CAAVI-RICS model for observing the security of distributed IoT and edge computing systems

Simulation Modelling Practice and Theory - Tập 105 - Trang 102125 - 2020
Saša Pešić1, Mirjana Ivanović1, Miloš Radovanović1, Costin Bădică2
1University of Novi Sad, Faculty of Sciences, Trg Dositeja Obradovića 4, Novi Sad, Serbia
2University of Craiova, Craiova, Romania

Tài liệu tham khảo

Aircrack-NG, Openwips-ng, 2018, (https://www.github.com/aircrack-ng/OpenWIPS-ng). Aman, 2018, Low power data integrity in IoT systems, IEEE Internet Things J., 5, 3102, 10.1109/JIOT.2018.2833206 Andersen, 2017 Babar, 2010, Proposed security model and threat taxonomy for the Internet of Things (IoT), 420 Barik, 2016, Foggis: fog computing for geospatial big data analytics, 613 Burks, 2012 Carter, 2006 Chiang, 2016, Fog and IoT: an overview of research opportunities, IEEE Internet Things J., 3, 854, 10.1109/JIOT.2016.2584538 Cirani, 2013, Enforcing security mechanisms in the ip-based internet of things: an algorithmic overview, Algorithms, 6, 197, 10.3390/a6020197 Dorri, 2017, Blockchain for IoT security and privacy: the case study of a smart home, 618 Dsouza, 2014, Policy-driven security management for fog computing: Preliminary framework and a case study, 16 Fernandes, 2016, Flowfence: Practical data protection for emerging iot application frameworks, 531 Ganeriwal, 2008, Reputation-based framework for high integrity sensor networks, ACM Trans. Sensor Netw., 4, 1, 10.1145/1362542.1362546 Güneysu, 2017, Towards lightweight identity-based encryption for the post-quantum-secure Internet of Things, 319 Guo, 2017, A survey of trust computation models for service management in internet of things systems, Comput. Commun., 97, 1, 10.1016/j.comcom.2016.10.012 He, 2014, An enhanced public key infrastructure to secure smart grid wireless communication networks, IEEE Netw., 28, 10, 10.1109/MNET.2014.6724101 Hodo, 2016, Threat analysis of IoT networks using artificial neural network intrusion detection system, 1 Huang, 2017, Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things, IEEE Access, 5, 12941, 10.1109/ACCESS.2017.2727054 Huang, 2010, A generic framework for three-factor authentication: preserving security and privacy in distributed systems, IEEE Trans. Parallel Distrib. Syst., 22, 1390, 10.1109/TPDS.2010.206 Hummen, 2014, Delegation-based authentication and authorization for the ip-based Internet of Things, 284 Ibrahim, 2016, Octopus: an edge-fog mutual authentication scheme., IJ Netw. Secur., 18, 1089 Index, 2018, 1 Joye, 2009, volume 2 Khan, 2017, Fog computing security: a review of current applications and security solutions, J. Cloud Comput., 6, 19, 10.1186/s13677-017-0090-3 Kim, 2017, A toolkit for construction of authorization service infrastructure for the internet of things, 147 Kumar, 2016, Fog computing: Common security issues and proposed countermeasures, 311 Lalitha, 2018, Recover the missing data in IoT by edge analytics, I-Manager’s J. Softw. Eng., 13, 25, 10.26634/jse.13.2.14342 Law, 2013, Wake: key management scheme for wide-area measurement systems in smart grid, IEEE Commun. Mag., 51, 34, 10.1109/MCOM.2013.6400436 Lei, 2017, Blockchain-based dynamic key management for heterogeneous intelligent transportation systems, IEEE Internet Things J., 4, 1832, 10.1109/JIOT.2017.2740569 Li, 2017, Lightweight mutual authentication for IoT and its applications, IEEE Trans. Sustain. Comput., 2, 359, 10.1109/TSUSC.2017.2716953 Li, 2017, An IoT data communication framework for authenticity and integrity, 159 Liu, 2017, Blockchain based data integrity service framework for IoT data, 468 Liu, 2014, Maca: A privacy-preserving multi-factor cloud authentication system utilizing big data, 518 Mahmoud, 2015, Internet of things (IoT) security: Current status, challenges and prospective measures, 336 A. Manzoor, A. Wahid, M.A. Shah, A. Akhunzada, F.F. Qureshi, Secure login using multi-tier authentication schemes in fog computing (2018). Marforio, 2014, Smartphones as practical and secure location verification tokens for payments., vol.14, 23 Matsemela, 2017, Internet of things data integrity, 1 Misra, 2009, Laid: a learning automata-based scheme for intrusion detection in wireless sensor networks, Secur. Commun. Netw., 2, 105, 10.1002/sec.74 Misra, 2016, Design and implementation analysis of a public key infrastructure-enabled security framework for