适合物联网的自适应轻量级安全框架

M. Domb
{"title":"适合物联网的自适应轻量级安全框架","authors":"M. Domb","doi":"10.5772/INTECHOPEN.73712","DOIUrl":null,"url":null,"abstract":"Standard security systems are widely implemented in the industry. These systems con- sume considerable computational resources. Devices in the Internet of Things [IoT] are very limited with processing capacity, memory and storage. Therefore, existing security systems are not applicable for IoT. To cope with it, we propose downsizing of existing security processes. In this chapter, we describe three areas, where we reduce the required storage space and processing power. The first is the classification process required for ongoing anomaly detection, whereby values accepted or generated by a sensor are clas- sified as valid or abnormal. We collect historic data and analyze it using machine learn ing techniques to draw a contour, where all streaming values are expected to fall within the contour space. Hence, the detailed collected data from the sensors are no longer required for real-time anomaly detection. The second area involves the implementation of the Random Forest algorithm to apply distributed and parallel processing for anomaly discovery. The third area is downsizing cryptography calculations, to fit IoT limitations without compromising security. For each area, we present experimental results support-ing our approach and implementation. as follows: We begin with an introduction followed by the relevant literature review. We then discuss rules extraction using machine learning tech -niques. We present random forest as the most suitable ML for IoT. We proceed with various improvements, utilizing RF and IoT attributes. We then outline an experiment that executes RF building and its corresponding classifications using 15 different configurations, each based on a unique combination of the number of processors and the forest size.","PeriodicalId":297158,"journal":{"name":"Internet of Things - Technology, Applications and Standardization","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An Adaptive Lightweight Security Framework Suited for IoT\",\"authors\":\"M. Domb\",\"doi\":\"10.5772/INTECHOPEN.73712\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Standard security systems are widely implemented in the industry. These systems con- sume considerable computational resources. Devices in the Internet of Things [IoT] are very limited with processing capacity, memory and storage. Therefore, existing security systems are not applicable for IoT. To cope with it, we propose downsizing of existing security processes. In this chapter, we describe three areas, where we reduce the required storage space and processing power. The first is the classification process required for ongoing anomaly detection, whereby values accepted or generated by a sensor are clas- sified as valid or abnormal. We collect historic data and analyze it using machine learn ing techniques to draw a contour, where all streaming values are expected to fall within the contour space. Hence, the detailed collected data from the sensors are no longer required for real-time anomaly detection. The second area involves the implementation of the Random Forest algorithm to apply distributed and parallel processing for anomaly discovery. The third area is downsizing cryptography calculations, to fit IoT limitations without compromising security. For each area, we present experimental results support-ing our approach and implementation. as follows: We begin with an introduction followed by the relevant literature review. We then discuss rules extraction using machine learning tech -niques. We present random forest as the most suitable ML for IoT. We proceed with various improvements, utilizing RF and IoT attributes. We then outline an experiment that executes RF building and its corresponding classifications using 15 different configurations, each based on a unique combination of the number of processors and the forest size.\",\"PeriodicalId\":297158,\"journal\":{\"name\":\"Internet of Things - Technology, Applications and Standardization\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Internet of Things - Technology, Applications and Standardization\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5772/INTECHOPEN.73712\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things - Technology, Applications and Standardization","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5772/INTECHOPEN.73712","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

标准安全系统在行业中得到了广泛的应用。这些系统消耗了大量的计算资源。物联网(IoT)中的设备在处理能力、内存和存储方面非常有限。因此,现有的安防系统并不适用于物联网。为了解决这个问题,我们建议缩减现有的安全流程。在本章中,我们描述了三个领域,我们减少所需的存储空间和处理能力。第一个是持续异常检测所需的分类过程,即传感器接受或生成的值被分类为有效或异常。我们收集历史数据,并使用机器学习技术对其进行分析,以绘制轮廓,其中所有流值预计将落在轮廓空间内。因此,实时异常检测不再需要从传感器收集的详细数据。第二个领域涉及随机森林算法的实现,应用分布式和并行处理异常发现。第三个领域是缩小加密计算,以适应物联网的限制而不影响安全性。对于每个领域,我们提供了支持我们的方法和实施的实验结果。我们先做一个介绍,然后是相关的文献综述。然后我们讨论使用机器学习技术的规则提取。我们认为随机森林是最适合物联网的机器学习。我们继续进行各种改进,利用射频和物联网属性。然后,我们概述了一个实验,该实验使用15种不同的配置执行RF构建及其相应的分类,每种配置都基于处理器数量和森林大小的独特组合。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An Adaptive Lightweight Security Framework Suited for IoT
Standard security systems are widely implemented in the industry. These systems con- sume considerable computational resources. Devices in the Internet of Things [IoT] are very limited with processing capacity, memory and storage. Therefore, existing security systems are not applicable for IoT. To cope with it, we propose downsizing of existing security processes. In this chapter, we describe three areas, where we reduce the required storage space and processing power. The first is the classification process required for ongoing anomaly detection, whereby values accepted or generated by a sensor are clas- sified as valid or abnormal. We collect historic data and analyze it using machine learn ing techniques to draw a contour, where all streaming values are expected to fall within the contour space. Hence, the detailed collected data from the sensors are no longer required for real-time anomaly detection. The second area involves the implementation of the Random Forest algorithm to apply distributed and parallel processing for anomaly discovery. The third area is downsizing cryptography calculations, to fit IoT limitations without compromising security. For each area, we present experimental results support-ing our approach and implementation. as follows: We begin with an introduction followed by the relevant literature review. We then discuss rules extraction using machine learning tech -niques. We present random forest as the most suitable ML for IoT. We proceed with various improvements, utilizing RF and IoT attributes. We then outline an experiment that executes RF building and its corresponding classifications using 15 different configurations, each based on a unique combination of the number of processors and the forest size.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Internet of Things in a Smart Connected World dT-Calculus: A Formal Method to Specify Distributed Mobile Real-Time IoT Systems An Adaptive Lightweight Security Framework Suited for IoT A Reference Architecture for Digital Ecosystems Cooperative Human-Centric Sensing Connectivity
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1