Security Agent Location in the Internet of Things

The Internet of Things (IoT) provides the ability to extend the Internet into devices and everyday objects, in a way that they are uniquely addressable. Sensors, actuators, as well as everyday devices and objects, such as cellphones, cars, and homes, are interconnected and form a network that can be...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 7; pp. 95844 - 95856
Main Authors Ioannou, Christiana, Vassiliou, Vasos
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The Internet of Things (IoT) provides the ability to extend the Internet into devices and everyday objects, in a way that they are uniquely addressable. Sensors, actuators, as well as everyday devices and objects, such as cellphones, cars, and homes, are interconnected and form a network that can be accessed, monitored, and controlled remotely. Security is an important subject in the IoT networks since the devices and the networks can be used as a means of invading the users' privacy. The current work examines the issue of security agent location using indicative intrusion detection techniques for network layer attacks. We analyze the methodology, operation, as well as the complexity of each technique. Through the extensive implementation and experimentation, we are able to conclude that the local security agents have the same performance results with centralized and decentralized approaches, but with negligible overhead. As such, they are useful when internal network communication, or network augmentation with monitoring nodes, is not feasible.
AbstractList The Internet of Things (IoT) provides the ability to extend the Internet into devices and everyday objects, in a way that they are uniquely addressable. Sensors, actuators, as well as everyday devices and objects, such as cellphones, cars, and homes, are interconnected and form a network that can be accessed, monitored, and controlled remotely. Security is an important subject in the IoT networks since the devices and the networks can be used as a means of invading the users' privacy. The current work examines the issue of security agent location using indicative intrusion detection techniques for network layer attacks. We analyze the methodology, operation, as well as the complexity of each technique. Through the extensive implementation and experimentation, we are able to conclude that the local security agents have the same performance results with centralized and decentralized approaches, but with negligible overhead. As such, they are useful when internal network communication, or network augmentation with monitoring nodes, is not feasible.
Author Ioannou, Christiana
Vassiliou, Vasos
Author_xml – sequence: 1
  givenname: Christiana
  surname: Ioannou
  fullname: Ioannou, Christiana
  organization: Research Center on Interactive Media, Smart Systems and Emerging Technologies (RISE), Nicosia, Cyprus
– sequence: 2
  givenname: Vasos
  orcidid: 0000-0001-8647-0860
  surname: Vassiliou
  fullname: Vassiliou, Vasos
  email: vasosv@cs.ucy.ac.cy
  organization: Research Center on Interactive Media, Smart Systems and Emerging Technologies (RISE), Nicosia, Cyprus
BookMark eNp9kE1rAjEQhkOxUGv9BV4Wetbme5OjiG0FoQftOSTZrEZsYrPx4L_v6tpSeuhcZhjmeRmee9ALMTgARghOEILyaTqbzVerCYZITrDEgiJ6A_oYcTkmjPDer_kODJtmB9sS7YqVfYBWzh6Tz6diunEhF8todfYxFD4UeeuKRcguBZeLWBfrrQ-b5gHc1nrfuOG1D8D783w9ex0v314Ws-lybCkUecydcFgah0RdiVobLrShkOrKCsNpTaGpqCYl1QYZqoUspUWkrComkWG4tGQAFl1uFfVOHZL_0Omkovbqsohpo3TK3u6dMgQJaInhtq5oiSuBDbHUYlYSzjDGbdZjl3VI8fPomqx28ZhC-77ClDEOMeSsvZLdlU2xaZKrlfX5YiMn7fcKQXUWrjrh6ixcXYW3LPnDfn_8PzXqKO-c-yFEySEVjHwBRtCMPQ
CODEN IAECCG
CitedBy_id crossref_primary_10_1016_j_adhoc_2021_102726
crossref_primary_10_3390_jsan10030058
Cites_doi 10.1109/ICT.2017.7998271
10.22385/jctecs.v5i0.71
10.1109/CMC.2010.49
10.1145/1089761.1089765
10.1109/INM.2015.7140344
10.1007/s12652-017-0558-5
10.1109/WIMOB.2005.1512911
10.7551/mitpress/7496.003.0003
10.1145/1961189.1961199
10.1007/978-3-540-77871-4_14
10.1016/j.jnca.2017.02.009
10.1109/INFCOM.2007.225
10.1145/1005817.1005828
10.1016/j.adhoc.2013.04.014
10.1109/INFOCOM.2006.89
10.1109/ISSNIP.2007.4496866
10.1109/COMST.2018.2844742
10.1016/j.burns.2015.08.009
10.1109/COMST.2015.2444095
10.1109/LCN.2004.38
10.1109/ICC.2013.6655254
10.1109/JIOT.2014.2306328
10.1145/1068009.1068061
10.1016/j.future.2017.01.029
10.1109/WAINA.2009.200
10.1145/3242102.3242145
10.1109/SIoT.2016.009
10.1109/SURV.2013.050113.00191
10.1145/2989293.2989305
10.1109/INSS.2012.6240521
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2019.2928414
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList

Materials Research Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 95856
ExternalDocumentID oai_doaj_org_article_b3180c3b6cfd472d82b3c4c257365222
10_1109_ACCESS_2019_2928414
8760485
Genre orig-research
GrantInformation_xml – fundername: H2020 Spreading Excellence and Widening Participation
  grantid: 739578
  funderid: 10.13039/100010684
– fundername: University of Cyprus
  funderid: 10.13039/100012996
– fundername: Government of the Republic of Cyprus through the Directorate General for European Programmes, Coordination and Development
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c408t-6e8e29be18fd8fab68ab404adc8b64f40bd4a374ab1b4a8979c137dd591b527c3
IEDL.DBID RIE
ISSN 2169-3536
IngestDate Wed Aug 27 01:28:50 EDT 2025
Mon Jun 30 03:10:51 EDT 2025
Tue Jul 01 02:41:42 EDT 2025
Thu Apr 24 23:02:50 EDT 2025
Wed Aug 27 02:54:35 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-6e8e29be18fd8fab68ab404adc8b64f40bd4a374ab1b4a8979c137dd591b527c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-8647-0860
OpenAccessLink https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/8760485
PQID 2455602065
PQPubID 4845423
PageCount 13
ParticipantIDs proquest_journals_2455602065
ieee_primary_8760485
crossref_citationtrail_10_1109_ACCESS_2019_2928414
doaj_primary_oai_doaj_org_article_b3180c3b6cfd472d82b3c4c257365222
crossref_primary_10_1109_ACCESS_2019_2928414
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20190000
2019-00-00
20190101
2019-01-01
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – year: 2019
  text: 20190000
PublicationDecade 2010
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2019
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
ref34
ref12
ref15
ref36
ref14
ref31
ref30
ref33
ref32
ref10
karlof (ref27) 2002
ref1
ref17
ref19
ref18
(ref2) 2017
ioannou (ref16) 2003
ref23
ref26
ref25
ref20
ref22
ref21
ref28
moon (ref29) 2009; 9
ref8
ref7
ref9
ref4
ref3
ref6
schaust (ref11) 2007; 1
ref5
österlind (ref24) 2006
References_xml – volume: 1
  start-page: 51
  year: 2007
  ident: ref11
  article-title: Misbehaviour detection for wireless sensor networks-necessary or Not?
