Next Article in Journal
Effects of Reduced Terrestrial LiDAR Point Density on High-Resolution Grain Crop Surface Models in Precision Agriculture
Next Article in Special Issue
Analysis of Latency Performance of Bluetooth Low Energy (BLE) Networks
Previous Article in Journal
Assessment of a Newly Developed, Active Pneumatic-Driven, Sensorimotor Test and Training Device
Previous Article in Special Issue
Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks
Article Menu

Export Article

Open AccessArticle
Sensors 2014, 14(12), 24188-24211; doi:10.3390/s141224188

A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

School of Electrical and Electronic Engineering, Yonsei University, 50 Yonsei-ro, Seodaemun-gu, Seoul 120-749, Korea
*
Author to whom correspondence should be addressed.
Received: 21 September 2014 / Revised: 23 November 2014 / Accepted: 4 December 2014 / Published: 16 December 2014
(This article belongs to the Special Issue Wireless Sensor Networks and the Internet of Things)
View Full-Text   |   Download PDF [1268 KB, uploaded 16 December 2014]   |  

Abstract

With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. View Full-Text
Keywords: intrusion detection system; Internet of Things, pattern detection; Wu–Manber intrusion detection system; Internet of Things, pattern detection; Wu–Manber
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Oh, D.; Kim, D.; Ro, W.W. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things. Sensors 2014, 14, 24188-24211.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top