Filters








23 Hits in 4.1 sec

COSMOS: Collaborative, Seamless and Adaptive Sentinel for the Internet of Things

Pantaleone Nespoli, David Useche Pelaez, Daniel Díaz López, Félix Gómez Mármol
2019 Sensors  
Our sentinel shields the IoT devices using multiple defensive rings, resulting in a more accurate and robust protection.  ...  Such intelligent objects are able to communicate autonomously through already existing network infrastructures, thus generating a more concrete integration between real world and computer-based systems  ...  Social Fund, by a Leonardo Grant 2017 for Researchers and Cultural Creators awarded by the BBVA Foundation, as well as by the Colombian School of Engineering Julio Garavito (Colombia) through the project  ... 
doi:10.3390/s19071492 fatcat:oiofzyi3zrclhkjimueqyf6k2i

Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms

Kamaldeep, Maitreyee Dutta, Jorge Granjal
2020 IEEE Access  
This paper presents a comprehensive study of existing second line of defense mechanisms for standardized protocols in IoT networks.  ...  The paper analyzes existing mechanisms in three aspects: Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) and Intrusion Response Systems (IRS).  ...  A NIDS for IoT monitors traffic within an IoT network, and acts as a robust line of defense against intrusion before it can access the resources of IoT devices.  ... 
doi:10.1109/access.2020.3005643 fatcat:wdh62xhb6vh7tpeap44mmftigi

Machine learning based solutions for security of Internet of Things (IoT): A survey

Syeda Manjia Tahsien, Hadis Karimipour, Petros Spachos
2020 Journal of Network and Computer Applications  
Thus, a strong-dynamically enhanced and up to date security system is required for next-generation IoT system.  ...  In order to detect attacks and identify abnormal behaviors of smart devices and networks, ML is being utilized as a powerful technology to fulfill this purpose.  ...  Therefore, PCA decreases the complexity of a system. This method can be used for selecting a feature to detect real-time intrusion attacks in an IoT system [125] .  ... 
doi:10.1016/j.jnca.2020.102630 fatcat:r6krcsvevrc67itbypxrgxryeq

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [article]

Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani
2018 arXiv   pre-print
The goal of this work is to provide a comprehensive survey of ML /DL methods that can be used to develop enhanced security methods for IoT systems.  ...  Implementing security measures, such as encryption, authentication, access control, network security and application security, for IoT devices and their inherent vulnerabilities is ineffective.  ...  [21] conducted a survey on intrusion detection for IoT systems.  ... 
arXiv:1807.11023v1 fatcat:a3onbmcf65acpkrtlywcv42tm4

IoT Nodes Authentication and ID Spoofing Detection Based on Joint Use of Physical Layer Security and Machine Learning

Dania Marabissi, Lorenzo Mucchi, Andrea Stomaci
2022 Future Internet  
Finally, in order to increase the spoofing detection performance in small networks, the use of low-complexity sentinel nodes is proposed here.  ...  In particular, a machine learning approach is used for authorized nodes classification by means of the identification of specific attributes of their wireless channel.  ...  The spoofing detection capability increases with the network dimension (i.e., the number of nodes), and this is important for future IoT systems where a massive machine access is foreseen.  ... 
doi:10.3390/fi14020061 fatcat:hebvom5x2rbu7dgigobptkwr2m

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin [article]

Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He
2022 arXiv   pre-print
, which include device identification, vulnerability discovery, intrusion detection systems (IDSs), honeypots, attribution, and threat intelligence (TI); iv) reviews the relevant content of DT, including  ...  Each single domain is a complicated system covering various components and technologies.  ...  Intrusion Detection Intrusion detection systems (IDSs) are applied to monitor network or computer system events, discover signs of security issues, and generate alarms when suspicious activities are detected  ... 
arXiv:2205.11783v1 fatcat:fz43u2e6g5gyfepqz44tezelba

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets [article]

Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez
2021 arXiv   pre-print
First, it performs a comprehensive review of the device types, behavioral data, and processing and evaluation techniques used by the most recent and representative research works dealing with two major  ...  potential misbehavior that may arise due to cyberattacks, system faults, or misconfigurations.  ...  ACKNOWLEDGMENT This work has been partially supported by the Swiss Federal Office for Defence Procurement (armasuisse) (project code Aramis R-3210/047-31), and the Irish Research Council, under the government  ... 
arXiv:2008.03343v2 fatcat:ujj7ka2txvfj7fbawyhloloac4

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
A survey on SDN based network intrusion detection system using machine learning approaches is presented in [309] .  ...  In IoT smart water system, the authors of [76] have proposed a procedure to develop a threat model ABA-IDS (Abnormal Behavior Analysis-Intrusion Detection System) for identifying attacks against four  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Risk Prediction of IoT Devices Based on Vulnerability Analysis

Pascal Oser, Rens W. van der Heijden, Stefan Lüders, Frank Kargl
2022 ACM Transactions on Privacy and Security  
To demonstrate this strength, we apply SAFER in the network of a large multinational organization, to systematically assess the security level of hundreds of IoT devices on large-scale networks.  ...  This article introduces SAFER, 1 the Security Assessment Framework for Embedded-device Risks, which enables a semi-automated risk assessment of IoT devices in any network.  ...  [38] implement dynamic protection measures on a network gateway managed by IoT Sentinel to let compromised IoT devices coexist in the same network with not-compromised devices.  ... 
doi:10.1145/3510360 fatcat:dcrua4jklfe2bhb6y7kwggttqy

