Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-4143
Online ISSN:
0976-4151


  About JISR
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Journal of Information Security Research

Trusted Execution Technology (TEE) in a Secure Execution Environment for IoT
Jawad Ali, Ahmad Sharadz Khalid, Eiad Ya, Shahrulniza Musa, Waqas Ahmed
Malaysian Institute of Information Technology, Universiti Kuala Lumpur, Malaysia & UniKL Business School, Universiti Kuala Lumpur, Malaysia
Abstract: In the last couple of years, the Internet of Things (IoT) is found to have increasing applications. The IoT components include smart-devices which communicate and exchange the information without the physical intervention of humans. The growth of newer models of IoT and their systems lead the devices more vulnerable and prone to a severe kind of threats. This current study has introduced a new system capturing and verification procedures in Blockchain supported smartIoT systems that can show the trust-level confidence to outside networks. This work has a Behavior Monitor and get implemented on a selected node that can extract the activity of each device and analyzes the behavior using deep machine learning strategy. In addition, we use Trusted Execution Technology (TEE) which can provide a secure execution environment (enclave) for sensitive application code and data on blockchain. To prove the proposed model, we analyze various IoT devices data that is infected by attacks. Experimental findings prove the ability of our proposed method in terms of accuracy and time required for detection.
Keywords: Security, Privacy, IOT, Blockchain, Trust, Behavior, Neural Network Trusted Execution Technology (TEE) in a Secure Execution Environment for IoT
DOI:https://doi.org/10.6025/jisr/2020/11/3/75-85
Full_Text   PDF 245 KB   Download:   97  times
References:

[1] Gartner Says By 2020, More Than Half of Major New Business Processes and Systems Will Incorporate Some Element of the Internet of Things. Technical report, Gartner, Inc, 2017. urlhttps://www.gartner.com/newsroom/id/3185623 (2017), [Online; accessed 08-April-2017]
[2] Mirai attack. urlhttps://www.corero.com/resources/ddos-attack-types/miraibotnet-ddos-attack.html (2017).
[3] ARM Trust Zone. urlhttps://www.arm.com/ products/security-on-arm/trustzone. (2018), [Online; accessed 25-Dec-2018]
[4] Intel SGX. urlhttps://software.intel.com/en-us/sgx (2018), [Online; accessed 25- Dec-2018]
[5] UCI Machine Learning Repository. urlhttps://archive.ics.uci.edu/ml/machinelearning-databases/00442/ (2018), [Online; accessed 03-Nov-2018]
[6] IOT Components. urlhttps://www.rfpage.com/what-are-the-major-componentsof-internet-of-things/ (2019), [Online; accessed 02-April-2019]
[7] Adnan, M., Eiad, D. Decentralizing Privacy Implementation at Cloud Storage Using Blockchain-Based Hybrid Algorithm p. 1-13
[8] Ali, J., Ali, T., Musa, S., Zahrani, A. (2018). Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure. International Journal of Advanced Computer Science and Applications 9 (10) 584 - 591. https://doi.org/10.14569/IJACSA.2018.091070, http://thesai.org/Publications/ViewPaper?Volume=9{&}Issue=10{&}Code=ijacsa{&}SerialNo=70
[9] Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith, K., Sorniotti, A., Stathakopoulou, C., Vukoli_c, M., Cocco, S.W., Yellick, J. (2018). Hyperledger Fabric: A Distributed Operating System for Permissioned
Blockchains. https://doi.org/10.1145/3190508.3190538, http://arxiv.org/abs/1801. 10228{%}0Ahttp://dx.doi.org/10.1145/3190508.3190538
[10] Banafa, A. (2017). Iot and blockchain convergence: Bene_ts and challenges. IEEE Internet of Things.
[11] Blenn, N., Ghinette, V., Doerr, C. (2017). Quantifying the spectrum of denial-of-service attacks through internet backscatter. In: Proceedings of the 12th International Conference on Availability, Reliability and Security. p. 21. ACM.
[12] Bocek, T., Rodrigues, B.B., Strasser, T., Stiller, B. (2017). Blockchains everywhere - a use-case of blockchains in the pharma supply-chain. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) p. 772-777. https://doi.org/10.23919/INM.2017.7987376, http://ieeexplore.ieee.org/document/7987376/
[13] Christidis, K., Devetsikiotis, M. (2016). Blockchains and Smart Contracts for the Internet of Things. IEEE Access 4, 2292-2303. https://doi.org/10.1109/ACCESS.2016.2566339
[14] Darwish, M. A., Yafi, E., Almasri, A. H., Zuhairi, M. F. (2018). Privacy and Security of Cloud Computing : A Comprehensive Review of Techniques and Challenges 7, 239-246.
[15] Dorri, A., Kanhere, S. S., Jurdak, R. (2017). Towards an optimized blockchain for IoT. In: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation. p. 173-178. ACM.
[16] Hammi, M. T., Hammi, B., Bellot, P., Serhrouchni, A. (2018). Bubbles of Trust : a decentralized Blockchain-based authentication system for. Computers & Security (July) (2018). https://doi.org/10.1016/j.cose.2018.06.004, https://doi.org/10.1016/j. cose.2018.06.004
[17] Hammi, M. T., Livolant, E., Bellot, P., Serhrouchni, A., Minet, P. (2017). A lightweight mutual authentication protocol for the IoT. In: International Conference on Mobile and Wireless Technology. p. 3-12. Springer.
[18] Hardjono, T., Smith, N. (2016). Cloud-based commissioning of constrained devices using permissioned blockchains. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. p. 29-36. ACM.
[19] Hashemi, S. H., Faghri, F., Rausch, P., Campbell, R. H. (2016). World of empowered iot users. In: Internet-of-Things Design and Implementation (IoTDI), 2016 IEEE First International Conference on. p. 13-24. IEEE.
[20] Hinton, G. E., Salakhutdinov, R. R. (2006). Reducing the dimensionality of data with neural networks. Science 313 (5786), 504-507.
[21] Huh, S., Cho, S., Kim, S. (2017). Managing IoT devices using blockchain platform. In: Advanced Communication Technology (ICACT), 2017 19th International Conference on. p. 464-467. IEEE.
[22] Johnson, S., Scarlata, V., Rozas, C., Brickell, E., Mckeen, F. (2016). Intel R software guard extensions: Epid provisioning and attestation services. White Paper 1, 1-10 (2016)
[23] Komninos, N., Philippou, E., Pitsillides, A. (2014). Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials 16 (4) 1933-1954.
[24] Lee, B., Lee, J. H. (2017). Blockchain-based secure firmware update for embedded devices in an internet of things environment. The Journal of Supercomputing 73 (3) 1152-1167.
[25] Li, Y., Ma, R., Jiao, R. (2015). A hybrid malicious code detection method based on deep learning. methods 9 (5).
[26] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Www.Bitcoin.Org p. 9. https://doi.org/10.1007/s10838-008-9062-0, https://bitcoin.org/bitcoin.pdf
[27] Nauman, M., Tanveer, T. A., Khan, S., Syed, T. A. (2017). Deep neural architectures for large scale android malware analysis. Cluster Computing, p. 1-20.
[28] Nichol, P. B., Brandt, J. (2016). Co-creation of trust for healthcare: The cryptocitizen framework for interoperability with blockchain. Research Proposal. ResearchGate (2016)
[29] Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A. Fairaccess: a new blockchain based access control framework for the internet of things. Security and Communication Networks 9 (18) 5943-5964.
[30] Ouaddah, A., Elkalam, A. A., Ouahman, A. A. (2017). Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA Cooperation Advances in Information and Communication Technologies, p. 523-533. Springer.
[31] Roulin, C., Dorri, A. On the Activity Privacy of Blockchain for IoT
[32] Walker, M. A., Dubey, A., Laszka, A., Schmidt, D. C. (2017). Platibart: a platform for transactive iot blockchain applications with repeatable testing. In: Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things. p. 17-22. ACM.
[33] Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 1-32.


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info