{"title":"Securing Industrial Control Systems Using Physical Device Fingerprinting","authors":"Tsion Yimer, Md Tanvir Arafin, K. Kornegay","doi":"10.1109/IOTSMS52051.2020.9340160","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340160","url":null,"abstract":"The advent of the Internet-of-Things (IoT) has introduced new connectivity modalities, communication protocols, and optimized architectures to coordinate Things on a network. BACnet MS/TP is a protocol that has the potential to deliver a reliable IoT back-end for industrial systems. However, conventional security threats can severely affect trust between the nodes in the network, leading to critical infrastructure failures. Hence, we analyze the opportunities and challenges for hardware solutions in securing BACnet controllers in this work. First, we look into the security threats and develop practical attack models. Then, we demonstrate how we model clocks in the network for fingerprinting. Next, we propose a distributed security monitor for deployment across the BACnet MS/TP nodes. We also illustrate how clock fingerprinting data can enable the security monitor to prevent intrusion and tampering. Finally, we experimentally verify our attacker model, attack scenarios, and the effectiveness of hardware-oriented security solutions for intrusion prevention and tampering on an industrial standard BACnet MS/TP network.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reinout Eyckerman, Siegfried Mercelis, J. Márquez-Barja, P. Hellinckx
{"title":"Evaluation of Objective Function Descriptions And Optimization Methodologies For Task Allocation In A Dynamic Fog Environment","authors":"Reinout Eyckerman, Siegfried Mercelis, J. Márquez-Barja, P. Hellinckx","doi":"10.1109/IOTSMS52051.2020.9340219","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340219","url":null,"abstract":"Industry, healthcare, and various other sectors are rapidly adopting the Internet of Things to drive information and automation systems. However, as the number of devices increases, the number of information sent over the network increases as well, inducing network congestion and a potential latency increase. To ensure that demanding applications, such as smart vehicles, are supported in the current network infrastructure, we provide a general methodology of distributing software from the cloud toward the edge, reducing multiple objectives such as latency. In this research we define several problems in multi-objective distribution scenarios, and compare several methodologies for defining and solving the problem. Additionally, we propose a method for decreasing the problem complexity, improving performance with only slightly reduced accuracy.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115707213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Achraf Rahmouni, Catarina Ferreira Da Silva, P. Ghodous
{"title":"Methodological approach for creating an IoT manufacturing application","authors":"Achraf Rahmouni, Catarina Ferreira Da Silva, P. Ghodous","doi":"10.1109/IOTSMS52051.2020.9340188","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340188","url":null,"abstract":"With the heterogeneity and diversity of electronic systems and their memory capacity, the Internet of Things technologies face several challenges, such as the difficulty in choosing in a growing catalog of IoT technologies and the lack of interoperability of these technologies. This leads to the creation of particular IoT architectures and to the selection of IoT technologies by trying and error approaches. We propose a methodological approach for creating an IoT application guided by the users’ needs and by the contextual environment. It enables the user to select the right hardware guided by the market supply and to check the performances of the IoT solutions. We implement and test our proposition in a picking system of a manufacturing factory. This practical implementation provides feedback regarding our methodological approach for creating an IoT application, which in turn enables us to improve and remodel the approach.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116152182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oussama Mounnan, A. E. Mouatasim, Otman Manad, Aissam Outchakoucht, Hamza Es-Samaali, L. Boubchir
{"title":"A Novel Approach Based on Blockchain to Enhance Security with Dynamic Policy Updating","authors":"Oussama Mounnan, A. E. Mouatasim, Otman Manad, Aissam Outchakoucht, Hamza Es-Samaali, L. Boubchir","doi":"10.1109/IOTSMS52051.2020.9340164","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340164","url":null,"abstract":"The cipher-text policy attribute-based encryption is a promising technique to ensure the security in the third trust parties environment and offers opportunities to their users. However, the policy updating becomes a challenging issue when we use CP-ABE to construct access control schemes. The traditional method consists of presenting a huge work to the data owners, data retrieving, its re-encryption under the new access policy, and the re-sending back to the cloud. These interactions incur a heavy computation burden and a high communication on the data owner. In this paper, we propose a novel approach, in one hand, to enhance the security by using Blockchain technology, and in the other hand to update the access policy dynamically. We use Blockchain to deploy a policy in a manner that preserves security. We use also the cloud to store the data with CP-ABE, and especially, we focus on the delegation of the policy updating method to the cloud. This method can minimize the computation work and avoid the transmission of encrypted data by combining the ciphertext and previous access strategy. Moreover, we also design a policy updating algorithm. In our scheme, the security is occurred by two factors, the first one must satisfy the policy in the CP-ABE. The second one also must satisfy the policy deployed in the Blockchain to have the authorization token generated to access the desired resources.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132590569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WSNB: Wearable Sensors with Neural Networks Located in a Base Station for IoT Environment","authors":"Alaa Mheisn, M. Shurman, A. Alma'aitah","doi":"10.1109/IOTSMS52051.2020.9340167","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340167","url":null,"abstract":"The Internet of Things (IoT) is a system paradigm that recently introduced, which includes different smart devices and applications, especially, in smart cities, e.g.; manufacturing, homes, and offices. To improve their awareness capabilities, it is attractive to add more sensors to their framework. In this paper, we propose adding a new sensor as a wearable sensor connected wirelessly with a neural network located on the base station (WSNB). WSNB enables the added sensor to refine their labels through active learning. The new sensors achieve an average accuracy of 93.81%, which is 4.5% higher than the existing method, removing human support and increasing the life cycle for the sensors by using neural network approach in the base station.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129030368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VM Introspection-based Allowlisting for IaaS","authors":"Farah Fargo, O. Franza, Cihan Tunc, S. Hariri","doi":"10.1109/IOTSMS52051.2020.9340190","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340190","url":null,"abstract":"Cloud computing has become the main backend of the IT infrastructure as it provides ubiquitous and on-demand computing to serve to a wide range of users including end-users and high-performance demanding agencies. The users can allocate and free resources allocated for their Virtual Machines (VMs) as needed. However, with the rapid growth of interest in cloud computing systems, several issues have arisen especially in the domain of cybersecurity. It is a known fact that not only the malicious users can freely allocate VMs, but also they can infect victims’ VMs to run their own tools that include cryptocurrency mining, ransomware, or cyberattacks against others. Even though there exist intrusion detection systems (IDS), running an IDS on every VM can be a costly process and it would require fine configuration that only a small subset of the cloud users are knowledgeable about. Therefore, to overcome this challenge, in this paper we present a VM introspection based allowlisting method to be deployed and managed directly by the cloud providers to check if there are any malicious software running on the VMs with minimum user intervention. Our middleware monitors the processes and if it detects unknown events, it will notify the users and/or can take action as needed.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127186750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Shapsough, I. Zualkernan, R. Dhaouadi, A. Sajun
{"title":"Using Siamese Networks to Detect Shading on the Edge of Solar Farms","authors":"S. Shapsough, I. Zualkernan, R. Dhaouadi, A. Sajun","doi":"10.1109/IOTSMS52051.2020.9340189","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340189","url":null,"abstract":"Solar power is one of the most promising sources of green power for future cities. However, real-time anomaly detection remains a challenge. Internet of Things (IoT) is an effective platform for real-time monitoring of large-scale solar farms. Using low-cost edge devices such as the Raspberry Pi (RPI), it is possible to not only read power and irradiance values from in-situ sensors, but to also apply machine learning and deep learning algorithms for real-time analysis and for detecting anomalous behaviors. This paper presents the design and implementation of an edge analytics application that uses RPI as an edge device. The Isolation Forest algorithm was first used to detect shading anomalies. A Siamese neural network was then trained to create a latent-space mapping. An anomaly detection model based on the latent space and a neural network and kNN was developed. These models could detect shading anomalies with an F1-Score of 0.94. Embedded variants of the model based on TensorFlow Lite and TensorRT were evaluated to service a large number of solar panels at 1Hz. The results are that a single RPI could do parallel anomaly detection of 512 solar panels at 1 Hz with 0% failures. The TensorRT variant consumed more resources than the TensorFlow Lite implementation, but the maximum CPU utilization remained below 75%.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121521949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anastasija Nikiforova, J. Bičevskis, Zane Bicevska, Ivo Oditis
{"title":"Data Quality Model-based Testing of Information Systems: the Use-case of E-scooters","authors":"Anastasija Nikiforova, J. Bičevskis, Zane Bicevska, Ivo Oditis","doi":"10.1109/IOTSMS52051.2020.9340228","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340228","url":null,"abstract":"The paper proposes a data quality model-based testing methodology aimed at improving testing methodology of information systems (IS) using previously proposed data quality model. The solution supposes creation of a description of the data to be processed by IS and the data quality requirements used for the development of the tests, followed by performing an automated test of the system on the generated tests verifying the correctness of data to be entered and stored in the database. The generation of tests for all possible data quality conditions creates a complete set of tests that verify the operation of the IS under all possible data quality conditions. The proposed solution is demonstrated by the real example of the system dealing with e-scooters. Although the proposed solution is demonstrated by applying it to the system that is already in use, it can also be used when developing a new system.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transferability of Privacy-related Behaviours to Shared Smart Home Assistant Devices","authors":"Vanessa Z. Lin, S. Parkin","doi":"10.1109/IOTSMS52051.2020.9340199","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340199","url":null,"abstract":"Smart assistant devices (such as Amazon Echo or Google Home) have notable differences to more conventional consumer computing devices. They can be used through voice control as well as physical interaction, and are often positioned as a shared device within a home environment. We conduct an exploratory online survey with 97 UK-based users of smart assistant devices, to examine the differences users perceive between smart assistants and more familiar devices (such as smartphones and computers), in terms of shared use dynamics, privacy-related behaviours, and privacy concerns. The survey explores typical usage, setup practices, perceived ease of use and control, privacy concerns for multiple users, shared usage of existing devices, and smart assistant privacy control usage. Approximately half of participants were unsure of where to access privacy settings on their smart home assistants; basic device controls and informal privacy controls saw general use. Those who had used privacy controls with previous devices used at least one smart assistant privacy control. Results have implications for supporting transferable privacy behaviours from computing devices to smart home devices, and improving privacy-related design for smart assistants.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130819801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IOTSMS 2020 Author Index","authors":"","doi":"10.1109/iotsms52051.2020.9340227","DOIUrl":"https://doi.org/10.1109/iotsms52051.2020.9340227","url":null,"abstract":"","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"19 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132497936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}