2017
P. Sarigiannidis, E. Karapistoli, A.A. Economides
Modeling the Internet of Things under Attack: A G-network Approach Journal Article
In: IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1964-1977, 2017.
Περίληψη | BibTeX | Ετικέτες: G-networks, Internet of Things (IoT), Modeling, queuing theory, security | Σύνδεσμοι:
@article{Sarigiannidis20171964,
title = {Modeling the Internet of Things under Attack: A G-network Approach},
author = { P. Sarigiannidis and E. Karapistoli and A.A. Economides},
url = {https://www.researchgate.net/publication/317867935_Modelling_the_Internet_of_Things_Under_Attack_A_G-network_Approach?_sg=nQGxFUwlDGkq6bJAkluGr9ICZ80minya34gpJdFzE990HU4AFYuPRV760oFW4FmaMbAYtNSeFztuzGo},
doi = {10.1109/JIOT.2017.2719623},
year = {2017},
date = {2017-01-01},
journal = {IEEE Internet of Things Journal},
volume = {4},
number = {6},
pages = {1964-1977},
abstract = {This paper introduces a novel, analytic framework for modeling security attacks in Internet of Things (IoT) infrastructures. The devised model is quite generic, and as such, it could flexibly be adapted to various IoT architectures. Its flexibility lies in the underlying theory, it is based on a dynamic G-network, where the positive arrivals denote the data streams that originated from the various data collection networks (e.g., sensor networks), while the negative arrivals denote the securit attacks that result in data losses (e.g., jamming attacks). In addition, we take into account the intensity of an attack by considering both light and heavy attacks. The light attack implies simple losses of traffic data, while the heavy attack causes massive data loss. The introduced model is solved subject to the arrival and departure rates in terms of: 1) average number of data packets in the application domain and 2) attack impact (loss rate). A comprehensive verification discussion accompanied by numerous numerical results verify the accuracy of the proposed model. Moreover, the assessment of the presented model highlights notable operation characteristics of the underlying IoT system under light and heavy attacks. © 2017 IEEE.},
keywords = {G-networks, Internet of Things (IoT), Modeling, queuing theory, security},
pubstate = {published},
tppubtype = {article}
}
This paper introduces a novel, analytic framework for modeling security attacks in Internet of Things (IoT) infrastructures. The devised model is quite generic, and as such, it could flexibly be adapted to various IoT architectures. Its flexibility lies in the underlying theory, it is based on a dynamic G-network, where the positive arrivals denote the data streams that originated from the various data collection networks (e.g., sensor networks), while the negative arrivals denote the securit attacks that result in data losses (e.g., jamming attacks). In addition, we take into account the intensity of an attack by considering both light and heavy attacks. The light attack implies simple losses of traffic data, while the heavy attack causes massive data loss. The introduced model is solved subject to the arrival and departure rates in terms of: 1) average number of data packets in the application domain and 2) attack impact (loss rate). A comprehensive verification discussion accompanied by numerous numerical results verify the accuracy of the proposed model. Moreover, the assessment of the presented model highlights notable operation characteristics of the underlying IoT system under light and heavy attacks. © 2017 IEEE.
Διεύθυνση
Internet of Things and Applications Lab
Department of Electrical and Computer Engineering
University of Western Macedonia Campus
ZEP Area, Kozani 50100
Greece
Πληροφορίες Επικοινωνίας
tel: +30 2461 056527
Email: ithaca@uowm.gr