ChapterPDF Available

Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms

Authors:

Abstract and Figures

This paper presents the main results of the experiments conducted using the MMT-IoT security analysis solution run on a IoT Fed4Fire+ platform (Virtual Wall - w.iLab proposed by IMEC, Belgium). MMT is a monitoring framework developed by Montimage, and MMT-IoT is the tool that allows monitoring and analysing the security and performance of IoT networks. The results obtained concern two principal advancements. First, the adaptations made to deploy MMT-IoT on the IoT platform in order to run the tool on the platform’s IoT devices. Second, the deployment of the software allowed us to run preliminary tests on the selected platform for performing initial validation and scalability tests on this real environment. To this end, Montimage defined and implemented three test scenarios related to security and scalability with 1 or more clients. These results will be used to prepare a new experimentation phase involving also another Fed4Fire+ platform (LOG-a-TEC proposed by IJS, Slovenia).
Content may be subject to copyright.
HAL Id: hal-02526342
https://hal.inria.fr/hal-02526342
Submitted on 31 Mar 2020
HAL is a multi-disciplinary open access
archive for the deposit and dissemination of sci-
entic research documents, whether they are pub-
lished or not. The documents may come from
teaching and research institutions in France or
abroad, or from public or private research centers.
L’archive ouverte pluridisciplinaire HAL, est
destinée au dépôt et à la diusion de documents
scientiques de niveau recherche, publiés ou non,
émanant des établissements d’enseignement et de
recherche français ou étrangers, des laboratoires
publics ou privés.
Distributed under a Creative Commons Attribution| 4.0 International License
Industrial IoT security monitoring and test on
Fed4Fire+ platforms
Diego Rivera, Edgardo Montes de Oca, Wissam Mallouli, Ana Cavalli, Brecht
Vermeulen, Matevz Vucnik
To cite this version:
Diego Rivera, Edgardo Montes de Oca, Wissam Mallouli, Ana Cavalli, Brecht Vermeulen, et al.. Indus-
trial IoT security monitoring and test on Fed4Fire+ platforms. ICTSS 2019: 31st IFIP International
Conference on Testing Software and Systems, Oct 2019, Paris, France. pp.270-278, �10.1007/978-3-
030-31280-0_17�. �hal-02526342�
Industrial IoT Security Monitoring and Test on
Fed4Fire+ Platforms
Diego Rivera1, Edgardo Montes de Oca1, Wissam Mallouli1, Ana Cavalli2,
Brecht Vermeulen3, and Matevz Vucnik4
1Montimage, 39 rue Bobillot, 75013 Paris, France
{first.last}@montimage.com
2Telecom SudParis, 9 rue Charles Fourier, 91011 Evry, France
ana.cavalli@telecom-sudparis.eu
3IMEC, Remisebosweg 1, 3001 Leuven, Belgium
brecht.vermeulen@ugent.be
4Jozef Stefan Institute, Jamova cesta 39, 1000 Ljubljana, Slovenia
matevz.Vucnik@ijs.si
Abstract. This paper presents the main results of the experiments con-
ducted using the MMT-IoT security analysis solution run on a IoT
Fed4Fire+ platform (Virtual Wall - w.iLab proposed by IMEC, Bel-
gium). MMT is a monitoring framework developed by Montimage, and
MMT-IoT is the tool that allows monitoring and analysing the secu-
rity and performance of IoT networks. The results obtained concern two
principal advancements. First, the adaptations made to deploy MMT-
IoT on the IoT platform in order to run the tool on the platform’s IoT
devices. Second, the deployment of the software allowed us to run pre-
liminary tests on the selected platform for performing initial validation
and scalability tests on this real environment. To this end, Montimage
defined and implemented three test scenarios related to security and
scalability with 1 or more clients. These results will be used to prepare
a new experimentation phase involving also another Fed4Fire+ platform
(LOG-a-TEC proposed by IJS, Slovenia).
Keywords: Monitoring ·Testing ·IoT ·Industrial Applications ·Fed4Fire
·MMT
1 Introduction
Internet of things (IoT) is a concept that describes a network of interconnected
devices capable of interacting with other devices, human beings and its sur-
rounding physical world to perform a variety of tasks [1].
Modern IoT devices make use of sensors (e.g., accelerometer, gyroscope, mi-
crophone, light sensor, etc.) [6] to detect any changes in their surrounding and
take necessary actions to improve any ongoing task efficiently [15]. The increas-
ing popularity and utility of IoT devices in divergent application domains made
the IoT industry to grow at a tremendous rate. According to a report by Busi-
ness Insider [3], 30 billion devices will be connected to the Internet by 2020.
