Security Agent Location in the Internet of Things
The Internet of Things (IoT) provides the ability to extend the Internet into devices and everyday objects, in a way that they are uniquely addressable. Sensors, actuators, as well as everyday devices and objects, such as cellphones, cars, and homes, are interconnected and form a network that can be...
Saved in:
Published in | IEEE access Vol. 7; pp. 95844 - 95856 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The Internet of Things (IoT) provides the ability to extend the Internet into devices and everyday objects, in a way that they are uniquely addressable. Sensors, actuators, as well as everyday devices and objects, such as cellphones, cars, and homes, are interconnected and form a network that can be accessed, monitored, and controlled remotely. Security is an important subject in the IoT networks since the devices and the networks can be used as a means of invading the users' privacy. The current work examines the issue of security agent location using indicative intrusion detection techniques for network layer attacks. We analyze the methodology, operation, as well as the complexity of each technique. Through the extensive implementation and experimentation, we are able to conclude that the local security agents have the same performance results with centralized and decentralized approaches, but with negligible overhead. As such, they are useful when internal network communication, or network augmentation with monitoring nodes, is not feasible. |
---|---|
AbstractList | The Internet of Things (IoT) provides the ability to extend the Internet into devices and everyday objects, in a way that they are uniquely addressable. Sensors, actuators, as well as everyday devices and objects, such as cellphones, cars, and homes, are interconnected and form a network that can be accessed, monitored, and controlled remotely. Security is an important subject in the IoT networks since the devices and the networks can be used as a means of invading the users' privacy. The current work examines the issue of security agent location using indicative intrusion detection techniques for network layer attacks. We analyze the methodology, operation, as well as the complexity of each technique. Through the extensive implementation and experimentation, we are able to conclude that the local security agents have the same performance results with centralized and decentralized approaches, but with negligible overhead. As such, they are useful when internal network communication, or network augmentation with monitoring nodes, is not feasible. |
Author | Ioannou, Christiana Vassiliou, Vasos |
Author_xml | – sequence: 1 givenname: Christiana surname: Ioannou fullname: Ioannou, Christiana organization: Research Center on Interactive Media, Smart Systems and Emerging Technologies (RISE), Nicosia, Cyprus – sequence: 2 givenname: Vasos orcidid: 0000-0001-8647-0860 surname: Vassiliou fullname: Vassiliou, Vasos email: vasosv@cs.ucy.ac.cy organization: Research Center on Interactive Media, Smart Systems and Emerging Technologies (RISE), Nicosia, Cyprus |
