Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  An Enhanced Security Approach to IoT Management on Information-Centric Networking  
  Authors : Charles O. Muango; Jairus O. Malenje; Laban O. Matundura; Qu Shaojian
  Cite as:

 

Technology advancement has not only made the world a global village but also made it possible for people to interact with devices around them through the Internet of Things (IoT) and bring your own devices (BYOD) technology. Organizations have been caught up in this rush as many employees in corporations and students in learning institutions bring different devices (such as smartphones, smart watches, smart screens, tablets, smart wrist bands that measure activity of one's organs) with them and connect to the corporate networks. IoT/BYOD has greatly improved efficiency and has led to a happy work force since they can now perform their duties efficiently as much of activities orbiting around their social life are within grasp. However, the downside of this increase in connected mobile devices is a cocktail of security threats that makes cyber security management critical for business continuity. In this paper, we propose an enhanced security scheme in IoT by use of social network analysis to single out central nodes that have the greatest influence in attack propagation. Simulation results show that the proposed method can be used to deactivate the influential node in the network in case of an attack thereby reducing the catastrophic impact. The significance of our enhanced IoT security approach is its ability to detect nodes with suspicious activities and thereby take them off the grid.

 

Published In : IJCSN Journal Volume 8, Issue 3

Date of Publication : June 2019

Pages : 192-199

Figures :05

Tables : 01

 

Charles O. Muango : Ph.D. Candidate, MSc.in Data Communication, BSc. In Computer Science. Currently am Employed at Masinde Muliro University of Science and Technology in the School of Computer and Informatics. Current research interests-Network Security, Cyber-Security, Social Networks, Deep learning & Human Computer Interaction.

Jairus O. Odawa : Ph.D. Candidate, MSc. IT, BSc. in Computer Science. Assistant Lecturer at Masinde Muliro University of Science and Technology in the School of Computer and Informatics.

Laban O. Oenga : Ph.D. Candidate, MSc. IT, BSc. in Computer Science. Assistant Lecturer at Masinde Muliro University of Science and Technology in the School of Computer and Informatics.

Qu Shaojian : (Ph.D.) Prof at the University of Shanghai for Science and Technology in the School of Business Management.

 

IoT; Security; Gadgets; DDoS; Information-Centric Networking

The aim of this paper was to use metrics to be able to identify a central node that is more active than the rest in the event of an attack then isolate it from the network. This was done by comparing values of the centrality measures from the simulation of our network. This means that when you have a network it is possible to get the epidemic threshold and the central nodes involved in malware spread through calculation and thereby being able to mitigate damage.

 

[1] Pwnie Express, "Internet of Evil Things," 2017. [2] Afzal Shah Idris , Amin Malik Faizan , and Arshid Syed , "Enhancing Security in loT based Home Automation using Reed Solomon Codes," in IEEE WiSPNET 2016 conference, 2016. [3] Marconot Johan , Pebay-Peyroula Florian , and David, "IoT Components LifeCycle based Security Analysis," in Euromicro Conference on Digital System Design, 2017. [4] O'Neill Maire, "Insecurity by Design: Today's IoT Device Security Problem," Elsevier LTD, 2016. [5] Kavalaris Stylianos , Kioupakis Fragkiskos-Emmanouil , and Kaltsas Konstantinos , "Development of a MultiVector Information Security Rating Scale for Smart Devices as a Means of Raising Public InfoSec Awareness," Procedia Computer Science 65, pp. 500 - 509, 2015. [6] Kao Yi-Chih , Chang Yung-Chia , and Chang RuayShiung , "Managing Bring Your Own Device Services in Campus Wireless Networks," in Computer Science and Engineering Conference (ICSEC), 2015 International, 2015. [7] Wang Yong , Wei Jinpeng , and Vangury Karthik , "Bring Your Own Device Security Issues and Challenges," in The 11th Annual IEEE CCNC- Mobile Device, Platform and Communication, 2014. [8] Suarez Javier, Quevedo Jose, Vidal Ivan, Corujo Daniel, and Garcia-Reinoso Jaime, "A secure IoT management architecture based on Information-Centric Networking," 2016. [9] Panda Mrutyunjaya , Dehuri Satchidananda , and Wang Gi-Nam , "Influencers in Social Networks," in Social Networking.: Springer. [10] Wang Yang , Chakrabarti D., Wang Chenxi , and Faloutsos C. , "Epidemic spreading in real networks: an eigenvalue viewpoint," in 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings., 2003. [11] Jaramillo David , Newhook Richard , and Nassar Nader , "Techniques and real world experiences in mobile device security," in IEEE SOUTHEASTCON 2014, 2014. [12] Pilling Rafe , "Global threats, cyber-security nightmares and how to protect against them," Computer Fraud & Security, vol. 2013, pp. 14 - 18, 2013. [13] Gandhi Meera and Muruganantham A. , "Potential Influencers Identification Using Multi-Criteria Decision Making (MCDM) Methods," Procedia Computer Science, vol. 57, pp. 1179 - 1188, 2015. [14] Tyrer Andrew, "Can the UK cyber-security industry lead the world?," Computer Fraud & Security, vol. 2, pp. 5 - 7, 2015. [15] McIntosh Chris , "Cyber-security: who will provide protection?," Computer Fraud & Security, vol. 12, pp. 19 - 20, 2015. [16] SOCNETV: SOCIAL NETWORK ANALYSIS AND VISUALIZATION SOFTWARE. Social Network Visualizer. [Online]. http://socnetv.org/ [17] Peng Sancheng , Yang Aimin , Cao Lihong , Yu Shui , and Xie Dongqing , "Social influence modeling using information theory in mobile social networks," Information Sciences, vol. 379, pp. 146-159, 2017. [18] Man Wing and Lam Wynne , "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, vol. 37, pp. 42 - 51, 2016. [19] Arshad Sobia , Awais Azam Muhammad , Hassan Ahmed Syed , and Loo Prof.Jonathan, "Towards Information-Centric Networking (ICN) Naming for Internet of Things (IoT)," Proceedings of ICFNDS '17 Cambridge,United Kingdom, p. 6, 2017.