2 D. Rivera et al.
These devices can provide new functionality in different domains, but can also
be used as vehicles to launch attacks (examples can be found for instance in [13,
9, 4, 7, 10, 11]).
The challenge of security monitoring on IoT network arises when trying to de-
tect these attacks on devices that have strict resource limitations. Furthermore,
existing centralised monitoring techniques (Intrusion Detection and Prevention
Systems) cannot handle the large amounts of data that needs to be analysed, and
have been designed to work on the edge of the networks and cannot cope with
IoT networks that lack clear boundaries. In this paper, we present MMT-IoT,
a security tool intended for addressing the requirements for security monitor-
ing on IoT networks, and its application in industrial settings. MMT-IoT allows
capturing IoT network traffic near the IoT devices and analyses them to de-
tect potential attacks. In this work we take advantage of the industrial Fed4Fire
testbed to deploy MMT-IoT on a near-to-real-life scenario, validate its security
detection properties and perform initial scalability tests.
The rest of the paper is organized as follows. Section 2 presents the general
architecture of the MMT-IoT tool. Section 3 presents the description of the
Fed4Fire platforms that were used for the experimentation. Section 4 presents
the methodology followed for the deployment and experiments on the Fed4Fire
testbed, as well as the results obtained. Finally, Section 5 presents the conclusions
and future work.
2 Montimage Monitoring Tool (MMT) for IoT Networks
The Montimage Monitoring Tool (MMT) [8] is a modular monitoring framework
that allows detecting behavior, security and performance incidents based on a
set of formal properties (written in XML) and embedded functions (written in
C or any script or interpreted language). MMT allows real-time data capture,
metadata extraction, correlation of data from different sources (i.e. network, ap-
plications traces and logs, operating systems), complex event processing, and
distributed analysis. It uses temporal logic to detect given security properties
(expected or anomalous), and statistical and machine learning-based analysis for
detecting more sophisticated activities and behaviour. It is relatively easy to ex-
tend by adding new: i) properties and embedded functions; ii) plugins for parsing
any structured message; iii) new dashboards for visualising data, statistics and
alarms; and, iv) instructions to trigger reactions (e.g. mitigation or blocking of
attacks).
In order to correctly adapt this approach – designed initially for traditional
Ethernet networks – to IoT networks, it was required to split the network extrac-
tor (sniffer) in two parts: the MMT-IoT Sniffer (a Contiki-based IoT device),
and the MMT-IoT Bridge (a Linux-based tool). The former is the IoT endpoint
that is in charge of sniffing the packets and forwarding them – using a USB line
– to a more powerful machine. The latter recovers the transferred packets from
the USB line and injects them (encapsulated using the ZEP protocol) in the
loopback interface of the machine, making the packets ready for analysis by the
Industrial IoT Security Monitoring and Test 3
Raw data
802.3 (eth)
IP
UDP
ZEP
802.15.4
6LowPAN
Data
Raw data
802.15.4
6LowPAN
CoAP
Data
MMT-IoT
Bridg e/Ex-
tractor
MMT-IoT
Sniff er
MMT
Prob e
USB Line
(SLIP
Library)
TUN
interfac e
MMT-Prob e
Report logs
Fig. 1. General Architecture of the MMT-IoT solution.
MMT-Probe and MMT-Security. Figure 1 summarises the general architecture
of the solution.
Concerning the MMT-IoT Sniffer, the implementation of this architecture
was achieved by introducing modifications in the network drivers to make the
sniffing feature work. Such modifications were focused in three main axes:
Radio driver in promiscuous mode: This modification was done to avoid
dropping of packets by the Contiki kernel.
Avoid dropping packets with bad checksum : By default, the radio driver reads
the packet and checks the CRC to detect potential transmission failures. If
this check fails, the packer is discarded to avoid processing a mis-formatted
packet and save energy. This behaviour was changed, since a sniffing solution
must extract all the packets on the medium whether they are correct or not.
Insertion of callbacks to redirect the received packet: A sniffer is a passive
network element, therefore, once the packet is received on the radio driver
layer, it is transferred via callbacks directly to the application layer. This
behaviour bypasses the Contiki network processing and redirects the packets
immediately using the USB line, saving energy in the sniffer device. The
structure of the inserted callbacks is depicted in Figure 2.
Finally, the MMT-IoT Bridge is responsible for capturing the packets sent
through the USB line and making them available for the security analysis per-
formed by the MMT-Probe and MMT-Security; both part of the MMT software.
This security analysis is performed by a set of security rules – previously assessed
by a network security engineer – which codify the set of network events that need
to be correlated for detecting security issues.
It is important to notice that computaiton complexity of detecting an attack
is given by the rule itself; complex attacks require more complex rules which
correlate a higher number of network events. Considering this, the computa-
tion complexity will be taken by MMT-Probe, and not MMT-IoT, which only
redirects the traffic to MMT-Probe. This is why neither MMT-IoT Sniffer nor
4 D. Rivera et al.
MMT-IoT Sniffer
Raw data
802.15.4
6LowPAN
UDP
CoAP
Application
Radio In terface
MMT-IoT Bridge
Forma t Extraction
Radio Driver
(CC25 38)
RDC Driver
Receive_pkg inp ut_pkg
Callba ck
Callba ck
ZEP
Encapsula tion
TUN/TA P
Forw ardi ng
Raw data
802.3 (eth)
IP
UDP
ZEP
802.15.4
6LowPAN
UDP
CoAP
Data
SnifferApp
SerialInte rface
format _pkg
Sendvia SLIP
USB Lin e
Interrupti on
Fig. 2. Internal details of the MMT-IoT solution.
MMT-IoT Bridge components contain any complex logic, since, as mentioned
before, the security analysis is performed by MMT-Probe.
3 Fed4Fire+ Testbeds
Experimentally driven research is considered to be a key factor for growing
the European Internet industry. In order to enable this type of RTD activities,
a number of projects for building a European facility for Future Internet Re-
search and Experimentation (FIRE) have been launched, each project targeting
a specific community within the Future Internet ecosystem. Through the federa-
tion of these infrastructures, innovative experiments become possible that break
the boundaries of these domains. Besides, infrastructure developers can utilize
common tools of the federation, allowing them to focus on their core testbed
activities.
In this sense, Fed4FIRE+ is a project under the European Union Programme
Horizon 2020, offering the largest worldwide federation of Next Generation In-
ternet (NGI) testbeds. These provide open and reliable facilities supporting a
wide variety of different research and innovation communities and initiatives in
Europe, including the 5G PPP projects.
The following platforms, LOG-a-TEC and Virtual Wall – w.iLab that are
part of Fed4FIRE+ where considered. It must be noted that only Virtual Wall
– w.iLab was used to perform the experiments described in this paper. in the
case of LOG-a-TEC, only a feasibility study was made and the experiments on
this platform will be performed at a later stage.
3.1 LOG-a-TEC
LOG-a-TEC is proposed by IJS, Slovenia [14]. It is composed of several differ-
ent radio technologies that enable dense and heterogeneous IoT, MTC and 5G
experimentation. Specially developed embedded wireless sensor nodes can host
four different wireless technologies and seven types of wireless transceivers. In
order to enable different experiments in combined indoor/outdoor environments
Industrial IoT Security Monitoring and Test 5
using heterogeneous wireless technologies, the testbed is deployed within JSI’s
premises and outside in the surrounding park and on the walls of the buildings.
The feasibility of using this platform to carry out experiments has been val-
idated and a new experimentation phase will allow performing the scenarios
described and demonstrate the genericity of the monitoring solution.
3.2 Virtual Wall – w.iLab
The w.iLab platform [5] is an IoT and 5G emulation testbed that allows running
experiments on nodes on real IoT deployments. This platform was designed by
the IMEC, Belgium. It provides “bare metal” access to its nodes, i.e., it gives
root access to physical machines that will be used to run the experiment. This
allows the experimenter to have full control of the nodes on the testbed. The
deployment of the MMT-IoT and MMT-Probe software and the execution of
the tests are performed remotely without requiring major interventions from the
operators. For this, we created credentials on the iMinds platform and performed
a reservation of the Intel NUC nodes from the “Datacenter” floor of the platform.
The jFED-Experimenter tool was required to design an experiment to access
these nodes.
4 Experimental Evaluation
4.1 Methodology
Considering these testbeds, we used the w.iLab platform to deploy the MMT-
IoT Sniffer and the MMT-Probe solutions. In this way, we were able to use the
w.iLab t.1 platform to evaluate the scalability of these by overloading them. By
performing the extraction of the packets from an IoT network, this experimen-
tation pursues two principal sub-objectives: (1) perform an initial DPI-based
security analysis on an IoT network traffic; and (2) determine the maximum
throughput a single instance of MMT-IoT Sniffer can handle.
