Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Security Issues of IoT with Fog

1,543 views

Published on

On Security and Privacy Issues of Fog Computing supported IoT

Published in: Internet
  • Login to see the comments

Security Issues of IoT with Fog

  1. 1. SECURITY ISSUES OF IOT WITH FOG. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSE November 9, 2016 Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 1 / 25
  2. 2. OUTLINE Introduction Existing System Problem Statement Proposed System Conclusion Future Works References Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 2 / 25
  3. 3. INTRODUCTION Cloud: Storing and accessing data and programs over the Internet instead of computer’s hard drive. IoT : Everyday objects(IoT nodes) connected through Internet, allowing them to send and receive data IoT uses: Internet : Infrastructure to interconnect IoT nodes Cloud: Background supporting infrastructure Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 3 / 25
  4. 4. INTRODUCTION contd... Huge network latency and Backend overhead occurs as data to be processed increases in IoT cloud. So IoT uses, Fog as a solution : ie.. intermediate computing buffer between IoT nodes and Cloud Adoption of IoT fog can cause many security threats, which is explored throughout Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 4 / 25
  5. 5. EXISTING SYSTEM Title:- ”Fog Computing and Its Role in the Internet of Things” (F.Bonomi, R. Milito, J. Zhu, and S. Addepalli) Proposed: Fog Computing - Extension of cloud computing Features used Features: Highly virtualized platform Limitations Multi fog OS prevents from access of other OS. If there occur any problem on Kernel mode, it does not prevent. Figure: Fog with computing features Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 5 / 25
  6. 6. EXISTING SYSTEM contd... Title:-”The Fog Computing Paradigm: Scenarios and Security Issues” (I. Stojmenovic and W. Sheng) Proposed: Man in the middle attack- Fog devices get replaced by fake ones. Features: Intrusion Detection method signature, behavioural or anomaly based detection method Limitations Protection methods like encryption and decryption of data consume large amount of battery on mobile devices. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 6 / 25
  7. 7. EXISTING SYSTEM contd... Title:- Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs (M. Zhang, Y. Duan, H. Yun, and Z.Zhao) Proposed: Android based malware detection Features: Uses Signature based approach for detection of malware Graphs are generated from behaviour graphs and convert it to signature and stores in database. Limitations Detection of malware from unknown or new malware family will be hectic. Figure: Android based malware to signature conversion[4] Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 7 / 25
  8. 8. FOG COMPUTING Fog computing is an extension of cloud computing paradigm, but is a more highly virtualized platform that provides computation, storage, and networking services between end IoT devices and back-end cloud servers. Figure: The hierarchical fog computing architecture Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 8 / 25
  9. 9. ADVANTAGES AND APPLICATIONS OF FOG Advantages Greater business agility Low latency Geo distribution Lower operating expense Applications Geographically distributed applications Fast mobile applications Large-scale distributed control systems Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 9 / 25
  10. 10. PROBLEM STATEMENT As fog infrastructure is prone to many security threats, there is a need for studying about them deeply so as the methods discussed in the proposed systems is needed to combine which is examined in the proposed system Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 10 / 25
  11. 11. RELEVANT SECURITY TECHNOLOGIES Security technology for IoT network When client wants to access cloud services, he must go through authentication process to ensure confidentiality and security for IoT network. Authorized users can access cloud with mobile devices. Protocol is of two phases: Registration and Authentication. Figure: Authentication as a service Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 11 / 25
  12. 12. RELEVANT SECURITY TECHNOLOGIES contd... Security technology for fog node In fog Computing, much of the information is gathered into fog node. If a wrong information is spread by exploiting vulnerability is a big problem. So need dynamic analysis techniques to monitor fog node in real time Typically, the performance overhead of dynamic analysis is high. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 12 / 25
  13. 13. RELEVANT SECURITY TECHNOLOGIES contd... Security technology for IoT node When some IoT nodes are out of order or provide wrong information, it can affect people. Attacker has many chances to compromise various devices with sensors. The attacker is able to predict user behavior and abuse its information. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 13 / 25
  14. 14. RELEVANT SECURITY TECHNOLOGIES contd... For IoT nodes, to be truly secure, an IoT node must also obtain application layer security. That means that the node itself, and not just the communication channel (i.e. the pipe), should be authenticated. In addition to channel authentication, encryption and data integrity should be established at the application layer to protect the data flowing through the pipe. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 14 / 25
  15. 15. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING Man- in- the middle Attack In this attack, gateways serving as fog devices may be compromised or replaced by fake ones. Use a strong encryption between the client and the server and never connect to open WiFi routers directly. Encryption and decryption methods consume large amount of battery on mobile device. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 15 / 25
  16. 16. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Intrusion Detection Intrusion detection system analyzes and monitors i) access control policy, ii) a log file, and iii)user log information in order to detect intrusion behavior. It can be run on network side in order to detect malicious activity such as DoS, port scanning. Intrusion detection techniques have been applied to mitigate attacks such as i) insider attack, ii) flooding attack, iii) port scanning, iv) attacks on VM or hypervisor. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 16 / 25
  17. 17. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Malicious Fog node problem In order to provide service to user, fog nodes process data received from the IoT devices. If the workloads is heavy, it is divided into several jobs and processed by several fog nodes. If some fog nodes are compounded by a malicious user, it is difficult to ensure the integrity of the data. Before the computation begin, fog nodes must trust each other. An authentication protocol is required. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 17 / 25
  18. 18. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Malicious Detection Technique When some fog nodes are compromised, hybrid detection technique is useful to detect malicious code in fog nodes. It is combined with signature-based detection technique and behavior-based detection technique. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 18 / 25
  19. 19. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Data Protection Messages generated from IoT devices is sent to the nearest fog nodes. When distributed and processed data is merged, the integrity of the data should be guaranteed. Because of limited resources, it is difficult to encrypt or decrypt data on IoT device so light-weight encryption algorithms or masking techniques are required. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 19 / 25
  20. 20. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Data Management Issues Fog nodes are geographically distributed, making it difficult to know data location. The user wants to be provided with the same services in other areas. It is difficult for user to know whether the node provides the same service. Some fog nodes by having duplicated files will cause a waste of resources. IoT will create enormous amounts of data there is a need for distributed intelligence and so-called fast Big Data processing. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 20 / 25
  21. 21. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Every communication deployment of IoT is unique. However, there are four basic stages that are common to just about every IoT application. Those components are: data collection, data transmission, data assessment, and response to the available information. Successful data management is therefore very important to the success of IoT. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 21 / 25
  22. 22. CONCLUSION IoT cloud with fog embedded system can overcome congestion problem network latency Fog computing provides the improved quality of services to the user by complementing shortages of IoT cloud. IoT technology can be utilized in various fields in the future. This presentation highlights the need to configure the secure fog computing environment through security technologies Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 22 / 25
  23. 23. FUTURE WORKS Future work should be done to develop a system for efficiently collect and analyze various logs generated in fog computing environment.. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 23 / 25
  24. 24. REFERENCES [1] Kanghyo Lee , Donghyun Kim, Dongsoo Ha, Ubaidullah Rajput and Heekuck Oh,”On Security and Privacy Issues of Fog Computing supported Internet of Things Environment,”Hanyang University, ERICA Campus, South Korea,2015. [2] L.M.Vaquero and L.Rodero-Merino,Finding your Way in Fog:Towards a Comprehensive Definition of Fog Computing, ACM SIGCOMM Computer Communication Review, vol.44, Oct. 2014. [3] F.Bonomi, R.Milito, J.Zhu, and S.Addepalli,Fog Computing and Its Role in the Internet of Things, Proceedings of the first edition of the MCC workshop on Mobile Cloud Computing,Aug.2012. [4] I.Stojmenovic and W.Sheng,The Fog Computing Paradigm: Scenarios and Security Issues, Federated Conference on Computer Science and Information Systems, pp.1-8, Sept. 2014. [5] M.Zhang, Y.Duan, H.Yun, and Z.Zhao,Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Nov.2014. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 24 / 25
  25. 25. THANK YOU Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 25 / 25

×