A Novel IoT Trust Model Leveraging Fully Distributed Behavioral
Fingerprinting and Secure Delegation
- URL: http://arxiv.org/abs/2310.00953v1
- Date: Mon, 2 Oct 2023 07:45:49 GMT
- Title: A Novel IoT Trust Model Leveraging Fully Distributed Behavioral
Fingerprinting and Secure Delegation
- Authors: Marco Arazzi, Serena Nicolazzo, Antonino Nocera
- Abstract summary: Internet of Things (IoT) solutions are experimenting a booming demand to make data collection and processing easier.
The higher the number of new capabilities and services provided in an autonomous way, the wider the attack surface that exposes users to data hacking and lost.
In this paper, we try to provide a contribution in this setting, tackling the non-trivial issues of equipping smart things with a strategy to evaluate, also through their neighbors, the trustworthiness of an object in the network before interacting with it.
- Score: 3.10770247120758
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: With the number of connected smart devices expected to constantly grow in the
next years, Internet of Things (IoT) solutions are experimenting a booming
demand to make data collection and processing easier. The ability of IoT
appliances to provide pervasive and better support to everyday tasks, in most
cases transparently to humans, is also achieved through the high degree of
autonomy of such devices. However, the higher the number of new capabilities
and services provided in an autonomous way, the wider the attack surface that
exposes users to data hacking and lost. In this scenario, many critical
challenges arise also because IoT devices have heterogeneous computational
capabilities (i.e., in the same network there might be simple sensors/actuators
as well as more complex and smart nodes). In this paper, we try to provide a
contribution in this setting, tackling the non-trivial issues of equipping
smart things with a strategy to evaluate, also through their neighbors, the
trustworthiness of an object in the network before interacting with it. To do
so, we design a novel and fully distributed trust model exploiting devices'
behavioral fingerprints, a distributed consensus mechanism and the Blockchain
technology. Beyond the detailed description of our framework, we also
illustrate the security model associated with it and the tests carried out to
evaluate its correctness and performance.
Related papers
- Internet of Agents: Weaving a Web of Heterogeneous Agents for Collaborative Intelligence [79.5316642687565]
Existing multi-agent frameworks often struggle with integrating diverse capable third-party agents.
We propose the Internet of Agents (IoA), a novel framework that addresses these limitations.
IoA introduces an agent integration protocol, an instant-messaging-like architecture design, and dynamic mechanisms for agent teaming and conversation flow control.
arXiv Detail & Related papers (2024-07-09T17:33:24Z) - Generative AI for Secure Physical Layer Communications: A Survey [80.0638227807621]
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content.
In this paper, we offer an extensive survey on the various applications of GAI in enhancing security within the physical layer of communication networks.
We delve into the roles of GAI in addressing challenges of physical layer security, focusing on communication confidentiality, authentication, availability, resilience, and integrity.
arXiv Detail & Related papers (2024-02-21T06:22:41Z) - Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security [7.8344795632171325]
Next-generation networks aim for comprehensive connectivity, interconnecting humans, machines, devices, and systems seamlessly.
To address this challenge, the Zero Trust (ZT) paradigm emerges as a key method for safeguarding network integrity and data confidentiality.
This work introduces EPS-CNN, a novel deep-learning-based wireless device identification framework.
arXiv Detail & Related papers (2024-02-08T00:23:42Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - MultiIoT: Benchmarking Machine Learning for the Internet of Things [70.74131118309967]
The next generation of machine learning systems must be adept at perceiving and interacting with the physical world.
sensory data from motion, thermal, geolocation, depth, wireless signals, video, and audio are increasingly used to model the states of physical environments.
Existing efforts are often specialized to a single sensory modality or prediction task.
This paper proposes MultiIoT, the most expansive and unified IoT benchmark to date, encompassing over 1.15 million samples from 12 modalities and 8 real-world tasks.
arXiv Detail & Related papers (2023-11-10T18:13:08Z) - Ensemble Learning based Anomaly Detection for IoT Cybersecurity via
Bayesian Hyperparameters Sensitivity Analysis [2.3226893628361682]
Internet of Things (IoT) integrates more than billions of intelligent devices over the globe with the capability of communicating with other connected devices.
Data collected by IoT contain a tremendous amount of information for anomaly detection.
In this paper, we present a study on using ensemble machine learning methods for enhancing IoT cybersecurity via anomaly detection.
arXiv Detail & Related papers (2023-07-20T05:23:49Z) - Semantic Information Marketing in The Metaverse: A Learning-Based
Contract Theory Framework [68.8725783112254]
We address the problem of designing incentive mechanisms by a virtual service provider (VSP) to hire sensing IoT devices to sell their sensing data.
Due to the limited bandwidth, we propose to use semantic extraction algorithms to reduce the delivered data by the sensing IoT devices.
We propose a novel iterative contract design and use a new variant of multi-agent reinforcement learning (MARL) to solve the modelled multi-dimensional contract problem.
arXiv Detail & Related papers (2023-02-22T15:52:37Z) - The Internet of Senses: Building on Semantic Communications and Edge
Intelligence [67.75406096878321]
The Internet of Senses (IoS) holds the promise of flawless telepresence-style communication for all human receptors'
We elaborate on how the emerging semantic communications and Artificial Intelligence (AI)/Machine Learning (ML) paradigms may satisfy the requirements of IoS use cases.
arXiv Detail & Related papers (2022-12-21T03:37:38Z) - IoT Security: Botnet detection in IoT using Machine learning [0.0]
This research work is to propose an innovative model using machine learning algorithm to detect and mitigate botnet-based distributed denial of service (DDoS) attack in IoT network.
Our proposed model tackles the security issue concerning the threats from bots.
arXiv Detail & Related papers (2021-04-06T01:47:50Z) - IoT Behavioral Monitoring via Network Traffic Analysis [0.45687771576879593]
This thesis is the culmination of our efforts to develop techniques to profile the network behavioral pattern of IoTs.
We develop a robust machine learning-based inference engine trained with attributes from traffic patterns.
We demonstrate real-time classification of 28 IoT devices with over 99% accuracy.
arXiv Detail & Related papers (2020-01-28T23:13:12Z) - Blockchain-based Smart-IoT Trust Zone Measurement Architecture [1.5749416770494706]
Internet of Things (IoT) has gained a tremendous attention and become a central aspect of our environment.
In this paper, we propose a behavior monitor in IoT- setup which can provide trust-confidence to outside networks.
In addition, we also incorporate Trusted Execution Technology (Intel SGX) in order to provide a secure execution environment for applications and data on blockchain.
arXiv Detail & Related papers (2020-01-08T03:41:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.