Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
In recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus improving quality of life. The core component of the...
Guardado en:
Autores principales: | , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/ac4e374a77354e308db2e94185e321bd |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:ac4e374a77354e308db2e94185e321bd |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:ac4e374a77354e308db2e94185e321bd2021-11-25T17:39:38ZSecuring Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications10.3390/fi131102721999-5903https://doaj.org/article/ac4e374a77354e308db2e94185e321bd2021-10-01T00:00:00Zhttps://www.mdpi.com/1999-5903/13/11/272https://doaj.org/toc/1999-5903In recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus improving quality of life. The core component of the IoT ecosystem is data which exists in various forms and formats. The collected data is then later used to create context awareness and make meaningful decisions. Besides an undoubtedly large number of advantages from the usage of IoT, there exist numerous challenges attributed to the security of objects that cannot be neglected for uninterrupted services. The Mirai botnet attack demonstrated that the IoT system is susceptible to different forms of cyberattacks. While advanced data analytics and Machine Learning have proved efficiency in various applications of cybersecurity, those still have not been explored enough in the literature from the applicability perspective in the domain of resource-constrained IoT. Several architectures and frameworks have been proposed for defining the ways for analyzing the data, yet mostly investigating off-chip analysis. In this contribution, we show how an Artificial Neural Network model can be trained and deployed on trivial IoT nodes for detecting intelligent similarity-based network attacks. This article proposes a concept of the resource-constrained intelligent system as a part of the IoT infrastructure to be able to harden the cybersecurity on microcontrollers. This work will serve as a stepping stone for the application of Artificial Intelligence on devices with limited computing capabilities such as end-point IoT nodes.Andrii ShalaginovMuhammad Ajmal AzadMDPI AGarticlecybersecuritysmart citiessmart applicationsnetwork attacksmachine learninginternet of thingsInformation technologyT58.5-58.64ENFuture Internet, Vol 13, Iss 272, p 272 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
cybersecurity smart cities smart applications network attacks machine learning internet of things Information technology T58.5-58.64 |
spellingShingle |
cybersecurity smart cities smart applications network attacks machine learning internet of things Information technology T58.5-58.64 Andrii Shalaginov Muhammad Ajmal Azad Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications |
description |
In recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus improving quality of life. The core component of the IoT ecosystem is data which exists in various forms and formats. The collected data is then later used to create context awareness and make meaningful decisions. Besides an undoubtedly large number of advantages from the usage of IoT, there exist numerous challenges attributed to the security of objects that cannot be neglected for uninterrupted services. The Mirai botnet attack demonstrated that the IoT system is susceptible to different forms of cyberattacks. While advanced data analytics and Machine Learning have proved efficiency in various applications of cybersecurity, those still have not been explored enough in the literature from the applicability perspective in the domain of resource-constrained IoT. Several architectures and frameworks have been proposed for defining the ways for analyzing the data, yet mostly investigating off-chip analysis. In this contribution, we show how an Artificial Neural Network model can be trained and deployed on trivial IoT nodes for detecting intelligent similarity-based network attacks. This article proposes a concept of the resource-constrained intelligent system as a part of the IoT infrastructure to be able to harden the cybersecurity on microcontrollers. This work will serve as a stepping stone for the application of Artificial Intelligence on devices with limited computing capabilities such as end-point IoT nodes. |
format |
article |
author |
Andrii Shalaginov Muhammad Ajmal Azad |
author_facet |
Andrii Shalaginov Muhammad Ajmal Azad |
author_sort |
Andrii Shalaginov |
title |
Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications |
title_short |
Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications |
title_full |
Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications |
title_fullStr |
Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications |
title_full_unstemmed |
Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications |
title_sort |
securing resource-constrained iot nodes: towards intelligent microcontroller-based attack detection in distributed smart applications |
publisher |
MDPI AG |
publishDate |
2021 |
url |
https://doaj.org/article/ac4e374a77354e308db2e94185e321bd |
work_keys_str_mv |
AT andriishalaginov securingresourceconstrainediotnodestowardsintelligentmicrocontrollerbasedattackdetectionindistributedsmartapplications AT muhammadajmalazad securingresourceconstrainediotnodestowardsintelligentmicrocontrollerbasedattackdetectionindistributedsmartapplications |
_version_ |
1718412124369190912 |