Security and Reliability of IoT---Selected Papers from SecRIoT 2019

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: closed (30 December 2019) | Viewed by 30845

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science and Biomedical Informatics, University of Thessaly, 35131 Lamia, Greece
Interests: computer and embedded systems architecture; VLSI circuits & systems design; low-power design and/or design-for-test; design of hardware accelerators for a variety of applications (e.g. image processing, cryptography, medical devices etc.)
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science and Telecommunications, University of Thessaly, GR-41110 Larissa, Greece
Interests: information systems security; computer virology; computer epidemiology; peer-to-peer networks; open source software
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor

E-Mail Website
Guest Editor
Research Programs Section, Hellenic Telecommunications Organisation, GR-15124 Athens, Greece
Interests: innovation; network technology; network management; e-Infrastructures and e-Services

Special Issue Information

Dear Colleagues,

This issue is dedicated to the 1st International Workshop on Security and Reliability of IoT Systems (SecRIoT 2019), devoted to topics related to recent trends and progress made in the field of the secure design, deployment, and operation of current and future IoT systems. SecRIoT 2019 will take place on the beautiful island of Santorini, Greece, 29–31 May 2019, collocated with the 15th Annual International Conference on Distributed Computing in Sensor Systems (DCOSS 2019).

In the coming years, more than 20 billion devices will be interconnected. The Internet of Things provides unparalleled opportunities for the development of novel services. Currently, most of the new electronic devices are offering basic-to-advanced networking capabilities in the context of smart environments. Newer vehicles are partially or completely autonomous, powered by modern microprocessors, hundreds of sensors, and Internet-enabled services. The same applies to robotic and medical devices and almost every other advanced equipment. Despite the longstanding efforts of the scientific community to secure Internet and network communications, operating systems and software applications, only a limited amount of this knowledge has been applied to IoT ecosystems. Most of the IoT devices, including modern vehicles, suffer from numerous and multilayered vulnerabilities. Aiming to reduce the cost and minimize the time to market of their products, minimal or no effort is put towards securing and supporting them sufficiently. Worse, there are recorded cases of IoT devices delivered with preinstalled malware, demonstrating a total lack of operations security in the supply chain. In contrast with software applications in PCs and mobile devices, the owners are not likely to replace their devices because of security problems. As a consequence, these systems remain vulnerable for extended periods. Recent very large-scale DDoS attacks based and executed entirely by IoT botnets signify the magnitude of the problem. This is an open call for contributions to both SecRIoT 2019 and this issue.

Topics of interest include, but are not limited to:

  • IoT security and privacy;
  • IoT intrusion detection and prevention systems;
  • Cyber physical security and IoT;
  • Secure design methodologies for IoT Systems;
  • Secure hardware and software codesign;
  • Development of secure embedded systems;
  • Secure embedded operation systems;
  • IoT malware;
  • Autonomous vehicles cybersecurity;
  • Secure network protocols for IoT systems;
  • IoT and blockchain;
  • Secure manufacturing process of IoT devices;
  • Privacy protection in IoT environments;
  • Security and privacy of medical devices;
  • IoT trust and reliability;
  • Reliable robotic devices.

Dr. Athanasios Kakarountas
Dr. Vasileios Vlachos
Dr. Periklis Chatzimisios
Dr. Ioannis Chochliouros
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

12 pages, 819 KiB  
Article
Smart Devices Security Enhancement via Power Supply Monitoring
by Dimitrios Myridakis, Georgios Spathoulas, Athanasios Kakarountas and Dimitrios Schinianakis
Future Internet 2020, 12(3), 48; https://doi.org/10.3390/fi12030048 - 10 Mar 2020
Cited by 7 | Viewed by 4069
Abstract
The continuous growth of the number of Internet of Things (IoT) devices and their inclusion to public and private infrastructures has introduced new applciations to the market and our day-to-day life. At the same time, these devices create a potential threat to personal [...] Read more.
The continuous growth of the number of Internet of Things (IoT) devices and their inclusion to public and private infrastructures has introduced new applciations to the market and our day-to-day life. At the same time, these devices create a potential threat to personal and public security. This may be easily understood either due to the sensitivity of the collected data, or by our dependability to the devices’ operation. Considering that most IoT devices are of low cost and are used for various tasks, such as monitoring people or controlling indoor environmental conditions, the security factor should be enhanced. This paper presents the exploitation of side-channel attack technique for protecting low-cost smart devices in an intuitive way. The work aims to extend the dataset provided to an Intrusion Detection Systems (IDS) in order to achieve a higher accuracy in anomaly detection. Thus, along with typical data provided to an IDS, such as network traffic, transmitted packets, CPU usage, etc., it is proposed to include information regarding the device’s physical state and behaviour such as its power consumption, the supply current, the emitted heat, etc. Awareness of the typical operation of a smart device in terms of operation and functionality may prove valuable, since any deviation may warn of an operational or functional anomaly. In this paper, the deviation (either increase or decrease) of the supply current is exploited for this reason. This work aimed to affect the intrusion detection process of IoT and proposes for consideration new inputs of interest with a collateral interest of study. In parallel, malfunction of the device is also detected, extending this work’s application to issues of reliability and maintainability. The results present 100% attack detection and this is the first time that a low-cost security solution suitable for every type of target devices is presented. Full article
(This article belongs to the Special Issue Security and Reliability of IoT---Selected Papers from SecRIoT 2019)
Show Figures

Figure 1

14 pages, 477 KiB  
Article
RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks
by Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim, Makhlouf Derdour and Helge Janicke
Future Internet 2020, 12(3), 44; https://doi.org/10.3390/fi12030044 - 2 Mar 2020
Cited by 184 | Viewed by 9630
Abstract
This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of-Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm and Forest PA. Specifically, the first and second [...] Read more.
This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of-Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm and Forest PA. Specifically, the first and second method take as inputs features of the data set, and classify the network traffic as Attack/Benign. The third classifier uses features of the initial data set in addition to the outputs of the first and the second classifier as inputs. The experimental results obtained by analyzing the proposed IDS using the CICIDS2017 dataset and BoT-IoT dataset, attest their superiority in terms of accuracy, detection rate, false alarm rate and time overhead as compared to state of the art existing schemes. Full article
(This article belongs to the Special Issue Security and Reliability of IoT---Selected Papers from SecRIoT 2019)
Show Figures

Figure 1

24 pages, 1027 KiB  
Article
Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets
by Georgios Spathoulas, Nikolaos Giachoudis, Georgios-Paraskevas Damiris and Georgios Theodoridis
Future Internet 2019, 11(11), 226; https://doi.org/10.3390/fi11110226 - 25 Oct 2019
Cited by 45 | Viewed by 5161
Abstract
Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high diversity in both hardware and software. Existing security models, [...] Read more.
Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high diversity in both hardware and software. Existing security models, approaches and solutions are not able to sufficiently protect such systems. In this paper we propose the use of lightweight agents installed at multiple internet of things (IoT) installations (e.g., smart-homes), in order to collaboratively detect distributed denial of service (DDoS) attacks conducted by the use of IoT devices botnets. Specifically, agents exchange outbound traffic information in order to identify possible victims of DDoS attacks. This information exchange is governed by a blockchain smart contract, that ensures the integrity of both the procedure and the information. A simulation of the operation of the proposed methodology has been conducted in order to evaluate both its detection efficiency and its resilience against malicious agents that aim to falsify results. Full article
(This article belongs to the Special Issue Security and Reliability of IoT---Selected Papers from SecRIoT 2019)
Show Figures

Figure 1

24 pages, 912 KiB  
Article
Simulation-Based Performance Validation of Homomorphic Encryption Algorithms in the Internet of Things
by Johannes Kölsch, Christopher Heinz, Axel Ratzke and Christoph Grimm
Future Internet 2019, 11(10), 218; https://doi.org/10.3390/fi11100218 - 22 Oct 2019
Cited by 9 | Viewed by 4510
Abstract
IoT systems consist of Hardware/Software systems (e.g., sensors) that are embedded in a physical world, networked and that interact with complex software platforms. The validation of such systems is a challenge and currently mostly done by prototypes. This paper presents the virtual environment [...] Read more.
IoT systems consist of Hardware/Software systems (e.g., sensors) that are embedded in a physical world, networked and that interact with complex software platforms. The validation of such systems is a challenge and currently mostly done by prototypes. This paper presents the virtual environment for simulation, emulation and validation of an IoT platform and its semantic model in real life scenarios. It is based on a decentralized, bottom up approach that offers interoperability of IoT devices and the value-added services they want to use across different domains. The framework is demonstrated by a comprehensive case study. The example consists of the complete IoT “Smart Energy” use case with focus on data privacy by homomorphic encryption. The performance of the network is compared while using partially homomorphic encryption, fully homomorphic encryption and no encryption at all.As a major result, we found that our framework is capable of simulating big IoT networks and the overhead introduced by homomorphic encryption is feasible for VICINITY. Full article
(This article belongs to the Special Issue Security and Reliability of IoT---Selected Papers from SecRIoT 2019)
Show Figures

Figure 1

19 pages, 1149 KiB  
Article
Threat Analysis for Smart Homes
by Georgios Kavallieratos, Nabin Chowdhury, Sokratis Katsikas, Vasileios Gkioulos and Stephen Wolthusen
Future Internet 2019, 11(10), 207; https://doi.org/10.3390/fi11100207 - 25 Sep 2019
Cited by 11 | Viewed by 6705
Abstract
The development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments necessitates the use of dynamic risk assessment methodologies and the modeling of dynamically changing [...] Read more.
The development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments necessitates the use of dynamic risk assessment methodologies and the modeling of dynamically changing states. In this paper, we focus on the smart home environment, where the deployment of IoT devices increase the attack surface. We examine existing dynamic risk assessment methodologies, and by leveraging a smart home reference architecture we identify the security risks of a smart home’s physical and communication viewpoints, taking into consideration also dynamic operational aspects. Further, we develop a smart home network topology generator and a graph-based attack model to study dependencies among dynamically changing states and the propagation of a malware infection. Full article
(This article belongs to the Special Issue Security and Reliability of IoT---Selected Papers from SecRIoT 2019)
Show Figures

Figure 1

Back to TopTop