You are on page 1of 36

I Congreso Internacional de Ingeniería

Industria 4.0 – 14 y 15 de Noviembre 2019

Improving Security in the Internet of Things


(IoT) through Bio-Inspired Approaches

Dr. Heena Rathore


Visiting Professor
Texas A&M University, USA
heena.Rathore@ieee.org
https://innovate.ieee.org/innovation-spotlight-ieee-fueling-fourth-industrial-revolution/

11/14/2019 2
Focus of Today’s Presentation

https://innovate.ieee.org/innovation-spotlight-ieee-fueling-fourth-industrial-revolution/

11/14/2019 Dr Heena Rathore 3


Internet of Things

11/14/2019 Dr Heena Rathore 4


Evolution of systems
Distributed
systems
• Single computer, • Autonomously acting
its peripherals, single systems
and perhaps some • Collection of performing local
remote terminals. independent programs and acting on
computers that local data but
appears to users as a participating on a global
Monolithic / single coherent task. Self-organizing
centralized system autonomous
systems systems

Characteristics of IoT Devices


Scalabilit Mobility Diversity
y
11/14/2019 Dr Heena Rathore 5
System Overview of Security Attacks in
IoT

Restuccia, F., D’Oro, S. and Melodia, T., 2018. Securing the Internet of Things in the Age of Machine Learning and Software-defined Networking. IEEE Internet of Things Journal.

11/14/2019 Dr Heena Rathore 6


Why Biological
Organisms as
Inspiration?

• Adaptive to varying environmental circumstances.


• Robust and resilient to failures.
• Achieve complex behaviors via limited set of basic rules.
• Learn and evolve when new conditions are applied.
• Effective management of constrained resources.
• Self-organize.
• Survive.

11/14/2019 Dr Heena Rathore 7


Taxonomy of Network Research
Inspired by Biology

Routing Security

Malware
propagation Intrusion Rumor
Social insect
detection Spreading in OSN
routing

Epidemiology**
Intelligent Immune
Ant colony (information
water drop** System**
optimization epidemics)
Heena et. al, NaBIC, 2012
Heena et. al, IJCA, 2014 Heena et. al, AMS, 2012

Admission Quality of Connectivity and


control service dynamism

Streaming Coding

Feedback loops Fireflies


Bird colony Bee colony for kidney blood synchronization
11/14/2019 optimization optimization pressure
Dr Heena Rathore 8
IoT Security: Two Phase Approach

Machine Learning Model Generation of


Sociopsychological Model virtual
Consensus Aware antibodies and
Sociopsychological Model antigens

Detection Phase Recovery Phase

11/14/2019 Dr Heena Rathore 9


Flowchart for ML

Data sent to
cloud
11/14/2019 Dr Heena Rathore 10
Heena Rathore, Sushmita Jha, “Bio-Inspired Machine Learning Based Wireless
11/14/2019 DrSensor Network Security”, in IEEE World Congress on Nature and Biologically Inspired
Heena Rathore 11
Computing (NaBIC), no. 5, 2013.
Challenges in Machine Learning
• High space and time complexity.

• Reduces energy efficiency of energy constrained sensor nodes.

• Selection of training set.

11/14/2019 Dr Heena Rathore 12


Duke University Psychology and Neuroscience Organizational Development by Carrie Foster,
2013.

Sociopsychological Model

Roger et al., ``An Integrative Model of Organizational Trust’’, 1995. Harrison et al., ``Initial Trust formation in New Organizational 13
11/14/2019 Dr Heena Rathore
Relationships’’, 1998.
Psychological Trust Model
Tn  An (Bn   In )
where,     1
1 Functional
An   
0...Otherwise 
Bn  e | |E | |
pn
In 
pn  nn
E  Error  t n  t n '
Heena Rathore, Venkataramana Badarla and KJ George, “Sociopsychological Trust Model for Wire- less Sensor Networks’’, Elsevier Journal of
Network and Computer Applications, 2014.
11/14/2019 Dr Heena Rathore 14
11/14/2019 Dr Heena Rathore 15
Challenges in Sociopsychological Model
• Fradulent node detection
 n  1 1
 2  n
 

• Colluding data node problem

11/14/2019 Dr Heena Rathore 16


Consensus
Kelley's Covariation Model
Attribution Theory
The term covariation simply
Consensus Facilitation, PDCI
means that a person has information
from multiple observations, at different
times and situations, and can perceive
the covariation of an observed effect
and its causes.
Kelley believed that there were three types of causal information which
influenced our judgments:
•Consensus
•Distinctiveness
•Consistency
Kelley, H. H. (1967). Attribution theory in social psychology. In D. Levine (ed.), Nebraska Symposium on Motivation (Volume 15, pp. 192-238). Lincoln: University of Nebraska
Press

11/14/2019 Dr Heena Rathore 17


Consensus Aware Sociopsychological Model
Consensus Aware SP MODEL

Ability

Consensus
Benevolence Bn  e | |x  x '| |
Consistency
pn
Integrity In 
pn  n n

Trust calculation (T=A(αB+ βI))

If T<0.5

Malicious Benevolent
11/14/2019 node Dr Heena Rathore node 18
Results

11/14/2019 Dr Heena Rathore 19


11/14/2019 Dr Heena Rathore 20
Comparative analysis
Method Machine learning Sociopsychological Consensus aware
model sociopsychological
model
Dependence on No Yes Yes
neighbors
Attacks Do not work for outliers, Do not work for Work well for all the
spikes, Colluding data node attacks
on-off attack attack
Space complexity O(k2) O(n) O(n2)

Time complexity O(k3) O(n) O(n2)

Response time 5 1 1

Malicious node ≈100% ≈50% ≈100%


detection percentage

k= number of samples, n= number of nodes

11/14/2019 Dr Heena Rathore 21


Recovery Phase- Immune Module

11/14/2019 Dr Heena Rathore 22


Flowchart

Sensor
Edge
Node

11/14/2019 Dr Heena Rathore 23


A=2, 4, 8, 16 A=1.1, 1.2, 1.3
Relationship between weights and antigens
First instance of malicious node is detected

Prior to malicious node


Detection, weight = 1

Red line denotes


both antigen change
and weights

Weights assigned to measurement value are proportional


To the antigen value

11/14/2019 Dr Heena Rathore 24


Measurements (No Security)

Node becomes fraudulent

11/14/2019 Dr Heena Rathore 25


Measurements after recovery
WtdAvg+Inc

WtdAvg

WtdAvg+Dec
NonWtdAvg

Heena Rathore, Venkataramana Badarla, Sushmita Jha and Anupam Gupta, “Novel Approach for Security in Wireless Sensor Network using Bio-Inspirations,” in IEEE
International Conference on Communication Systems and Networks (COMSNETS), no. 6, pp. 1-8,2014.
11/14/2019 Dr Heena Rathore 26
Primary vs Secondary Response

11/14/2019 Dr Heena Rathore 27


Shutting Process can depend on:
Number of backup nodes:-
- Is a sensor node (Exponentially)
- Acts as a edge node (Linear)
Since it will allow leaf nodes to switch to another hop for transmission

11/14/2019 Dr Heena Rathore 28


Primary vs secondary response
(a)Linear increase for edge nodes

1
A(t )  
0.1  A(t  1)

(b)Exponential increase for sensor nodes

1
A(t )   n
2  A(t 0 )

Heena Rathore, Venkataramana Badarla, “Primary Secondary Immune Response Adaptation for Wireless Sensor Networks,” in IEEE International Conference on Sensing,
Communications and Networking (IEEE SECON), no.11, 2014.
11/14/2019 Dr Heena Rathore 29
Experimental Setup

(b)Soil moisture probe VH400 (c)Nodes and gateway communicate


(a)Field setup
through Zigbee

11/14/2019 Dr Heena Rathore 30


(d)NI WSN-3294 Outdoor IP Enclosure (e)NI WSN-3202 (f)NI WSN 9792
11/14/2019 Dr Heena Rathore 31
(a)Measurements by the fraudulent node (b)Rate of change of A, B and I

(c)Trust ratings of fraudulent node (d)Recovery phase

11/14/2019 (e)ON-OFF attack Dr Heena Rathore (f) Integrity change on different attack 32
Experimental Results
Conclusion

Machine Learning Model Generation of


Sociopsychological Model virtual
Consensus Aware antibodies and
Sociopsychological Model antigens

Detection Phase Recovery Phase

11/14/2019 Dr Heena Rathore 33


Drones and
Robotics

Self-driving cars

More efficient,
providing
economic
growth,
reducing
resource
consumption

Opportunities in the 4IR


Era
11/14/2019 Dr Heena Rathore 34
Thank You! 

11/14/2019 Dr Heena Rathore 35


CREA IMPACTO POSITIVO Y
TRASCIENDE

You might also like