首页> 外文期刊>Mechanical systems and signal processing >An intrusion detection framework for energy constrained IoT devices
【24h】

An intrusion detection framework for energy constrained IoT devices

机译:能源受限的IoT设备的入侵检测框架

获取原文
获取原文并翻译 | 示例

摘要

Industrial Internet of Things (IIoT) exemplifies IoT with applications in manufacturing, surveillance, automotive, smart buildings, homes and transport. It leverages sensor technology, cutting edge communication and data analytics technologies and the open Internet to consolidate IT and operational technology (OT) aiming to achieve cost and performance benefits. However, the underlying resource constraints and ad hoc nature of such systems have significant implications especially in achieving effective intrusion detection. Consequently, contemporary solutions requiring a stable infrastructure and extensive computational resources are inadequate to fulfill these characteristics of an IIoT system. In this paper, we propose an intrusion detection framework for the energy-constrained IoT devices which form the foundation of an IIoT ecosystem. In view of the ad hoc nature of such systems as well as emerging complex threats such as botnets, we assess the feasibility of collaboration between the host (IoT devices) and the edge devices for effective intrusion detection whilst minimizing energy consumption and communication overhead. We implemented the proposed framework with Contiki operating system and conducted rigorous evaluation to identify potential performance trade-offs. The evaluation results demonstrate that the proposed framework can minimize energy and communication overheads whilst achieving an effective collaborative intrusion detection for IIoT systems.
机译:工业物联网(IIoT)通过制造,监控,汽车,智能建筑,家庭和运输中的应用来例证物联网。它利用传感器技术,尖端的通信和数据分析技术以及开放的Internet来整合IT和运营技术(OT),以期实现成本和性能优势。但是,此类系统的潜在资源限制和临时性质具有重大意义,尤其是在实现有效的入侵检测方面。因此,需要稳定基础设施和大量计算资源的现代解决方案不足以满足IIoT系统的这些特征。在本文中,我们提出了一种针对能耗受限的物联网设备的入侵检测框架,该框架构成了IIoT生态系统的基础。鉴于此类系统的特殊性质以及新兴的复杂威胁(如僵尸网络),我们评估了主机(IoT设备)和边缘设备之间进行协作以进行有效入侵检测的可行性,同时将能耗和通信开销降至最低。我们使用Contiki操作系统实施了建议的框架,并进行了严格的评估,以找出潜在的性能折衷。评估结果表明,提出的框架可以最大程度地减少能源和通信开销,同时为IIoT系统实现有效的协作入侵检测。

著录项

  • 来源
    《Mechanical systems and signal processing》 |2020年第2期|106436.1-106436.13|共13页
  • 作者

  • 作者单位

    School of Computing and Engineering University of West London London UK;

    Department of Computer Science and Mathematics The University of Derby Derby United Kingdom;

    Electrical Engineering Department Faculty of Engineering The British University in Egypt Cairo Egypt;

    Department of Electrical Engineering and Computer Science Khalifa University United Arab Emirates;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Internet of Things (IoT); Industrial IoT; Intrusion detection; Constrained IoT devices; Performance evaluation;

    机译:物联网(IoT);工业物联网入侵检测;受约束的物联网设备;绩效评估;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号