To achieve these objectives, we deployed a set of IoT devices as shown in
Figure 3. In this deployment we used 3 types of devices:
Fig. 3. Deployment of the MMT-IoT Solution of the w.iLab platform.
6 D. Rivera et al.
Ping Client: An emulated IoT sensor programmed to attack the server. For
the emulation purposes we used a client that performs a ”ping” to the IoT
router, however in real life a client can be any device generating some type
of traffic.
IoT Router: A gateway running a routing protocol to allow communications
within the IoT network.
MMT-IoT: A node running the Montimage software under test.
We used the deployment described above to perform initial validation and
scalability tests in scenarios that contain respectively 1, 2, 3 malicious clients.
We used these configurations to pursue both objectives previously mentioned:
(1) the security analysis validation, by means of determining the number of
detected attacks; and (2) the scalability of the MMT-IoT solution, by means of
analyzing the number of extracted packets on each scenario. This latter aims to
be a first test of the scalability of the MMT-IoT software, aiming to determine
the amount of information an IoT sniffer is capable to handle.
To deploy the testing scenarios we used the nodes provided by the w.iLab
platform, each one composed of a Linux machine with two Zolertia Re-Mote
IoT nodes. On each node we used the Zolertia Re-mote nodes to install the
corresponding device type (in form of an IoT firmware) and generate the test
traffic. Additionally, we installed the MMT-IoT Bridge, MMT-Probe and MMT-
Security software on the MMT-IoT Linux machine. This was done in order to
read the packets extracted by the IoT sniffer and perform the security analysis
on the same node.
The Ping Client IoT sensors were configured to trigger the attack every 10
seconds. At each triggering, the client sent a burst of 10 ICMP ping packets
equally spaced within a second. Additionally, an RPL router image was de-
ployed in the “IoT-Router” machine in order to allow packets to flow through
the network. All the MMT software was deployed in the MMT-IoT machine,
including the MMT-IoT sniffer (in the Zolertia remote connected to that node),
the MMT-IoT Bridge (running on the same NUC machine) and the MMT-Probe
(also running on the NUC machine). This latter was the component in charge of
analyzing the extracted packets and performing attack detection according to a
rule previously defined: “we should not allow more than 2 ICMP ping packets
per second on an IoT network”. This rule comes to the fact that in IPv6 network
(and particularly in 6LowPAN networks) the ICMP traffic (and specifically the
ping packets) is important to keep the network running. In this sense, the rule
allows a fair amount of ICMP packets run through the network without raising
an attack alert. This is done to reduce the number of false positives detected by
MMT. Using this rule, MMT-Probe was capable of detecting the occurrence of
three or more ICMP packets as an attack, generating a report in the MMT-Probe
logs.
Each scenario was executed continuously during 5 minutes, in order to gen-
erate enough traffic for later analysis. The packets extracted with MMT-IoT
Sniffer (using the tcpdump tool) and the MMT-Probe logs are used to check the
number of detected attacks in the scenario.
Industrial IoT Security Monitoring and Test 7
0
10
20
30
40
50
60
70
80
90
100
0
3
6
9
12
15
18
21
24
27
30
33
36
39
42
45
48
51
54
57
60
63
66
69
72
75
78
81
84
87
90
93
96
99
102
105
108
111
114
117
120
123
126
129
132
135
138
141
144
147
150
153
156
159
162
165
168
171
174
177
180
Packets per second
Time (s)
Extracted Packets per Second with 1 Client
Fig. 4. Throughput extracted using MMT-IoT and 1 client.
0
10
20
30
40
50
60
70
80
90
100
0
3
6
9
12
15
18
21
24
27
30
33
36
39
42
45
48
51
54
57
60
63
66
69
72
75
78
81
84
87
90
93
96
99
102
105
108
111
114
117
120
123
126
129
132
135
138
141
144
147
150
153
156
159
162
165
168
171
174
177
180
Packets per second
Time (s)
Extracted Packets per Second with 2 Clients
Fig. 5. Throughput extracted using MMT-IoT and 2 clients.
4.2 Results and Discussion
Figures 4, 5 and 6 show the results of the execution of the three scenarios.
