Anda di halaman 1dari 11

Proposed Research on

HIERARCHICAL SECURITY APPROACH FOR


SPARSE DATA MODELLING USING NOVEL
ALGORITHMS FOR
INTERNET OF THINGS APPLICATIONS
Name of Candidate

Vadiraja A
Asistant Professor, Dept. Of ISE

Jyothy Institute of Technology, Bengaluru


Supervisor

Dr. Vinay Hegde


Associate Professor, Dept. Of CSE

RVCE, Bengaluru
th

04 December 2016 @ BNMIT, Bengaluru

Objectives Problem Background

IoT should have three characteristics:


Comprehensive Perception
Reliable Transmission
Intelligent Processing
Comprehensive Perception
The sensor nodes of perception layer obtain object information
anytime and anywhere.

Reliable Transmission
Safe and complete transfer of the information objects through the
wireless or wired network to the data centre in real time.
Intelligent Processing
Middleware analyses and deals with the collected information
before submitting to application terminal eventually.

Objectives of the Proposed work


The objective is to provide hierarchical security for the following
layers of IoT security architecture.
a) The Security Problems of Perception Layer Data

Information Collection and Transmission:


Sensor nodes are of many varieties and are highly
heterogeneous.

They have generally simple architecture and processor.

These makes them less capable of having complex security


protection.
b) The Traditional Security Issues of Network Layer:

Although Internet security architecture has been very mature,


there are still many means of attack.
For example, a large number of malicious nodes send data at
the same time which leads to attacks like DDoS

Literature Survey
1. A Survey on the Internet of Things Security by Kai Zhao, Lina Ge, Ninth International Conference
on Computational Intelligence and Security 2013
1. Introduction to the architecture and features of IoT security
2. Expounds several security issues of IoT that exist in the three-layer system structure.
3. Perception layer safety measures are elaborated, including key management and algorithm, security
routing protocol, data fusion technology, as well as authentication and access control, etc.
2. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things,
Huansheng Ning, Hong Liu, Laurence T. Yang, IEEE - 2015
1. Design of an aggregated-proof based hierarchical authentication scheme (APHA) for the layered
networks.
2. Different access authorities are assigned to achieve hierarchical access control.
3. Secure IoT framework and 2D architecture for End-To-End Security, Jongseok Choi, Youngjin In,
Changjun Park, Seonhee Seok, Hwanjeong Seo, Howon Kim , Springer - 2016
1. Proposes a Secure IoT framework for End-to-End security from an IoT application to IoT devices.
2. Talks about the IoT Application, an IoT Broker and the IoT devices.
3. The proposed framework encrypts sensitive data by a symmetric encryption and an attribute-based
encryption
4. A Hierarchical Security Architecture for Cyber-Physical Systems, Quanyan Zhu, Craig Rieger and
Tamer Baar, IEEE - 2011
1. Discusses a hierarchical viewpoint to IoT security issues, addressing security concerns at each level
and emphasizing a holistic cross-layer philosophy for developing security solutions.
2. Proposes a bottom-up framework that establishes a model from the physical and control levels to the
supervisory level, incorporating concerns from network and communication levels.

Methodology to be followed

It is proposed to adopt a hierarchical viewpoint to the security


issues, addressing security concerns at each level.
Emphasizing a holistic cross-layer philosophy for developing
security solutions.
A bottom-up framework that establishes a model from the
physical and control levels to the supervisory level.
Incorporating concerns from network and communication
levels.

Expected Outcome - Solution

Aim - 1:

To come up with an application scenario on which the


proposed framework can be applied for testing and
validation.
Aim - 2:
It is proposed to come up with a novel algorithm to realize a
total security solution for heterogeneous sensors deployed to
collect sparse data through data modelling approach.
Aim - 3:

It is proposed to come up with an framework to secure the


communication between the Perception Layer and the
Networking Layer of the IoT security structure.
Aim - 4:

To apply, test and validate the above framework on the


application scenario developed as part of Aim 1.

Facilities available at the Research Center

Major Equipment available in various Laboratories

HPC SERVER Master/Scheduling/ GPU BASED COMPUTE NODE


Management Node - INTEL XEON E5-2670V2 PROCESSOR*2
STORAGE SYSTEM - INTEL XEON E5-2670V2 PROCESSOR*2,
MONOSEK -NETWORK PROTOCOL ANALYZER SYSTEM - Intel(R)
Xeon(R) CPU E5620 @2.40GHz

Access to following resources,


Swebok learning material
IEEE Electronic library
Spinger
Science Direct
Taylor & Francis
Proquest
E-books: Cambridge University Press

Summary

Comprehensive Perception, Reliable Transmission and


Intelligent Processing are the necessary characteristics of any
IoT solution.
Many key manipulation techniques have been proposed so far,
along with Hierarchical approaches for securing all the layers.
An End-to-End Hierarchical approach to securing the
Perception and Network layer is the area of interest proposed
here.
Setting up a Sparse data model application and testing the
framework on the same and validating would be the main aim of
the proposal.
Test against the already known Network and Communication
attack scenarios like DDoS.

References - 1
[1] Kai Zhao, Lina Ge, A Survey on the Internet of Things Security, Ninth International Conference on
Computational Intelligence and Security, CIS.2013.145, 2013
[2] Jorge Granjal, Edmundo Monteiro, Security for the Internet of Things: A Survey of Existing Protocols and
Open Research Issues, IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 17, NO. 3, THIRD
QUARTER 2015
[3] Hui Suo, Jiafu Wan, Security in the Internet of Things: A Review, Computer Science and Electronics
Engineering (ICCSEE), 2012 International Conference, 10.1109/ICCSEE.2012.373, 2012
[4] Mohamed Abomhara, Geir M. Kien, Security and privacy in the Internet of Things: Current status and
open issues, Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference,
10.1109/PRISMS.2014.6970594, 2014
[5] Quandeng Gou, Lianshan Yan, Yihe Liu, Yao Li, Construction and Strategies in IoT Security System,
IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE
Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom.2013.195, 2013

References - 2
[6] Huansheng Ning, Hong Liu, Laurence T. Yang, Aggregated-Proof Based Hierarchical Authentication
Scheme for the Internet of Things, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED

SYSTEMS, VOL. 26, NO. 3, MARCH 2015


[7] Rahul C. Shah, Sumit Roy, Sushant Jain, Waylon Brunette, Data MULEs: Modeling a Three-tier
Architecture for Sparse Sensor Networks, IEEE SNPA Workshop, 2003
[8] Huansheng Ning, Cyber-Physical-Social Based Security Architecture for Future Internet of Things,

http://dx.doi.org/10.4236/ait.2012.21001 Published Online January 2012 (http://www.SciRP.org/journal/ait), 2012

[9] Jongseok Choi, Youngjin In, Changjun Park, Seonhee Seok, Hwanjeong Seo, Howon Kim ,
Secure IoT framework and 2D architecture for End-To-End Security,

Springer

Science+Business Media New York, Published Online in March 2016

[10] Quanyan Zhu, Craig Rieger and Tamer Baar, A Hierarchical Security Architecture for
Cyber-Physical Systems, 978-1-4244-9293-0/11 IEEE, 2011

Thank You
- Vadiraja Acharya

Anda mungkin juga menyukai