{"title":"Anomaly detection in IoT environment using machine learning","authors":"Harini Bilakanti, Sreevani Pasam, Varshini Palakollu, Sairam Utukuru","doi":"10.1002/spy2.366","DOIUrl":"https://doi.org/10.1002/spy2.366","url":null,"abstract":"This research paper delves into the security concerns within Internet of Things (IoT) networks, emphasizing the need to safeguard the extensive data generated by interconnected physical devices. The presence of anomalies and faults in the sensors and devices deployed within IoT networks can significantly impact the functionality and outcomes of IoT systems. The primary focus of this study is the identification of anomalies in IoT devices arising sensor tampering, with an emphasis on the application of machine learning techniques. While supervised methods like one‐class SVM, Gaussian Naive Bayes, and XG Boost have proven effective in anomaly detection, there has been a noticeable scarcity of research employing unsupervised methods. This scarcity is mainly attributed to the absence of well‐defined ground truths for model training. This research takes an innovative approach by investigating the utility of unsupervised algorithms, including Isolation Forest and Local Outlier Factor, alongside supervised techniques to enhance the precision of anomaly detection.","PeriodicalId":506233,"journal":{"name":"SECURITY AND PRIVACY","volume":"34 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139128139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Habib Esmaeelzadeh Rostam, Homayun Motameni, R. Enayatifar
{"title":"Privacy‐preserving in the smart healthcare system using steganography and chaotic functions based on DNA","authors":"Habib Esmaeelzadeh Rostam, Homayun Motameni, R. Enayatifar","doi":"10.1002/spy2.363","DOIUrl":"https://doi.org/10.1002/spy2.363","url":null,"abstract":"The smart healthcare system is one of the Internet of Things‐based applications that are increasingly used nowadays. One of the requirements of this system is privacy‐preserving, which should protect the disclosure of the patient record contents. In the present paper, a combination of chaotic functions and a new DNA‐based steganography method, and image blocking are suggested to protect patients' privacy‐preserving. First, the image is blocked, and the initial key for the chaotic function will be gained by using the centers of the blocks. Then the data and image are transformed into DNA sequences. Finally, one of the randomly chosen DNA strands of data is XOR with the center of one randomly selected block and will be placed in one of the block pixels. The failure to send the initial key separately to generate random numbers, as well as the random selection of secret data bits and image pixels for steganography has increased the security of the proposed method. The simulation results not only indicate the quality of the stego‐image but also show better performance of the proposed method than the existing methods.","PeriodicalId":506233,"journal":{"name":"SECURITY AND PRIVACY","volume":"143 5‐6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139149350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mubeen Javed, Muhammad Arslan Akram, Adnan Noor Mian, Saru Kumari
{"title":"On the security of a novel privacy‐preserving authentication scheme for V2G networks","authors":"Mubeen Javed, Muhammad Arslan Akram, Adnan Noor Mian, Saru Kumari","doi":"10.1002/spy2.357","DOIUrl":"https://doi.org/10.1002/spy2.357","url":null,"abstract":"Vehicle‐to‐grid (V2G) network has a clear advantage in terms of economic advantages, it has attracted the interest of electric vehicle (EV) and power grid users. However, numerous security concerns limit its further progress. In existing V2G protocols a trusted third party independently generates the master key of the system, so if the adversary compromises the third party, then the system may become vulnerable to system master key leakage attack. Recently, Su et al. presented a privacy‐preserving mutual authentication protocol for V2G networks. Firstly, we crypt‐analysis Su et al.'s protocol and show that their protocol is vulnerable to several security attacks such as the reveal of the master secret key, impersonation attacks and the incorrect notion of EV's anonymity and traceability and does not meet the security features they claimed in their paper. Secondly, we verify that Su et al.'s protocol is unsafe against impersonation attacks, system key leakage, and electrical vehicle anonymity attack using the AVISPA tool.","PeriodicalId":506233,"journal":{"name":"SECURITY AND PRIVACY","volume":"32 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139205651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. J. Singh, Nazrul Hoque, Kh Robindro Singh, D. K. Bhattacharyya
{"title":"Botnet‐based IoT network traffic analysis using deep learning","authors":"N. J. Singh, Nazrul Hoque, Kh Robindro Singh, D. K. Bhattacharyya","doi":"10.1002/spy2.355","DOIUrl":"https://doi.org/10.1002/spy2.355","url":null,"abstract":"IoT networks are increasingly being connected to a wide range of devices, and the number of devices connected has significantly increased in recent years. As a consequence, the number of vulnerabilities to IoT networks has also been increasing tremendously. In IoT networks, botnet‐based Distributed Denial of Service attack is challenging due to its dynamic behavior. The sensors and actuators connected to IoT networks are low‐powered and have less memory. Because of their inherent vulnerability, IoT devices can always be compromised by an attacker and be used to form a large botnet. A detailed analysis of IoT botnet attacks is presented in this article, along with statistics and the architectures of the botnet. We also survey the existing literature on IoT botnet traffic analysis and present a taxonomy of attack detection methods. We particularly focus on deep learning‐based methods and conduct a comparative study to evaluate their performance on IoT traffic analysis. We identify the current issues and research challenges in this field, and we conclude by highlighting some future research directions.","PeriodicalId":506233,"journal":{"name":"SECURITY AND PRIVACY","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139213003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heba A. Hassan, E. E. Hemdan, W. El-shafai, Mona Shokair, F. A. Abd El‐Samie
{"title":"Detection of attacks on software defined networks using machine learning techniques and imbalanced data handling methods","authors":"Heba A. Hassan, E. E. Hemdan, W. El-shafai, Mona Shokair, F. A. Abd El‐Samie","doi":"10.1002/spy2.350","DOIUrl":"https://doi.org/10.1002/spy2.350","url":null,"abstract":"Software‐defined networks (SDNs) have gained popularity in recent years as a solution for the fundamental issues that affect traditional dispersed networks. The primary advantage of SDNs is the decoupling of the control plane from the data plane, which increases the flexibility of the network. The SDN represents a network architecture of the next generation, however, its configuration options are centralized, leaving it open for cyber‐attacks. This paper concentrates on the early identification of attacks in an SDN environment. When malicious traffic is affecting in an SDN topology, an artificial intelligence (AI) module in the topology is used to detect the attack and stop the attack source using machine learning (ML) techniques. The architecture presented in this research allows for the comparison of several ML classification techniques that are used to identify different sorts of network attacks. For attack detection, eight ML techniques are used, namely logistic regression (LR), linear discriminant analysis (LDA), Naïve Bayes (NB), k‐nearest neighbor (KNN), classification and regression tree (CART), AdaBoost (AB), random forest (RF), and support‐vector machine (SVM) classifiers. These techniques are tested on the InSDN dataset, which is a novel attack‐specific SDN dataset. The results show that the highest accuracy of 98.6% is achieved with the LDA classifier. Further improvement in the accuracy of classification models is observed when random over‐sampling, synthetic minority oversampling technique (SMOTE), random under‐sampling, and under‐sampling with Tomek links and near‐miss concept are applied to address the class imbalance problem. After applying these methods, the LDA classifier showed an accuracy of 98.79%.","PeriodicalId":506233,"journal":{"name":"SECURITY AND PRIVACY","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139214093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sangeeta Gupta, Premkumar Chithaluru, May El Barachi, Manoj Kumar
{"title":"Secure data access using blockchain technology through IoT cloud and fabric environment","authors":"Sangeeta Gupta, Premkumar Chithaluru, May El Barachi, Manoj Kumar","doi":"10.1002/spy2.356","DOIUrl":"https://doi.org/10.1002/spy2.356","url":null,"abstract":"In the current landscape, staying abreast of the latest technological advancements is a formidable challenge, especially given the deluge of data inundating the internet. The realization has dawned that effectively managing the surge in emerging data necessitates the integration of multiple technologies. In pursuit of this objective, the Internet of Things (IoT), renowned for its sensor‐based data capture capabilities, is frequently coupled with blockchain technology to ensure secure data storage and access. This amalgamation, in turn, leverages the cloud environment when data volume surpasses a machine's processing capacity, thus mitigating infrastructure and maintenance costs. This study endeavors to optimize data storage within the blocks of the blockchain (BCT) by storing an index that points to the actual data. This innovative approach not only conserves storage space but also enhances operational efficiency. Furthermore, it simplifies the task of identifying malicious or faulty nodes deployed at different locations for data capture within the prescribed time frame. To exemplify this implementation, a case study is presented, focusing on securing user votes through the creation of contracts. The results showcased underscore the preference for a permissioned blockchain, such as Fabric, over a permissionless one, like Ethereum, particularly in the context of security considerations. The findings reveal that as the number of operations (in this case, votes cast) increases, Ethereum's performance deteriorates, while Fabric exhibits exceptional robustness. Additionally, the study analyzes sensor data simulated via IoT nodes before and after the application of security algorithms to underscore the significance of the proposed Secure Cloud‐Based Blockchain (SCB2) model. The analysis encompasses various facets, including the creation, validation, and computation times of transactions and blocks within a node, and positions the model favorably in comparison to existing literature.","PeriodicalId":506233,"journal":{"name":"SECURITY AND PRIVACY","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139245161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alay Patel, Devam Patel, Riya Kakkar, P. Oza, Smita Agrawal, S. Tanwar, Ravi Sharma, Nagendar Yamsani
{"title":"Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities","authors":"Alay Patel, Devam Patel, Riya Kakkar, P. Oza, Smita Agrawal, S. Tanwar, Ravi Sharma, Nagendar Yamsani","doi":"10.1002/spy2.354","DOIUrl":"https://doi.org/10.1002/spy2.354","url":null,"abstract":"With the advancement of innovative technologies, the Internet of Things (IoT) has become quite popular in various applications such as smart homes, smart cities, agriculture, healthcare, and so forth. However, the heterogeneity of IoT protocols can pose security challenges to wireless networks. Thus, we have presented a systematic review of IoT technologies such as ZigBee, Radio Frequency Identification (RFID), Bluetooth, WiFi, Ethernet, AR, embedded subscriber identification modules (E‐SIM), and smart sensors, along with their communication protocols, which are part of the IoT‐layered architecture. We have bifurcated the IoT‐layered architecture into the perception, network, and application layers. Furthermore, we have presented IoT security attacks associated with the perception, network, and application layers of the IoT‐layered architecture. Moreover, we have discussed several IoT security solutions, open issues, and research challenges dedicated to the security of IoT networks. IoT security solutions can provide secure and efficient data communication over wireless networks.","PeriodicalId":506233,"journal":{"name":"SECURITY AND PRIVACY","volume":"27 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139257061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}