Browse > Article
http://dx.doi.org/10.7472/jksii.2022.23.4.95

Development of Internet of Things Sensor-based Information System Robust to Security Attack  

Yun, Junhyeok (School of Computer Engineering & Applied Mathematics, Computer System Institute, Hankyong National University)
Kim, Mihui (School of Computer Engineering & Applied Mathematics, Computer System Institute, Hankyong National University)
Publication Information
Journal of Internet Computing and Services / v.23, no.4, 2022 , pp. 95-107 More about this Journal
Abstract
With the rapid development of Internet of Things sensor devices and big data processing techniques, Internet of Things sensor-based information systems have been applied in various industries. Depending on the industry in which the information systems are applied, the accuracy of the information derived can affect the industry's efficiency and safety. Therefore, security techniques that protect sensing data from security attacks and enable information systems to derive accurate information are essential. In this paper, we examine security threats targeting each processing step of an Internet of Things sensor-based information system and propose security mechanisms for each security threat. Furthermore, we present an Internet of Things sensor-based information system structure that is robust to security attacks by integrating the proposed security mechanisms. In the proposed system, by applying lightweight security techniques such as a lightweight encryption algorithm and obfuscation-based data validation, security can be secured with minimal processing delay even in low-power and low-performance IoT sensor devices. Finally, we demonstrate the feasibility of the proposed system by implementing and performance evaluating each security mechanism.
Keywords
Internet of Things; Information System; Network Security; Big-data;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Sultana, S. F. and Shubhangi, D. C. "Video encryption algorithm and key management using perfect shuffle", International Journal of Engineering Research and Applications, Vol.7, No.2, pp.1-5, 2017. http://dx.doi.org/10.9790/9622-0707030105   DOI
2 Ma, Y., Li, C. and Ou, B. "Cryptanalysis of an image block encryption algorithm based on chaotic maps", Journal of Information Security and Applications, Vol.54, pp.102566, 2020. https://doi.org/10.1016/j.jisa.2020.102566   DOI
3 Chatterjee, S., Kar, A. K. and Mustafa, S. Z. "Securing IoT devices in smart cities of India: from ethical and enterprise information system management perspective", Enterprise Information Systems, Vol.15, No.4, pp.585-615, 2021. https://doi.org/10.1080/17517575.2019.1654617   DOI
4 Kuemper, D., Iggena, T., Toenjes, R. and Pulvermueller, E. "Valid. IoT: a framework for sensor data quality analysis and interpolation", In Proceedings of the 9th ACM Multimedia Systems Conference, 2018, pp.294-303. https://doi.org/10.1145/3204949.3204972   DOI
5 Yoon, C., Huh, M., Kang, S. G., Park, J. and Lee, C. "Implement smart farm with IoT technology", In 2018 20th International Conference on Advanced Communication Technology (ICACT), pp.749-752, 2018. https://doi.org/10.23919/ICACT.2018.8323908   DOI
6 Sung-sik Mun, Mi-hui Kim, "Dos Attack Defense Using SDN and Honeypot", In Proceedings of Korea Information Processing Society Conference, pp.397-400. 2020. https://doi.org/10.3745/PKIPS.y2020m11a.397   DOI
7 Grosse, K., Manoharan, P., Papernot, N., Backes, M. and McDaniel, P., "On the (statistical) detection of adversarial examples", arXiv preprint, arXiv: 1702.06280, 2017. https://doi.org/10.48550/arXiv.1702.06280   DOI
8 Joon-hyuk Yoon, Mi-hui Kim, "Smart parking system using mobile crowdsensing: focus on removing privacy information", In Proceedings of the Korea Information Processing Society Conference, pp.32-35, 2018. https://doi.org/10.3745/PKIPS.y2018m05a.32   DOI
9 Kim, B., Abuadbba, A., Gao, Y., Zheng, Y., Ahmed, M. E., Kim, H. and Nepal, S. "Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks", arXiv preprint, arXiv:2010.03735, 2020. https://doi.org/10.48550/arXiv.2010.03735   DOI
10 Quiring, E., Klein, D., Arp, D., Johns, M. and Rieck, K. "Adversarial preprocessing: Understanding and preventing image-scaling attacks in machine learning", In 29th {USENIX} Security Symposium ({USENIX} Security 20), pp.1363-1380, 2020. https://www.usenix.org/conference/usenixsecurity20/pr esentation/quiring