BookMark | eNp9kE1rAjEQhkOxUGv9BV4Wetbme5OjiG0FoQftOSTZrEZsYrPx4L_v6tpSeuhcZhjmeRmee9ALMTgARghOEILyaTqbzVerCYZITrDEgiJ6A_oYcTkmjPDer_kODJtmB9sS7YqVfYBWzh6Tz6diunEhF8todfYxFD4UeeuKRcguBZeLWBfrrQ-b5gHc1nrfuOG1D8D783w9ex0v314Ws-lybCkUecydcFgah0RdiVobLrShkOrKCsNpTaGpqCYl1QYZqoUspUWkrComkWG4tGQAFl1uFfVOHZL_0Omkovbqsohpo3TK3u6dMgQJaInhtq5oiSuBDbHUYlYSzjDGbdZjl3VI8fPomqx28ZhC-77ClDEOMeSsvZLdlU2xaZKrlfX5YiMn7fcKQXUWrjrh6ixcXYW3LPnDfn_8PzXqKO-c-yFEySEVjHwBRtCMPQ |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_1016_j_adhoc_2021_102726 crossref_primary_10_3390_jsan10030058 |
Cites_doi | 10.1109/ICT.2017.7998271 10.22385/jctecs.v5i0.71 10.1109/CMC.2010.49 10.1145/1089761.1089765 10.1109/INM.2015.7140344 10.1007/s12652-017-0558-5 10.1109/WIMOB.2005.1512911 10.7551/mitpress/7496.003.0003 10.1145/1961189.1961199 10.1007/978-3-540-77871-4_14 10.1016/j.jnca.2017.02.009 10.1109/INFCOM.2007.225 10.1145/1005817.1005828 10.1016/j.adhoc.2013.04.014 10.1109/INFOCOM.2006.89 10.1109/ISSNIP.2007.4496866 10.1109/COMST.2018.2844742 10.1016/j.burns.2015.08.009 10.1109/COMST.2015.2444095 10.1109/LCN.2004.38 10.1109/ICC.2013.6655254 10.1109/JIOT.2014.2306328 10.1145/1068009.1068061 10.1016/j.future.2017.01.029 10.1109/WAINA.2009.200 10.1145/3242102.3242145 10.1109/SIoT.2016.009 10.1109/SURV.2013.050113.00191 10.1145/2989293.2989305 10.1109/INSS.2012.6240521 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2019.2928414 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 95856 |
ExternalDocumentID | oai_doaj_org_article_b3180c3b6cfd472d82b3c4c257365222 10_1109_ACCESS_2019_2928414 8760485 |
Genre | orig-research |
GrantInformation_xml | – fundername: H2020 Spreading Excellence and Widening Participation grantid: 739578 funderid: 10.13039/100010684 – fundername: University of Cyprus funderid: 10.13039/100012996 – fundername: Government of the Republic of Cyprus through the Directorate General for European Programmes, Coordination and Development |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c408t-6e8e29be18fd8fab68ab404adc8b64f40bd4a374ab1b4a8979c137dd591b527c3 |
IEDL.DBID | RIE |
ISSN | 2169-3536 |
IngestDate | Wed Aug 27 01:28:50 EDT 2025 Mon Jun 30 03:10:51 EDT 2025 Tue Jul 01 02:41:42 EDT 2025 Thu Apr 24 23:02:50 EDT 2025 Wed Aug 27 02:54:35 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://creativecommons.org/licenses/by/4.0/legalcode |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-6e8e29be18fd8fab68ab404adc8b64f40bd4a374ab1b4a8979c137dd591b527c3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-8647-0860 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/8760485 |
PQID | 2455602065 |
PQPubID | 4845423 |
PageCount | 13 |
ParticipantIDs | proquest_journals_2455602065 ieee_primary_8760485 crossref_citationtrail_10_1109_ACCESS_2019_2928414 doaj_primary_oai_doaj_org_article_b3180c3b6cfd472d82b3c4c257365222 crossref_primary_10_1109_ACCESS_2019_2928414 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20190000 2019-00-00 20190101 2019-01-01 |
