{"title":"DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with online learning for health Internet of Things and Internet of Vehicles","authors":"Erol Gelenbe , Baran Can Gül , Mert Nakıp","doi":"10.1016/j.iot.2024.101340","DOIUrl":"10.1016/j.iot.2024.101340","url":null,"abstract":"<div><p>Networked health systems are often the victims of cyberattacks with serious consequences for patients and healthcare costs, with the Internet of Things (IoT) being an additional prime target. In future systems we can imagine that the Internet of Vehicles (IoV) will also be used for conveying patients for diagnosis and treatment in an integrated manner. Thus the medical field poses very significant and specific challenges since even for a single patient, several providers may carry out tests or offer healthcare services, and may have distinct interconnected sub-contractors for services such as ambulances and connected cars, connected devices or temporary staff providers, that have distinct confidentiality requirements on top of possible commercial competition. On the other hand, these distinct entities can be subject to similar or coordinated attacks, and could benefit from each others’ cybersecurity experience to better detect and mitigate cyberattacks. Thus the present work proposes a novel Distributed Self-Supervised Federated Intrusion Detection Algorithm (DISFIDA), with Online Self-Supervised Federated Learning, that uses Dense Random Neural Networks (DRNN). In DISFIDA learning data is private, and neuronal weights are shared among Federated partners. Each partner in DISFIDA combines its synaptic weights with those it receives other partners, with a preference for those weights that have closer numerical values to its own weights which it has learned on its own. DISFIDA is tested with three open-access datasets against five benchmark methods, for two relevant IoT healthcare applications: networks of devices (e.g., body sensors), and Connected Smart Vehicles (e.g., ambulances that transport patients). These tests show that the DISFIDA approach offers 100% True Positive Rate for attacks (one percentage point better than comparable state of the art methods which attain 99%) so that it does better at detecting attacks, with 99% True Negative Rate similar to state-of-the-art Federated Learning, for Distributed Denial of Service (DDoS) attacks.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101340"},"PeriodicalIF":6.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002816/pdfft?md5=3f8cac47e530cac8c010a7b776652d64&pid=1-s2.0-S2542660524002816-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Le Sun , Yueyuan Wang , Huiyun Li , Ghulam Muhammad
{"title":"Fine-grained vulnerability detection for medical sensor systems","authors":"Le Sun , Yueyuan Wang , Huiyun Li , Ghulam Muhammad","doi":"10.1016/j.iot.2024.101362","DOIUrl":"10.1016/j.iot.2024.101362","url":null,"abstract":"<div><p>The Internet of Things (IoT) has revolutionized the healthcare system by connecting medical sensors to the internet, while also posing challenges to the security of medical sensor networks (MSN). Given the extreme sensitivity of medical data, any vulnerability may result in data breaches and misuse, impacting patient safety and privacy. Therefore, safeguarding MSN security is critical. As medical sensor devices rely on smart healthcare software systems for data management and communication, precisely detecting system code vulnerabilities is essential to ensuring network security. Effective software vulnerability detection targets two key objectives: (i) achieving high accuracy and (ii) directly identifying vulnerable code lines for developers to fix. To address these challenges, we introduce Vulcoder, a novel vulnerability-oriented, encoder-driven model based on the Bidirectional Encoder Representations from Transformers (BERT) architecture. We propose a one-to-one mapping function to capture code semantics through abstract syntax trees (AST). Combined with multi-head attention, Vulcoder achieves precise function- and line-level detection of software vulnerabilities in MSN. This accelerates the vulnerability remediation process, thereby strengthening network security. Experimental results on various datasets demonstrate that Vulcoder outperforms previous models in identifying vulnerabilities within MSN. Specifically, it achieves a 1%–419% improvement in function-level prediction F1 scores and a 12.5%–380% increase in line-level localization precision. Therefore, Vulcoder helps enhance security defenses and safeguard patient privacy in MSN, facilitating the development of smart healthcare.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101362"},"PeriodicalIF":6.0,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524003032/pdfft?md5=ec517a1daef40dd544058b39166a1eae&pid=1-s2.0-S2542660524003032-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ehsanul Islam Zafir , Afifa Akter , M.N. Islam , Shahid A. Hasib , Touhid Islam , Subrata K. Sarker , S.M. Muyeen
{"title":"Enhancing security of Internet of Robotic Things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques","authors":"Ehsanul Islam Zafir , Afifa Akter , M.N. Islam , Shahid A. Hasib , Touhid Islam , Subrata K. Sarker , S.M. Muyeen","doi":"10.1016/j.iot.2024.101357","DOIUrl":"10.1016/j.iot.2024.101357","url":null,"abstract":"<div><p>The Internet of Robotic Things (IoRT) integrates robots and autonomous devices, transforming industries such as manufacturing, healthcare, and transportation. However, security vulnerabilities in IoRT systems pose significant challenges to data privacy and system integrity. To address these issues, encryption is essential for protecting sensitive data transmitted between devices. By converting data into ciphertext, encryption ensures confidentiality and integrity, reducing the risk of unauthorized access and data breaches. Blockchain technology also enhances IoRT security by offering decentralized, tamper-proof data storage solutions. By offering comprehensive insights, practical recommendations, and future directions, this paper aims to contribute to the advancement of knowledge and practice in securing interconnected robotic systems, thereby ensuring the integrity and confidentiality of data exchanged within IoRT ecosystems. Through a thorough examination of encryption requisites, scopes, and current implementations in IoRT, this paper provides valuable insights for researchers, engineers, and policymakers involved in IoRT security efforts. By integrating encryption and blockchain technologies into IoRT systems, stakeholders can foster a secure and dependable environment, effectively manage risks, bolster user confidence, and expedite the widespread adoption of IoRT across diverse sectors. The findings of this study underscore the critical role of encryption and blockchain technology in IoRT security enhancement and highlight potential avenues for further exploration and innovation. Furthermore, this paper suggests future research areas, such as threat intelligence and analytics, security by design, multi-factor authentication, and AI for threat detection. These recommendations support ongoing innovation in securing the evolving IoRT landscape.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101357"},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002981/pdfft?md5=a4332066960a6d42faa3e5a09581d2cb&pid=1-s2.0-S2542660524002981-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CLARA: A cluster-based node correlation for sampling rate adaptation and fault tolerance in sensor networks","authors":"Hassan Harb , Clara Abou Nader , Ali Jaber , Mourad Hakem , Jean-Claude Charr , Chady Abou Jaoude , Chamseddine Zaki","doi":"10.1016/j.iot.2024.101345","DOIUrl":"10.1016/j.iot.2024.101345","url":null,"abstract":"<div><p>Recently, wireless sensor networks (WSNs) have been proven as an efficient and low-cost solution for monitoring various kind of applications. However, the massive amount of data collected and transmitted by the sensor nodes, which are mostly redundant, will quickly consume their limited battery power, which is sometimes difficult to replace or recharge. Although the huge efforts made by researchers to solve such problem, most of the proposed techniques suffer from their accuracy and their complexity, which is not suitable for limited-resources sensors. Therefore, designing new data reduction techniques to reduce the raw data collected in such networks is becoming essential to increase their lifetime. In this paper, we propose a CLuster-based node correlation for sAmpling Rate adaptation and fAult tolerance, abbreviated CLARA, mechanism dedicated to periodic sensor network applications. Mainly, CLARA works on two stages: node correlation and fault tolerance. The first stage introduces a data clustering method that aims to search the correlation among neighboring nodes. Then, it accordingly adapts their sensing frequencies in a way to reduce the amount of data collected in such networks while preserving the information integrity at the sink. In the second stage, a fault tolerance model is proposed that allows the sink to regenerate the raw sensor data based on two methods: moving average (MA) and exponential smoothing (ES). We demonstrated the efficiency of our technique through both simulations and experiments. The best obtained results show that the first stage can reduce the sensor sampling rate, and accordingly the sensor energy, up to 64% while the second stage can accurately regenerate the raw data with an error loss less than 0.15.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101345"},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoTSLE: Securing IoT systems in low-light environments through finite automata, deep learning and DNA computing based image steganographic model","authors":"Subhadip Mukherjee, Somnath Mukhopadhyay, Sunita Sarkar","doi":"10.1016/j.iot.2024.101358","DOIUrl":"10.1016/j.iot.2024.101358","url":null,"abstract":"<div><p>The Internet of Things (IoT) is a vast network of interconnected devices and systems, including wearables, smart home appliances, industrial machinery, and vehicles, equipped with sensors and connectivity. The data collected by the IoT devices are transmitted over a network, for processing and analyzing that data, so that appropriate actions can be initiated. Security of IoT systems is a major concern, as IoT devices collect and transmit crucial information. But images captured in low-light environments pose a challenge for IoT security by limiting the ability to accurately identify objects and people, increasing the risk of spoofing, and hindering forensic analysis. This paper unfolds a novel framework for IoT security using Steganography in Low-light Environment (IoTSLE) by image enhancement and data concealment. In proposed IoTSLE, initially, the low-light images, captured by the IoT devices in a low-light environment, are enhanced by band learning with recursion and band recomposition. After that, the secret information is concealed within the enhanced image. This concealment is supervised by using a specially designed finite automata for genome sequence encoding and 2-2-2 embedding. The proposed steganography technique is capable of hiding secret information within a 512 × 512 RGB image with the payload of 2<!--> <!-->097<!--> <!-->152 bits. The experiments like, PSNR, SSIM, Q-Index, BER, NCC, and NAE etc. are conducted to analyze the imperceptibility and security of IoTSLE. The proposed IoTSLE is useful for various IoT systems in different private and government fields like, defense agencies, digital forensics, agriculture, healthcare industry, cybersecurity firms, smart home, smart city etc.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101358"},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimized and intelligent metaverse intrusion detection system based on rough sets","authors":"Gehad Ismail Sayed , Aboul Ella Hassanien","doi":"10.1016/j.iot.2024.101360","DOIUrl":"10.1016/j.iot.2024.101360","url":null,"abstract":"<div><p>The convergence of the Internet of Things (IoT) and the Metaverse is revolutionizing the digital world by providing immersive, interactive environments as well as new data transmission opportunities. However, this rapid integration raises complex security issues, including an increased risk of unlawful access and data breaches. Strong cybersecurity measures are required to identify and prevent these attacks, preserving the security and confidentiality of users. Finding significant features for recognizing malicious attacks and enhancing the accuracy of network intrusion detection in general, and particularly in the virtual environment, are some of the significant research needs. This paper introduces an intelligent intrusion detection system (IIDS) based on rough set-based electric eel foraging optimization (RSEEFO) in conjunction with the AdaBoost-based classification algorithm. The main objective of this system is to detect and recognize different types of attacks on the interaction and connectivity between the IoT and the metaverse. The proposed IIDS-RSEEFO consists of three phases, which are data pre-processing, multi-IoT attack classification, and evaluation. The main problems associated with the adopted dataset are handled in data pre-processing. Then, in the second phase, a one-versus-all approach is employed along with RSEEFO and AdaBoost to handle the multi-class classification problem. Finally, several evaluation metrics are employed to assess the reliability and robustness of the proposed IIDS-RSEEFO. The proposed IIDS was tested on CIC-IoT-2023 and validated on UNSWNB-15. It achieved high accuracy across all attack types of CIC-IoT-2023, with accuracies of 99.7 %, 100 %, 100 %, 99.8 %, 100 %, 100 %, 99.8 %, and 100 % for benign traffic, DDoS, brute force, spoofing, DoS, Mirai, recon, and web-Based respectively, accompanied by robust sensitivity, F1-Score, Specificity, G-Mean, and crossover-error rate metrics demonstrating its effectiveness in accurately predicting each attack type. Additionally, it obtained high accuracy for all attack types of UNSWNB-15, with accuracies of 96.48 %, 99.12 %, 99.24 %, 93.78 %, 92.55 %, 92.55 %, 92.55 %, 94.73 %, 94.73 %, 98.09 %, 98.39 %, 99.50 %, and 99.95 % for analysis, backdoor, DoS, exploits, fuzzers, generic, normal, reconnaissance, shellcode, and worms, respectively. In addition, the results evaluated that the proposed model is superior compared to the existing intrusion detection systems.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101360"},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time series processing-based malicious activity detection in SCADA systems","authors":"Michael Zaslavski, Meir Kalech","doi":"10.1016/j.iot.2024.101355","DOIUrl":"10.1016/j.iot.2024.101355","url":null,"abstract":"<div><p>Many critical infrastructures, essential to modern life, such as oil and gas pipeline control and electricity distribution, are managed by SCADA systems. In the contemporary landscape, these systems are interconnected to the internet, rendering them vulnerable to numerous cyber-attacks. Consequently, ensuring SCADA security has become a crucial area of research. This paper focuses on detecting attacks that manipulate the timing of commands within the system, while maintaining their original order and content. To address this challenge, we propose several machine-learning-based methods. The first approach relies on Long-Short-Term Memory model, and the second utilizes Hierarchical Temporal Memory model, both renowned for their effectiveness in detecting patterns in time-series data. We rigorously evaluate our methods using a real-life SCADA system dataset and show that they outperform previous techniques designed to combat such attacks.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101355"},"PeriodicalIF":6.