Advertisement

An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT

  • Zbigniew ZieliskiEmail author
  • Jan Chudzikiewicz
  • Janusz Furtak
Chapter
Part of the Internet of Things book series (ITTCC)

Abstract

Security and dependability are the most crucial challenges for the IoT implementation into the military domain. Insufficiently secured military IoT can provide adversary possibility of manipulation or disruption of data transmitted between units or even taking control of or disabling automated systems. On the other hand, if we already apply certain security mechanisms, IoT network should work reliably, even with faults arising out of unreliable hardware, and harsh or even hostile physical environment. In the paper it was pointed out that security mechanisms and fault-tolerant techniques to be effective in military applications should be tightly integrated. An approach for integrating security techniques on the access layer and the fault-tolerant techniques which are based on faulty (or misbehaving) sensor nodes diagnosis and reconfiguration was proposed. Presented solutions for securing the military IoT network ensure strong nodes authentication within network clusters and securing data transmissions between sensor nodes (SN) and gateways with the use of COTS IoT platforms equipped with TPM modules. Fault diagnosis (or detection) is based on the comparison method within network clusters. The method for determining effective diagnosable structures within clusters was presented. An experimentally constructed network called SFTN was build to demonstrate the proposed approach. Also, some results from a study of the experimental network in Cooja simulator were conducted.

Keywords

Fault-tolerant system Fault-diagnosis Internet of Things Security 

References

  1. 1.
    Zieliński, Z., Chudzikiewicz, J., Furtak, J., Głebocki, P.: Integrating some security and fault tolerant techniques for military applications of Internet of Things. In: IEEE World Forum on Internet of Things, 12–14 Dec 2016, Reston, VA, USA (2016)Google Scholar
  2. 2.
    Zheng, D.E., Carter, W.A.: Leveraging the Internet of Things for a More Efficient and Effective Military, A Report of the CSIS Strategic Technologies Program (2015)Google Scholar
  3. 3.
    Suri, N., et al.: Analyzing the applicability of Internet of Things to the battlefield environment. In: Proceedings of ICMCIS Conference, Brussel (2016)Google Scholar
  4. 4.
    Yishi, L., Fei, J., Hui, Y.: Study on application modes of military Internet of Things (MIOT). In: Proceedings of 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), vol. 3, pp. 25–27 (2012)Google Scholar
  5. 5.
    Qian, Y., Joshi, J., Tipper, D., Krishnamurthy, P.: Information Assurance: Dependability and Security in Networked Systems, pp. 113–170. Morgan Kaufmann Publishers (2018)Google Scholar
  6. 6.
    Avizienis, A., Laprie, J.C., Randell, B., Landwhehr, C.: Basic concepts and taxonomy of dependable and secure comuting. IEEE Trans. Dependable Secur. Comput. 1, 11–33 (2004)CrossRefGoogle Scholar
  7. 7.
    Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices. In: WiMob’15Google Scholar
  8. 8.
    Bohli, J.M., Skarmeta, A., Victoria Moreno, M., García, D., Langendörfer, P.: SMARTIE project: secure IoT data management for smart cities. In: International Conference on Recent Advances in Internet of Things (RIoT), Singapore, pp. 1–6 (2015)Google Scholar
  9. 9.
    Rao, M., Newe, T., Grout, I., Lewis, E., Mathur, A.: FPGA Based Reconfigurable IPSec AH Core Suitable for IoT Applications. In: CIT/IUCC/DASC/PICOM’15 (2015)Google Scholar
  10. 10.
    Altolini, D., Lakkundi, V., Bui, N., Tapparello, C., Rossi, M.: Low power link layer security for IoT: implementation and performance analysis. In: IWCMC’13 (2013)Google Scholar
  11. 11.
    Wrona, K.: Securing the Internet of Things a military perspective. In: Proceedings of 2nd IEEE World Forum on Internet of Things—WF-IoT’15 (2015)Google Scholar
  12. 12.
    Chudzikiewicz, J., Furtak, J., Zielinski, Z.: Secure protocol for wireless communication within Internet of Military Things. In: Proceedings of 2nd IEEE World Forum on Internet of Things—WF-IoT’16 (2016)Google Scholar
  13. 13.
    Koushanfar, F., Potkonjak, M., Sangiovanni-Vincentelli, M.A.: Fault-tolerance in sensor networks. In: Mahgoub, I., Ilyas, M. (eds.) Handbook of Sensor Networks, Section VIII, no. 36. CRC Press (2004)Google Scholar
  14. 14.
    Jiang, P.: A new method for node fault detection in wireless sensor networks. Sensors 9, 1282–1294 (2012)CrossRefGoogle Scholar
  15. 15.
    Chen, J., Kher, S., Somani, A.: Distributed fault detection of wireless sensor networks. In: DIWANS ’06 Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad hoc Networks and Sensor Networks, pp. 65–72 (2006)Google Scholar
  16. 16.
    Maeng, J., Malek, M.: A comparison connection assignment for self-diagnosis of multiprocessor systems. Digest International Symposium on Fault Tolerant Computing, pp. 173–175 (1981)Google Scholar
  17. 17.
    Chudzikiewicz, J., Furtak, J., Zielinski, Z.: Fault-tolerant techniques for the Internet of Military Things. In: Proceedings of 2nd IEEE World Forum on Internet of Things—WF-IoT’16 (2016)Google Scholar
  18. 18.
    TPM Main Part 1 Design Principles. Specification Version 1.2. Revision 116, Trusted Computing Group, Incorporated (2011)Google Scholar
  19. 19.
    Kinney, S.: Trusted Platform Module Basics: Using TPM in Embedded Systems. Elsevier Inc, Embedded Technology Series (2006)Google Scholar
  20. 20.
    Chudzikiewicz, J., Zieliński, Z.: On some resources placement schemes in the 4-dimensional soft degradable hypercube processors network. In: Proceedings of DepCoSRELCOMEX Conference, Poland, pp. 133–143 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Zbigniew Zieliski
    • 1
    Email author
  • Jan Chudzikiewicz
    • 1
  • Janusz Furtak
    • 1
  1. 1.Faculty of CyberneticsMilitary University of TechnologyWarszawaPoland

Personalised recommendations