Sergio Ruiz-Villafranca , Juan Manuel Castelo Gómez , José Roldán-Gómez
{"title":"A forensic tool for the identification, acquisition and analysis of sources of evidence in IoT investigations","authors":"Sergio Ruiz-Villafranca , Juan Manuel Castelo Gómez , José Roldán-Gómez","doi":"10.1016/j.iot.2024.101308","DOIUrl":"10.1016/j.iot.2024.101308","url":null,"abstract":"<div><p>The emergence of the Internet of Things (IoT) has posed a new challenge for forensic investigators, who find themselves carrying out examinations in a very heterogeneous and novel scenario. Aspects such as the high number of devices, the unlikelihood of having physical access to them, the short lifetime of the data, or the difficulty of acquiring it, demand changes in some of the key processes of forensic investigations. In this regard, the identification, acquisition, and analysis phases call for an IoT-centred approach that can fulfil the requirements of the environment. Due to the interoperability of the IoT, and the way in which the data is handled and exchanged, the network traffic becomes a very useful source of evidence. In view of this, this paper presents an automatic procedure for identifying, analysing, and acquiring IoT network traffic and using it as a basis for forensic examinations by employing an edge node capable of performing real-time traffic monitoring and analysis on the most popular IoT protocols. Furthermore, by pairing it with an Intrusion Detection System (IDS) based on Machine Learning (ML) algorithms, the proposal is capable of following a proactive approach, detecting threats and taking the corresponding measures to assure the correct initiation of a forensic process.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S254266052400249X/pdfft?md5=9cf512ece43bae0d0c5c055464a44cdf&pid=1-s2.0-S254266052400249X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141962901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-based IoT security solutions for IDS research centers","authors":"Selman Hızal , A.F.M. Suaib Akhter , Ünal Çavuşoğlu , Devrim Akgün","doi":"10.1016/j.iot.2024.101307","DOIUrl":"10.1016/j.iot.2024.101307","url":null,"abstract":"<div><p>The rapid evolution of the Internet of Things (IoT) has connected real-world objects to the Internet, enhancing digital interaction and introducing critical security vulnerabilities. Intrusion Detection Systems (IDS) are essential in identifying threats and protecting Internet of Things devices from cyberattacks. A secure, decentralized platform enabled by blockchain technology offers the optimal solution for researchers worldwide to collaboratively address the challenges of IoT security effectively. This study introduces a blockchain-based IDS research center to strengthen IoT network security via global collaboration. It demonstrates the benefits of combining IDS with blockchain to improve cybersecurity in research centers, facilitating the efficient sharing of security solutions. By defining various node types on the blockchain, the platform ensures controlled access to services and streamlined network management through specific authorizations. Research centers can contribute to the blockchain with their findings, whereas others utilize the platform to access IDS services. Our work uses machine learning algorithms to achieve promising performance in detecting DDoS attacks, with the XGBoost algorithm demonstrating good results compared to the literature. The findings illustrate how effectively the presented approach works with blockchain technology and the CiCIoT2023 dataset to provide safe and decentralized information sharing.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141952512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dieu Linh Nguyen Thi , Xuan Thuc Kieu , Tien Son Bui , Thanh Lanh Le , Van Cu Pham
{"title":"Towards interworking of matter and oneM2M: Design and implementation of a matter–oneM2M Interworking Proxy Entity","authors":"Dieu Linh Nguyen Thi , Xuan Thuc Kieu , Tien Son Bui , Thanh Lanh Le , Van Cu Pham","doi":"10.1016/j.iot.2024.101313","DOIUrl":"10.1016/j.iot.2024.101313","url":null,"abstract":"<div><p>The new smart home protocol, Matter, has garnered worldwide attention for its ability to tackle the most significant obstacle to fully unlock the potential of smart homes: interoperability. The increasing support for Matter among numerous vendors in their products is having a noticeable impact on interoperability at the device level. This work expands the reach of Matter to the IoT platform level by integrating it with an open and standardized platform, oneM2M. One of the key strengths of oneM2M is its ability to provide an open, common, and flexible interface at the platform level, facilitating seamless interconnection across various domains. This integration pave the way to provide Matter’s smart homes user with advanced intelligence services, including AI/ML applications, and emerging concepts like the metaverse. The proposed Interworking Proxy Entity (IPE) for Matter has been successfully implemented, and multiple scenarios have been tested using both commercial and experimental Matter devices within the oneM2M ACME and Mobius platforms. The results demonstrate seamless integration of Matter devices into the oneM2M platform, enabling other applications to interact with them solely through oneM2M standard interfaces. Additionally, the IPE proves to be practical for real-world applications with negligible overhead, offering mutual benefits for both Matter and oneM2M ecosystems.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141953649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shamsher Ullah , Jianqiang Li , Farhan Ullah , Jie Chen , Ikram Ali , Salabat Khan , Abdul Ahad , Victor C.M. Leung
