Security in Comp Science 2021
Security in Comp Science 2021
Gelenbe · Marija Jankovic ·
Dionysios Kehagias · Anna Marton ·
Andras Vilmos (Eds.)
Security in Computer
and Information Sciences
Second International Symposium, EuroCybersec 2021
Nice, France, October 25–26, 2021
Revised Selected Papers
Communications
in Computer and Information Science 1596
Security in Computer
and Information Sciences
Second International Symposium, EuroCybersec 2021
Nice, France, October 25–26, 2021
Revised Selected Papers
Editors
Erol Gelenbe Marija Jankovic
IITIS-PAN ITI-CERTH
Gliwice, Poland Thessaloniki, Greece
Andras Vilmos
Safepay Systems
Budapest, Hungary
© The Editor(s) (if applicable) and The Author(s) 2022. This book is an open access publication.
Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International
License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution
and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and
the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this book are included in the book’s Creative Commons license,
unless indicated otherwise in a credit line to the material. If material is not included in the book’s Creative
Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use,
you will need to obtain permission directly from the copyright holder.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, expressed or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
vulnerability assessement [28, 29], disruptive checkpoints, and assuring efficient massive
IoT device access to gateways [21, 23]. The topics covered by the EuroCyberSec 2021
symposium reflected the aims of the IoTAC project.
Over 20 paper presentations were submitted of which 15 were retained for the
symposium, and nine full papers were selected for these proceedings by the Program
Committee based on technical quality. One additional review paper was invited. Over
40 participants attended, with some 15 physically present and the remainder online.
The papers in these proceedings discuss aspects specifically relevant to the IoTAC
project, and also of broad interest to cybersecurity and related European Union projects,
including other research projects and some of their outcomes, such as the combined
societal and technical implications of IoT cybersecurity.
Since software is the ultimate target of cyberattacks, software vulnerability detection
methods were examined by examining the influence of the “vocabulary” used inside
programs, relating to the security by design for software systems considered in IoTAC.
Signal processing techniques applied to digital data on the internal computer data transfer
“bus” can help detect anomalies or attacks on servers, while incremental attack detection
can also be performed, with ongoing learning and detection occurring as the packet traffic
flows into a gateway [30].
The important issue of energy consumption for battery powered drone surveillance
missions, in order to optimize actions within a mission and maximize mission duration,
is of great importance in both civilian and military applications, and is also relevant to
one of the IoTAC use cases involving Airbus industries.
The authentication of IoT devices by hardware and software means with a hybrid
approach connects us to the SETIT project, also funded by the European Commission.
Secure authentication schemes are also discussed, as well as fast adaptive routing-based
methods aimed at reducing energy consumption while improving both performance and
system security at the Edge [22].
IoT also has a massive access problem when a large number of IoT devices access
a gateway frequently or periodically, which can be addresed by novel traffic shaping
techniques [17].
We hope that you find these papers interesting and fruitful for your own research.
Erol Gelenbe
Marija Jankovic
Dionysios Kehagias
Anna Marton
Andras Vilmos
Preface vii
References
1. https://www.grantsoffice.com/Portals/0/funded/issues/FUNDEDOct2021.pdf
2. Abdelrahman, O.H., Gelenbe, E., Görbil, G., Lent, R. (eds.): Information Sciences and
Systems 2015 - 30th International Symposium on Computer and Information Sciences, ISCIS
2015, London, UK, 21–24 September 2015, Lecture Notes in Electrical Engineering, vol.
