Skip to main content

IoT Checker Using Timing Side-Channel and Machine Learning

  • Conference paper
  • First Online:
Silicon Valley Cybersecurity Conference (SVCC 2020)

Abstract

In the recent era, the adoption of IoT technology can be seen in nearly every other field. However, with its fast growth rate, the IoT brings several advanced security challenges. To alleviate these problems, we propose an inventive framework introduced into the IoT package to gather side-channel information (execution timing) for inconsistency and attack location. We observed that the applications running on the gadget would need more time to execute during the attack as the resources such as memory, I/O, CPU will get drained. This timing information under normal and attack mode will be extracted, processed, and utilized to construct a fingerprint. The support vector machine method will then be used to identify if the device is under attack utilizing the fingerprint.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nordrum, A.: Popular internet of things forecast of 50 billion devices by 2020 is outdated. In: IEEE Spectrum: Technology, Engineering, and Science News, 18 August 2016

    Google Scholar 

  2. Khan, M.A., et al.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

  3. Capra, M., et al.: Edge computing: a survey on the hardware requirements in the internet of things world. Future Internet 11, 100 (2019)

    Article  Google Scholar 

  4. Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019)

    Article  Google Scholar 

  5. Čolaković, A., Hadžialić, M.: Internet of things (IoT): a review of enabling technologies, challenges, and open research issues. Comput. Netw. 144, 17–39 (2018)

    Article  Google Scholar 

  6. Kumar, N.M., Mallick, P.K.: The internet of things: insights into the building blocks, component interactions, and architecture layers. Procedia Comput. Sci. 132, 109–117 (2018)

    Article  Google Scholar 

  7. Amazon Web Services. Prototype with the SDK and a Raspberry PI (2019). Accessed 12 Oct 2019

    Google Scholar 

  8. jseidl. Goldeneye

    Google Scholar 

  9. GinjaChris. pentmenu (2015). Accessed 13 Oct 2020

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Surbhi Vasudeva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sahu, K., Kshirsagar, R., Vasudeva, S., Alzahrani, T., Karimian, N. (2021). IoT Checker Using Timing Side-Channel and Machine Learning. In: Park, Y., Jadav, D., Austin, T. (eds) Silicon Valley Cybersecurity Conference. SVCC 2020. Communications in Computer and Information Science, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-72725-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-72725-3_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-72724-6

  • Online ISBN: 978-3-030-72725-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics