scispace - formally typeset
Search or ask a question

Showing papers on "Communications protocol published in 2021"


Journal ArticleDOI
Jing Zhang1, Jie Cui1, Hong Zhong1, Zhili Chen1, Lu Liu2 
TL;DR: A novel Chinese remainder theorem (CRT)-based conditional privacy-preserving authentication scheme for securing vehicular authentication, which solves the leakage problem during side channel attacks, and ensures higher level of security for the entire system.
Abstract: Existing security and identity-based vehicular communication protocols used in Vehicular Ad-hoc Networks (VANETs) to achieve conditional privacy-preserving mostly rely on an ideal hardware device called tamper-proof device (TPD) equipped in vehicles. Achieving fast authentication during the message verification process is usually challenging in such strategies and further they suffer performance constraints from resulting overheads. To address such challenges, this paper proposes a novel Chinese remainder theorem (CRT)-based conditional privacy-preserving authentication scheme for securing vehicular authentication. The proposed protocol only requires realistic TPDs, and eliminates the need for pre-loading the master key onto the vehicle's TPDs. Chinese remainder theorem can dynamically assist the trusted authorities (TAs) whilst generating and broadcasting new group keys to the vehicles in the network. The proposed scheme solves the leakage problem during side channel attacks, and ensures higher level of security for the entire system. In addition, the proposed scheme avoids using the bilinear pairing operation and map-to-point hash operation during the authentication process, which helps achieving faster verification even under increasing number of signature. Moreover, the security analysis shows that our proposed scheme is secure under the random oracle model and the performance analysis shows that our proposed scheme is efficient in reducing computation and communication overheads.

184 citations


Journal ArticleDOI
TL;DR: This paper proposes a novel approach named CANintelliIDS, based on a combination of convolutional neural network (CNN) and attention-based gated recurrent unit (GRU) model to detect single intrusion attacks as well as mixed intrusion attacks on a CAN bus.
Abstract: Controller area network (CAN) is a communication protocol that provides reliable and productive transmission between in-vehicle nodes continuously. CAN bus protocol is broadly utilized standard channel to deliver sequential communications between electronic control units (ECUs) due to simple and reliable in-vehicle communication. Existing studies report how easily an attack can be performed on the CAN bus of in-vehicle due to weak security mechanisms that could lead to system malfunctions. Hence the security of communications inside a vehicle is a latent problem. In this paper, we propose a novel approach named CANintelliIDS, for vehicle intrusion attack detection on the CAN bus. CANintelliIDS is based on a combination of convolutional neural network (CNN) and attention-based gated recurrent unit (GRU) model to detect single intrusion attacks as well as mixed intrusion attacks on a CAN bus. The proposed CANintelliIDS model is evaluated extensively and it achieved a performance gain of 10.79% on test intrusion attacks over existing approaches.

138 citations


Journal ArticleDOI
TL;DR: This work surveys the control and filtering problems of networked systems under the effects induced by communication protocols and provides a systematic review of the communication-protocol-based fault diagnosis problems.
Abstract: In recent years, the communication-protocol-based synthesis and analysis issues have gained substantial research interest owing mainly to their significance in networked systems. In this work, we s...

121 citations


Journal ArticleDOI
TL;DR: Various communication protocols, namely Zigbee, Bluetooth, Near Field Communication (NFC), LoRA, etc. are presented, and the difference between different communication protocols is provided.
Abstract: Internet of Things (IoT) consists of sensors embed with physical objects that are connected to the Internet and able to establish the communication between them without human intervene applications are industry, transportation, healthcare, robotics, smart agriculture, etc. The communication technology plays a crucial role in IoT to transfer the data from one place to another place through Internet. This paper presents various communication protocols, namely Zigbee, Bluetooth, Near Field Communication (NFC), LoRA, etc. Later, it provides the difference between different communication protocols. Finally, the overall discussion about the communication protocols in IoT.

66 citations


Journal ArticleDOI
TL;DR: An innovative multi-layered architecture to deploy heterogeneous automation and monitoring systems for microgrids is proposed, structured into six functional layers to organize the hardware and software equipment in an integrated manner.
Abstract: Intelligent energy facilities, e.g., smart grids and microgrids are the evolution of traditional energy grids through digital transformation. These modern paradigms are expected to foster the utilization of renewable energies, sustainable development, and resilience of the power grid. A barrier found when deploying experimental smart grids and microgrids consists of handling the heterogeneity of the required hardware and software components as well as the available commercial equipment. Despite the fact that there is various architecture proposed in previous literature, it commonly lacks experimental validation, specification of involved equipment concerning industrial/proprietary or open-source nature, and concretization of communication protocols. To overcome such drawbacks, this paper proposes an innovative multi-layered architecture to deploy heterogeneous automation and monitoring systems for microgrids. The architecture is structured into six functional layers to organize the hardware and software equipment in an integrated manner. The open protocol Modbus TCP is chosen to harmonize communications, enabling the interconnection of equipment from industrial and energy scopes, indeed of open-source nature. An experimental photovoltaic-based smart microgrid is reported as the application case to demonstrate the suitability and validity of the proposal.

57 citations


Book ChapterDOI
05 Jan 2021
TL;DR: The experimental results demonstrated the adequacy of the proposed ML models to suit MQTT-based networks IDS requirements, and emphasise on the importance of using flow-based features to discriminate MQ TT-based attacks from benign traffic, while packet- based features are sufficient for traditional networking attacks.
Abstract: The Internet of Things (IoT) is one of the main research fields in the Cybersecurity domain. This is due to (a) the increased dependency on automated device, and (b) the inadequacy of general-purpose Intrusion Detection Systems (IDS) to be deployed for special purpose networks usage. Numerous lightweight protocols are being proposed for IoT devices communication usage. One of the distinguishable IoT machine-to-machine communication protocols is Message Queuing Telemetry Transport (MQTT) protocol. However, as per the authors best knowledge, there are no available IDS datasets that include MQTT benign or attack instances and thus, no IDS experimental results available.

55 citations


Proceedings ArticleDOI
01 Feb 2021
TL;DR: SynCron as discussed by the authors is an end-to-end synchronization solution for near-data-processing (NDP) systems that adds low-cost hardware support near memory for synchronization acceleration, and avoids the need for hardware cache coherence support.
Abstract: Near-Data-Processing (NDP) architectures present a promising way to alleviate data movement costs and can provide significant performance and energy benefits to parallel applications. Typically, NDP architectures support several NDP units, each including multiple simple cores placed close to memory. To fully leverage the benefits of NDP and achieve high performance for parallel workloads, efficient synchronization among the NDP cores of a system is necessary. However, supporting synchronization in many NDP systems is challenging because they lack shared caches and hardware cache coherence support, which are commonly used for synchronization in multicore systems, and communication across different NDP units can be expensive.This paper comprehensively examines the synchronization problem in NDP systems, and proposes SynCron, an end-to-end synchronization solution for NDP systems. SynCron adds low-cost hardware support near memory for synchronization acceleration, and avoids the need for hardware cache coherence support. SynCron has three components: 1) a specialized cache memory structure to avoid memory accesses for synchronization and minimize latency overheads, 2) a hierarchical message-passing communication protocol to minimize expensive communication across NDP units of the system, and 3) a hardware-only overflow management scheme to avoid performance degradation when hardware resources for synchronization tracking are exceeded.We evaluate SynCron using a variety of parallel workloads, covering various contention scenarios. SynCron improves performance by $1.27\times$ on average (up to $1.78\times$) under high-contention scenarios, and by $ 1.35\times$ on average (up to $2.29\times)$ under low-contention real applications, compared to state-of-the-art approaches. SynCron reduces system energy consumption by $ 2.08\times$ on average (up to $4.25\times$).

51 citations


Journal ArticleDOI
TL;DR: An effort has been made to provide a big outlook to the current “researchers” on machine learning techniques that have been employed to handle various issues in WSNs, and special attention has been given to routing problems.

48 citations


Journal ArticleDOI
TL;DR: In this paper, the authors survey and classify current cryptographic and IDS approaches and compare these approaches based on criteria such as real-time constraints, types of hardware used, changes in CAN Bus behaviour, and software/ hardware used to validate these approaches.
Abstract: As connectivity between and within vehicles increases, so does concern about safety and security. Various automotive serial protocols are used inside vehicles such as Controller Area Network (CAN), Local Interconnect Network (LIN), and FlexRay. CAN Bus is the most used in-vehicle network protocol to support exchange of vehicle parameters between Electronic Control Units (ECUs). This protocol lacks security mechanisms by design and is therefore vulnerable to various attacks. Furthermore, connectivity of vehicles has made the CAN Bus vulnerable not only from within the vehicle but also from outside. With the rise of connected cars, more entry points and interfaces have been introduced on board vehicles, thereby also leading to a wider potential attack surface. Existing security mechanisms focus on the use of encryption, authentication, and vehicle Intrusion Detection Systems (IDS), which operate under various constraints such as low bandwidth, small frame size (e.g., in the CAN protocol), limited availability of computational resources, and real-time sensitivity. We survey and classify current cryptographic and IDS approaches and compare these approaches based on criteria such as real-time constraints, types of hardware used, changes in CAN Bus behaviour, types of attack mitigation, and software/ hardware used to validate these approaches. We conclude with mitigation strategies limitations and research challenges for the future.

42 citations


Journal ArticleDOI
TL;DR: This work studies multi-user IoT applications offloading for a MEC system, which cooperatively considers to allocate both the resources of computation and communication and indicates that offloading decisions, energy consumption, latency, and the impact of the number of IoT devices have shown superior improvement over traditional models.

38 citations


Journal ArticleDOI
24 May 2021-Sensors
TL;DR: In this paper, the authors provide a critical analysis of the existing IoT/IIoT solutions based on different security mechanisms, including communications protocols, networking, cryptography and intrusion detection systems.
Abstract: The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising these opportunities, businesses engage in creating the Industrial Internet of Things (IIoT). IoT is vulnerable to hacks and, therefore, requires various techniques to achieve the level of security required. Furthermore, the wider implementation of IIoT causes an even greater security risk than its benefits. To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and highlights the existing security approaches for the most significant industrial applications. This paper mainly classifies the attacks and possible security solutions regarding IoT layers architecture. Consequently, each attack is connected to one or more layers of the architecture accompanied by a literature analysis on the various IoT security countermeasures. It further provides a critical analysis of the existing IoT/IIoT solutions based on different security mechanisms, including communications protocols, networking, cryptography and intrusion detection systems. Additionally, there is a discussion of the emerging tools and simulations used for testing and evaluating security mechanisms in IoT applications. Last, this survey outlines several other relevant research issues and challenges for IoT/IIoT security.

Journal ArticleDOI
01 May 2021-Agronomy
TL;DR: This study implemented a custom-based sensor node, gateway, and handheld device for real-time transmission of agricultural data to a cloud server and concludes that hybrid range-based localization algorithms are more reliable and scalable for deployment in the agricultural field.
Abstract: The Internet of Things (IoT) is transforming all applications into real-time monitoring systems. Due to the advancement in sensor technology and communication protocols, the implementation of the IoT is occurring rapidly. In agriculture, the IoT is encouraging implementation of real-time monitoring of crop fields from any remote location. However, there are several agricultural challenges regarding low power use and long-range transmission for effective implementation of the IoT. These challenges are overcome by integrating a long-range (LoRa) communication modem with customized, low-power hardware for transmitting agricultural field data to a cloud server. In this study, we implemented a custom-based sensor node, gateway, and handheld device for real-time transmission of agricultural data to a cloud server. Moreover, we calibrated certain LoRa field parameters, such as link budget, spreading factor, and receiver sensitivity, to extract the correlation of these parameters on a custom-built LoRa testbed in MATLAB. An energy harvesting mechanism is also presented in this article for analyzing the lifetime of the sensor node. Furthermore, this article addresses the significance and distinct kinds of localization algorithms. Based on the MATLAB simulation, we conclude that hybrid range-based localization algorithms are more reliable and scalable for deployment in the agricultural field. Finally, a real-time experiment was conducted to analyze the performance of custom sensor nodes, gateway, and handheld devices.

