sensors-logo

Journal Browser

Journal Browser

Validation Methods in IoT Systems: Security, Performance and Safety

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (25 March 2023) | Viewed by 9746

Special Issue Editors


E-Mail Website
Guest Editor
Department of Environmental Sciences, Informatics and Statistics (DAIS), Università Ca’ Foscari Venezia, 30172 Venice, Italy
Interests: performance and reliability evaluation; stochastic modelling; queueing theory; wireless sensor networks
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Environmental Sciences, Informatics and Statistics (DAIS), Università Ca’ Foscari Venezia, 30172 Venezia, Italy
Interests: application of abstract interpretation-based static analysis to security vulnerabilities

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) represents, in many ways, a paradigm shift in computer and telecommunication science. The interaction of many devices with typically low computational power and battery supply makes the verification and assessment of many system properties extremely challenging. Among these properties, security, performance and safety are crucial to the widespread adoption of IoT systems. 

In fact, these systems connect physical objects equipped with sensors and actuators to the Internet. This new pattern hasopened the door to several cyber attacks. Since IoT systems combine interaction with the physical world, and remote control, their security is critical in order not to allow remote attackers to compromise physical safety.

In addition, architects of IoT systems must also guarantee quantitative properties, such as the throughput, end-to-end delays and energy absorption of the devices, especially when IoT supports emergency monitoring and hence reaction times and the availability of the communication networks are primary concerns. 

Finally, logical flaws and bugs of IoT systems might threaten their operativity, as well as pose various dangers to people exposed to these systems. In recent decades, flaws in embedded systems have had catastrophic consequences. Similarly, IoT systems might suffer from the same issues, amplified by the fact of being interconnected through the Internet.

This Special Issue welcomes theoretical and experimental papers, as well as industrial and experience reports, where techniques for the assessment of security, performance and safety have been successfully used in real applications. Specifically, this Special Issue includes, but is not limited to, the following topics:

  • Analytical models, simulations and measurements for the assessment of quantitative properties of IoT systems.
  • Dynamic analysis and testing of security, safety or performance of deployed IoT systems. 
  • Static analysis of security, safety or performance of IoT software.
  • Software engineering techniques to enhance security, safety or performance of IoT systems.
  • Runtime monitoring of IoT systems to detect anomalous, erroneous, and unpredicted behaviors.
  • Case studies of IoT systems focused on the analysis of their security, safety, and/or performance.

Methodological, practical and experience papers are welcome.

Dr. Andrea Marin
Dr. Pietro Ferrara
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

34 pages, 6984 KiB  
Article
On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices
by Luis F. Rojas-Muñoz, Santiago Sánchez-Solano, Macarena C. Martínez-Rodríguez and Piedad Brox
Sensors 2023, 23(8), 4070; https://doi.org/10.3390/s23084070 - 18 Apr 2023
Cited by 2 | Viewed by 1822
Abstract
The proliferation of devices for the Internet of Things (IoT) and their implication in many activities of our lives have led to a considerable increase in concern about the security of these devices, posing a double challenge for designers and developers of products. [...] Read more.
The proliferation of devices for the Internet of Things (IoT) and their implication in many activities of our lives have led to a considerable increase in concern about the security of these devices, posing a double challenge for designers and developers of products. On the one hand, the design of new security primitives, suitable for resource-limited devices, can facilitate the inclusion of mechanisms and protocols to ensure the integrity and privacy of the data exchanged over the Internet. On the other hand, the development of techniques and tools to evaluate the quality of the proposed solutions as a step prior to their deployment, as well as to monitor their behavior once in operation against possible changes in operating conditions arising naturally or as a consequence of a stress situation forced by an attacker. To address these challenges, this paper first describes the design of a security primitive that plays an important role as a component of a hardware-based root of trust, as it can act as a source of entropy for True Random Number Generation (TRNG) or as a Physical Unclonable Function (PUF) to facilitate the generation of identifiers linked to the device on which it is implemented. The work also illustrates different software components that allow carrying out a self-assessment strategy to characterize and validate the performance of this primitive in its dual functionality, as well as to monitor possible changes in security levels that may occur during operation as a result of device aging and variations in power supply or operating temperature. The designed PUF/TRNG is provided as a configurable IP module, which takes advantage of the internal architecture of the Xilinx Series-7 and Zynq-7000 programmable devices and incorporates an AXI4-based standard interface to facilitate its interaction with soft- and hard-core processing systems. Several test systems that contain different instances of the IP have been implemented and subjected to an exhaustive set of on-line tests to obtain the metrics that determine its quality in terms of uniqueness, reliability, and entropy characteristics. The results obtained prove that the proposed module is a suitable candidate for various security applications. As an example, an implementation that uses less than 5% of the resources of a low-cost programmable device is capable of obfuscating and recovering 512-bit cryptographic keys with virtually zero error rate. Full article
(This article belongs to the Special Issue Validation Methods in IoT Systems: Security, Performance and Safety)
Show Figures

Figure 1

30 pages, 24368 KiB  
Article
Automatic Verification and Execution of Cyber Attack on IoT Devices
by Fartein Lemjan Færøy, Muhammad Mudassar Yamin, Ankur Shukla and Basel Katt
Sensors 2023, 23(2), 733; https://doi.org/10.3390/s23020733 - 9 Jan 2023
Cited by 5 | Viewed by 3689
Abstract
Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to critical infrastructure, they are used everywhere. This makes them ideal targets for malicious actors to exploit for nefarious purposes. Recent attacks like the Mirai botnet are [...] Read more.
Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to critical infrastructure, they are used everywhere. This makes them ideal targets for malicious actors to exploit for nefarious purposes. Recent attacks like the Mirai botnet are just examples in which default credentials were used to exploit thousands of devices. This raises major concerns about IoT device security. In this work, we aimed to investigate security of IoT devices through performing automatic penetration test on IoT devices. A penetration test is a way of detecting security problems, but manually testing billions of IoT devices is infeasible. This work has therefore examined autonomous penetration testing on IoT devices. In recent studies, automated attack execution models were developed for modeling automated attacks in cyber ranges. We have (1) investigated how such models can be applied for performing autonomous IoT penetration testing. Furthermore, we have (2) investigated if some well known and severe Wi-Fi related vulnerabilities still exist in IoT devices. Through a case study, we have shown that the such models can be used to model and design autonomous penetration testing agents for IoT devices. In addition, we have demonstrated that well-known vulnerabilities are present in deployed and currently sold products used in IoT devices, and that they can be both autonomously revealed through our developed system. Full article
(This article belongs to the Special Issue Validation Methods in IoT Systems: Security, Performance and Safety)
Show Figures

Figure 1

Review

Jump to: Research

27 pages, 3675 KiB  
Review
Cybersecurity Testing for Automotive Domain: A Survey
by Feng Luo, Xuan Zhang, Zhenyu Yang, Yifan Jiang, Jiajia Wang, Mingzhi Wu and Wanqiang Feng
Sensors 2022, 22(23), 9211; https://doi.org/10.3390/s22239211 - 26 Nov 2022
Cited by 8 | Viewed by 3586
Abstract
Modern vehicles are more complex and interconnected than ever before, which also means that attack surfaces for vehicles have increased significantly. Malicious cyberattacks will not only exploit personal privacy and property, but also affect the functional safety of electrical/electronic (E/E) safety-critical systems by [...] Read more.
Modern vehicles are more complex and interconnected than ever before, which also means that attack surfaces for vehicles have increased significantly. Malicious cyberattacks will not only exploit personal privacy and property, but also affect the functional safety of electrical/electronic (E/E) safety-critical systems by controlling the driving functionality, which is life-threatening. Therefore, it is necessary to conduct cybersecurity testing on vehicles to reveal and address relevant security threats and vulnerabilities. Cybersecurity standards and regulations issued in recent years, such as ISO/SAE 21434 and UNECE WP.29 regulations (R155 and R156), also emphasize the indispensability of cybersecurity verification and validation in the development lifecycle but lack specific technical details. Thus, this paper conducts a systematic and comprehensive review of the research and practice in the field of automotive cybersecurity testing, which can provide reference and advice for automotive security researchers and testers. We classify and discuss the security testing methods and testbeds in automotive engineering. Furthermore, we identify gaps and limitations in existing research and point out future challenges. Full article
(This article belongs to the Special Issue Validation Methods in IoT Systems: Security, Performance and Safety)
Show Figures

Figure 1

Back to TopTop