Detecting Malware Infection on Infrastructure Hosted in Iaas Cloud using Cloud Visibility and Forensics

Lama Almadhoor, A. A. bd El-Aziz, Hedi Hamdi
2021 International Journal of Advanced Computer Science and Applications  
Keywords-Malware attacks; infrastructure as a service (IaaS); amazon web services (AWS); malware detection; cloud forensics; visibility (  ...  security for granted.  ...  Intrusion Detection Systems (IDS) can be used in a variety of ways over the IaaS cloud layer [22] , including: 4) Network-based Intrusion Detection Systems (NIDS): All network packets are collected  ... 
doi:10.14569/ijacsa.2021.01206106 fatcat:qax2cwnuzfckriaypux6rs6r2y

Towards Synoptic Water Monitoring Systems: A Review of AI Methods for Automating Water Body Detection and Water Quality Monitoring Using Remote Sensing

Liping Yang, Joshua Driscol, Sarigai Sarigai, Qiusheng Wu, Christopher D. Lippitt, Melinda Morgan
2022 Sensors  
Based on this review, the main challenges of leveraging AI and RS for intelligent water information extraction are discussed, and research priorities are identified.  ...  extraction and water quality detection and monitoring through remote sensing.  ...  Below, we outline a few ways to make AI systems more generalizable for water body detection and water quality monitoring tasks. (1) Create robust AI methods for tiny water body detection.  ... 
doi:10.3390/s22062416 pmid:35336587 pmcid:PMC8949619 fatcat:yik4lq6xq5afvbrsluso7zdroq

Deep learning in the fog

Andrzej Sobecki, Julian Szymański, David Gil, Higinio Mora
2019 International Journal of Distributed Sensor Networks  
It poses a challenge for creating a new generation of fog computing that supports artificial intelligence and selects the architecture appropriate for an intelligent solution.  ...  In this article, we show from four perspectives, namely, hardware, software libraries, platforms, and current applications, the landscape of components used for developing intelligent Internet of Things  ...  Funding The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work has been partially supported by funds from the Faculty  ... 
doi:10.1177/1550147719867072 fatcat:2b6j6gr32nf4lksf24n6z63qzu

Monitoring self-adaptive applications within edge computing frameworks: A state-of-the-art review

Salman Taherizadeh, Andrew C. Jones, Ian Taylor, Zhiming Zhao, Vlado Stankovski
2018 Journal of Systems and Software  
Requirement analysis is a key software engineering task in the whole lifecycle of applications; however, the requirements for monitoring systems within edge computing scenarios are not yet fully established  ...  of monitoring requirements for adaptive applications orchestrated upon edge computing frameworks; and to discuss and compare the use of widely-used cloud monitoring technologies to assure the performance  ...  , Time Critical and Highly self-adaptive cloud applications) and No. 644179 (ENTICE project: dEcentralised repositories for traNsparent and efficienT vIrtual maChine opErations).  ... 
doi:10.1016/j.jss.2017.10.033 fatcat:zogkd5d5yjakdapoykqqvlvoyq

D6.1 PIXEL Information System architecture and design v1

Carlos E. Palau, Benjamin Molina, Ignacio Lacalle, Miguel Angel Llorente, Jose Antonio Clemente, Flavio Fuart, Gasper Vrhovsek, Dejan Stepec, Vito Cucek, Marko Kuder, Marjan Sterk, Marc Despland (+5 others)
2021 Zenodo  
PIXEL Information Hub The main architectural approach for the PIXEL Information Hub is based on robust experience gained by XLAB during the design of a similar technical solution for the FAIR (Facility  ...  Communication and information gathering in such distributed systems of nodes can be a pain and can flood the internal network.  ...  While cybersecurity has become a prerequisite for the proper functioning of digital networks and services, IoT systems still present specific weaknesses today: 1.  ... 
doi:10.5281/zenodo.5552757 fatcat:mrtm57avcfcnfakvoeze7jmbku

BME VIK Annual Research Report on Electrical Engineering and Computer Science 2016

Hassan Charaf, Gábor Harsányi, András Poppe, Sándor Imre, Bálint Kiss, Tamás Dabóczi, Gyula Katona, Lajos Nagy, Gábor Magyar, István Kiss
2017 Periodica Polytechnica Electrical Engineering and Computer Science  
We are proud of combining engineering applications with sound scientific results, which is the assurance of high-level industrial collaboration leading to novel results and innovation.  ...  These factors have positioned our Faculty as a significant source of knowledge transfer and a treasured partner in various cooperation activities.The current paper gives a brief account of the results  ...  Inference from the low-level information is a challenge for the intelligent processing and inference system.  ... 
doi:10.3311/ppee.11067 fatcat:danqnppunnhq3mc2ns3qfhdwy4
« Previous Showing results 1 — 15 out of 23 results