zigbee sensor networks, Int. J. Commun. Syst., 29, 1992, 10.1002/dac.2893 Moore, 2008, Fast exclusion of errant devices from vehicular networks, 135 Moradi, 2011, Pushing the limits: A very compact and a threshold implementation of aes, 69 Nitti, 2012, A subjective model for trustworthiness evaluation in the social internet of things, 18 Noroozi, 2018, Vpkiaas: A highly-available and dynamically-scalable vehicular public-key infrastructure, 302 Noura, 2018, One round cipher algorithm for multimedia IoT devices, Multimed. Tools Appl., 77, 18383, 10.1007/s11042-018-5660-y Osvik, 2010, Fast software aes encryption, 75 Pešić, 2019, CAAVI-RICS model for analyzing the security of fog computing systems Pešić, 2019, Caavi-rics model for analyzing the security of fog computing systems, 23 Pesic, 2019, Caavi-rics model for analyzing the security of fog computing systems: Authentication, 226 Razouk, 2017, A new security middleware architecture based on fog computing and cloud to support IoT constrained devices, 35 Rijswijk-Deij, 2013, Using trusted execution environments in two-factor authentication: comparing approaches Roesch, 1999, Snort: Lightweight intrusion detection for networks., vol. 99, 229 Rosenfeld, 2010, Sensor physical unclonable functions, 112 Roux, 2017, Toward an intrusion detection approach for IoT based on radio communications profiling, 147 Salonikias, 2015, Access control issues in utilizing fog computing for transport infrastructure, 15 Samarati, 2000, Access control: Policies, models, and mechanisms, 137 Sedjelmaci, 2013, Efficient and lightweight intrusion detection based on nodes’ behaviors in wireless sensor networks, 1 Sedjelmaci, 2016, A lightweight anomaly detection technique for low-resource IoT devices: a game-theoretic methodology, 1 Seitz, 2015, Authorization for the internet of things using oauth 2.0 Seitz, 2017 Shahzad, 2017, Continuous authentication and authorization for the internet of things, IEEE Internet Comput., 21, 86, 10.1109/MIC.2017.33 Shivraj, 2015, One time password authentication scheme based on elliptic curves for Internet of Things (IoT), 1 Singh, 2017, Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions, J. Ambient Intell. Hum. Comput., 1 Srivatsa, 2011, Eventguard: a system architecture for securing publish-subscribe networks, ACM Trans. Comput. Syst., 29, 1, 10.1145/2063509.2063510 Stojmenovic, 2014, The fog computing paradigm: scenarios and security issues, 1 Stojmenovic, 2016, An overview of fog computing and its security issues, Concurr. Comput., 28, 2991, 10.1002/cpe.3485 Suciu, 2015, Big data, internet of things and cloud convergence–an architecture for secure e-health applications, J. Med. Syst., 39, 141, 10.1007/s10916-015-0327-y Tian, 2017, Smartauth: user-centered authorization for the internet of things, 361 Trnka, 2018, Authentication and authorization rules sharing for internet of things, Softw. Netw., 2018, 35 Tsai, 2009, Intrusion detection by machine learning: a review, Expert Syst. Appl., 36, 11994, 10.1016/j.eswa.2009.05.029 Tsai, 2013, Data mining for internet of things: a survey, IEEE Commun. Surv. Tut., 16, 77, 10.1109/SURV.2013.103013.00206 Turkanović, 2014, A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion, Ad Hoc Netw., 20, 96, 10.1016/j.adhoc.2014.03.009 Usman, 2017, Sit: a lightweight encryption algorithm for secure internet of things, arXiv preprint arXiv:1704.08688 Valenta, 2017 Wang, 2018, Fear and logging in the Internet of Things Wang, 2016, Reusing hardware performance counters to detect and identify kernel control-flow modifying rootkits, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 35, 485, 10.1109/TCAD.2015.2474374 Wang, 2015, Confirm: Detecting firmware modifications in embedded systems using hardware performance counters, 544 Wong, 2017, Enhancing suricata intrusion detection system for cyber security in scada networks, 1 Wu, 2017, An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment, J. Netw. Comput. Appl., 89, 72, 10.1016/j.jnca.2016.12.008 Xiao, 2017, A hybrid scheme for fine-grained search and access authorization in fog computing environment, Sensors, 17, 1423, 10.3390/s17061423 Ye, 2014, An efficient authentication and access control scheme for perception layer of internet of things, Appl., Math. Inf. Sci., 8, 1617, 10.12785/amis/080416 Yi, 2015, Security and privacy issues of fog computing: A survey, 685