Modeling and Verification of Lightweight Defense Strategies in IoT Security: A Discrete Event System Approach

dc.contributor.authorRay, Dipojjwal
dc.date.accessioned2025-07-08T10:30:25Z
dc.date.issued2024
dc.descriptionSupervisors: Mitra, Pinaki and Biswas, Santosh
dc.description.abstractThe Internet of Things (IoT) revolution has ushered huge technological benefits and has made future communication and human lives easier. However, the rapid proliferation of IoT introduces numerous security challenges. IoT systems have been shown vulnerable to device-level attacks. Also indubitably, there exists a multitude of network-level attacks that make IoT systems vulnerable due to lack of secure provisions in place. At the device-level, secure IoT devices can be heavily compromised to various side-channel attacks. There exists scan-based side-channel attacks for which the proposed countermeasures are either insufficient, or compromise on testability, or of high-overhead. At the network-level, IoTspecific protocols are prone to varied internal DDOS attacks at each layer. Given the resource-constrained environment, lightweight, accurate and malicious node identification schemes are highly demanding among attack mitigation techniques. For genuine reasons, Intrusion Detection Systems (IDS), a software or hardware component monitoring host or network threats, are widely used to secure IoT systems and deemed suitable for most of such detection or prevention scenarios. The two most popular IDS-based design techniques are Signature based IDS, which use known signatures, and Anomaly-based IDS that use statistical features. However, there exists no known signatures or features in attacks like RPL rank attack, RPL version number attack, 6LoWPAN based fragmentation attacks, CoAP request spoofing and CoAP response spoofing attacks, rendering Signature-based and Anomaly-based methods futile. Basically they generate lots of false positives since the IoT network traffic, operational under attack, cannot be differentiated from the normal traffic. This dissertation presents few novel attack mitigation and attack node location identification mechanisms for IoT security, utilizing controller and IDS implementations, while using various Discrete Event System (DES) based formalisms. DES models are designed for the IoT systems under normal and abnormal conditions. DES based formalisms ensure proofs of correctness and completeness which are preferable. DES security and Fault Detection and Diagnosis (FDD) theoretic properties in Finite State Automata are leveraged for the proofs.
dc.identifier.otherROLL NO.156201002
dc.identifier.urihttps://gyan.iitg.ac.in/handle/123456789/2935
dc.language.isoen
dc.relation.ispartofseriesTH-3501
dc.titleModeling and Verification of Lightweight Defense Strategies in IoT Security: A Discrete Event System Approach
dc.typeThesis

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
Abstract-TH-3501_156201002.pdf
Size:
475.27 KB
Format:
Adobe Portable Document Format
Description:
ABSTRACT
Loading...
Thumbnail Image
Name:
TH-3501_156201002.pdf
Size:
6.28 MB
Format:
Adobe Portable Document Format
Description:
THESIS

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: