Data Conformity Evaluation: A Novel Approach for IoT Security
Title | Data Conformity Evaluation: A Novel Approach for IoT Security |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Maria Verzegnassi, Enrico Giulio, Tountas, Konstantinos, Pados, Dimitris A., Cuomo, Francesca |
Conference Name | 2019 IEEE 5th World Forum on Internet of Things (WF-IoT) |
Date Published | April 2019 |
Publisher | IEEE |
ISBN Number | 978-1-5386-4980-0 |
Keywords | blind attack detection method, composability, computer network security, data conformity, data conformity evaluation, edge detection, Image edge detection, Internet of Things, IoT networks, IoT security, Iterative methods, jamming, L1-norm, Metrics, Network topology, principal-component-analysis, pubcrawl, Resiliency, Scalability, security, star topology network, telecommunication network topology, tensor decomposition, tensors, Wireless sensor networks |
Abstract | We consider the problem of attack detection for IoT networks based only on passively collected network parameters. For the first time in the literature, we develop a blind attack detection method based on data conformity evaluation. Network parameters collected passively, are converted to their conformity values through iterative projections on refined L1-norm tensor subspaces. We demonstrate our algorithmic development in a case study for a simulated star topology network. Type of attack, affected devices, as well as, attack time frame can be easily identified. |
URL | https://ieeexplore.ieee.org/document/8767175 |
DOI | 10.1109/WF-IoT.2019.8767175 |
Citation Key | maria_verzegnassi_data_2019 |
- L1-norm
- wireless sensor networks
- tensors
- tensor decomposition
- telecommunication network topology
- star topology network
- security
- Scalability
- Resiliency
- pubcrawl
- principal-component-analysis
- network topology
- Metrics
- blind attack detection method
- Jamming
- Iterative methods
- IoT security
- IoT networks
- Internet of Things
- Image edge detection
- edge detection
- data conformity evaluation
- data conformity
- computer network security
- composability