IoTURVA: Securing Device-to-Device Communications for IoT

被引:0
作者
Hafeez, Ibbad [1 ]
Ding, Aaron Yi [2 ]
Antikainen, Markku [1 ,3 ]
Tarkoma, Sasu [1 ,3 ]
机构
[1] Univ Helsinki, Helsinki, Finland
[2] Tech Univ Munich, Munich, Germany
[3] Aalto Univ, Helsinki, Finland
来源
PROCEEDINGS OF THE 23RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM '17) | 2017年
关键词
IoT; Access control; Security; Network;
D O I
10.1145/3117811.3131262
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this poster we present IoTuRvA, a platform for securing Deviceto-Device (D2D) communication in IoT. Our solution takes a black box approach to secure IoT edge-networks. We combine user and device-centric context-information together with network data to classify network communication as normal or malicious. We have designed a dual-layer traffic classification scheme based on fuzzy logic, where the classification model is trained remotely. The remotely trained model is then used by the edge gateway to classify the network traffic. We have implemented a proof-of-concept prototype and evaluate its performance in a real world environment. The evaluation shows that IoTuRvA causes very small overhead while it works with minimal hardware, and that our model training and classification approach can improve system efficiency and privacy.
引用
收藏
页码:552 / 554
页数:3
相关论文
共 8 条
[1]  
[Anonymous], 2017, Common Vulnerabilities and Exposures (CVE)
[2]  
[Anonymous], 2017, COMMON WEAKNESS ENUM
[3]   openPDS: Protecting the Privacy of Metadata through SafeAnswers [J].
de Montjoye, Yves-Alexandre ;
Shmueli, Erez ;
Wang, Samuel S. ;
Pentland, Alex Sandy .
PLOS ONE, 2014, 9 (07)
[4]  
Hafeez Ibbad., 2016, P 2016 ACM WORKSHOP, P55
[5]   Preserving worker privacy in crowdsourcing [J].
Kajino, Hiroshi ;
Arai, Hiromi ;
Kashima, Hisashi .
DATA MINING AND KNOWLEDGE DISCOVERY, 2014, 28 (5-6) :1314-1335
[6]  
Miettinen M., 2016, ABS161104880 CORR
[7]   Cyberentity Security in the Internet of Things [J].
Ning, Huansheng ;
Liu, Hong ;
Yang, Laurence T. .
COMPUTER, 2013, 46 (04) :46-53
[8]  
Woolf Nicky, 2017, DDOS ATTACK DISRUPTE