An analysis of the Gateway Integrity Checking Protocol from the perspective of Intrusion Detection Systems
- PDF / 871,263 Bytes
- 23 Pages / 439.37 x 666.142 pts Page_size
- 98 Downloads / 175 Views
An analysis of the Gateway Integrity Checking Protocol from the perspective of Intrusion Detection Systems Mateus Martínez de Lucena1 Antônio Augusto Fröhlich1
· Roberto Milton Scheffel2 ·
Received: 30 April 2020 / Accepted: 1 September 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Internet of Things (IoT) gateways bridging resource-constrained devices and the internet, running conventional operating systems and communication protocols, are valuable targets for malicious attackers. Once compromised, the gateway can no longer be trusted to deliver data accurately to the applications running on the Cloud. In this work we present an analysis of the Gateway Integrity Checking Protocol, a gossip protocol that collects data from subsets of IoT devices, to answer a challenge sent by an External Security Agent. The response is used to check the integrity of data arriving at the Cloud from the gateway. The evaluation of the time and energy overhead, and the impact of the proposed solution on the lifetime of the network through simulations is presented. A detailed qualitative comparison against other Intrusion Detection Systems in the IoT domain is made, showing that the proposed solution can provide customizable security levels with little overhead in terms of processing power and network traffic. Keywords Internet of Things · Security protocol · Integrity checking
This research was partially funded by CAPES and by CNPq, Brazil. This paper was originally published in the 2019 IX Brazilian Symposium on Computing Systems Engineering (SBESC) [1].
B
Mateus Martínez de Lucena [email protected] Roberto Milton Scheffel [email protected] Antônio Augusto Fröhlich [email protected]
1
Software/Hardware Integration Lab - Federal University of Santa Catarina, Florianópolis, Joinville, Brazil
2
Federal University of Technology - Paraná, Toledo, Brazil
123
M. Martínez de Lucena et al.
1 Introduction The integration of complex Cyber-Physical Systems (CPS) such as cars, factories, and power grids into the Cloud under the Internet of Things (IoT) paradigm has been happening for over 20 years now [2]. The integration is the staple of Industry 4.0, with security being one of its major hindering factors [3]. Machinery parts, subsystems, components, and devices in this realm are usually subjected to timeliness constraints that are hardly met by traditional Information Technology (IT) infrastructures and therefore are connected to it via gateways [4]. These IoT gateways enable the world of dedicated real-time systems to connect with the IT infrastructure and eventually, the Cloud, enabling a myriad of advanced services and business opportunities. Despite their benefits, IoT gateways bring about pressing issues related to security and dependability. Being connected to the internet using conventional operating systems and communication protocols, they are exposed to the same threats that afflict ordinary IT infrastructures. They become single points of failure in network-dependent sys
Data Loading...