Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications

In recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus improving quality of life. The core component of the...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Andrii Shalaginov, Muhammad Ajmal Azad
Formato: article
Lenguaje:EN
Publicado: MDPI AG 2021
Materias:
Acceso en línea:https://doaj.org/article/ac4e374a77354e308db2e94185e321bd
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:ac4e374a77354e308db2e94185e321bd
record_format dspace
spelling oai:doaj.org-article:ac4e374a77354e308db2e94185e321bd2021-11-25T17:39:38ZSecuring Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications10.3390/fi131102721999-5903https://doaj.org/article/ac4e374a77354e308db2e94185e321bd2021-10-01T00:00:00Zhttps://www.mdpi.com/1999-5903/13/11/272https://doaj.org/toc/1999-5903In recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus improving quality of life. The core component of the IoT ecosystem is data which exists in various forms and formats. The collected data is then later used to create context awareness and make meaningful decisions. Besides an undoubtedly large number of advantages from the usage of IoT, there exist numerous challenges attributed to the security of objects that cannot be neglected for uninterrupted services. The Mirai botnet attack demonstrated that the IoT system is susceptible to different forms of cyberattacks. While advanced data analytics and Machine Learning have proved efficiency in various applications of cybersecurity, those still have not been explored enough in the literature from the applicability perspective in the domain of resource-constrained IoT. Several architectures and frameworks have been proposed for defining the ways for analyzing the data, yet mostly investigating off-chip analysis. In this contribution, we show how an Artificial Neural Network model can be trained and deployed on trivial IoT nodes for detecting intelligent similarity-based network attacks. This article proposes a concept of the resource-constrained intelligent system as a part of the IoT infrastructure to be able to harden the cybersecurity on microcontrollers. This work will serve as a stepping stone for the application of Artificial Intelligence on devices with limited computing capabilities such as end-point IoT nodes.Andrii ShalaginovMuhammad Ajmal AzadMDPI AGarticlecybersecuritysmart citiessmart applicationsnetwork attacksmachine learninginternet of thingsInformation technologyT58.5-58.64ENFuture Internet, Vol 13, Iss 272, p 272 (2021)
institution DOAJ
collection DOAJ
language EN
topic cybersecurity
smart cities
smart applications
network attacks
machine learning
internet of things
Information technology
T58.5-58.64
spellingShingle cybersecurity
smart cities
smart applications
network attacks
machine learning
internet of things
Information technology
T58.5-58.64
Andrii Shalaginov
Muhammad Ajmal Azad
Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
description In recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus improving quality of life. The core component of the IoT ecosystem is data which exists in various forms and formats. The collected data is then later used to create context awareness and make meaningful decisions. Besides an undoubtedly large number of advantages from the usage of IoT, there exist numerous challenges attributed to the security of objects that cannot be neglected for uninterrupted services. The Mirai botnet attack demonstrated that the IoT system is susceptible to different forms of cyberattacks. While advanced data analytics and Machine Learning have proved efficiency in various applications of cybersecurity, those still have not been explored enough in the literature from the applicability perspective in the domain of resource-constrained IoT. Several architectures and frameworks have been proposed for defining the ways for analyzing the data, yet mostly investigating off-chip analysis. In this contribution, we show how an Artificial Neural Network model can be trained and deployed on trivial IoT nodes for detecting intelligent similarity-based network attacks. This article proposes a concept of the resource-constrained intelligent system as a part of the IoT infrastructure to be able to harden the cybersecurity on microcontrollers. This work will serve as a stepping stone for the application of Artificial Intelligence on devices with limited computing capabilities such as end-point IoT nodes.
format article
author Andrii Shalaginov
Muhammad Ajmal Azad
author_facet Andrii Shalaginov
Muhammad Ajmal Azad
author_sort Andrii Shalaginov
title Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
title_short Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
title_full Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
title_fullStr Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
title_full_unstemmed Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
title_sort securing resource-constrained iot nodes: towards intelligent microcontroller-based attack detection in distributed smart applications
publisher MDPI AG
publishDate 2021
url https://doaj.org/article/ac4e374a77354e308db2e94185e321bd
work_keys_str_mv AT andriishalaginov securingresourceconstrainediotnodestowardsintelligentmicrocontrollerbasedattackdetectionindistributedsmartapplications
AT muhammadajmalazad securingresourceconstrainediotnodestowardsintelligentmicrocontrollerbasedattackdetectionindistributedsmartapplications
_version_ 1718412124369190912