Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย
Security Issues of IoT with Fog
1. SECURITY ISSUES OF IOT WITH FOG.
Achu Anna Antony
S1 M.Tech CSE
Roll No: 01
Guide: Mr.Bino Thomas
Assistant Professor, CSE
November 9, 2016
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 1 / 25
3. INTRODUCTION
Cloud: Storing and accessing data and programs over the
Internet instead of computerโs hard drive.
IoT : Everyday objects(IoT nodes) connected through
Internet, allowing them to send and receive data
IoT uses:
Internet : Infrastructure to interconnect IoT nodes
Cloud: Background supporting infrastructure
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 3 / 25
4. INTRODUCTION contd...
Huge network latency and Backend overhead occurs as data
to be processed increases in IoT cloud. So IoT uses,
Fog as a solution : ie.. intermediate computing bu๏ฌer between
IoT nodes and Cloud
Adoption of IoT fog can cause many security threats, which is
explored throughout
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 4 / 25
5. EXISTING SYSTEM
Title:- โFog Computing and Its Role in the Internet of Thingsโ
(F.Bonomi, R. Milito, J. Zhu, and S. Addepalli)
Proposed:
Fog Computing - Extension of cloud computing Features used
Features:
Highly virtualized platform
Limitations
Multi fog OS prevents from access of other OS. If there occur
any problem on Kernel mode, it does not prevent.
Figure: Fog with computing features
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 5 / 25
6. EXISTING SYSTEM contd...
Title:-โThe Fog Computing Paradigm: Scenarios and Security
Issuesโ (I. Stojmenovic and W. Sheng)
Proposed:
Man in the middle attack- Fog devices get replaced by fake
ones.
Features:
Intrusion Detection method signature, behavioural or anomaly
based detection method
Limitations
Protection methods like encryption and decryption of data
consume large amount of battery on mobile devices.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 6 / 25
7. EXISTING SYSTEM contd...
Title:- Semantics-Aware Android Malware Classi๏ฌcation Using
Weighted Contextual API Dependency Graphs (M. Zhang, Y.
Duan, H. Yun, and Z.Zhao)
Proposed:
Android based malware detection
Features:
Uses Signature based approach for detection of malware
Graphs are generated from behaviour graphs and convert it to
signature and stores in database.
Limitations
Detection of malware from unknown or new malware family
will be hectic.
Figure: Android based malware to signature conversion[4]
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 7 / 25
8. FOG COMPUTING
Fog computing is an extension of cloud computing paradigm,
but is a more highly virtualized platform that provides
computation, storage, and networking services between end
IoT devices and back-end cloud servers.
Figure: The hierarchical fog computing architecture
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 8 / 25
9. ADVANTAGES AND APPLICATIONS OF FOG
Advantages
Greater business agility
Low latency
Geo distribution
Lower operating expense
Applications
Geographically distributed applications
Fast mobile applications
Large-scale distributed control systems
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 9 / 25
10. PROBLEM STATEMENT
As fog infrastructure is prone to many security threats, there
is a need for studying about them deeply so as the methods
discussed in the proposed systems is needed to combine which
is examined in the proposed system
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 10 / 25
11. RELEVANT SECURITY TECHNOLOGIES
Security technology for IoT network
When client wants to access cloud services, he must go
through authentication process to ensure con๏ฌdentiality and
security for IoT network.
Authorized users can access cloud with mobile devices.
Protocol is of two phases: Registration and Authentication.
Figure: Authentication as a service
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 11 / 25
12. RELEVANT SECURITY TECHNOLOGIES contd...
Security technology for fog node
In fog Computing, much of the information is gathered into
fog node.
If a wrong information is spread by exploiting vulnerability is a
big problem.
So need dynamic analysis techniques to monitor fog node in
real time
Typically, the performance overhead of dynamic analysis is
high.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 12 / 25
13. RELEVANT SECURITY TECHNOLOGIES contd...
Security technology for IoT node
When some IoT nodes are out of order or provide wrong
information, it can a๏ฌect people.
Attacker has many chances to compromise various devices
with sensors.
The attacker is able to predict user behavior and abuse its
information.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 13 / 25
14. RELEVANT SECURITY TECHNOLOGIES contd...
For IoT nodes, to be truly secure, an IoT node must also
obtain application layer security.
That means that the node itself, and not just the
communication channel (i.e. the pipe), should be
authenticated.
In addition to channel authentication, encryption and data
integrity should be established at the application layer to
protect the data ๏ฌowing through the pipe.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 14 / 25
15. SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING
Man- in- the middle Attack
In this attack, gateways serving as fog devices may be
compromised or replaced by fake ones.
Use a strong encryption between the client and the server and
never connect to open WiFi routers directly.
Encryption and decryption methods consume large amount of
battery on mobile device.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 15 / 25
16. SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Intrusion Detection
Intrusion detection system analyzes and monitors
i) access control policy, ii) a log ๏ฌle, and iii)user log
information in order to detect intrusion behavior.
It can be run on network side in order to detect malicious
activity such as DoS, port scanning.
Intrusion detection techniques have been applied to mitigate
attacks such as i) insider attack, ii) ๏ฌooding attack, iii) port
scanning, iv) attacks on VM or hypervisor.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 16 / 25
17. SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Malicious Fog node problem
In order to provide service to user, fog nodes process data
received from the IoT devices.
If the workloads is heavy, it is divided into several jobs and
processed by several fog nodes.
If some fog nodes are compounded by a malicious user, it is
di๏ฌcult to ensure the integrity of the data.
Before the computation begin, fog nodes must trust each
other.
An authentication protocol is required.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 17 / 25
18. SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Malicious Detection Technique
When some fog nodes are compromised, hybrid detection
technique is useful to detect malicious code in fog nodes.
It is combined with signature-based detection technique and
behavior-based detection technique.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 18 / 25
19. SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Data Protection
Messages generated from IoT devices is sent to the nearest
fog nodes.
When distributed and processed data is merged, the integrity
of the data should be guaranteed.
Because of limited resources, it is di๏ฌcult to encrypt or
decrypt data on IoT device so light-weight encryption
algorithms or masking techniques are required.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 19 / 25
20. SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Data Management Issues
Fog nodes are geographically distributed, making it di๏ฌcult to
know data location.
The user wants to be provided with the same services in other
areas.
It is di๏ฌcult for user to know whether the node provides the
same service.
Some fog nodes by having duplicated ๏ฌles will cause a waste
of resources.
IoT will create enormous amounts of data there is a need for
distributed intelligence and so-called fast Big Data processing.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 20 / 25
21. SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Every communication deployment of IoT is unique.
However, there are four basic stages that are common to just
about every IoT application. Those components are:
data collection,
data transmission,
data assessment, and
response to the available information.
Successful data management is therefore very important to
the success of IoT.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 21 / 25
22. CONCLUSION
IoT cloud with fog embedded system can overcome
congestion problem
network latency
Fog computing provides the improved quality of services to
the user by complementing shortages of IoT cloud.
IoT technology can be utilized in various ๏ฌelds in the future.
This presentation highlights the need to con๏ฌgure the secure
fog computing environment through security technologies
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 22 / 25
23. FUTURE WORKS
Future work should be done to develop a system for e๏ฌciently
collect and analyze various logs generated in fog computing
environment..
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 23 / 25
24. REFERENCES
[1] Kanghyo Lee , Donghyun Kim, Dongsoo Ha, Ubaidullah Rajput
and Heekuck Oh,โOn Security and Privacy Issues of Fog
Computing supported Internet of Things Environment,โHanyang
University, ERICA Campus, South Korea,2015.
[2] L.M.Vaquero and L.Rodero-Merino,Finding your Way in
Fog:Towards a Comprehensive De๏ฌnition of Fog Computing, ACM
SIGCOMM Computer Communication Review, vol.44, Oct. 2014.
[3] F.Bonomi, R.Milito, J.Zhu, and S.Addepalli,Fog Computing and
Its Role in the Internet of Things, Proceedings of the ๏ฌrst edition
of the MCC workshop on Mobile Cloud Computing,Aug.2012.
[4] I.Stojmenovic and W.Sheng,The Fog Computing Paradigm:
Scenarios and Security Issues, Federated Conference on Computer
Science and Information Systems, pp.1-8, Sept. 2014.
[5] M.Zhang, Y.Duan, H.Yun, and Z.Zhao,Semantics-Aware
Android Malware Classi๏ฌcation Using Weighted Contextual API
Dependency Graphs, Proceedings of the 2014 ACM SIGSAC
Conference on Computer and Communications Security, Nov.2014.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 24 / 25
25. THANK YOU
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 25 / 25