基于AI技术和物联网4G网络的数据监控系统在网络安全攻击防范中的蜜网实现

Kushnian Kour, Subhashish Goswami, Meenakshi Sharma, P. Sivasankar, V. Vekariya, A. Kumari
{"title":"基于AI技术和物联网4G网络的数据监控系统在网络安全攻击防范中的蜜网实现","authors":"Kushnian Kour, Subhashish Goswami, Meenakshi Sharma, P. Sivasankar, V. Vekariya, A. Kumari","doi":"10.17762/ijcnis.v14i3.5603","DOIUrl":null,"url":null,"abstract":"Cyber Physical Systems (CPS) comprises of the ubiquitous object concept those are connected with Internet to provide ability of data transmission and sensing over network. The smart appliances transmits the data through CPS devices with the implementation of Internet of Things (IoT) exhibits improved performance characteristics with significant advantages such as time savings, reduced cost, higher human comfort and efficient electricity utilization. In the minimal complexity sensor nodes cyber physical system is adopted for the heterogeneous environment for the wireless network connection between clients or hosts. However, the conventional security scheme uses the mechanisms for desktop devices with efficient utilization of resources in the minimal storage space environment, minimal power processing and limited energy backup. This paper proposed a Secure Honeynet key authentication (SHKA) model for security attack prevention through effective data monitoring with IoT 4G communication. The proposed SHKA model uses the lightweight key agreement scheme for authentication to provide security threats and confidentiality issues in CPS applications. With the implementation of SHKA HoneyNet model the data in IoT are monitored for security mechanism in IoT environment. The middleware module in SHKA scheme uses the Raspberry platform to establish internetworking between CPS device to achieve dynamic and scalability. The secure IoT infrastructure comprises of flexible evaluation of user-centric environment evaluation for the effectiveness. The developed SHKA model perform mutual authentication between CPS devices for minimal computation overhead and efficiency. The wireless channel uses the dynamic session key for the secure communication for cyber-attacks security with lightweight security in CPS system. The SHKA model demonstrate the effectiveness based on consideration of three constraints such as low power processing, reduced storage and minimal backup energy. Experimental analysis stated that proposed SHKA scheme provides lightweight end-to-end key establishment in every session. The CPS devices generates the session key of 128 bit long. The minimum key size is implemented to provide effective security in IoT 4G communication with minimal execution time. The simulation results demonstrated that SHKA model exhibits effective cyber-attacks for the constraint devices to improve performance of IoT network.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Honeynet Implementation in Cyber Security Attack Prevention with Data Monitoring System Using AI Technique and IoT 4G Networks\",\"authors\":\"Kushnian Kour, Subhashish Goswami, Meenakshi Sharma, P. Sivasankar, V. Vekariya, A. Kumari\",\"doi\":\"10.17762/ijcnis.v14i3.5603\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber Physical Systems (CPS) comprises of the ubiquitous object concept those are connected with Internet to provide ability of data transmission and sensing over network. The smart appliances transmits the data through CPS devices with the implementation of Internet of Things (IoT) exhibits improved performance characteristics with significant advantages such as time savings, reduced cost, higher human comfort and efficient electricity utilization. In the minimal complexity sensor nodes cyber physical system is adopted for the heterogeneous environment for the wireless network connection between clients or hosts. However, the conventional security scheme uses the mechanisms for desktop devices with efficient utilization of resources in the minimal storage space environment, minimal power processing and limited energy backup. This paper proposed a Secure Honeynet key authentication (SHKA) model for security attack prevention through effective data monitoring with IoT 4G communication. The proposed SHKA model uses the lightweight key agreement scheme for authentication to provide security threats and confidentiality issues in CPS applications. With the implementation of SHKA HoneyNet model the data in IoT are monitored for security mechanism in IoT environment. The middleware module in SHKA scheme uses the Raspberry platform to establish internetworking between CPS device to achieve dynamic and scalability. The secure IoT infrastructure comprises of flexible evaluation of user-centric environment evaluation for the effectiveness. The developed SHKA model perform mutual authentication between CPS devices for minimal computation overhead and efficiency. The wireless channel uses the dynamic session key for the secure communication for cyber-attacks security with lightweight security in CPS system. The SHKA model demonstrate the effectiveness based on consideration of three constraints such as low power processing, reduced storage and minimal backup energy. Experimental analysis stated that proposed SHKA scheme provides lightweight end-to-end key establishment in every session. The CPS devices generates the session key of 128 bit long. The minimum key size is implemented to provide effective security in IoT 4G communication with minimal execution time. The simulation results demonstrated that SHKA model exhibits effective cyber-attacks for the constraint devices to improve performance of IoT network.\",\"PeriodicalId\":232613,\"journal\":{\"name\":\"Int. J. Commun. Networks Inf. Secur.\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Commun. Networks Inf. Secur.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17762/ijcnis.v14i3.5603\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Commun. Networks Inf. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17762/ijcnis.v14i3.5603","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

网络物理系统(Cyber Physical Systems, CPS)是由泛在对象(ubiquitous object)概念组成的,它通过网络提供数据传输和感知能力。随着物联网(IoT)的实施,智能家电通过CPS设备传输数据,具有节省时间、降低成本、提高人体舒适度和高效用电等显著优势。在最小复杂度的传感器节点中,采用网络物理系统进行客户端或主机之间的无线网络连接。而传统的安全方案采用的是桌面设备在最小的存储空间环境、最小的功耗处理和有限的能量备份下高效利用资源的机制。本文提出了一种安全蜜网密钥认证(Secure Honeynet key authentication, SHKA)模型,通过物联网4G通信进行有效的数据监控,防范安全攻击。提出的SHKA模型使用轻量级密钥协议方案进行身份验证,以解决CPS应用程序中的安全威胁和机密性问题。通过SHKA蜜网模型的实现,对物联网环境中的数据进行监控,形成物联网环境中的安全机制。SHKA方案中的中间件模块采用Raspberry平台建立CPS设备间的互联,实现了动态和可扩展性。安全的物联网基础设施包括以用户为中心的灵活评估环境的有效性评估。所开发的SHKA模型在CPS设备之间进行相互认证,以实现最小的计算开销和效率。无线信道采用动态会话密钥进行安全通信,保证了CPS系统的网络攻击安全,具有轻量级的安全性。基于低功耗处理、减少存储和最小备用能量三个约束条件的SHKA模型证明了其有效性。实验分析表明,所提出的SHKA方案在每个会话中提供轻量级的端到端密钥建立。CPS设备生成128位长的会话密钥。实现最小密钥大小,以最小的执行时间为物联网4G通信提供有效的安全性。仿真结果表明,SHKA模型对约束设备进行了有效的网络攻击,提高了物联网网络的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Honeynet Implementation in Cyber Security Attack Prevention with Data Monitoring System Using AI Technique and IoT 4G Networks
Cyber Physical Systems (CPS) comprises of the ubiquitous object concept those are connected with Internet to provide ability of data transmission and sensing over network. The smart appliances transmits the data through CPS devices with the implementation of Internet of Things (IoT) exhibits improved performance characteristics with significant advantages such as time savings, reduced cost, higher human comfort and efficient electricity utilization. In the minimal complexity sensor nodes cyber physical system is adopted for the heterogeneous environment for the wireless network connection between clients or hosts. However, the conventional security scheme uses the mechanisms for desktop devices with efficient utilization of resources in the minimal storage space environment, minimal power processing and limited energy backup. This paper proposed a Secure Honeynet key authentication (SHKA) model for security attack prevention through effective data monitoring with IoT 4G communication. The proposed SHKA model uses the lightweight key agreement scheme for authentication to provide security threats and confidentiality issues in CPS applications. With the implementation of SHKA HoneyNet model the data in IoT are monitored for security mechanism in IoT environment. The middleware module in SHKA scheme uses the Raspberry platform to establish internetworking between CPS device to achieve dynamic and scalability. The secure IoT infrastructure comprises of flexible evaluation of user-centric environment evaluation for the effectiveness. The developed SHKA model perform mutual authentication between CPS devices for minimal computation overhead and efficiency. The wireless channel uses the dynamic session key for the secure communication for cyber-attacks security with lightweight security in CPS system. The SHKA model demonstrate the effectiveness based on consideration of three constraints such as low power processing, reduced storage and minimal backup energy. Experimental analysis stated that proposed SHKA scheme provides lightweight end-to-end key establishment in every session. The CPS devices generates the session key of 128 bit long. The minimum key size is implemented to provide effective security in IoT 4G communication with minimal execution time. The simulation results demonstrated that SHKA model exhibits effective cyber-attacks for the constraint devices to improve performance of IoT network.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信