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive IoT edge based smart irrigation system for tomato cultivation","authors":"Rohit Kumar Kasera, Tapodhir Acharjee","doi":"10.1016/j.iot.2024.101356","DOIUrl":"10.1016/j.iot.2024.101356","url":null,"abstract":"<div><p>Agriculture industry is the primary engine for a country's economic development. Growing crops using minimum irrigation water is a major challenge for farmers. In conventional farming, crops may be affected by various diseases due to inadequate irrigation scheduling. Recent proposals have suggested using Edge-IoT, AI, and distributed computing to accelerate the inference procedure utilized in smart irrigation applications. The use of resource-constrained edge servers and edge devices used to deliver smart agriculture applications can cause latency-sensitive workloads to interfere with one another. To address this issue, we design a long-range (LoRa) edge IoT computing-based sustainable and customized smart irrigation framework to capture the real-time data of tomato plants. This helps in automatic underground drip irrigation scheduling. This also predicts total water demand and usage, and measure plant growth status. The edge-IoT cloud data transmission control and optimization has been enforced using Smart irrigation data optimization and robust transmission (SIDORT) Message Queuing Telemetry Transport (MQTT) system. We develop a hybrid algorithm named Linked least traversal (LLT) for machine-to-machine communication (M2M). Also, a Reinforcement learning (RL) based Optimal Soil Wetness Closeness Policy (OSWCP) for irrigation scheduling has been proposed. The performance of the proposed smart irrigation models has been validated through extensive experiments using real-time data in which OSWCP performance has been measured at a 97.88 % accuracy rate. Additionally, a comparison of our proposed architecture has been accomplished by resolving the existing smart irrigation system challenges.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101356"},"PeriodicalIF":6.0,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Francis Borges Oliveira , Marco Di Felice , Carlos Kamienski
{"title":"IoTDeploy: Deployment of IoT Smart Applications over the Computing Continuum","authors":"Francis Borges Oliveira , Marco Di Felice , Carlos Kamienski","doi":"10.1016/j.iot.2024.101348","DOIUrl":"10.1016/j.iot.2024.101348","url":null,"abstract":"<div><p>IoT Smart Applications have created a demand for architectures, infrastructure, platforms, orchestration, and service deployment strategies. They are deployed from sensors to the cloud over a geographical and computing continuum, which is challenging for service orchestration and DevOps strategies. The distributed infrastructure to implement the end-to-end data path may vary, even for similar applications, concerning the services deployed over the mist, fog, edge, and cloud stages. This paper proposes and evaluates IoTDeploy, a solution for streamlining and scaling static and dynamic IoT service deployment over the continuum. IoTDeploy implements a CI/CD tool plugin for deploying applications running on the continuum and supports dynamic service migration. We evaluated the service migration from cloud to fog and fog to cloud with a case study on smart irrigation in agriculture. The experiments reveal that deployment in IoT-distributed environments is reliable and resilient, enabling migration without interrupting the application and losing data.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101348"},"PeriodicalIF":6.0,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Positive connotations of map-matching based on sub-city districts for trajectory data analytics","authors":"Zheng-Yun Zhuang , Ye Ding","doi":"10.1016/j.iot.2024.101338","DOIUrl":"10.1016/j.iot.2024.101338","url":null,"abstract":"<div><div>We propose a new data pre-processing method, sub-district-based map matching (SDBMM), which involves projecting a trajectory onto sub-city districts (SCDs), geographical areas on the map with irregular boundaries. Thus, this method differs significantly from traditional map-matching processes, which match trajectory data points to the nearest or most probable road segments. With SDBMM, a moving object is represented through gradual transitions through a set of SCDs instead of ‘blinking’ at the road segments rapidly. This change in information granularity yields more presentation efficiency. As SCDs are meaningful partitions of a city based on urban planning or travel behaviours, SDBMM also underlies a new ground for post hoc analytics. In the first application, we perform SDBMM for a large taxi-trajectory dataset in a large city. This case verifies SDBMM with sufficient massive data and brings valuable knowledge to several parties (i.e. taxi drivers, service operators, and the government) in managing the taxi transport mode in the city and policy-making. We apply SDBMM in a second application of anti-drug investigation and find that SCDs with pathway entrances/exits across the mountain ranges are usually the hot traces of drug transactions. These practical applications may foster greater confidence in future utilisations of SDBMM.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101338"},"PeriodicalIF":6.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142323744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}