists, and bibliographies.

Anomaly Behavior Analysis For IoT Sensors

Jesus Pacheco, Salim Hariri
Published 2018 · Computer Science, Engineering

Cite This
Download PDF
Analyze on Scholarcy
Share
The Internet of Things (IoT) will not only connect computers and mobile devices but also interconnect smart buildings, homes, and cities, as well as electrical grids, gas, and water networks, automobiles, airplanes, etc. IoT will lead to the development of a wide range of advanced information services that need to be processed in real time and require large storage and computational power. The integration of IoT with fog and cloud computing not only brings the computational requirements but also enables IoT services to be pervasive, cost-effective, and accessible from anywhere and at anytime. In any IoT application, sensors are indispensable to bring the physical world into the digital world that can be implemented by leveraging fog computing. However, IoT sensors will introduce major security challenges as they contribute to a significant increase in the IoT attack surface. In this paper, we present a methodology to develop an intrusion detection system on the basis of anomaly behavior analysis to detect when a sensor has been compromised and used to provide misinformation. Our preliminary experimental results show that our approach can accurately authenticate sensors on the basis of their behavior and can detect known and unknown sensor attacks with high detection rate and low false alarms.
This paper references
10.1109/FAS-W.2016.58
IoT Security Framework for Smart Cyber Infrastructures
Jesus Pacheco (2016)
10.1109/JIOT.2013.2296516
An Information Framework for Creating a Smart City Through Internet of Things
Jiong Jin (2014)
10.1109/CloudCom.2013.155
Smart Home: Integrating Internet of Things with Web Services and Cloud Computing
M. Soliman (2013)
10.1109/ICDCSW.2013.34
A Path Authenticating Method Using Bloom Filters against Impersonation Attacks on Relaying Nodes for Wireless Sensor Networks
Noriaki Tanabe (2013)
10.1109/FAS-W.2016.60
A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks
Q. Yaseen (2016)
10.1109/INDIN.2015.7281734
Structured system threat modeling and mitigation analysis for industrial automation systems
Roman Schlegel (2015)
10.1109/ISC2.2016.07580756
Design and evaluation of resilient infrastructures systems for smart cities
Jesus Pacheco (2016)
10.1109/FAS-W.2016.59
Enabling Low Latency Services on LTE Networks
Cesar A. García-Pérez (2016)
10.1109/FAS-W.2016.57
Towards Programmable Fog Nodes in Smart Factories
Mathias Santos de Brito (2016)
10.1016/j.jnca.2013.08.001
Network attacks: Taxonomy, tools and systems
Nazrul Hoque (2014)
10.1109/ICCSEE.2012.373
Security in the Internet of Things: A Review
Hui Suo (2012)
10.1016/J.APENERGY.2012.05.020
Multi-agent control system with information fusion based comfort model for smart buildings
Z. Wang (2012)
10.1109/FAS-W.2016.56
Application Orchestration in Mobile Edge Cloud: Placing of IoT Applications to the Edge
Attila Hegyi (2016)
10.1109/FAS-W.2016.54
CloudAware: A Context-Adaptive Middleware for Mobile Edge and Cloud Computing Applications
Gabriel Orsini (2016)
10.1109/ACC.2016.7524930
Detection of replay attacks in cyber-physical systems
A. Hoehn (2016)
10.1109/TSE.2010.60
An Attack Surface Metric
P. K. Manadhata (2011)
10.1109/ICMSAO.2015.7152200
A survey of intrusion detection systems in wireless sensor networks
Okan Can (2015)
10.1109/SCC.2014.44
A Framework for Environmental Monitoring with Arduino-Based Sensors Using Restful Web Service
Sungchul Lee (2014)
10.1145/2808475.2808485
The SDN Shuffle: Creating a Moving-Target Defense using Host-based Software-Defined Networking
Douglas C. MacFarland (2015)
10.1109/WISP.2011.6051716
Wavelet-based sensor validation: Differentiating abrupt sensor faults from system dynamics
Alexey P. Kozionov (2011)
10.1109/TDSC.2012.24
Automated Security Test Generation with Formal Threat Models
D. Xu (2012)
10.1109/MOBIQ.2007.4451054
Anomaly-Based Behavior Analysis of Wireless Network Security
S. Fayssal (2007)
10.1109/SERVICES.2015.12
Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things
Md. Mahmud Hossain (2015)
10.1109/FAS-W.2016.55
How Beneficial Are Intermediate Layer Data Centers in Mobile Edge Networks?
Amardeep Mehta (2016)
10.1145/2818184
Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey
Vittorio P. Illiano (2015)
10.1109/WiMOB.2013.6673340
IoT architecture to enable intercommunication through REST API and UPnP using IP, ZigBee and arduino
Hiro Gabriel Cerqueira Ferreira (2013)



This paper is referenced by
10.1109/CAMAD.2019.8858490
Combining Statistical and Machine Learning Techniques in IoT Anomaly Detection for Smart Homes
Georgios M. Spanos (2019)
10.1109/AICCSA.2017.85
IoT Security Framework for Smart Water System
Jesus Pacheco (2017)
IoT device fingerprinting with sequence-based features
Nishadh Aluthge (2018)
10.1109/AICCSA.2018.8612808
Security Framework for IoT Cloud Services
Jesus Pacheco (2018)
10.20944/preprints202001.0303.v1
Securing Internet of Things against Physical Layer Attacks Using Hybrid Security Algorithm (HSA)
Meysam Zarei (2020)
10.1145/3341325.3342008
Anomaly Behavior Analysis for IoT Network Nodes
J. Pacheco (2019)
Context Aware Anomaly Behavior Analysis for Smart Home Systems
Z. Pan (2019)
10.3390/s19194235
False Data Detection for Fog and Internet of Things Networks
R. Fantacci (2019)
10.1109/ACCESS.2020.3005643
Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms
.. Kamaldeep (2020)
10.1002/ett.3504
EdgePlace: Availability-aware placement for chained mobile edge applications
He Zhu (2018)
10.1109/ICECOS.2018.8605265
Measurement of Component Performance (Sensor) on Internet of Thing (IoT)
Sharipuddin (2018)
10.1002/CPE.5355
A trust assurance technique for Internet of things based on human behavior compliance
Marco Anisetti (2019)
10.1109/CCWC47524.2020.9031162
Connected Home Automated Security Monitor (CHASM): Protecting IoT Through Application of Machine Learning
Jeffrey S. Chavis (2020)
10.1109/AICCSA47632.2019.9035338
Anomaly Behavior Analysis for Fog Nodes Availability Assurance in IoT Applications
J. Pacheco (2019)
10.1002/ett.3493
EdgeCloudSim: An environment for performance evaluation of edge computing systems
Cagatay Sonmez (2018)
You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi
Lingjing Yu (2020)
10.1007/s11277-020-07421-z
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism
Mina Zaminkar (2020)
10.1002/ett.3525
E2ARC: Energy-efficient adaptive resource block allocation with low complexity in device-to-device communication
Pimmy Gandotra (2018)
10.1109/ROPEC.2017.8261614
Anomaly behavior analysis for smart grid automation system
A. Orozco (2017)
10.1007/978-3-030-38516-3_4
A Systematic Literature Survey: Development of Smart City Based on Various Internet of Things Architectures
Kirti (2020)
10.22042/ISECURE.2018.116976.408
A Survey of Anomaly Detection Approaches in Internet of Things
Morteza Behniafar (2018)
10.1109/ACCESS.2020.2988055
Artificial Neural Networks-Based Intrusion Detection System for Internet of Things Fog Nodes
J. Pacheco (2020)
10.1016/j.iot.2019.100129
A Survey on Internet of Things Security: Requirements, Challenges, and Solutions
Hamed Haddadpajouh (2019)
A Trust Assurance Technique for IoT based on Human Behavior Compliance
M. Anisetti (2019)
10.1109/I2CT42659.2018.9057870
Security and Privacy Issues in Internet of Things (IoT)
Muhammad Sarmad Masood (2018)
An Anomaly Behavior Analysis Methodology for the Internet of Things: Design, Analysis, and Evaluation
Jesus Horacio Pacheco Ramirez (2017)
10.1109/ICCAC.2017.14
Autonomic Identity Framework for the Internet of Things
Xiaoyang Zhu (2017)
10.1002/ett.3502
Subcarriers assignment scheme for multiple secondary users in OFDMA-based IEEE 802.22 WRAN: A game theoretic approach
Nitin Gupta (2018)
10.1002/ett.3446
A collaborative mobile edge computing and user solution for service composition in 5G systems
Ismaeel Al Ridhawi (2018)
Semantic Scholar Logo Some data provided by SemanticScholar