BEAST: Behavior as a Service for Trust management in IoT devices

被引:4
作者
Huber, Brennan [1 ]
Kandah, Farah [1 ]
Skjellum, Anthony [2 ]
机构
[1] Auburn Univ, Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Univ Tennessee, SimCtr, Chattanooga, TN 37403 USA
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2023年 / 144卷
基金
美国国家科学基金会;
关键词
Internet of Things; Trust management; Security; Deep learning; Behavioral analysis; Smart city; INTERNET; SECURITY; REPUTATION; PROTOCOL; MODEL;
D O I
10.1016/j.future.2023.02.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the internet becomes intertwined into every aspect of human life, the security of the Internet of Things (IoT) is also becoming increasingly critical. IoT devices are becoming the primary data source for a variety of smart-city applications, where critical decisions are based on this collected data. If malicious actors gain control of and/or tamper with the data being transmitted, the integrity of an entire smart city will be compromised. However, through monitoring IoT devices' behavior, anomalies can be detected and isolated to avoid any negative impact on decision-making. This behavioral monitoring process will complement traditional trust management approaches, since more accurate trust values can be calculated without the need to rely on a majority consensus. In this work, we present a BEhavior-As-a-Service for Trust management (BEAST) that implements a deep learning -based behavioral model to accurately classify IoT devices' interactions in the system. Through the implementation of the Elo rating system, these classifications will be presented as a vector of behaviors per device, which dynamically reflects each device's trust in the system. This work presents an analysis of our methodology as well as a threat model. Using simulations, a real-world use case is presented showing the interactions between IoT-based devices. Our results show that our BEAST model is able to dynamically evaluate each IoT device's trust, as well as capture and mitigate multiple threats targeting the trust in the system.(c) 2023 Elsevier B.V. All rights reserved.
引用
收藏
页码:165 / 178
页数:14
相关论文
共 73 条
[1]   Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web [J].
Aas, Josh ;
Barnes, Richard ;
Case, Benton ;
Durumeric, Zakir ;
Eckersley, Peter ;
Flores-Lopez, Alan ;
Halderman, J. Alex ;
Hoffman-Andrews, Jacob ;
Kasten, James ;
Rescorla, Eric ;
Schoen, Seth ;
Warren, Brad .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :2473-2487
[2]  
Agarap AF, 2019, arXiv
[3]   A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT) [J].
Alshehri, Mohammad Dahman ;
Hussain, Farookh Khadeer .
COMPUTING, 2019, 101 (07) :791-818
[4]   Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT) [J].
Alshehri, Mohammad Dahman ;
Hussain, Farookh Khadeer ;
Hussain, Omar Khadeer .
MOBILE NETWORKS & APPLICATIONS, 2018, 23 (03) :419-431
[5]  
Autonomous Vehicles, 2017, SELF DRIVING VEHICLE
[6]  
Ayad A, 2018, INNOV SMART GRID TEC
[7]   Decentralized trust management [J].
Blaze, M ;
Feigenbaum, J ;
Lacy, J .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :164-173
[8]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[9]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[10]   TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things [J].
Chen, Dong ;
Chang, Guiran ;
Sun, Dawei ;
Li, Jiajia ;
Jia, Jie ;
Wang, Xingwei .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04) :1207-1228