A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

被引:69
作者
Oh, Doohwan [1 ]
Kim, Deokho [1 ]
Ro, Andwon Woo [1 ]
机构
[1] Yonsei Univ, Sch Elect & Elect Engn, Seoul 120749, South Korea
关键词
intrusion detection system; Internet of Things; pattern detection; Wu-Manber; MATCHING ALGORITHM; SEARCH;
D O I
10.3390/s141224188
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.
引用
收藏
页码:24188 / 24211
页数:24
相关论文
共 35 条
[1]   Data Management for the Internet of Things: Design Primitives and Solution [J].
Abu-Elkheir, Mervat ;
Hayajneh, Mohammad ;
Abu Ali, Najah .
SENSORS, 2013, 13 (11) :15582-15612
[2]   EFFICIENT STRING MATCHING - AID TO BIBLIOGRAPHIC SEARCH [J].
AHO, AV ;
CORASICK, MJ .
COMMUNICATIONS OF THE ACM, 1975, 18 (06) :333-340
[3]  
[Anonymous], INTERNET THINGS NEXT
[4]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[5]  
Baojun Zhang, 2009, Proceedings of the 2009 Second International Workshop on Computer Science and Engineering (WCSE 2009), P408, DOI 10.1109/WCSE.2009.698
[6]   FAST STRING SEARCHING ALGORITHM [J].
BOYER, RS ;
MOORE, JS .
COMMUNICATIONS OF THE ACM, 1977, 20 (10) :762-772
[7]  
Cantone D, 2003, LECT NOTES COMPUT SC, V2647, P47
[8]  
Charras C., 2004, Handbook of Exact String Matching Algorithms
[9]   Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview [J].
Cirani, Simone ;
Ferrari, Gianluigi ;
Veltri, Luca .
ALGORITHMS, 2013, 6 (02) :197-226
[10]  
Commentz-Walter B., 1979, Automata, Languages and Programming, P118