Securing Heterogeneous IoT systems

189246-Thumbnail Image.png
Description
Over the past few years, the Internet of Things (IoT) has become an essential element of daily life. At the core of IoT are the densely deployed heterogeneous IoT sensors, such as RFID tags, cameras, temperature sensors, pressure sensors. These

Over the past few years, the Internet of Things (IoT) has become an essential element of daily life. At the core of IoT are the densely deployed heterogeneous IoT sensors, such as RFID tags, cameras, temperature sensors, pressure sensors. These sensors work collectively to sense and capture intricate details of the surroundings, enabling the provision of highly detailed and comprehensive information. This fine-grained information encompasses a wide range of critical parameters that contribute to intelligent decision-making processes. Therefore, the security and privacy of heterogeneous IoT systems are indispensable. The heterogeneous nature of IoT systems poses a number of security and privacy challenges, including device security and privacy, data security and privacy, communication security, and AI and machine learning security. This dissertation delves into specific research issues related to device, communication, and data security, addressing them comprehensively. By focusing on these critical aspects, this work aims to enhance the security and privacy of heterogeneous IoT systems, contributing to their reliable and trustworthy operation. Specifically, Chapter 1 introduces the challenges and existing solutions in heterogeneous IoT systems. Chapter 2 presents SmartRFID, a novel UHF RFID authentication system to promote commodity crypto-less UHF RFID tags for security-sensitive applications. Chapter 3 presents WearRF-CLA, a novel CLA scheme built upon increasingly popular wrist wearables and UHF RFID systems. Chapter 4 presents the design and evaluation of PhyAuth, a PHY message authentication framework against packet-inject attacks in ZigBee networks. Chapter 5 presents NeighborWatch, a novel image-forgery detection framework for multi-cameras system with OFoV. Chapter 6 discusses the future work.
Date Created
2023
Agent

Vulnerability Analysis and Protective Measures for the Design of a Secure, Resilient and Cost-Effective Smart Grid System

171903-Thumbnail Image.png
Description
Important features of smart grids are identified as efficient transmission of electricity and monitoring data, speedier recovery from disrupted power supplies, decreased operation and management costs, improved security, etc. All these can be made possible by a well-planned advanced communication

Important features of smart grids are identified as efficient transmission of electricity and monitoring data, speedier recovery from disrupted power supplies, decreased operation and management costs, improved security, etc. All these can be made possible by a well-planned advanced communication system for the grid. However, most of the existing research not only fail to provide a clear understanding of the intra-and-inter dependencies of joint power-communication systems, necessary for a reliable and resilient operation of the grid, but also debates on the best suited design for the communication network. This dissertation introduces a simple, yet accurate multi-valued-logic based model of interdependency called the Modified Implicative Interdependency Model (MIIM) which can depict the interactions between the components of these power-communication systems and using this model an existing problem in the grid concerning cascading failure of entities is solved. Communication system for smart grid is responsible for securely sending both power transmission control data and environmental monitoring data to Control Centers. In this dissertation, a hybrid communication network, comprising of both wired and wireless communication is proposed together with a secure routing protocol to mitigate different types of cyber-attacks. Also, to prevent false data injections and owing to some limitations in MIIM, a further improvement is made to develop the Multi-State Implicative Interdependency Model which considers the data dependency of communication entities. In this dissertation, the issue of communication cost incurred due to ill-designed topology is also addressed, and an optimal-cost communication topology is planned for modern smart grids. It is also identified that communication cost analysis cannot be done without considering the optimal placement of Phasor Measurement Unit (PMU). Consequently, the optimal PMU placement problem is studied simultaneously with the minimum cost network design problem, and an attempt to minimize the overall cost is made in this dissertation. All the designs and network algorithms proposed here, are tested on substation location data of Arizona.
Date Created
2022
Agent

IoT Security in the Era of Artificial Intelligence

171890-Thumbnail Image.png
Description
The security of Internet-of-Things (IoT) is essential for its widespread adoption. The recent advancement in Artificial Intelligence (AI) brings both challenges and opportunities to IoT security. On the one hand, AI enables better security designs. On the other hand, AI-based

The security of Internet-of-Things (IoT) is essential for its widespread adoption. The recent advancement in Artificial Intelligence (AI) brings both challenges and opportunities to IoT security. On the one hand, AI enables better security designs. On the other hand, AI-based advanced attacks are more threatening than traditional ones. This dissertation aims to study the dual effects of AI on IoT security, specifically IoT device security and IoT communication security. Particularly, this dissertation investigates three important topics: 1) security of acoustic mobile authentication, 2) Deep Learning (DL)-guided jamming attacks on cross-technology IoT networks, and 3) DL-powered scalable group-key establishment for large IoT networks. Chapter 2 presents a thorough study on the security of acoustic mobile authentication. In particular, this chapter proposes two mobile authentication schemes identifying the user's mobile device with its linear and nonlinear acoustic fingerprints, respectively. Both schemes adopt the Data Mining (DM) techniques to improve their identification accuracy. This chapter identifies a novel fingerprint-emulation attack and proposes the dynamic challenge and response method as an effective defense. A comprehensive comparison between two schemes in terms of security, usability, and deployment is presented at the end of this chapter, which suggests their respective suitable application scenarios. Chapter 3 identifies a novel DL-guided predictive jamming attack named DeepJam. DeepJam targets at cross-technology IoT networks and explores Deep Reinforcement Learning (DRL) to predict the victim's transmissions that are not subject to the Cross-Technology Interference (CTI). This chapter also proposes two effective countermeasures against DeepJam for resource capable and resource constrained IoT networks, respectively. Chapter 4 proposes a drone-aided DL-powered scalable group-key generation scheme, named DroneKey, for large-scale IoT networks. DroneKey is a physical-layer key generation scheme. In particular, DroneKey actively induces correlated changes to the wireless signals received by a group of devices and explores DL techniques to extract a common key from them. DroneKey significantly outperforms existing solutions in terms of the scalability and key-generation rate.
Date Created
2022
Agent