  publication-title: Fachgespräch Sensornetze
– ident: ref12
  doi: 10.1109/ICT.2017.7998271
– year: 2003
  ident: ref16
  article-title: The hunt for viral processes
– ident: ref22
  doi: 10.22385/jctecs.v5i0.71
– ident: ref14
  doi: 10.1109/CMC.2010.49
– ident: ref9
  doi: 10.1145/1089761.1089765
– ident: ref33
  doi: 10.1109/INM.2015.7140344
– ident: ref31
  doi: 10.1007/s12652-017-0558-5
– ident: ref20
  doi: 10.1109/WIMOB.2005.1512911
– ident: ref35
  doi: 10.7551/mitpress/7496.003.0003
– ident: ref36
  doi: 10.1145/1961189.1961199
– ident: ref28
  doi: 10.1007/978-3-540-77871-4_14
– ident: ref6
  doi: 10.1016/j.jnca.2017.02.009
– ident: ref19
  doi: 10.1109/INFCOM.2007.225
– ident: ref3
  doi: 10.1145/1005817.1005828
– ident: ref25
  doi: 10.1016/j.adhoc.2013.04.014
– ident: ref18
  doi: 10.1109/INFOCOM.2006.89
– ident: ref10
  doi: 10.1109/ISSNIP.2007.4496866
– year: 2017
  ident: ref2
  publication-title: Baseline Security Recommendations for IoT in the Context of Critical Information Infrastructures
– start-page: 641
  year: 2006
  ident: ref24
  article-title: Cross-level sensor network simulation with COOJA
  publication-title: Proc 1st IEEE Int Workshop Practical Issues Building Sensor Netw Appl
– ident: ref5
  doi: 10.1109/COMST.2018.2844742
– volume: 9
  start-page: 118
  year: 2009
  ident: ref29
  article-title: Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks
  publication-title: Int J Comput Sci Netw Secur
– ident: ref13
  doi: 10.1016/j.burns.2015.08.009
– start-page: 113
  year: 2002
  ident: ref27
  article-title: Secure routing in wireless sensor networks: Attacks and countermeasures
  publication-title: Proc 1st IEEE Int Workshop Sensor Netw Protocols Appl
– ident: ref26
  doi: 10.1109/COMST.2015.2444095
– ident: ref23
  doi: 10.1109/LCN.2004.38
– ident: ref15
  doi: 10.1109/ICC.2013.6655254
– ident: ref1
  doi: 10.1109/JIOT.2014.2306328
– ident: ref4
  doi: 10.1145/1068009.1068061
– ident: ref32
  doi: 10.1016/j.future.2017.01.029
– ident: ref17
  doi: 10.1109/WAINA.2009.200
– ident: ref34
  doi: 10.1145/3242102.3242145
– ident: ref8
  doi: 10.1109/SIoT.2016.009
– ident: ref7
  doi: 10.1109/SURV.2013.050113.00191
– ident: ref30
  doi: 10.1145/2989293.2989305
– ident: ref21
  doi: 10.1109/INSS.2012.6240521
SSID ssj0000816957
Score 2.178981
Snippet The Internet of Things (IoT) provides the ability to extend the Internet into devices and everyday objects, in a way that they are uniquely addressable....
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 95844
SubjectTerms Actuators
Anomaly detection
Electronic devices
Experimentation
Internet of Things
intrusion detection systems
logistic regression
Monitoring
Object recognition
Remote control
