Skip to main content

Attack Identification Framework for IoT Devices

  • Conference paper
  • First Online:
Information Systems Design and Intelligent Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 434))

Abstract

With the emergence of Internet and embedded computing, Internet of Things (IoT) is currently becoming an area of interest amongst researches. IoT enable interconnection of embedded devices capable of running application like smart grid, smart traffic control, remote health monitoring etc. As the IoT devices can be connected virtually as well as physically, cyber attacks are likely to become a major threat. An attacker who have an access to the on-board network connecting IoT devices or appliances can spy on people, can inject malicious code into these embedded devices creating serious security concerns. In this work, we propose a framework to monitor security threats possible on IoT devices. The framework consists of several modules like data capture, anomaly detector and alert generator. The data capture module collects the application level data, transport and network headers of the traffic that goes into the IoT device. The anomaly detector module uses a signature based approach to detect threats. The proposed framework is tested on a testbed comprising of Arduino boards with Wiznet Ethernet shield as the IoT device communicate with Samsung Android smart-phone over a bridge connected through WiFi. We ran SNORT Intrusion Detector on the bridge with rules for generating alerts for intrusion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Y. Berhanu, H. Abie, and M. Hamdi. A testbed for adaptive security for iot in ehealth. In Proceedings of the International Workshop on Adaptive Security, page 5. ACM, 2013.

    Google Scholar 

  2. O. S. Lab. The 2015 internet of things in the enterprise report: Executive summary. available online at:. http://info.opendns.com/rs/033-OMP-861/images/OpenDNS-2015-IoT-Executive-Summary.pdf/. Accessed on July 2015.

  3. Souliss. Souliss. available online at:. https://code.google.com/p/souliss/. Accessed on Jan 2015.

  4. T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, and K. Wehrle. Security challenges in the ip-based internet of things. Wireless Personal Communications, 61(3):527–542, 2011.

    Google Scholar 

  5. A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah. A systemic approach for iot security. In Distributed Computing in Sensor Systems (DCOSS), 2013 IEEE International Conference on, pages 351–355. IEEE, 2013.

    Google Scholar 

  6. G. S. John Pescatore. Securing the internet of things survey. available online at:. https://www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785/. Accessed on Feb 2015.

  7. Wireshark. Wireshark. available online at:. https://wireshark.org/, 2015.

  8. Arduino. Arduino. available online at:. http://arduino.cc/en/Main/Software/. Accessed on Jan 2015.

  9. Wiznet. Wiznet ethernet w5100. available online at:. https://sparkfun.com/datasheets/. Accessed on Jan 2015.

  10. S. A5.2.1. Souliss archive. available online at:. https://souliss.googlecode.com/archive/A5.2.1/. Accessed on Jan 2015.

Download references

Acknowledgments

This work was supported by grant from Tata Consultancy Services (TCS) under research scholar program, India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jagan Mohan Reddy Danda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Danda, J.M.R., Hota, C. (2016). Attack Identification Framework for IoT Devices. In: Satapathy, S.C., Mandal, J.K., Udgata, S.K., Bhateja, V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 434. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2752-6_49

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2752-6_49

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2750-2

  • Online ISBN: 978-81-322-2752-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics