Edge‐based blockchain enabled anomaly detection for insider attack prevention in Internet of Things

YM Tukur, D Thakker, IU Awan - Transactions on Emerging …, 2021 - Wiley Online Library
Transactions on Emerging Telecommunications Technologies, 2021Wiley Online Library
Abstract Internet of Things (IoT) platforms are responsible for overall data processing in the
IoT System. This ranges from analytics and big data processing to gathering all sensor data
over time to analyze and produce long‐term trends. However, this comes with prohibitively
high demand for resources such as memory, computing power and bandwidth, which the
highly resource constrained IoT devices lack to send data to the platforms to achieve
efficient operations. This results in poor availability and risk of data loss due to single point of …
Abstract
Internet of Things (IoT) platforms are responsible for overall data processing in the IoT System. This ranges from analytics and big data processing to gathering all sensor data over time to analyze and produce long‐term trends. However, this comes with prohibitively high demand for resources such as memory, computing power and bandwidth, which the highly resource constrained IoT devices lack to send data to the platforms to achieve efficient operations. This results in poor availability and risk of data loss due to single point of failure should the cloud platforms suffer attacks. The integrity of the data can also be compromised by an insider, such as a malicious system administrator, without leaving traces of their actions. To address these issues, we propose in this work an edge‐based blockchain enabled anomaly detection technique to prevent insider attacks in IoT. The technique first employs the power of edge computing to reduce the latency and bandwidth requirements by taking processing closer to the IoT nodes, hence improving availability, and avoiding single point of failure. It then leverages some aspect of sequence‐based anomaly detection, while integrating distributed edge with blockchain that offers smart contracts to perform detection and correction of abnormalities in incoming sensor data. Evaluation of our technique using real IoT system datasets showed that the technique remarkably achieved the intended purpose, while ensuring integrity and availability of the data which is critical to IoT success.
Wiley Online Library
以上显示的是最相近的搜索结果。 查看全部搜索结果