{"title":"The revolution and vision of explainable AI for Android malware detection and protection","authors":"Shamsher Ullah , Jianqiang Li , Farhan Ullah , Jie Chen , Ikram Ali , Salabat Khan , Abdul Ahad , Victor C.M. Leung","doi":"10.1016/j.iot.2024.101320","DOIUrl":"10.1016/j.iot.2024.101320","url":null,"abstract":"<div><p>The rise and exponential growth in complexity and widespread use of Android mobile devices have resulted in corresponding detrimental consequences within the realm of cyber-attacks. The Android-based device platform is now facing significant challenges from several attack vectors, including but not limited to denial of service (DoS), botnets, phishing, social engineering, malware, and other forms of cyber threats. Among the many threats faced by users, it has been observed that instances of malware attacks against Android phones have become a frequent and regular phenomenon. In contrast to previous studies that concentrated on evaluating the detection skills of machine learning (ML) classifiers in determining the causes, our research is primarily focused on the revolution and vision of eXplainable AI (XAI) for Android malware detection and protection. The XAI that we have presented aims to investigate how machine learning-based models acquire knowledge during the training phase. Our proposed XAI main goal is to study and figure out what makes machine learning-based malware classifiers work so well in controlled lab settings that might not accurately reflect real-life situations. It has been observed that the presence of temporal sample irregularities within the training dataset leads to inflated classification performance, resulting in too optimistic F1 scores and accuracy rates of up to 96.11%, 90.24%, and 99.48% respectively.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141953723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parliamentary adjustment during a crisis: Interplay of digitalization and domestic context factors","authors":"Aleksandra Maatsch","doi":"10.1016/j.iot.2024.101316","DOIUrl":"10.1016/j.iot.2024.101316","url":null,"abstract":"<div><p>The article studies how national parliaments in EU member states adjusted to the Covid-19 pandemic by posing the following questions: to what extent has the application of innovative digital measures facilitated the resilience of parliamentary democracy during the Covid-19 pandemic? What was the interplay between digital measures and other explanatory factors, such respect for the rule of law (RoL) at the domestic level and presence/absence of fast-track measures? Drawing on qualitative content analysis, the article demonstrates that the three explanatory factors reinforce each other. If respect for the RoL is deficient and fast-track measures are allowed, digitalization is not capable of upholding parliamentary powers in emergency situations. At the same time, parliamentary resilience is also possible without digitalization. The condition is that the domestic context guarantees both the respect for the RoL and the absence of fast-track measures.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141979918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing a custom communication protocol for UAVs: Ground control station and architecture design","authors":"Hsia-Hsiang Chen","doi":"10.1016/j.iot.2024.101319","DOIUrl":"10.1016/j.iot.2024.101319","url":null,"abstract":"<div><p>Robots have become a prominent research topic across various application domains in recent decades. Additionally, unmanned aerial vehicles (UAVs) are extensively used in both the military and commercial sectors, substantially reducing transaction costs and enhancing safety. Researchers have addressed secure control and communication protocols between software, firmware, and hardware components. This study focuses on the design of three critical elements: the hardware architecture, the software ground control station (GCS), and the firmware tasks within the UAV embedded system. These components are interconnected via an enhanced MAVLink protocol (EMP). Furthermore, various sensors are integrated into the UAV's peripheral devices. We discuss flight control (FC) approaches, such as proportional-integral-derivative (PID) control and the Kalman filter (KF), detailing the process of the hovering algorithm. Additionally, we explain how access is messaged and how message commands are implemented at the protocol layer. We propose a large-scale UAV system architecture suitable for commercial and military applications, supported by a real-life scenario. Experimental results demonstrate the effectiveness and efficiency of the UAV in outdoor activities. Our findings confirm that the proposed UAV architecture is a robust and efficient system in practical applications.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141953648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olusogo Popoola , Marcos A Rodrigues , Jims Marchang , Alex Shenfield , Augustine Ikpehai , Jumoke Popoola
{"title":"An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security","authors":"Olusogo Popoola , Marcos A Rodrigues , Jims Marchang , Alex Shenfield , Augustine Ikpehai , Jumoke Popoola","doi":"10.1016/j.iot.2024.101314","DOIUrl":"10.1016/j.iot.2024.101314","url":null,"abstract":"<div><p>This study proposes an optimized hybrid encryption framework combining ECC-256r1 with AES-128 in EAX mode, tailored for smart home healthcare environments, and conducts a comprehensive investigation to validate its performance. Our framework addresses current limitations in securing sensitive health data and demonstrates resilience against emerging quantum computing threats. Through rigorous experimental evaluation, we show that the proposed configuration outperforms existing solutions by delivering unmatched security, processing speed, and energy efficiency. It employs a robust yet streamlined approach, meticulously designed to ensure simplicity and practicality, facilitating seamless integration into existing systems without imposing undue complexity. Our investigation affirms the framework's capability to resist common cybersecurity threats like MITM, replay, and Sybil attacks while proactively considering quantum resilience. The proposed method excels in processing speed (0.006 seconds for client and server) and energy efficiency (3.65W client, 95.4W server), offering a quantum-resistant security level comparable to AES-128. This represents a security-efficiency ratio of 21.33 bits per millisecond, a 25.6% improvement in client-side processing speed, and up to 44% reduction in server-side energy consumption compared to conventional RSA-2048 methods. These improvements enable real-time encryption of continuous health data streams in IoT environments, making it ideal for IoT devices where AES-128′s smaller footprint is advantageous. By prioritizing high-grade encryption alongside ease of use and implementation, the proposed framework presents a future-proof solution that anticipates the trajectory of cryptographic standards amid advancing quantum computing technologies, signifying a pivotal advancement in safeguarding IoT-driven healthcare data.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002555/pdfft?md5=2390a56d976465509b02838e71b34da6&pid=1-s2.0-S2542660524002555-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141953742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fábio Coutinho dos Santos , Fátima Duarte-Figueiredo , Robson E. De Grande , Aldri L. dos Santos
{"title":"Enhancing a fog-oriented IoT authentication and encryption platform through deep learning-based attack detection","authors":"Fábio Coutinho dos Santos , Fátima Duarte-Figueiredo , Robson E. De Grande , Aldri L. dos Santos","doi":"10.1016/j.iot.2024.101310","DOIUrl":"10.1016/j.iot.2024.101310","url":null,"abstract":"<div><p>The term Internet of Things (IoT) refers to a network that connects smart things with sensors. Healthcare, transportation, and smart cities are some IoT applications. IoT technologies integrate objects in the cloud-based Internet. The massive scale of IoT exposes some systems to attacks. There is an urgent need for solutions that efficiently handle IoT authentication, encryption, and attack detection. This work proposes a Fog-based IoT security platform named IoTSafe. It contains mechanisms for authentication and encryption and a deep learning-based attack detection module. The IoTSafe attack detection module uses the Message Queue Telemetry Transport (MQTT). Tests were performed to evaluate the IoTSafe platform in three different environments. A case study demonstrated that the platform is efficient with all proposed mechanisms and modules. The results for the attack detection module show the proposal’s effectiveness with an accuracy of 99.57% and a precision of 99.66%. The IoTSafe time response was less than one second, guaranteeing the quality of service.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oleksandr Kuznetsov , Dzianis Kanonik , Alex Rusnak , Anton Yezhov , Oleksandr Domin , Kateryna Kuznetsova
{"title":"Adaptive Merkle trees for enhanced blockchain scalability","authors":"Oleksandr Kuznetsov , Dzianis Kanonik , Alex Rusnak , Anton Yezhov , Oleksandr Domin , Kateryna Kuznetsova","doi":"10.1016/j.iot.2024.101315","DOIUrl":"10.1016/j.iot.2024.101315","url":null,"abstract":"<div><p>The scalability of blockchain technology remains a critical challenge, hindering its widespread adoption across various sectors. This study introduces an innovative approach to address this challenge by proposing the adaptive restructuring of Merkle trees, fundamental components of blockchain architecture responsible for ensuring data integrity and facilitating efficient verification processes. Unlike traditional static tree structures, our adaptive model dynamically adjusts the configuration of these trees based on usage patterns, significantly reducing the average path length required for verification and, consequently, the computational overhead associated with these processes. Through a comprehensive conceptual framework, we delineate the methodology for adaptive restructuring, encompassing both binary and non-binary tree configurations. This framework is validated through a series of detailed examples, demonstrating the practical feasibility and the efficiency gains achievable with our approach. To empirically assess the effectiveness of our proposed method, we conducted rigorous experiments using real-world data from the Ethereum blockchain. The results provide compelling evidence for the superiority of adaptive Merkle trees, with efficiency gains of up to 30% and higher observed during the initial stages of tree restructuring. Moreover, we present a comparative analysis with existing scalability solutions, highlighting the unique advantages of adaptive restructuring in terms of simplicity, security, and efficiency enhancement without introducing additional complexities or dependencies. This study’s implications extend beyond theoretical advancements, offering a scalable, secure, and efficient method for blockchain data verification that could facilitate broader adoption of blockchain technology in finance, supply chain management, and beyond. As the blockchain ecosystem continues to evolve, the principles, methodologies, and empirical findings outlined herein are poised to contribute significantly to its growth and maturity. <strong>Statement</strong> The findings of this article were presented at ETHDenver 2024 (<span><span>https://www.ethdenver.com/</span><svg><path></path></svg></span>), a leading innovation festival that champions the Web3 community’s role in shaping the future of blockchain technology. A video of our presentation can be found at <span><span>https://www.youtube.com/watch?v=-jjYVCAQkNE</span><svg><path></path></svg></span>. The original manuscript of this article is available on the preprint archive at <span><span>https://arxiv.org/abs/2403.00406</span><svg><path></path></svg></span>.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141962905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-based approach for attack detection in IoT devices: A survey","authors":"Valentino Merlino, Dario Allegra","doi":"10.1016/j.iot.2024.101306","DOIUrl":"10.1016/j.iot.2024.101306","url":null,"abstract":"<div><p>The proliferation of Internet of Things (IoT) devices has revolutionized multiple sectors, promising significant societal benefits. With an estimated 29 billion IoT devices expected to be interconnected by 2030, these devices span from common household items to advanced sensors and applications across various domains. However, the extensive scale of IoT networks has introduced security challenges, including vulnerabilities, cyber-attacks, and a lack of standardized protocols. In response to evolving threats, machine learning techniques, particularly for malware detection, have made significant strides. This survey focuses on a less-explored aspect of IoT security: the potential of energy-based attack detection. We aim to provide an up-to-date, comprehensive understanding of this approach by analyzing the existing body of research. We explore the diverse landscape of machine learning methodologies employed in IoT security, emphasizing the energy-based approach as a valuable tool for detecting and mitigating attacks. Furthermore, this survey underscores the significance of power consumption analysis in identifying deviations from expected behavior, enabling the detection of ongoing attacks or security vulnerabilities. Our survey offers insights into the state-of-the-art techniques, methodologies, and advancements in energy-based attack detection for IoT devices. By presenting a structured roadmap through the literature, research methodology, and in-depth discussion, we aim to aid researchers, practitioners, and policymakers in enhancing IoT security. This survey’s unique contribution lies in bridging the gap in the literature regarding energy-based approaches and underscoring their potential for fortifying IoT security. Future research in this direction promises to significantly enhance the safety and resilience of the IoT landscape.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002476/pdfft?md5=d084df37e5f12ee0ae887f65422c5cc2&pid=1-s2.0-S2542660524002476-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141963218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}