The Internet of Things Secure distributed inference

被引:51
|
作者
Chen, Yuan [1 ]
Kar, Soummya [1 ]
Moura, Jose M. F. [2 ,3 ,4 ,5 ,6 ]
机构
[1] Carnegie Mellon Univ, Elect & Comp Engn, Pittsburgh, PA 15213 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[3] Amer Assoc Advancement Sci, Washington, DC USA
[4] US Natl Acad Inventors, Tampa, FL USA
[5] US Natl Acad Engn, Washington, DC USA
[6] Acad Sci Portugal, Lisbon, Portugal
关键词
OPTIMIZATION; STRATEGIES; STATE;
D O I
10.1109/MSP.2018.2842097
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The growth in the number of devices connected to the Internet of Things (IoT) poses major challenges in security. The integrity and trustworthiness of data and data analytics are increasingly important concerns in IoT applications. These are compounded by the highly distributed nature of IoT devices, making it infeasible to prevent attacks and intrusions on all data sources. Adversaries may hijack devices and compromise their data. As a result, reactive countermeasures, such as intrusion detection and resilient analytics, become vital components of security. This article overviews algorithms for secure distributed inference in IoT.
引用
收藏
页码:64 / 75
页数:12
相关论文
共 50 条
  • [21] A Novel Secure Architecture for the Internet of Things
    Qian, Jiewei
    Xu, He
    Li, Peng
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 398 - 401
  • [22] Information-Driven Distributed Sensing for Efficient Bayesian Inference in Internet of Things Systems
    Zhou, Chongyu
    Li, Qiang
    Chen-Khong Tham
    [J]. 2018 15TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2018, : 136 - 144
  • [23] Secure MQTT for Internet of Things (IoT)
    Singh, Meena
    Rajan, M. A.
    Shivraj, V. L.
    Balamuralidhar, P.
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 746 - 751
  • [24] A survey of secure middleware for the Internet of Things
    Fremantle, Paul
    Scott, Philip
    [J]. PEERJ COMPUTER SCIENCE, 2017,
  • [25] Secure Ownership Transfer for the Internet of Things
    Gunnarsson, Martin
    Gehrmann, Christian
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 33 - 44
  • [26] Can biometrics secure the Internet of Things?
    Orme, David
    [J]. Biometric Technology Today, 2019, 2019 (05) : 5 - 7
  • [27] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [28] A Secure Networking Architecture for the Internet of Things
    Wu Shao-xing
    Ma Yu-jun
    Xiang Yan-tie
    [J]. PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 135 - 140
  • [29] Internet of Things for the Distributed Generation
    Yildirim, Oktay
    Okay, Mustafa
    Akpolat, Alper Nabi
    Dursun, Erkan
    [J]. 2019 INNOVATIONS IN INTELLIGENT SYSTEMS AND APPLICATIONS CONFERENCE (ASYU), 2019, : 350 - 353
  • [30] CApproaches to Secure Inference in the Internet of Things Performance bounds, algorithms, and effective attacks on IoT sensor networks
    Zhang, Jiangfan
    Blum, Rick S.
    Poor, H. Vincent
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2018, 35 (05) : 50 - 63