3.8 Proceedings Paper

IoT Security Framework for Smart Cyber Infrastructures

出版社

IEEE
DOI: 10.1109/FAS-W.2016.58

关键词

internet of things; threat model; attack vector; cyber security; smart infrastructures; fog computing

资金

  1. Air Force Office of Scientific Research (AFOSR) Dynamic Data-Driven Application Systems (DDDAS) [FA95550-12-1-0241]
  2. National Science Foundation [NSF IIP-0758579, SES-1314631, DUE-1303362]
  3. Thomson Reuters in the framework of the Partner University Fund (PUF) project (PUF is a program of the French Embassy in the United States)
  4. French government
  5. National Instruments though NI Research Academic Grant
  6. Thomson Reuters in the framework of the Partner University Fund (PUF) project (FACE Foundation)

向作者/读者索取更多资源

The Internet of Things (IoT) will connect not only computers and mobile devices, but it will also interconnect smart buildings, homes, and cities, as well as electrical grids, gas, and water networks, automobiles, airplanes, etc. IoT will lead to the development of a wide range of advanced information services that need to be processed in real-time and require data centers with large storage and computing power. The integration of IoT with Cloud and Fog Computing can bring not only the required computational power and storage capacity, but they enable IoT services to be pervasive, cost-effective, and can be accessed from anywhere using any device (mobile or stationary). However, IoT infrastructures and services will introduce grand security challenges due to the significant increase in the attack surface, complexity, heterogeneity and number of resources. In this paper, we present an IoT security framework for smart infrastructures such as Smart Homes (SH) and smart buildings (SB). We also present a general threat model that can be used to develop a security protection methodology for IoT services against cyber-attacks (known or unknown). Additionally, we show that Anomaly Behavior Analysis (ABA) Intrusion Detection System (ABA-IDS) can detect and classify a wide range of attacks against IoT sensors.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据