PublicationDateYYYYMMDD | 2019-01-01 |
PublicationDate_xml | – year: 2019 text: 20190000 |
PublicationDecade | 2010 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2019 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref13 ref34 ref12 ref15 ref36 ref14 ref31 ref30 ref33 ref32 ref10 karlof (ref27) 2002 ref1 ref17 ref19 ref18 (ref2) 2017 ioannou (ref16) 2003 ref23 ref26 ref25 ref20 ref22 ref21 ref28 moon (ref29) 2009; 9 ref8 ref7 ref9 ref4 ref3 ref6 schaust (ref11) 2007; 1 ref5 österlind (ref24) 2006 |
References_xml | – volume: 1 start-page: 51 year: 2007 ident: ref11 article-title: Misbehaviour detection for wireless sensor networks-necessary or Not? publication-title: Fachgespräch Sensornetze – ident: ref12 doi: 10.1109/ICT.2017.7998271 – year: 2003 ident: ref16 article-title: The hunt for viral processes – ident: ref22 doi: 10.22385/jctecs.v5i0.71 – ident: ref14 doi: 10.1109/CMC.2010.49 – ident: ref9 doi: 10.1145/1089761.1089765 – ident: ref33 doi: 10.1109/INM.2015.7140344 – ident: ref31 doi: 10.1007/s12652-017-0558-5 – ident: ref20 doi: 10.1109/WIMOB.2005.1512911 – ident: ref35 doi: 10.7551/mitpress/7496.003.0003 – ident: ref36 doi: 10.1145/1961189.1961199 – ident: ref28 doi: 10.1007/978-3-540-77871-4_14 – ident: ref6 doi: 10.1016/j.jnca.2017.02.009 – ident: ref19 doi: 10.1109/INFCOM.2007.225 – ident: ref3 doi: 10.1145/1005817.1005828 – ident: ref25 doi: 10.1016/j.adhoc.2013.04.014 – ident: ref18 doi: 10.1109/INFOCOM.2006.89 – ident: ref10 doi: 10.1109/ISSNIP.2007.4496866 – year: 2017 ident: ref2 publication-title: Baseline Security Recommendations for IoT in the Context of Critical Information Infrastructures – start-page: 641 year: 2006 ident: ref24 article-title: Cross-level sensor network simulation with COOJA publication-title: Proc 1st IEEE Int Workshop Practical Issues Building Sensor Netw Appl – ident: ref5 doi: 10.1109/COMST.2018.2844742 – volume: 9 start-page: 118 year: 2009 ident: ref29 article-title: Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks publication-title: Int J Comput Sci Netw Secur – ident: ref13 doi: 10.1016/j.burns.2015.08.009 – start-page: 113 year: 2002 ident: ref27 article-title: Secure routing in wireless sensor networks: Attacks and countermeasures publication-title: Proc 1st IEEE Int Workshop Sensor Netw Protocols Appl – ident: ref26 doi: 10.1109/COMST.2015.2444095 – ident: ref23 doi: 10.1109/LCN.2004.38 – ident: ref15 doi: 10.1109/ICC.2013.6655254 – ident: ref1 doi: 10.1109/JIOT.2014.2306328 – ident: ref4 doi: 10.1145/1068009.1068061 – ident: ref32 doi: 10.1016/j.future.2017.01.029 – ident: ref17 doi: 10.1109/WAINA.2009.200 – ident: ref34 doi: 10.1145/3242102.3242145 – ident: ref8 doi: 10.1109/SIoT.2016.009 – ident: ref7 doi: 10.1109/SURV.2013.050113.00191 – ident: ref30 doi: 10.1145/2989293.2989305 – ident: ref21 doi: 10.1109/INSS.2012.6240521 |
SSID | ssj0000816957 |
Score | 2.178981 |