Journal ArticleDOI
TL;DR: In this article, the authors present the state-of-the-art communication technologies that can meet the communication requirements of the smart grid CPS (SG-CPS) applications.
Abstract: The recent developments in embedded system design and communication technologies popularized the adaption of the cyber-physical system (CPS) for practical applications. A CPS is an amalgamation of a physical system, a cyber system, and their communication network. The cyber system performs extensive computational operations on the data received from the physical devices, interprets the data, and initiates effective control actions in real-time. One such CPS is the smart grid CPS (SG-CPS) consisting of physical devices with diverse communication requirements, and intermediate communication networks. Thus, reliable communication networks are paramount for the effective operation of the SG-CPS. This paper is an elaborate survey on the communication networks from the perspective of the SG-CPS. This paper presents the state-of-art communication technologies that can meet the communication requirements of the various SG-CPS applications. The communications standards and communication protocols are also comprehensively discussed. A systematic mapping among communication technologies, standards, and protocols for various SG-CPS applications has been presented based on an extensive literature survey in this paper. Furthermore, several challenges, such as security, safety, reliability and resilience, etc., have been addressed from SG-CPS’s perspective. This work also identifies the research gaps in the various domains of the SG-CPS that can be of immense benefit to the research community.

Journal ArticleDOI
TL;DR: Evaluating three of the most popular protocols used both in Consumer as well as in Industrial IoT environments: MQTT, CoAP, and OPC UA shows that CoAP is the protocol that achieves across all scenarios lowest time-to-completion, while OPCUA, albeit exhibiting less variability, resulted in higher time- to-com completion in comparison to CoAP or MQ TT.
Abstract: IoT data exchange is supported today by different communication protocols and different protocolar frameworks, each of which with its own advantages and disadvantages, and often co-existing in a way that is mandated by vendor policies. Although different protocols are relevant in different domains, there is not a protocol that provides better performance (jitter, latency, energy consumption) across different scenarios. The focus of this work is two-fold. First, to provide a comparison of the different available solutions in terms of protocolar features such as type of transport, type of communication pattern support, security aspects, including Named-data networking as relevant example of an Information-centric networking architecture. Secondly, the work focuses on evaluating three of the most popular protocols used both in Consumer as well as in Industrial IoT environments: MQTT, CoAP, and OPC UA. The experimentation has been carried out first on a local testbed for MQTT, COAP and OPC UA. Then, larger experiments have been carried out for MQTT and CoAP, based on the large-scale FIT-IoT testbed. Results show that CoAP is the protocol that achieves across all scenarios lowest time-to-completion, while OPC UA, albeit exhibiting less variability, resulted in higher time-to-completion in comparison to CoAP or MQTT.

Journal ArticleDOI
TL;DR: This paper investigates the security vulnerabilities with in-vehicle network protocols such as CAN, automotive Ethernet, and FlexRay, and suggests a way to improve IVN security based on a hybrid blockchain.
Abstract: Modern vehicles are no longer simply mechanical devices. Connectivity between the vehicular network and the outside world has widened the security holes that hackers can use to exploit a vehicular network. Controller Area Network (CAN), FlexRay, and automotive Ethernet are popular protocols for in-vehicle networks (IVNs) and will stay in the industry for many more years. However, these protocols were not designed with security in mind. They have several vulnerabilities, such as lack of message authentication, lack of message encryption, and an ID-based arbitration mechanism for contention resolution. Adversaries can use these vulnerabilities to launch sophisticated attacks that may lead to loss of life and damage to property. Thus, the security of the vehicles should be handled carefully. In this paper, we investigate the security vulnerabilities with in-vehicle network protocols such as CAN, automotive Ethernet, and FlexRay. A comprehensive survey on security attacks launched against in-vehicle networks is presented along with countermeasures adopted by various researchers. Various algorithms have been proposed in the past for intrusion detection in IVNs. However, those approaches have several limitations that need special attention from the research community. Blockchain is a good approach to solving the existing security issues in IVNs, and we suggest a way to improve IVN security based on a hybrid blockchain.

Journal ArticleDOI
TL;DR: In this paper, a lightweight VNA detection model named ML-LGBM is proposed, which includes the development of a large VNA dataset, a feature extraction method, an LGBM algorithm and maximum parameter optimization.
Abstract: Internet of Things (IoT) has caused significant digital disruption to the future of the digital world. With the emergence of the 5G technology, IoT would shift rapidly from aspirational vision to real-world applications. However, one of the most pressing issues in IoT is security. Routing protocols of the IoT, such as the Routing Protocol for Low-power and lossy network protocol (RPL), are vulnerable to both insider and outsider attacks with the insider ones being more challenging because they are more difficult to detect and mitigate. Among the most concerning insider attacks to RPL in IoT applications is the Version Number Attacks (VNAs) that target the global repair mechanisms by consuming resources of IoT devices, such as power, memory, and processing power, to eventually cause the IoT ecosystem to collapse. In this paper, a lightweight VNA detection model named ML-LGBM is proposed. The work on the ML-LGBM model includes the development of a large VNA dataset, a feature extraction method, an LGBM algorithm and maximum parameter optimization. Results of extensive experiments demonstrate the advantages of the proposed ML-LGBM model based on several metrics, such as accuracy, precision, F-score, true negative rate and false-positive rate of 99.6%, 99%, 99.6%, 99.3% and 0.0093, respectively. Moreover, the proposed ML-LGBM model has slower execution time and less memory resource requirement of 140.217 seconds and 347,530 bytes, making it suitable for resource-constrained IoT devices.

Journal ArticleDOI
TL;DR: Results show both latency and overhead increased by a minimum of 3 × for each protocol, which was below the recommended maximum standard for microgrid monitoring but exceeded the recommended standard for control operations.

Journal ArticleDOI
15 Mar 2021-Sensors
TL;DR: In this article, the authors studied the security prerequisites of the UAV communication protocol, specifically in the military setting, and proposed a security protocol (with two sub-protocols), that serves in securing the communication between UAVs, and between a UAV and a Ground Control Station, is proposed.
Abstract: Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability. Unfortunately, as they become widespread and their demand grows, they are becoming more and more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, and spoofing. In order to cope with such attacks and security threats, a proper design of robust security protocols is indispensable. Although several pieces of research have been carried out with this regard, there are still research gaps, particularly concerning UAV-to-UAV secure communication, support for perfect forward secrecy, and provision of non-repudiation. Especially in a military scenario, it is essential to solve these gaps. In this paper, we studied the security prerequisites of the UAV communication protocol, specifically in the military setting. More importantly, a security protocol (with two sub-protocols), that serves in securing the communication between UAVs, and between a UAV and a Ground Control Station, is proposed. This protocol, apart from the common security requirements, achieves perfect forward secrecy and non-repudiation, which are essential to a secure military communication. The proposed protocol is formally and thoroughly verified by using the BAN-logic (Burrow-Abadi-Needham logic) and Scyther tool, followed by performance evaluation and implementation of the protocol on a real UAV. From the security and performance evaluation, it is indicated that the proposed protocol is superior compared to other related protocols while meeting confidentiality, integrity, mutual authentication, non-repudiation, perfect forward secrecy, perfect backward secrecy, response to DoS (Denial of Service) attacks, man-in-the-middle protection, and D2D (Drone-to-Drone) security.

Journal ArticleDOI
TL;DR: A novel distributed transfer learning (TL) framework to maximize multipath communication networking performance for Industry 4.0 environment and conduct seamless sharing of knowledge gain by the multipath TCP (MPTCP) agents is developed.
Abstract: We consider a fifth-generation (5G)-empowered future Industrial IoT (IIoT) networking problem where IIoT machines are capable of communicating and sharing their data networking knowledge gained (and experiences) with other neighboring devices/tools For such an IIoT setting, deep-learning (DL)-based communication protocols are known to be highly efficient but having a computationally complex training procedure in terms of both time/space and volume of data sets One solution for such training is to be completed offline for each equipment and machines of IIoT before deployment A better approach would be to replicate the model from the expert existing machine and implant it into new machines Such training for the transfer of knowledge can be done by manufacturers using high computational power, even for large-scale DL models After sufficient training and the desired level of accuracy, the trained machines can be deployed in the smart factory equipment to perform life-long collaborative learning We design a novel distributed transfer learning (TL) framework to maximize multipath communication networking performance for Industry 40 environment To conduct seamless sharing of knowledge gain by the multipath TCP (MPTCP) agents and tackle retraining issues of DL-based approaches, we investigate TL for MPTCP from the IIoT networking perspective With relevant insights from transfer and collaborative learning, we develop a distributed TL-MPTCP framework to accelerate the learning efficiency and enhance the performance of newly deployed machines Our approach is validated with numerical and emulated NS-3 experiments in comparison with the state-of-the-art schemes

Journal ArticleDOI
TL;DR: In this paper, a global view based adaptive contention window (GV-ACW) MAC protocol is proposed to further reduce latency and improve alternative energy harvesting, which adopts the optimized size of contention window in the near sink area to meet the functional requirements of data forwarding, while in the far sink area, the size is larger than it required by node for data transmission so as to reduce the latency and thereby improve the network performance as a whole.
Abstract: Massive tremendous amount of miniaturized wireless Internet of Things (IoT) devices are widely employed in many fields such as industrial production, social life, public (and defense) security and management of human society. The limitation of node device’s energy capacity is the bottleneck issue of these network systems. MAC protocol is a key communication protocol for such sensor nodes which both rationally saves energy (an alternative to energy harvesting way) and improves the performances of the wireless sensor networks. There are complex tradeoff optimization relationships between the size of contention window and energy consumption, delay and collision, in which too large or too small contention window value cannot make the network performance optimal. This paper firstly gives an optimization algorithm for the size of the contention window through theoretical analysis, which can achieve a compromise between energy consumption (i.e. alternative energy harvesting) and delay. Then, a global view based adaptive contention window (GV-ACW) MAC protocol is proposed to further reduce latency and improve alternative energy harvesting. The GV-ACW MAC protocol adopts the optimized size of contention window in the near sink area to meet the functional requirements of data forwarding, while in the far sink area, the size of contention window is larger than it required by node for data transmission so as to reduce the latency and thereby improve the network performance as a whole. The theoretical analysis and experimental results show that, comparing with previous MAC protocol, GV-ACW protocol can realize effective alternative energy harvesting which resulting increasement of the network lifetime by 6% and reduce the network delay by 15%.

Proceedings ArticleDOI
11 Jul 2021
TL;DR: ProFuzzBench as discussed by the authors is a benchmark for stateful fuzzing of network protocols, which includes a suite of representative open-source network servers for popular protocols, and tools to automate experimentation.
Abstract: We present a new benchmark (ProFuzzBench) for stateful fuzzing of network protocols. The benchmark includes a suite of representative open-source network servers for popular protocols, and tools to automate experimentation. We discuss challenges and potential directions for future research based on this benchmark.

Journal ArticleDOI
TL;DR: An energy efficient heterogeneous clustering protocol for the enhancement of the network lifetime is proposed that uses the sensor energy for the clustering process in a well-organized manner to maximize the lifetime of network.
Abstract: The network lifetime of Wireless Sensor Network (WSN) is one of the most challenging issues for any network protocol. The nodes in the network are densely deployed and are provided with limited power supply. The routing strategy is treated as an effective solution to improve the lifetime of the network. The cluster based routing techniques are used in the WSN to enhance the network lifespan and to minimize the energy consumption of the network. In this paper, an energy efficient heterogeneous clustering protocol for the enhancement of the network lifetime is proposed. The proposed protocol uses the sensor energy for the clustering process in a well-organized manner to maximize the lifetime of network. The MATLAB simulator is used for implementing the clustering model of proposed protocol and for measuring the effectiveness of the proposed technique the comparison is performed with the various existing approaches such as Stability Election Protocol, Distributed Energy Efficient Clustering and Adaptive Threshold Energy Efficient cross layer based Routing.

Journal ArticleDOI
27 Feb 2021
TL;DR: The goal is to develop a method for selecting messaging models and application-level protocols in non-critical and critical multi-level IoT/WoT systems, provided that the type of access to intelligent objects is initially determined by the initial data, as well as analysis of vulnerabilities and attacks using these protocols.
Abstract: The subject of study in the paper is the analysis of technologies, architectures, vulnerabilities and cyberattacks, communication patterns of smart objects, messaging models, and Internet of Things (IoT) / Web of Things (WoT) protocols for solving applied problems of critical and non-critical systems. The goal is to develop a method for selecting messaging models and application-level protocols in non-critical and critical multi-level IoT/WoT systems, provided that the type of access to intelligent objects is initially determined by the initial data, as well as analysis of vulnerabilities and attacks using these protocols. Objectives : to formalize the procedure for choosing communication protocols for IoT/WoT systems; analyze possible vulnerabilities of communication protocols; develop a method for selecting communication protocols for given initial data, depending on the selected type of communication template for smart objects; check practically the proposed method. The methods of research are methods of system analysis. The following results were obtained. The analysis of the features of communication protocols is conducted by comparing the main interrelated characteristics of IoT/WoT, the results of which are presented in the form of a table. A method has been developed for selecting communication protocols, depending on the selected type of communication template. The analysis of possible vulnerabilities of communication protocols and possible attacks using these protocols is conducted. The author has tested the method using the example of a corporate system (Smart House) based on the WoT concept. Findings . The scientific novelty of the results obtained is as follows: the analysis conducted in the paper shows that currently there is no unified approach to the choice of a messaging model and application-level protocols for building IoT/WoT, depending on the selected type of communication template for smart objects. The method for selecting communication protocols for the given conditions (for each IoT system its interaction pattern will correspond, depending on which components interact with each other), improved by the authors of the paper, makes it possible to simplify the task of using separate protocols for given IoT systems, considering vulnerabilities of protocols.

Journal ArticleDOI
TL;DR: A wireless sensor network (WSN) topology, communication protocol, application, and sensor nodes prototypes designed for low-power timely train integrity (TI) reporting in unreliable conditions, like intermittent node operation and network association and unreliable radio links are proposed.
Abstract: To increase railway use efficiency, the European Railway Traffic Management System (ERTMS) Level 3 requires all trains to constantly and reliably self-monitor and report their integrity and track position without infrastructure support. Timely train separation detection is challenging, especially for long freight trains without electrical power on cars. Data fusion of multiple monitoring techniques is currently investigated, including distributed integrity sensing of all train couplings. We propose a wireless sensor network (WSN) topology, communication protocol, application, and sensor nodes prototypes designed for low-power timely train integrity (TI) reporting in unreliable conditions, like intermittent node operation and network association (e.g., in low environmental energy harvesting conditions) and unreliable radio links. Each train coupling is redundantly monitored by four sensors, which can help to satisfy the train collision avoidance system (TCAS) and European Committee for Electrotechnical Standardization (CENELEC) software integrity level (SIL) 4 requirements and contribute to the reliability of the asynchronous network with low rejoin overhead. A control center on the locomotive controls the WSN and receives the reports, helping the integration in railway or Internet-of-Things (IoT) applications. Software simulations of the embedded application code virtually unchanged show that the energy-optimized configurations check a 50-car TI (about 1-km long) in 3.6-s average with 0.1-s standard deviation and that more than 95% of the reports are delivered successfully with up to one-third of communications or up to 15% of the nodes failed. We also report qualitative test results for a 20-node network in different experimental conditions.

Proceedings ArticleDOI
Yapeng Ye1, Zhuo Zhang1, Fei Wang1, Xiangyu Zhang1, Dongyan Xu1 
01 Jan 2021
TL;DR: A novel probabilistic method for network trace based protocol reverse engineering that first makes use of multiple sequence alignment to align all messages and then reduces the problem to identifying the keyword field from the set of aligned fields.
Abstract: Network protocol reverse engineering is an important challenge with many security applications. A popular kind of method leverages network message traces. These methods rely on pair-wise sequence alignment and/or tokenization. They have various limitations such as difficulties of handling a large number of messages and dealing with inherent uncertainty. In this paper, we propose a novel probabilistic method for network trace based protocol reverse engineering. It first makes use of multiple sequence alignment to align all messages and then reduces the problem to identifying the keyword field from the set of aligned fields. The keyword field determines the type of a message. The identification is probabilistic, using random variables to indicate the likelihood of each field (being the true keyword). A joint distribution is constructed among the random variables and the observations of the messages. Probabilistic inference is then performed to determine the most likely keyword field, which allows messages to be properly clustered by their true types and enables the recovery of message format and state machine. Our evaluation on 10 protocols shows that our technique substantially outperforms the state-of-the-art and our case studies show the unique advantages of our technique in IoT protocol reverse engineering and malware analysis.

Journal ArticleDOI
11 Feb 2021-Sensors
TL;DR: In this paper, a blockchain based secure and privacy preserving authentication protocol is proposed for the Internet of Vehicles (IoV) Blockchain is utilized to store and manage the authentication information in a distributed and decentralized environment and developed on the Ethereum platform that uses a digital signature algorithm to ensure confidentiality, non-repudiation, integrity, and preserving the privacy of the IoVs.
Abstract: The efficiency of cooperative communication protocols to increase the reliability and range of transmission for Vehicular Ad hoc Network (VANET) is proven, but identity verification and communication security are required to be ensured Though it is difficult to maintain strong network connections between vehicles because of there high mobility, with the help of cooperative communication, it is possible to increase the communication efficiency, minimise delay, packet loss, and Packet Dropping Rate (PDR) However, cooperating with unknown or unauthorized vehicles could result in information theft, privacy leakage, vulnerable to different security attacks, etc In this paper, a blockchain based secure and privacy preserving authentication protocol is proposed for the Internet of Vehicles (IoV) Blockchain is utilized to store and manage the authentication information in a distributed and decentralized environment and developed on the Ethereum platform that uses a digital signature algorithm to ensure confidentiality, non-repudiation, integrity, and preserving the privacy of the IoVs For optimized communication, transmitted services are categorized into emergency and optional services Similarly, to optimize the performance of the authentication process, IoVs are categorized as emergency and general IoVs The proposed cooperative protocol is validated by numerical analyses which show that the protocol successfully increases the system throughput and decreases PDR and delay On the other hand, the authentication protocol requires minimum storage as well as generates low computational overhead that is suitable for the IoVs with limited computer resources

Journal ArticleDOI
TL;DR: In this article, an intrusion detection system for smart-grid utilizing IEC 61850's Sampled Value (SV) messages is developed with machine learning and is able to monitor communication traffic of a given power system and distinguish normal data measurements from falsely injected data, i.e., attacks.
Abstract: Modern power systems require increased connectivity to implement novel coordination and control schemes Wide-spread use of information technology in smartgrid domain is an outcome of this need IEC 61850-based communication solutions have become popular due to a myriad of reasons Object-oriented modeling capability, interoperable connectivity and strong communication protocols are to name a few However, power system communication infrastructure is not well-equipped with cybersecurity mechanisms for safe operation Unlike online banking systems that have been running such security systems for decades, smartgrid cybersecurity is an emerging field A recent publication aimed at equipping IEC 61850-based communication with cybersecurity features, ie IEC 62351, only focuses on communication layer security To achieve security at all levels, operational technology-based security is also needed To address this need, this paper develops an intrusion detection system for smartgrids utilizing IEC 61850‘s Sampled Value (SV) messages The system is developed with machine learning and is able to monitor communication traffic of a given power system and distinguish normal data measurements from falsely injected data, ie attacks The designed system is implemented and tested with realistic IEC 61850 SV message dataset Tests are performed on a Modified IEEE 14-bus system with renewable energy-based generators where different fault are applied The results show that the proposed system can successfully distinguish normal power system events from cyberattacks with high accuracy This ensures that smartgrids have intrusion detection in addition to cybersecurity features attached to exchanged messages

Journal ArticleDOI
TL;DR: In this paper, the authors provide a comprehensive survey of communication strategies from both an algorithm viewpoint and a computer network perspective, focusing on reducing the communication volumes used in distributed training, while network optimizations focus on accelerating the communications between distributed devices.

Journal ArticleDOI
20 Jan 2021-Sensors
TL;DR: In this article, the authors present LoRaWANSim, a network simulator implemented in MATLAB to characterize the behavior of LoRa-WAN networks, accounting for physical, medium access control and network aspects.
Abstract: Among the low power wide area network communication protocols for large scale Internet of Things, LoRaWAN is considered one of the most promising, owing to its flexibility and energy-saving capabilities. For these reasons, during recent years, the scientific community has invested efforts into assessing the fundamental performance limits and understanding the trade-offs between the parameters and performance of LoRaWAN communication for different application scenarios. However, this task cannot be effectively accomplished utilizing only analytical methods, and precise network simulators are needed. To that end, this paper presents LoRaWANSim, a LoRaWAN simulator implemented in MATLAB, developed to characterize the behavior of LoRaWAN networks, accounting for physical, medium access control and network aspects. In particular, since many simulators described in the literature are deployed for specific research purposes, they are usually oversimplified and hold a number of assumptions affecting the accuracy of their results. In contrast, our simulator has been developed for the sake of completeness and it is oriented towards an accurate representation of the LoRaWAN at the different layers. After a detailed description of the simulator, we report a validation of the simulator itself and we then conclude by presenting some results of its use revealing notable and non-intuitive trade-offs present in LoRaWAN. Such simulator will be made available via open access to the research community.

Journal ArticleDOI
Xu Zhu1
TL;DR: In this article, the authors discuss the key technologies for the fusion of Radio Frequency Identification (RFID) technology and wireless sensor networks through a fusion approach; meanwhile, it addresses the problem of energy imbalance infusion networks.