In this figure one can observe peaks each 10 seconds. These peaks correspond
to the automatic triggering of the attacks, i.e. they show the moment when the
clients started to send the ICMP ping packets. In these particular instances we
observe a raise in the extracted traffic since there was more data available to
be processed. In the 3-clients scenario we see that after 3 minutes of execution
the peaks appear more often. We conjecture that this behaviour is due to some
type of “desynchronization” between the three clients, and the different attacks
appear more frequently.
An interesting observation is the limit of the extracted packets per second.
Despite the fact that in the scenario we add more and more clients, and thus
more traffic, the maximum number of packets extracted remained practically the
same: around 95 packets per second. This opens the possibility of performing
experiments to answer the following questions: “How does the packet size impact
the number of packets extracted by MMT-IoT?” and “given the MTU of the IoT
network, what is the upper limit of the throughput extracted by MMT-IoT?”
Finally, by analysing the logs of the MMT-Probe it was possible to count the
number of attack detected. In the scenario with 1 attacking client, MMT-Probe
8 D. Rivera et al.
0
10
20
30
40
50
60
70
80
90
100
0
3
6
9
12
15
18
21
24
27
30
33
36
39
42
45
48
51
54
57
60
63
66
69
72
75
78
81
84
87
90
93
96
99
102
105
108
111
114
117
120
123
126
129
132
135
138
141
144
147
150
153
156
159
162
165
168
171
174
177
180
Packets per second
Time (s)
Extracted Packets per Second with 3 Clients
Fig. 6. Throughput extracted using MMT-IoT and 3 clients.
detected 183 attacks; with 2 clients, 1046; and with 3 clients, 968. These numbers
allow us to validate the applicability of the MMT solution in the IoT networks.
In the case of a single attacker, MMT-Probe was capable of analysing the packets
extracted by the MMT-IoT Sniffer and detect a simple security threat inside an
IoT network.
5 Conclusions and Future Work
This paper presented the MMT-IoT tool and its deployment on the Fed4Fire+
testbed. It also presented the results of the feasibility and preliminary tests per-
formed on the Virtual Wall–w.iLab platform. These tests allowed us to validate
a proof-of-concept version of MMT-IoT on a real IoT environment. In particu-
lar, they allowed increasing the Technology Readiness Level of the tool and the
added value of a future product.
It is important to note that even though this paper aimed performing initial
feasibility analysis of the scalability issues, the preliminary results allowed us
to draw promising conclusions about the future of the tool. In particular, Mon-
timage will aim extending this study in order to clarify how the size of the IoT
packets influences the extracted throughput and experiment other more sophis-
ticated attacks. Our first analysis point out that these experiments would allow
us to identify potential optimisations in the MMT-IoT sniffer and improve the
detection algorithms, aiming to increase the value of the tool and gaining com-
petitive advantage over other similar products such as Bastille’s Enterprise IoT
Security [2] that uses Bayesian statistics to identify anomalies, and Pwnie Ex-
press’ Pulse IoT Security Platform [12] that performs device discovery to detect
rogue devices, vulnerability scans and policy-infringing connections.
As a future work, we prepare a new experimentation phase that will involve
two Fed4Fire platforms: LOG-a-TEC and w.iLab.
Industrial IoT Security Monitoring and Test 9
References
1. Bari, N., Mani, G., Berkovich, S.: Internet of things as a methodological concept.
IEEE Fourth International Conference on Computing for Geospatial Research and
Application (COM. Geo) pp. 48 – 55 (2013)
2. Basille: Enterprise IoT Security. https://www.bastille.net/product (2019), [Online;
accessed on 12/07/2019]
3. Greenough, J.: How the internet of things will impact consumers, businesses, and
governments in 2016 and beyond. IEEE 4th International Conference on Distance
Learning and Education (ICDLE) (2015), http://www.businessinsider.com/how-
the-internet-of-things-market-will-grow-2014-10
4. Hasan, R., Saxena, N., Haleviz, T., et al.: Sensing-enabled channels for hard-to-
detect command and control of mobile devices. 8th ACM SIGSAC symposium on
Information, computer and communications security pp. 469 – 480 (2013)
5. IMEC: w.ilab. https://doc.ilabt.imec.be/ilabt/wilab/index.html (2018), [Online;
accessed on 12/07/2019]
6. Lane, N.D., Miluzzo, E., H. Lu, D.P., Choudhury, T., Campbell, A.T.: A survey
of mobile phone sensing. IEEE Communications magazine 48(9) (2010)
7. Maiti, A., Jadliwala, M., He, J., Bilogrevic, I.: (smart) watch your taps: side-
channel keystroke inference attacks using smartwatches. ACM International Sym-
posium on Wearable Computers pp. 27 – 30 (2015)
8. Montimage: MMT (Montimage Monitoring Tool).
https://montimage.com/products/MMT DPI.html (2019), [Online; accessed
on 12/07/2019]
9. Nahapetian, A.: Side-channel attacks on mobile and wearable systems. 13th IEEE
Consumer Communications & Networking Conference (CCNC) pp. 243 – 247
(2016)
10. Petracca, G., Reineh, A.A., Sun, Y., Grossklags, J., Jaeger, T.: Aware: Preventing
abuse of privacy-sensitive sensors via operation bindings. 26th USENIX Security
Symposium (2017)
11. Petracca, G., Sun, Y., Jaeger, T., Atamli, A.: Audroid: Preventing attacks on audio
channels in mobile devices. 31st ACM Annual Computer Security Applications
Conference pp. 181 – 190 (2015)
12. Pwnie: Pulse IoT Security Platform. https://www.pwnieexpress.com/pulse (2019),
[Online; accessed on 12/07/2019]
13. Sikder, A.K., Aksu, H., Uluagac, A.S.: 6thsense: A contextaware sensor-based at-
tack detector for smart devices. 26th USENIX Security Symposium pp. 397 – 414
(2017)
14. Vucnik, M., Fortuna, C., Solc, T., Mohorcic, M.: Integrating research testbeds into
social coding platforms. European Conference on Networks and Communications
(EuCNC) (2018). https://doi.org/https://doi.org/10.1109/EuCNC.2018.8443242
15. Yu, Y., Wang, J., Zhou, G.: The exploration in the education of professionals
in applied internet of things engineering. IEEE 4th International Conference on
Distance Learning and Education (ICDLE) pp. 74 – 77 (2010)
... The monitoring framework for an industrial IoT network on the Fed4Fire W-iLab testbed was tested in [37]. As part of this testing, an IoT network is monitored and its security and performance are examined. ...
Article
Full-text available
In computer networking, simulations are widely used to test and analyse new protocols and ideas. Currently, there are a number of open real testbeds available to test the new protocols. In the EU, for example, there are Fed4Fire testbeds, while in the US, there are POWDER and COSMOS testbeds. Several other countries, including Japan, Brazil, India, and China, have also developed next-generation testbeds. Compared to simulations, these testbeds offer a more realistic way to test protocols and prototypes. In this paper, we examine some available wireless testbeds from the EU and the US, which are part of an open-call EU project under the NGIAtlantic H2020 initiative to conduct Software-Defined Networking (SDN) experiments on intelligent Internet of Things (IoT) networks. Furthermore, the paper presents benchmarking results and failure recovery results from each of the considered testbeds using a variety of wireless network topologies. The paper compares the testbeds based on throughput, latency, jitter, resources available, and failure recovery time, by sending different types of traffic. The results demonstrate the feasibility of performing wireless experiments on different testbeds in the US and the EU. Further, issues faced during experimentation on EU and US testbeds are also reported.
... Many studies have already used tesbeds for research on SDN [14], [15] service chaining [16], [17], IoT-cloud integration [2], [18], security [19], [20], etc. Additionally, works on testbed integration [21]- [25] have allowed researchers to interconnect testbeds of different domains to improve the scalability, flexibility and scope of their solutions. ...
Conference Paper
Full-text available
Current trends on 5G network programmability evidence the need for end-to-end flexibility from the node and edge all the way to the cloud. Such multi-domain scenarios require realistic testbeds where different task-offloading algorithms, scheduling functions, and service orchestration techniques can be deployed and tested. While many of these research components can be often explored locally in small and isolated testbeds, new 5G demands are requesting for inter-operable platforms with a wider and a more global scope. The goal for these global platforms is that they can cope with multi-tier hierarchical architectures that are capable to face intense computational processes and heavy network traffic loads, while preserving dependability and keeping a low latency on the task executions and data transmission. In this paper we demonstrate a worldwide attempt to integrate different high-performance testing facilities, located in USA, Belgium, and The Netherlands, to enable experimentation on top of such large and complex architectures. In order to do this, we describe and deploy a multi-domain use case that can benefit from a global hierarchical infrastructure. Finally, we detail the performance characteristics of the deployment, discussing the experiences and technical challenges, and presenting the lessons learned we obtained when building and testing such experimental use case.
Conference Paper
Full-text available
The adoption of social coding platforms among software developers is particularly high because it increases collaboration and productivity as well as code re-use. On the other hand research testbeds do not generally have such high adoption rate. The learning curve of adopting new technology represents an initial drop in performance before it increases. However this effect is unexpected by many users and there is a risk that they will abandon new technology before their performance increases. The main contribution of this paper is to introduce methodology to take advantage of the high adoption rate of social coding platforms to improve the adoption of research testbeds. The proposed approach is that a social coding platform serves as a common gateway to various testbeds since it is something many developers are comfortable with and thus the initial effort needed to start using the testbed is decreased and the probability that experimenters continue to use a testbed is higher.
Article
Full-text available
Sensors (e.g., light, gyroscope, accelerotmeter) and sensing enabled applications on a smart device make the applications more user-friendly and efficient. However, the current permission-based sensor management systems of smart devices only focus on certain sensors and any App can get access to other sensors by just accessing the generic sensor API. In this way, attackers can exploit these sensors in numerous ways: they can extract or leak users' sensitive information, transfer malware, or record or steal sensitive information from other nearby devices. In this paper, we propose 6thSense, a context-aware intrusion detection system which enhances the security of smart devices by observing changes in sensor data for different tasks of users and creating a contextual model to distinguish benign and malicious behavior of sensors. 6thSense utilizes three different Machine Learning-based detection mechanisms (i.e., Markov Chain, Naive Bayes, and LMT) to detect malicious behavior associated with sensors. We implemented 6thSense on a sensor-rich Android smart device (i.e., smartphone) and collected data from typical daily activities of 50 real users. Furthermore, we evaluated the performance of 6thSense against three sensor-based threats: (1) a malicious App that can be triggered via a sensor (e.g., light), (2) a malicious App that can leak information via a sensor, and (3) a malicious App that can steal data using sensors. Our extensive evaluations show that the 6thSense framework is an effective and practical approach to defeat growing sensor-based threats with an accuracy above 96% without compromising the normal functionality of the device. Moreover, our framework costs minimal overhead.
Conference Paper
Full-text available
Sensors (e.g., light, gyroscope, accelerometer) and sensing enabled applications on a smart device make the applications more user-friendly and efficient. However, the current permission-based sensor management systems of smart devices only focus on certain sensors and any App can get access to other sensors by just accessing the generic sensor API. In this way, attackers can exploit these sensors in numerous ways: they can extract or leak users’ sensitive information, transfer malware, or record or steal sensitive information from other nearby devices. In this paper, we propose 6thSense, a context-aware intrusion detection system which enhances the security of smart devices by observing changes in sensor data for different tasks of users and creating a contextual model to distinguish benign and malicious behavior of sensors. 6thSense utilizes three different Machine Learning-based detection mechanisms (i.e., Markov Chain, Naive Bayes, and LMT) to detect malicious behavior associated with sensors. We implemented 6thSense on a sensor-rich Android smart device (i.e., smartphone) and collected data from typical daily activities of 50 real users. Furthermore, we evaluated the performance of 6thSense against three sensor-based threats: (1) a malicious App that can be triggered via a sensor (e.g., light), (2) a malicious App that can leak information via a sensor, and (3) a malicious App that can steal data using sensors. Our extensive evaluations show that the 6thSense framework is an effective and practical approach to defeat growing sensor-based threats with an accuracy above 96% without compromising the normal functionality of the device. Moreover, our framework costs minimal overhead.
Conference Paper
Full-text available
In this paper, we investigate the feasibility of keystroke inference attacks on handheld numeric touchpads by using smartwatch motion sensors as a side-channel. The proposed attack approach employs supervised learning techniques to accurately map the uniqueness in the captured wrist movements to each individual keystroke. Experimental evaluation shows that keystroke inference using smartwatch motion sensors is not only fairly accurate, but also better than similar attacks previously demonstrated using smartphone motion sensors.
Conference Paper
Full-text available
Voice control is a popular way to operate mobile devices, enabling users to communicate requests to their devices. However, adversaries can leverage voice control to trick mobile devices into executing commands to leak secrets or to modify critical information. Contemporary mobile operating systems fail to prevent such attacks because they do not control access to the speaker at all and fail to control when untrusted apps may use the microphone, enabling authorized apps to create exploitable communication channels. In this paper, we propose a security mechanism that tracks the creation of audio communication channels explicitly and controls the information flows over these channels to prevent several types of attacks. We design and implement AuDroid, an extension to the SELinux reference monitor integrated into the Android operating system for enforcing lattice security policies over the dynamically changing use of system audio resources. To enhance flexibility, when information flow errors are detected, the device owner, system apps and services are given the opportunity to resolve information flow errors using known methods, enabling AuDroid to run many configurations safely. We evaluate our approach on 17 widely-used apps that make extensive use of the microphone and speaker, finding that AuDroid prevents six types of attack scenarios on audio channels while permitting all 17 apps to run effectively. AuDroid shows that it is possible to prevent attacks using audio channels without compromising functionality or introducing significant performance overhead.
Conference Paper
Full-text available
The proliferation of mobile computing devices has enabled immense opportunities for everyday users. At the same time, however, this has opened up new, and perhaps more severe, possibilities for attacks. In this paper, we explore a novel generation of mobile malware that exploits the rich variety of sensors available on current mobile devices. Two properties distinguish the proposed malware from the existing state-of-the-art. First, in addition to the misuse of the various traditional services available on modern mobile devices, this malware can be used for the purpose of targeted context-aware attacks. Second, this malware can be commanded and controlled over context-aware, out-of-band channels as opposed to a centralized infrastructure. These communication channels can be used to quickly reach out to a large number of infected devices, while offering a high degree of undetectability. In particular, unlike traditional network-based communication, the proposed sensing-enabled channels cannot be detected by monitoring the cellular or wireless communication networks. To demonstrate the feasibility of our proposed attack, we present different flavors of command and control channels based on acoustic, visual, magnetic and vibrational signaling. We further build and test a proof-of-concept Android application implementing many such channels.
Article
Full-text available
Mobile phones or smartphones are rapidly becoming the central computer and communication device in people's lives. Application delivery channels such as the Apple AppStore are transforming mobile phones into App Phones, capable of downloading a myriad of applications in an instant. Importantly, today's smartphones are programmable and come with a growing set of cheap powerful embedded sensors, such as an accelerometer, digital compass, gyroscope, GPS, microphone, and camera, which are enabling the emergence of personal, group, and communityscale sensing applications. We believe that sensor-equipped mobile phones will revolutionize many sectors of our economy, including business, healthcare, social networks, environmental monitoring, and transportation. In this article we survey existing mobile phone sensing algorithms, applications, and systems. We discuss the emerging sensing paradigms, and formulate an architectural framework for discussing a number of the open issues and challenges emerging in the new area of mobile phone sensing research.
Conference Paper
Nowadays, we are witnessing formation of a new technological marvel: Internet of Things. This construction is able to combine in a particular operational entity all the bits and pieces of the world around us. Thus, why could not this unique establishment present the long-sought essence in the Nature of Things? The two pillars of modern fundamental science-relativity and quantum mechanics-are just approximate descriptions of some properties of such a constructive possibility. The machinery of the physical world develops on a cellular automaton model employing as the transformation rule the mechanism of distributed mutual synchronization with the property of fault-tolerance. This infrastructure yields traveling wave solutions that exactly correspond to the spectrum of the stable elementary particles of matter with an upper bound on the propagation speed. On top of the considered cellular automaton infrastructure there appears a secondary formation that constitutes the mechanism of the Holographic Universe that is the basis for the Internet of Things. The holographic activities determine all the quantum mechanics properties of the physical world including the nonlocality entanglement. For living systems the arrangement of the Internet of Things elucidates the most puzzling biological capability of morphogenesis that otherwise cannot find any reasonable explanation. In this paper, we present the world view of internet of things and the application of this methodology from geospatial computing to physics. We give specific details on applying IoT concept to geospatial analysis in various fields from agriculture to medicine. We also provide detailed analysis of the profound impact of internet of things on our physical world which is a vital knowledge when it comes to geospatial research. We present calendar variation of quantum world which can be used for geospatial data gathering by fine tuning the equipment based on the time of the year.
Article
China has also entered Internet of Things time with booming development of Internet of Things industry worldwide. Numerous qualified engineering and technical professionals are the important guarantee for the rapid development of the Internet of Things. This article analyzes the present situation and development future of China's Internet of Things industry, proposes enterprises' demand on Internet of Things Engineering-majored professionals as well as the ability and quality composition of this type of professionals, demonstrates arrangements of course systems and practice parts to educate these professionals as well, and finally predicates the future of Internet of Things Engineering major and outline the direction this major moves.