Snippet | The Internet of Things (IoT) provides the ability to extend the Internet into devices and everyday objects, in a way that they are uniquely addressable.... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 95844 |
SubjectTerms | Actuators Anomaly detection Electronic devices Experimentation Internet of Things intrusion detection systems logistic regression Monitoring Object recognition Remote control Remote monitoring Security security agents Sensors Support vector machines Wireless sensor networks |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEBYhp-YQ0ialTtKiQ49x1npYj-N2aQilzSUJ7E149IBA8ZbW-f8ZWcqypdBcchWybM3I33wapG8I-WwBuIgKmVvCnY6MPLV26ESbIHbM6z7omO8O_7hR1_fy27pf75T6ymfCijxwMdwCcNF1XoDyKUjNg-EgvPS40oRC7jCjL8a8nc3UjMGGKdvrKjPEOrtYrlY4o3yWy15yi6DM5F-haFbsryVW_sHlOdhcHZHDyhLpsnzdW7IXx3fkYEc78Jiw21p5ji7z7Sj6fVOSb_RhpEjqaEn1xYluEi3FOU_I_dXXu9V1W-sftF52ZmpVNJFbiMykYNIAygwgOzkEb0DJJDsIchBaDsBADsZq65nQIfSWQc-1F-_J_rgZ4wdCMS4DtoDSlsmeJwAkHhERRgYBSZiG8GdTOF_FwXONip9u3iR01hX7uWw_V-3XkIvtQ7-KNsb_u3_JNt52zcLWcwO621V3u5fc3ZDj7KHtIAjmiEF9Q86fPebqT_jHcdkjn-NIsk5f49Vn5E2eTsm_nJP96fdj_IiMZIJP8-J7Av9V19k priority: 102 providerName: Directory of Open Access Journals |
Title | Security Agent Location in the Internet of Things |
URI | https://ieeexplore.ieee.org/document/8760485 https://www.proquest.com/docview/2455602065 https://doaj.org/article/b3180c3b6cfd472d82b3c4c257365222 |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB61PcGBAgWxtFQ-cGy28SOxfVxWVBWiXKBSb1bGDwmBdhFkL_x6xrE34iXELbLsyPGMx99MPN8AvLSIQsaekFsiT0dFkRo7tLJJGFvudRd0zLnDN-_661v15q67O4CLORcmxjhdPovL_Dj9yw9bv8uhskvauaRw3SEckuNWcrXmeEouIGE7XYmFeGsvV-s1fUO-vWWXwpIZ5uqXw2fi6K9FVf6wxNPxcnUMN_uJlVsln5a7EZf--2-cjf8784fwoOJMtiqK8QgO4uYx3P-JffAE-Ptau46tcn4Ve7st4Tv2ccMIFrISLIwj2yZWyns-gdur1x_W102toNB41Zqx6aOJwmLkJgWTBuzNgKpVQ_AGe5VUi0ENUqsBOarBWG09lzqEznLshPbyKRxttpv4DBid7Egt2GvLVScSIkGXSDZKBYlJmgWI_dI6X-nFc5WLz25yM1rrijxcloer8ljAxTzoS2HX-Hf3V1lmc9dMjT010Fq7utMckpVqvcTep6C0CEag9MqTaZI9gU2xgJMsn_klVTQLONtrgKvb-JsTqiNEKAimPf_7qFO4lydYYjJncDR-3cUXhFJGPJ-8-_NJSX8AySPjIQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VcgAO5VGqLhTIgWOzjR9x7OOyolpgtxdaqTcr44eEqHYRzV749YwTb1QeQtwiy44cz3jm88TzDcBbg8hFUITcIp10ZOCxNG0lyoihYq6pfRNS7vDqQi2u5Mfr-noPTsdcmBBCf_ksTNNj_y_fb9w2hcrOaOeSwtX34D75_ZoP2VpjRCWVkDB1k6mFWGXOZvM5fUW6v2Wm3JAhZvIX99Oz9OeyKn_Y4t7BnD-G1W5qw72Sr9Nth1P34zfWxv-d-xM4yEizmA2q8RT2wvoZPLrDP3gI7HOuXlfMUoZVsdwMAbziy7ogYFgM4cLQFZtYDAU-n8PV-fvL-aLMNRRKJyvdlSrowA0GpqPXsUWlW5SVbL3TqGSUFXrZika2yFC22jTGMdF4XxuGNW-cOIL99WYdjqEg347UgqoxTNY8IhJ4CWSlpBcYhZ4A3y2tdZlgPNW5uLH9QaMydpCHTfKwWR4TOB0HfRv4Nf7d_V2S2dg1kWP3DbTWNu81i2SnKidQuehlw73mKJx0ZJyEIrjJJ3CY5DO-JItmAic7DbB5I99aToqmCFKr-sXfR72BB4vL1dIuP1x8egkP02SHCM0J7Hfft-EVYZYOX_eq-hNyQOV2 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+Agent+Location+in+the+Internet+of+Things&rft.jtitle=IEEE+access&rft.au=Ioannou%2C+Christiana&rft.au=Vassiliou%2C+Vasos&rft.date=2019&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=7&rft.spage=95844&rft.epage=95856&rft_id=info:doi/10.1109%2FACCESS.2019.2928414&rft.externalDocID=8760485 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |