CFP last date
20 January 2025
Reseach Article

Bio-inspired Security Scheme for IoT Technology

by Charles O. Muango, Jairus O. Malenje, Qu Shaojian
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 19
Year of Publication: 2019
Authors: Charles O. Muango, Jairus O. Malenje, Qu Shaojian
10.5120/ijca2019918960

Charles O. Muango, Jairus O. Malenje, Qu Shaojian . Bio-inspired Security Scheme for IoT Technology. International Journal of Computer Applications. 178, 19 ( Jun 2019), 13-18. DOI=10.5120/ijca2019918960

@article{ 10.5120/ijca2019918960,
author = { Charles O. Muango, Jairus O. Malenje, Qu Shaojian },
title = { Bio-inspired Security Scheme for IoT Technology },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2019 },
volume = { 178 },
number = { 19 },
month = { Jun },
year = { 2019 },
issn = { 0975-8887 },
pages = { 13-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number19/30641-2019918960/ },
doi = { 10.5120/ijca2019918960 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:53:59.003939+05:30
%A Charles O. Muango
%A Jairus O. Malenje
%A Qu Shaojian
%T Bio-inspired Security Scheme for IoT Technology
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 19
%P 13-18
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There is a general consensus among scholars and ICT practitioners that the evolution of technology in today’s world has advanced [1] to a level where communication between individuals and abstract objects is possible under the framework of Internet of Things (IoT). However, due to security threats and constrained resources (such as memory, power and processing capacity), applying traditional approaches of security on these category of devices has become a challenge to ICT professionals in this era of cybersecurity. Therefore, this study proposes a flexible solution that can be used to classify IoT devices into operational domains, whereby a meta-heuristic Nature-Inspired Firefly algorithm is used to tune parameters for the various domains to prevent attacks from spilling all over the entire community of IoT devices. With this approach, no device shall be allowed to communicate outside its domain. The proposed technique is modeled on the behavior of the firefly that uses its light intensity to communicate to friends and frighten off impostors or enemies. Through iterative simulations done, we were able to achieve constant light intensity (attractiveness) with different bands. Our findings revealed a fast and improved convergence rate as compared to other nature inspired algorithms. Therefore, we recommend that these bands can be allocated to the various IoT domains. Limitations of the study and future directions are well addressed.

References
  1. Internet Society, "2017 Internet Society Global Internet Report - Paths to Our Digital Future," 2017.
  2. Olivier Flauzac , Carlos Gonzalez , and Florent Nolot , "New Security Architecture for IoT Network," in International Workshop on Big Data and Data Mining Challenges on IoT and Pervasive Systems, 2015.
  3. Pwnie Express, The IoT Security Gap. Boston: Pwnie Express, 2017.
  4. Jouini Mouna , Ben Arfa Rabai Latifa , and Khedri Ridha , "Multidimensional Approach Towards a Quantitative Assessment of Security Threats," in The 6th International Conference on Ambient Systems, Networks and Technologies(ANT 2015), 2015.
  5. Behrens Reinhard and Ahmed Ali , "A Security Architecture for The Internet of Things," KSII Transactions on Internet and Information Systems, vol. 11, no. 12, pp. 6092-6115, 2017.
  6. Vashi Shivangi , Ram Jyotsnamayee , and Modi Janit , "Internet of Things (IoT) A Vision, Architectural Elements, and Security Issues," in International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), 2017.
  7. Marconot Johan , Pebay-Peyroula Florian , and Hély David , "IoT Components LifeCycle based Security Analysis," in 2017 Euromicro Conference on Digital System Design, 2017.
  8. Express Pwnie, "Internet Of Evil Things," 2017.
  9. Wei Wang. (2017, October) https://thehackernews.com. [Online]. https://thehackernews.com/2017/10/iot-botnet-malware-attack.html
  10. Check Point Research. (2017, October) Check Point Research. [Online]. https://research.checkpoint.com/new-iot-botnet-storm-coming/
  11. Elisa Bertino and Islam Nayeem , "Botnets and internet of things security," Computer, pp. 76-79, February 2017.
  12. M. Antonakakis et al., "Understanding the mirai botnet," in USENIX Security Symposium, 2017.
  13. Greenberg Andy. (2017, October ) WIRED. [Online]. https://www.wired.com/story/reaper-iot-botnet-infected-million-networks/
  14. Khandelwal Swati. (2017, November) The Hacker News. [Online]. https://thehackernews.com/2017/11/amazon-alexa-hacking-bluetooth.html
  15. Kamal Aldein Mohammeda Zeinab and Sayed Ali Elmustafa , "Internet of Things Applications, Challenges and Related Future Technologies," World Scientific News, vol. 67, no. 2, pp. 126-148, 2017.
  16. Afzal Shah Idris , Amin Malik Faizan , and Arshid Ah Syed , "Enhancing Security in loT based Home Automation using Reed Solomon Codes," in IEEE WiSPNET 2016 conference, 2016.
  17. Jerald. A Vimal , Rabara. S Albert , and Premila Bai Daisy , "Algorithmic Approach to security Architecture for Integrated IoT Smart Services Environment," in World Congress on Computing and Communication Technologies (WCCCT), 2017.
  18. Deogirikar Jyoti and Vidhate Amarsinh , "Security Attacks inIoT: A Survey," in International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), 2017.
  19. Riahi Sfar Arbia , Chtourou Zied , and Challa Yacine , "A systemic and cognitive vision for IoT security: a case study of military live simulation and security challenges," in 2017 International Conference on Smart, Monitored and Controlled Cities (SM2C), 2017.
  20. Sedjelmaci Hichem , Mohamed Senouci Sidi , and Taleb Tarik, "An Accurate Security Game for Low-Resource IoT Devices," in IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 10, OCTOBER 2017, 2017.
  21. Muhammad Ahemd Mian , Ali Shah Munam , and Wahid Abdul , "IoT Security: A Layered Approach for Attacks & Defenses," in International Conference on Communication Technologies (ComTech), 2017.
  22. Ahmad Khan Minhaj and Salah Khaled , "IoT Security: Review, Blockchain Solutions, and Open Challenges," Future Generation Computer Systems, no. FUTURE 3814, 2017.
  23. Mohsin Mujahid , Anwar Zahid , and Zaman Farhat , "IoTChecker: A data-driven framework for security analytics of Internet of Things configurations," computers & s e c u r i t y , no. 70, pp. 199–223, 2017.
  24. Kim Hyun-Jin, Chang Hyun-Soo , Suh Jeong-Jun , and Shon Tae-shik , "A Study on Device Security in IoT Convergence," in 2016 International Conference on Industrial Engineering, Management Science and Application (ICIMSA), 2016.
  25. She Yang Xin, Nature Inspired Optimization Algorithms.: Elsevier Inc., 2014.
Index Terms

Computer Science
Information Sciences

Keywords

IoT Cyber-security Firefly Domain Light-intensity