A security monitoring system for internet of things

被引:21
作者
Casola, Valentina [1 ]
De Benedictis, Alessandra [1 ]
Riccio, Antonio [1 ]
Rivera, Diego [2 ]
Mallouli, Wissam [2 ]
de Oca, Edgardo Montes [2 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, Naples, Italy
[2] Montimage R&D, Paris, France
关键词
IoT monitoring; IoT security; IoT threats;
D O I
10.1016/j.iot.2019.100080
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wide adoption of the Internet of Things (IoT) paradigm in several application domains has raised new security issues, which should be carefully taken into account to achieve a real benefit from the indisputable innovation potential of IoT. In fact, the heterogeneity of involved technologies, including the integration of different resource-constrained devices and networks, has led to the introduction of new threats affecting all architectural layers and urging for the design and enforcement of adequate security countermeasures, including effective monitoring capabilities. In this paper, we present a monitoring tool for IoT systems based on the extension of the Montimage network monitoring tools. The proposed solution, validated within the H2020 ANASTACIA project, proved to be well suited to monitor IoT-level networks thanks to the exploitation of protocol-specific plugins. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:20
相关论文
共 30 条
[11]  
Lee T.H., 2014, Advanced Technologies, Embedded and Multimedia for Human-Centric Computing: HumanCom and EMC 2013, P1205
[12]   (Smart)Watch Your Taps: Side-Channel Keystroke Inference Attacks using Smartwatches [J].
Maiti, Anindya ;
Jadliwala, Murtuza ;
He, Jibo ;
Bilogrevic, Igor .
ISWC 2015: PROCEEDINGS OF THE 2015 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS, 2015, :27-30
[13]  
Nahapetian Ani, 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), P243, DOI 10.1109/CCNC.2016.7444763
[14]  
Olsson J., 2014, Texas Instruments, P13
[15]  
Ortiz A., MS12A MONITORING COM
[16]  
Petracca G, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P379
[17]  
Pharate A., 2015, Int. J. Comput. Appl, V118, P23, DOI DOI 10.5120/20758-3163
[18]  
Pongle P., 2015, International Journal of Computer Applications, V121, P1, DOI DOI 10.5120/21565-4589
[19]   SVELTE: Real-time intrusion detection in the Internet of Things [J].
Raza, Shahid ;
Wallgren, Linus ;
Voigt, Thiemo .
AD HOC NETWORKS, 2013, 11 (08) :2661-2674
[20]  
Rios Erkuden, 2015, Proceedings of the 5th International Conference on Cloud Computing and Services Science (CLOSER 2015), P551