11 Giuste, F. O. and Vizcarra, J. C., "CIFAR-10 Image Classification Using Feature Ensembles", arXiv preprint, arXiv:2002.03846, 2020. https://doi.org/10.48550/arXiv.2002.03846   DOI
12 Liu, H. and Wang, X. "Image encryption using DNA complementary rule and chaotic maps", Applied Soft Computing, Vol.12, No.5, pp.1457-1466, 2012. https://doi.org/10.1016/j.asoc.2012.01.016   DOI
13 Guo, Y. and Qu, J. "Study on intelligent logistics management information system based on IOT and cloud computation in big data era", The Open Cybernetics & Systemics Journal, Vol.9, No.1, 2015. http://dx.doi.org/10.2174/1874110X01509010934   DOI
14 Abbasi, A., Sarker, S. and Chiang, R. H., "Big data research in information systems: Toward an inclusive research agenda", Journal of the association for information systems, Vol.17, No.2, pp.3, 2016. http://dx.doi.org/10.17705/1jais.00423   DOI
15 Moo-kyung Jung, Chang-yong Choi, Ho-cheol Lee and Dong-myung Lee, "A Design of Platform of Portable Cultural Asset Surveilance System", In Proceedings of Korea Institute of Information and Communication Engineering Conference, pp.599-600, 2013. https://koreascience.kr/article/CFKO201331751950292.page
16 Dziak, D., Jachimczyk, B. and Kulesza, W. J. "IoT-based information system for healthcare application: design methodology approach", Applied Sciences, Vol.7, No.6, pp.596, 2017. https://doi.org/10.3390/app7060596   DOI
17 Apache, "Apache Hadoop", https://hadoop.apache.org
18 Tharayil, K. S., Farshteindiker, B., Eyal, S., Hasidim, N., Hershkovitz, R., Houri, S. and Oren, Y. "Sensor defense in-software (SDI): Practical software based detection of spoofing attacks on position sensors", Engineering Applications of Artificial Intelligence, Vol.95, pp.103904, 2020. https://doi.org/10.1016/j.engappai.2020.103904   DOI
19 Xiao, Q., Chen, Y., Shen, C., Chen, Y. and Li, K. "Seeing is not believing: Camouflage attacks on image scaling algorithms", In 28th {USENIX} Security Symposium ({USENIX} Security 19), pp.443-460, 2019. https://www.usenix.org/conference/usenixsecurity19/presentation/xiao
20 Dean, J. and Ghemawat, S. "MapReduce: simplified data processing on large clusters", Communications of the ACM, Vol.51, No.1, pp.107-113, 2008. https://doi.org/10.1145/1327452.1327492   DOI
21 Sharma, P. S., Roy, P. K., Ahmad, N., Ahuja, J. and Kumar, N., "Localisation of License Plate and Character Recognition Using Haar Cascade", In 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), pp.971-974, 2019. https://ieeexplore.ieee.org/abstract/document/8991267
22 Chakraborty, A., Alam, M., Dey, V., Chattopadhyay, A. and Mukhopadhyay, D. "Adversarial attacks and defences: A survey", arXiv preprint, arXiv:1810.00069, 2018. https://doi.org/10.48550/arXiv.1810.00069   DOI
23 Apache, "Apache Spark", https://spark.apache.org
24 Tcheumadjeu, L. C. T., Luber, A., Brockfeld, E., Gurczik, G., Sohr, A. and Sauerlander, A. "Integration of mobile wireless RF sensors into a traffic information system", Transportation research procedia, Vol.25, pp.1865-1883, 2017. https://doi.org/10.1016/j.trpro.2017.05.168   DOI
25 Qureshi, A. U. H., Larijani, H., Yousefi, M., Adeel, A. and Mtetwa, N. "An adversarial approach for intrusion detection systems using Jacobian Saliency Map Attacks (JSMA)", Algorithm. Computers, Vol.9, No.3, p. 58, 2020. https://doi.org/10.3390/computers9030058   DOI
26 Kapalova, N., Khompysh, A., Arici, M. and Algazy, K. "A block encryption algorithm based on exponentiation transform", Cogent Engineering, Vol.7 No.1, pp.1788292, 2020. https://doi.org/10.1080/23311916.2020.1788292   DOI
27 Boukerche, A., Zheng, L. and Alfandi, O. "Outlier detection: Methods, models, and classification", ACM Computing Surveys (CSUR), Vol.53, No.3, pp.1-37, 2020. https://doi.org/10.1145/3381028   DOI
28 Angelin, B. and Geethe, A., "Outlier Detection using Clustering Techniques-K-means and K-median", In 2020 4th International Conference on Intelligent Computing and Control Systems, pp.373-378, 2020. https://doi.org/10.1109/ICICCS48265.2020.9120990   DOI
29 Anaya, E., Patel, J., Shah, P., Shah, V. and Cheng, Y. "A Performance Study on Cryptographic Algorithms for IoT Devices", In Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, pp.159-161. 2020. https://doi.org/10.1145/3374664.3379531   DOI
30 Mo, Y. and Sinopoli, B. "False data injection attacks in control systems", In Preprints of the 1st workshop on Secure Control Systems, pp.1-6, 2010. https://ptolemy.berkeley.edu/projects/truststc/conferenc es/10/CPSWeek/papers/scs1_paper_7.pdf