Remote monitoring
Security
security agents
Sensors
Support vector machines
Wireless sensor networks
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEBYhp-YQ0ialTtKiQ49x1npYj-N2aQilzSUJ7E149IBA8ZbW-f8ZWcqypdBcchWybM3I33wapG8I-WwBuIgKmVvCnY6MPLV26ESbIHbM6z7omO8O_7hR1_fy27pf75T6ymfCijxwMdwCcNF1XoDyKUjNg-EgvPS40oRC7jCjL8a8nc3UjMGGKdvrKjPEOrtYrlY4o3yWy15yi6DM5F-haFbsryVW_sHlOdhcHZHDyhLpsnzdW7IXx3fkYEc78Jiw21p5ji7z7Sj6fVOSb_RhpEjqaEn1xYluEi3FOU_I_dXXu9V1W-sftF52ZmpVNJFbiMykYNIAygwgOzkEb0DJJDsIchBaDsBADsZq65nQIfSWQc-1F-_J_rgZ4wdCMS4DtoDSlsmeJwAkHhERRgYBSZiG8GdTOF_FwXONip9u3iR01hX7uWw_V-3XkIvtQ7-KNsb_u3_JNt52zcLWcwO621V3u5fc3ZDj7KHtIAjmiEF9Q86fPebqT_jHcdkjn-NIsk5f49Vn5E2eTsm_nJP96fdj_IiMZIJP8-J7Av9V19k
  priority: 102
  providerName: Directory of Open Access Journals
Title Security Agent Location in the Internet of Things
URI https://ieeexplore.ieee.org/document/8760485
https://www.proquest.com/docview/2455602065
https://doaj.org/article/b3180c3b6cfd472d82b3c4c257365222
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB61PcGBAgWxtFQ-cGy28SOxfVxWVBWiXKBSb1bGDwmBdhFkL_x6xrE34iXELbLsyPGMx99MPN8AvLSIQsaekFsiT0dFkRo7tLJJGFvudRd0zLnDN-_661v15q67O4CLORcmxjhdPovL_Dj9yw9bv8uhskvauaRw3SEckuNWcrXmeEouIGE7XYmFeGsvV-s1fUO-vWWXwpIZ5uqXw2fi6K9FVf6wxNPxcnUMN_uJlVsln5a7EZf--2-cjf8784fwoOJMtiqK8QgO4uYx3P-JffAE-Ptau46tcn4Ve7st4Tv2ccMIFrISLIwj2yZWyns-gdur1x_W102toNB41Zqx6aOJwmLkJgWTBuzNgKpVQ_AGe5VUi0ENUqsBOarBWG09lzqEznLshPbyKRxttpv4DBid7Egt2GvLVScSIkGXSDZKBYlJmgWI_dI6X-nFc5WLz25yM1rrijxcloer8ljAxTzoS2HX-Hf3V1lmc9dMjT010Fq7utMckpVqvcTep6C0CEag9MqTaZI9gU2xgJMsn_klVTQLONtrgKvb-JsTqiNEKAimPf_7qFO4lydYYjJncDR-3cUXhFJGPJ-8-_NJSX8AySPjIQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VcgAO5VGqLhTIgWOzjR9x7OOyolpgtxdaqTcr44eEqHYRzV749YwTb1QeQtwiy44cz3jm88TzDcBbg8hFUITcIp10ZOCxNG0lyoihYq6pfRNS7vDqQi2u5Mfr-noPTsdcmBBCf_ksTNNj_y_fb9w2hcrOaOeSwtX34D75_ZoP2VpjRCWVkDB1k6mFWGXOZvM5fUW6v2Wm3JAhZvIX99Oz9OeyKn_Y4t7BnD-G1W5qw72Sr9Nth1P34zfWxv-d-xM4yEizmA2q8RT2wvoZPLrDP3gI7HOuXlfMUoZVsdwMAbziy7ogYFgM4cLQFZtYDAU-n8PV-fvL-aLMNRRKJyvdlSrowA0GpqPXsUWlW5SVbL3TqGSUFXrZika2yFC22jTGMdF4XxuGNW-cOIL99WYdjqEg347UgqoxTNY8IhJ4CWSlpBcYhZ4A3y2tdZlgPNW5uLH9QaMydpCHTfKwWR4TOB0HfRv4Nf7d_V2S2dg1kWP3DbTWNu81i2SnKidQuehlw73mKJx0ZJyEIrjJJ3CY5DO-JItmAic7DbB5I99aToqmCFKr-sXfR72BB4vL1dIuP1x8egkP02SHCM0J7Hfft-EVYZYOX_eq-hNyQOV2
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+Agent+Location+in+the+Internet+of+Things&rft.jtitle=IEEE+access&rft.au=Ioannou%2C+Christiana&rft.au=Vassiliou%2C+Vasos&rft.date=2019&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=7&rft.spage=95844&rft.epage=95856&rft_id=info:doi/10.1109%2FACCESS.2019.2928414&rft.externalDocID=8760485
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon