Data-Driven Scalable Mechanisms and Architectures for Secure IoT Connectivity

被引:0
作者
Mandapati, Sai Gautam [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Australia
来源
2024 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS, PERCOM WORKSHOPS | 2024年
关键词
Named Data Networking; IoT Security; Machine Learning; Cache Management; Rate-Limiting;
D O I
10.1109/PerComWorkshops59983.2024.10502462
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The widespread adoption of Internet of Things (IoT) changed the way we live and work. It also introduces new challenges and risks that can impact individuals, organizations, and society at large. This paper introduces a novel approach to secure IoT connectivity using Named Data Networking (NDN), a paradigm well-suited for IoT due to its in-network caching and inherent security features. Recognizing the vulnerabilities of NDN to specific security threats such as Side-channel Timing Attacks (SCTA), Cache Pollution Attacks (CPA), and Interest Flooding attacks (IFA), we have embarked on a journey to enhance its security framework. Our approach encompasses the development of a comprehensive dataset for these attacks, the application of machine learning for accurate anomaly detection and classification, the introduction of a rate-limiting mechanism using Hidden Markov Models (HMMs) to combat IFAs, and the ongoing work on a cache replacement policy to effectively counter cache-based attacks.
引用
收藏
页码:253 / 254
页数:2
相关论文
共 7 条
[1]  
Afanasyev A., 2013, Imaging structural co-variance between human brain regions, P1
[2]   Landscape of IoT security [J].
Aidoo, Andy ;
Schiller, Eryk ;
Fuhrer, Jara ;
Stahl, Jonathan ;
Ziorjen, Michael ;
Stiller, Burkhard .
COMPUTER SCIENCE REVIEW, 2022, 44
[3]   Identifying Previously Requested Content by Side-Channel Timing Attack in NDN [J].
Dogruluk, Ertugrul ;
Costa, Antonio ;
Macedo, Joaquim .
FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2018, 2018, 878 :33-46
[4]   Recent Development of Emerging Indoor Wireless Networks towards 6G [J].
Edirisinghe, Sampath ;
Galagedarage, Orga ;
Dias, Imali ;
Ranaweera, Chathurika .
NETWORK, 2023, 3 (02) :269-297
[5]   A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture [J].
Hidouri, Abdelhak ;
Touati, Haifa ;
Hadded, Mohamed ;
Hajlaoui, Nasreddine ;
Muhlethaler, Paul .
ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 1, 2022, 449 :435-446
[6]  
Mastorakis S, 2017, ACM SIGCOMM COMP COM, V47
[7]  
Signorello S, 2017, 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), P1