Situation Aware Intrusion Detection System Design for Industrial IoT Gateways
Title | Situation Aware Intrusion Detection System Design for Industrial IoT Gateways |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Kirupakar, J., Shalinie, S. Mercy |
Conference Name | 2019 International Conference on Computational Intelligence in Data Science (ICCIDS) |
Date Published | Feb. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-5386-9471-8 |
Keywords | cloud computing, composability, compositionality, Computational Intelligence, Computer architecture, computer network security, constrained IIoT gateways, consumer IoT segment, cryptography, cyber security threat, cyber-attacks, data protection, edge node, enterprise attackers, Human Behavior, human factors, IIoT world, industrial IoT domain, Industrial IoT Gateway, industrial IoT gateways, Internet of Things, internetworking, IoT platform providers, IoT security, Logic gates, Metrics, Peer-to-peer computing, production engineering computing, Protocols, pubcrawl, resilience, Resiliency, resilient services, security, security attacks, security measures, security services, Sensors, situation aware intrusion detection system design, standard IIoT gateways, system services |
Abstract | In today's IIoT world, most of the IoT platform providers like Microsoft, Amazon and Google are focused towards connecting devices and extract data from the devices and send the data to the Cloud for analytics. Only there are few companies concentrating on Security measures implemented on Edge Node. Gartner estimates that by 2020, more than 25 percent of all enterprise attackers will make use of the Industrial IoT. As Cyber Security Threat is getting more important, it is essential to ensure protection of data both at rest and at motion. The reflex of Cyber Security in the Industrial IoT Domain is much more severe when compared to the Consumer IoT Segment. The new bottleneck in this are security services which employ computationally intensive software operations and system services [1]. Resilient services consume considerable resources in a design. When such measures are added to thwart security attacks, the resource requirements grow even more demanding. Since the standard IIoT Gateways and other sub devices are resource constrained in nature the conventional design for security services will not be applicable in this case. This paper proposes an intelligent architectural paradigm for the Constrained IIoT Gateways that can efficiently identify the Cyber-Attacks in the Industrial IoT domain. |
URL | https://ieeexplore.ieee.org/document/8862038 |
DOI | 10.1109/ICCIDS.2019.8862038 |
Citation Key | kirupakar_situation_2019 |
- Resiliency
- internetworking
- IoT platform providers
- IoT security
- Logic gates
- Metrics
- Peer-to-peer computing
- production engineering computing
- Protocols
- pubcrawl
- resilience
- Internet of Things
- resilient services
- security
- security attacks
- security measures
- security services
- sensors
- situation aware intrusion detection system design
- standard IIoT gateways
- system services
- cyber-attacks
- Cloud Computing
- composability
- Compositionality
- computational intelligence
- computer architecture
- computer network security
- constrained IIoT gateways
- consumer IoT segment
- cyber security threat
- Cryptography
- Data protection
- edge node
- enterprise attackers
- Human behavior
- Human Factors
- IIoT world
- industrial IoT domain
- Industrial IoT Gateway
- industrial IoT gateways