363. Springer (2016)
3. Abdelrahman, O.H., Gelenbe, E., Görbil, G., Oklander, B.: Mobile network anomaly
detection and mitigation: The NEMESYS approach. In: Information Sciences and Systems
2013, pp. 429–438. Springer (2013)
4. Baldini, G., et al.: Iot network risk assessment and mitigation: the seriot approach. In:
Soldatos, J. (ed.) Security Risk Management for the Internet of Things: Technologies
and Techniques for IoT Security, Privacy and Data Protection. pp. 87–104. NOW Pub-
lishers (2020). https://doi.org/10.1561/9781680836837, https://www.nowpublishers.com/art
icle/Chapter/9781680836820?cId=978-1-68083-683-7.ch5
5. Brun, O., Yin, Y., Gelenbe, E.: Deep learning with dense random neural network for detecting
attacks against IoT-connected home environments. Procedia Computer Science 134, pp. 458–
463 (2018)
6. Collen, A., et al.: GHOST - safe-guarding home IoT environments with personalised real-
time risk control. In: Gelenbe, E., Campegiani, P., Czachorski, T., Katsikas, S., Komnios, I.,
Romano, L., Tzovaras, D. (eds.) Recent Cybersecurity Research in Europe: Proceedings of
the 2018 ISCIS Security Workshop, Imperial College London. Communications in Computer
and Information Science, vol. 821, pp. 68–78. Springer (2018)
7. Czachórski, T., Gelenbe, E., Grochla, K., Lent, R. (eds.): Computer and Information Sciences
- 31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016,
Proceedings, Communications in Computer and Information Science, vol. 659. Springer
(2016)
8. Czachórski, T., Gelenbe, E., Grochla, K., Lent, R.: Computer and Information Sciences -
32nd International Symposium, ISCIS 2018, held at the 24th IFIP World Computer Congress,
WCC 2018, Poznan, Poland, September 20–21, 2018, Proceedings (2018)
9. Czachórski, T., Gelenbe, E., Lent, R. (eds.): Information Sciences and Systems 2014 -
Proceedings of the 29th International Symposium on Computer and Information Sciences,
ISCIS 2014, Krakow, Poland, October 27–28, 2014. Springer (2014)
10. Diamantopoulos, S., et al.: Secure cross-border exchange of health related data: The
KONFIDO approach. In: International Conference on Internet and Distributed Computing
Systems, pp. 318–327. Springer (2019)
11. Diamantopoulos, S., et al.: Secure cross-border exchange of health related data: The
KONFIDO approach. In: EDCC, pp. 73–74. IEEE (2019)
12. European Commission Cybersecurity Policies: https://digital-strategy.ec.europa.eu/en/pol
icies/cybersecurity-policies
13. Frötscher, A., Monschiebl, B., Drosou, A., Gelenbe, E., Reed, M.J., Al-Naday, M.: Improve
cybersecurity of C-ITS road side infrastructure installations: the SerIoT - secure and safe
IoT approach. In: 2019 IEEE International Conference on Connected Vehicles and Expo
(ICCVE), pp. 1–5. IEEE (2019)
14. Gelenbe, E.: The 24th International Symposium on Computer and Information Sciences,
ISCIS 2009, 14–16 September 2009, North Cyprus. IEEE (2009)
15. Gelenbe, E., et al.: Security in computer and information sciences: First International ISCIS
Security Workshop, Euro-Cybersec 2018, London, UK, February 26–27, 2018, revised
selected papers (2018)
viii Preface
16. Gelenbe, E., Caseau, Y.: The impact of information technology on energy consumption and
carbon emissions. Ubiquity 2015 (June), pp. 1–15. ACM (2015)
17. Gelenbe, E., Czachorski, T., Marek, D., Nakıp, M.: Mitigating the massive access problem
in the internet of things. In: EuroCybersec 2021. Springer (2022)
18. Gelenbe, E., Lent, R. (eds.): Computer and Information Sciences III - 27th International
Symposium on Computer and Information Sciences, Paris, France, October 3–4, 2012.
Springer (2013)
19. Gelenbe, E., Lent, R. (eds.): Information Sciences and Systems 2013 - Proceedings of the
28th International Symposium on Computer and Information Sciences, ISCIS 2013, Paris,
France, October 28–29, 2013, Lecture Notes in Electrical Engineering, vol. 264. Springer
(2013)
20. Gelenbe, E., Lent, R., Sakellari, G., Sacan, A., Toroslu, I.H., Yazici, A.: Computer and
Information Sciences - Proceedings of the 25th International Symposium on Computer and
Information Sciences, London, UK, September 22–24, 2010, Lecture Notes in Electrical
Engineering, vol. 62. Springer (2010).
21. Gelenbe, E., Nakip, M., Marek, D., Czachorski, T.: Diffusion analysis improves scalability
of IoT networks to mitigate the massive access problem. In: IEEE MASCOTS 2021:
29th International Symposium on Modelling, Analysis and Simulation of Computer and
Telecommunication Systems, pp. 1–6. IEEE (2021)
22. Gelenbe, E., Nowak, M.P., Frohlich, P., Fiołka, J., Ch˛eciński, J.: Energy, QoS and security
aware services at the edge. In: EuroCybersec 2021. Springer (2022)
23. Gelenbe, E., Sigman, K.: IoT traffic shaping and the massive access problem. In: ICC 2022,
IEEE International Conference on Communications, 16–20 May 2022, Seoul, South Korea.
pp. 2290–2295 (2022)
24. Gelenbe, E., Wu, F.J.: Future research on cyber-physical emergency management systems.
Future Internet 5(3), pp. 336–354 (2013)
25. Siavvas M., et al.: The IoTAC software security-by-design platform: Concept, challenges,
and preliminary overview. In: DRCNN 2022: 1st International Workshop on Key challenges
in Global Cybersecurity: Efforts and Trends in EU (KCYEU), pp. 1–6. IEEE (2022)
26. Kadioglu, Y.M., Gelenbe, E.: Product-form solution for cascade networks with intermittent
energy. IEEE Syst. J. 13(1), pp. 918–927. IEEE (2019)
27. Kehagias, D.D., Jankovic, M., Siavvas, M.G., Gelenbe, E.: Investigating the interaction
between energy consumption, quality of service, reliability, security, and maintainability
of computer systems and networks. SN Comput. Sci. 2(1), 23 (2021)
28. Nakip, M., Gelenbe, E.: Mirai botnet attack detection with auto-associative dense random
neural networks. In: 2021 IEEE Global Communications Conference. vol. 2021, pp. 1–6.
IEEE (2021)
29. Nakip, M., Gelenbe, E.: Randomization of data generation times improves performance of
predictive IoT networks. In: IEEE World Forum on Internet of Things (WF IoT), July 14–
21, 2021. p. 5161. IEEE (2021)
30. Nakip, M., Gelenbe, E.: Botnet attack detection with incremental online learning. In:
EuroCybersec 2021. Springer (2022)
Preface ix
31. Nalin, M., et al.: The European cross-border health data exchange roadmap: Case study in
the Italian setting. Journal of Biomedical Informatics 94, 103183 (2019)
32. Natsiavas, P., et al.: Developing an infrastructure for secure patient summary exchange in the
eu context: Lessons learned from the KONFIDO project. Health Informatics Journal 27(2),
14604582211021459 (2021)
33. Pavloski, M., Gelenbe, E.: Mitigating for signalling attacks in UMTS networks. In:
Information Sciences and Systems 2014, pp. 159–165. Springer (2014)
34. Pernici, B., Aiello, M., Vom Brocke, J., Donnellan, B., Gelenbe, E., Kretsis, M.: What IS can
do for environmental sustainability: a report from CAiSE’11 panel on green and sustainable
IS. Communications of the Association for Information Systems 30(1), 18 (2012)
35. Siavvas, M., et al.: An empirical evaluation of the relationship between technical debt and
software security. In: ICIST 2019 Proceedings. vol. 1, pp. 199–203 (2019)
36. Siavvas, M.G., Gelenbe, E.: Optimum interval for application-level checkpoints. In:
CSCloud/EdgeCom. pp. 145–150. IEEE (2019)
37. Tugcu, T., Caglayan, M.U., Alagoz, F., Gelenbe, E. (eds.): New Trends in Computer
Networks: 20th International Symposium on Computer and Information Sciences (2005)
Organization
Organizing Committee
Erol Gelenbe IITIS, Polish Academy of Sciences, Poland
Marija Jankovic ITI-CERTH, Greece
Dionysios Kehagias ITI-CERTH, Greece
Anna Marton SafePay, Hungary
Andras Vilmos ATOS, Hungary
Program Committee
Erol Gelenbe (Chair) IITIS, Polish Academy of Sciences
Levente Buttyan Budapest University of Technology and
Economics, Hungary
Ufuk Caglayan Yasar University, Turkey
Maria Carla Calzarossa University of Pavia, Italy
Tadeusz Czachorski IITIS, Polish Academy of Sciences, Poland
Cuneyt Guzelis Yasar University, Turkey
Peter Hoffman T-Sec, Germany
Marija Jankovic ITI-CERTH, Greece
Dionysios Kehagias ITI-CERTH, Thessaloniki, Greece
Ioannis Mavridis University of Macedonia, Greece
Miltiadis Siavvas ITI-CERTH, Greece
Contents
1 Introduction
This ISCIS CyberSecurity 2021 Symposium that was held in Nice, France,
as part of this series, specializes for the second time on Cybersecurity follow-
ing a previous event [45], which is my main research interest [6,21,90]. Indeed,
Cybersecurity is at the forefront of serious technical issues in Computer Science
as we transition to highly inter-dependent cyber-physical systems [76], and the
European Union published its recommendation for security and privacy [22].
Furthermore, insecurity in systems and networks and the techniques that are
used to defend our systems, are also increasing energy consumption in com-
puter systems and network and their CO2 impact, and the costs of operating
them [27,46,86]. Hence energy consumption in mobile network has also received
attention [3,42].
Thus the European Commission funded research projects in this field have
significantly increased [1] over recent years and this introduction summarizes
related research undertaken throughout Europe and includes five recent EC
funded projects:
– NEMESYS on the cybersecurity of mobile telephone system [5,52,53,82,101],
– The project SDK4ED that mainly focused on energy savings [87,103] but also
considered issues of Cybersecurity and Reliability [109].
– KONFIDO [17,18,96,97] on the security of communications and data trans-
fers for interconnected European national or regional health services,
– GHOST [8,11] regarding the security of IoT systems for the home, and the
design of secure IoT home gateways,
– SerIoT on the Cybersecurity of IoT systems [7,31] with a range of applications
in supply chains, smart cities, smart manufacturing, and other areas.
– IoTAC, which aims at securing IoT networks by strengthening the protec-
tion of gateways using novel techniques such as Botnet detection, system
wide vulnerability assessment [93,94], disruptive checkpoints, and assuring
the optimization of the massive access to IoT gateways [67,75].
It also discusses some results from the SDK4ED project concerning the energy
efficient handling of system reliability issues through checkpointing [107,108].
Early work on DDoS Attacks [65] had proposed self-aware networks and the
Cognitive Packet Network (CPN) [39,77,80] to detect and counter-attack against
DDoS, by identifying sources of attacks by following upstream the attacking traf-
fic, using CPN’s ACK packets to “drop” attacking traffic at upstream routers
[65,100]. It was also applied to mitigate worm attacks and to deviate user traffic
so as to avoid insecure nodes [37,104,105]. Related issues include the manage-
ment of keys [114,115], and the study and mitigation of signalling storms in
mobile telephony [26,102].
[78,79,106] with the Random Neural Network [32,33,35,54] and its extensions
[89]. Related to the GHOST project, other recent work discusses the effect and
mitigation of attacks on the batteries which supply the power of many light-
weight IoT network nodes [55].
The SerIoT project that was started in 2018 [19] also produced valuable
results [48]. Its technical scope included SerCPN [29,30], a specific secure net-
work [49] for managing geographically distributed IoT devices and services using
the principles of the Cognitive Packet Network (CPN) tested in several exper-
iments [28,59,61,62,64]. CPN uses “Smart” Packets (SPs) to search for paths
and measure QoS while the network is in operation, via Reinforcement Learning
using a Random Neural Network, and based on the QoS Goal pursued by the
end user. When an SP reaches its destination, its measurements are returned
by an ACK packet to the intermediate nodes of the path that was identified by
the SP, and to the end user, providing the QoS offered by the path that the SP
travelled. Source nodes receive ACKs and take the decision to switch to the path
that offers the best security or quality of service [50,51,56,63].
Extensions with a genetic algorithm [36] was also tested [92]. An interesting
development in SerIoT combines energy aware routing [40,66] and security, and
admission control [73]. Adaptive techniques for wireless IoT traffic to achieve bet-
ter QoS are also found in [68–70,99] and summarized in [20,91], while the RNN
with adaptive approaches was shown to offer opportunities for massive video
compression [12,13], as well as for managing Cloud servers [113]. Such adaptive
techniques that support the interaction between security metrics, performance
and energy consumption were also discussed in a paper in this volume [71].
The subsequent IoTAC project has lead to incremental techniques for learn-
ing from user traffic and then testing for an attack as described in [95]. In IoTAC,
there was also substantial work on dealing with severe performance issues due to
the large flows of IoT packets towards gateways from thousands of IoT devices,
so that the resulting Massive Access Problem (MAP) has to be mitigated with
novel traffic shaping techniques [47].
5 Conclusions
The existence of frequent and effective cyberattacks on public networks and infor-
mation technology infrastructures motivates education and research on Cyber-
security. The field that started with the need to encrypt data and create secure
systems through strong means for security such as passwords, authentication
schemes, firewalls and cryptographic keys, has now substantially evolved towards
the detection and mitigation of cyberattacks. In addition issues with respect to
software’s own specific vulnerabilities [23] and the need to detect and mitigate
such properties has also become important [23,24,44,88,109,110].
Indeed, we now realize that hoping to use static means of defence in Cyber-
security is largely ineffective unless it is accompanied by real-time techniques
that rapidly react to possible malicious actions or attempts to attack a system.
Thus the field of Cybersecurity research has now entered a far broader phase
with much more substantial activity. Its support through several European Union
AI and Quality of Service Driven Attack Detection, Mitigation 5
References
1. https://www.grantsoffice.com/Portals/0/funded/issues/FUNDEDOct2021.pdf
2. Abdelrahman, O.H., Gelenbe, E.: A data plane approach for detecting control
plane anomalies in mobile networks. In: Mandler, B., et al. (eds.) IoT360 2015.
LNICST, vol. 169, pp. 210–221. Springer, Cham (2016). https://doi.org/10.1007/
978-3-319-47063-4 19
3. Abdelrahman, O.H., Gelenbe, E.: A diffusion model for energy harvesting sensor
nodes. In: 2016 IEEE 24th International Symposium on Modeling, Analysis and
Simulation of Computer and Telecommunication Systems (MASCOTS), pp. 154–
158. IEEE (2016)
4. Abdelrahman, O.H., Gelenbe, E., Gorbil, G., Lent, R. (eds.): Information Sciences
and Systems 2015. LNEE, vol. 363. Springer, Cham (2016). https://doi.org/10.
1007/978-3-319-22635-4
5. Abdelrahman, O.H., Gelenbe, E., Görbil, G., Oklander, B.: Mobile network
anomaly detection and mitigation: the NEMESYS approach. In: Gelenbe, E.,
Lent, R. (eds.) Information Sciences and Systems 2013, pp. 429–438. Springer,
Cham (2013). https://doi.org/10.1007/978-3-319-01604-7 42
6. Akgün, M., Çaglayan, M.U.: Towards scalable identification in RFID systems.
Wireless Pers. Commun. 86(2), 403–421 (2016). https://doi.org/10.1007/s11277-
015-2936-7
7. Baldini, G., et al.: IoT network risk assessment and mitigation: the SerIoT app-
roach (2020)
8. Brun, O., Yin, Y., Gelenbe, E.: Deep learning with dense random neural net-
work for detecting attacks against IoT-connected home environments. Procedia
Comput. Sci. 134, 458–463 (2018)
9. Castaldo, L., Cinque, V.: Blockchain-based logging for the cross-border exchange
of eHealth data in Europe. In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC 2018.
CCIS, vol. 821, pp. 46–56. Springer, Cham (2018). https://doi.org/10.1007/978-
3-319-95189-8 5
10. Chesnais, A., Gelenbe, E., Mitrani, I.: On the modeling of parallel access to shared
data. Commun. ACM 26(3), 196–202 (1983)
11. Collen, A., et al.: GHOST - safe-guarding home IoT environments with person-
alised real-time risk control. In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC 2018.
CCIS, vol. 821, pp. 68–78. Springer, Cham (2018). https://doi.org/10.1007/978-
3-319-95189-8 7
12. Cramer, C., Gelenbe, E., Bakircloglu, H.: Low bit-rate video compression with
neural networks and temporal subsampling. Proc. IEEE 84(10), 1529–1543 (1996)
13. Cramer, C.E., Gelenbe, E.: Video quality and traffic QoS in learning-based sub-
sampled and receiver-interpolated video sequences. IEEE J. Sel. Areas Commun.
18(2), 150–167 (2000)
14. Czachórski, T., Gelenbe, E., Grochla, K., Lent, R. (eds.): ISCIS 2016. CCIS, vol.
659. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47217-1
15. Czachórski, T., Gelenbe, E., Grochla, K., Lent, R. (eds.): ISCIS 2018. CCIS, vol.
935. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00840-6
6 M. U. Çag̃layan
16. Czachórski, T., Gelenbe, E., Lent, R. (eds.): Information Sciences and Systems
2014. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-09465-6
17. Diamantopoulos, S., et al.: Secure cross-border exchange of health related data:
the KONFIDO approach. In: Montella, R., Ciaramella, A., Fortino, G., Guerrieri,
A., Liotta, A. (eds.) IDCS 2019. LNCS, vol. 11874, pp. 318–327. Springer, Cham
(2019). https://doi.org/10.1007/978-3-030-34914-1 30
18. Diamantopoulos, S., et al.: Secure cross-border exchange of health related data:
the KONFIDO approach. In: EDCC, pp. 73–74. IEEE (2019)
19. Domanska, J., Gelenbe, E., Czachorski, T., Drosou, A., Tzovaras, D.: Research
and innovation action for the security of the internet of things: the SerIoT project.
In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC 2018. CCIS, vol. 821, pp. 101–118.
Springer, Cham (2018). https://doi.org/10.1007/978-3-319-95189-8 10
20. Du, J., Jiang, C., Gelenbe, E., Zhang, H., Ren, Y.: Traffic offloading in software
defined ultra-dense networks. In: Ultra-Dense Networks: Principles and Applica-
tions, p. 164 (2020)
21. Ermis, O., Bahtiyar, S., Anarim, E., Çaglayan, M.U.: A key agreement proto-
col with partial backward confidentiality. Comput. Netw. 129, 159–177 (2017).
https://doi.org/10.1016/j.comnet.2017.09.008
22. European Commission: Cybersecurity Policies. https://digital-strategy.ec.europa.
eu/en/policies/cybersecurity-policies
23. Filus, K., Boryszko, P., Domańska, J., Siavvas, M., Gelenbe, E.: Efficient fea-
ture selection for static analysis vulnerability prediction. Sensors 21, 1113 (2021).
https://doi.org/10.3390/s21041133
24. Filus, K., Siavvas, M., Domańska, J., Gelenbe, E.: The random neural network
as a bonding model for software vulnerability prediction. In: Calzarossa, M.C.,
Gelenbe, E., Grochla, K., Lent, R., Czachórski, T. (eds.) MASCOTS 2020. LNCS,
vol. 12527, pp. 102–116. Springer, Cham (2021). https://doi.org/10.1007/978-3-
030-68110-4 7
25. Fourneau, J.M., Gelenbe, E., Suros, R.: G-networks with multiple classes of neg-
ative and positive customers. Theoret. Comput. Sci. 155(1), 141–156 (1996)
26. Francois, F., Abdelrahman, O.H., Gelenbe, E.: Feasibility of signaling storms
in 3G/UMTS operational networks. In: Mandler, B., et al. (eds.) IoT360 2015.
LNICST, vol. 169, pp. 187–198. Springer, Cham (2016). https://doi.org/10.1007/
978-3-319-47063-4 17
27. Francois, F., Abdelrahman, O.H., Gelenbe, E.: Towards assessment of energy
consumption and latency of LTE UES during signaling storms. In: Abdelrahman,
O.H., Gelenbe, E., Gorbil, G., Lent, R. (eds.) Information Sciences and Systems
2015. LNEE, vol. 363, pp. 45–55. Springer, Cham (2016). https://doi.org/10.
1007/978-3-319-22635-4 4
28. Francois, F., Gelenbe, E.: Optimizing secure SDN-enabled inter-data centre over-
lay networks through cognitive routing. In: 2016 IEEE 24th International Sympo-
sium on Modeling, Analysis and Simulation of Computer and Telecommunication
Systems (MASCOTS), pp. 283–288. IEEE (2016)
29. Fröhlich, P., Gelenbe, E., Fiolka, J., Checinski, J., Nowak, M., Filus, Z.: Smart
SDN management of fog services to optimize QoS and energy. Sensors 21, 3105
(2021). https://doi.org/10.3390/s21093105
30. Rutkowski, L., Scherer, R., Korytkowski, M., Pedrycz, W., Tadeusiewicz, R.,
Zurada, J.M. (eds.): ICAISC 2020. LNCS (LNAI), vol. 12415. Springer, Cham
(2020). https://doi.org/10.1007/978-3-030-61401-0
AI and Quality of Service Driven Attack Detection, Mitigation 7
31. Frötscher, A., Monschiebl, B., Drosou, A., Gelenbe, E., Reed, M.J., Al-Naday, M.:
Improve cybersecurity of c-its road side infrastructure installations: the SerIoT-
secure and safe IoT approach. In: 2019 IEEE International Conference on Con-
nected Vehicles and Expo (ICCVE), pp. 1–5. IEEE (2019)
32. Gelenbe, E.: Random neural networks with negative and positive signals and
product form solution. Neural Comput. 1(4), 502–510 (1989)
33. Gelenbe, E.: Stability of the random neural network model. Neural Comput. 2(2),
239–247 (1990)
34. Gelenbe, E.: G-networks with signals and batch removal. Probab. Eng. Inf. Sci.
7(3), 335–342 (1993)
35. Gelenbe, E.: Learning in the recurrent random neural network. Neural Comput.
5(1), 154–164 (1993)
36. Gelenbe, E.: Genetic algorithms with analytical solution. In: Proceedings of the
1st Annual Conference on Genetic Programming, pp. 437–443. MIT Press (1996)
37. Gelenbe, E.: Dealing with software viruses: a biological paradigm. Inf. Secur. Tech.
Rep. 12(4), 242–250 (2007)
38. Gelenbe, E.: The 24th International Symposium on Computer and Information
Sciences, ISCIS 2009, 14–16 September 2009. IEEE (2009)
39. Gelenbe, E.: Steps toward self-aware networks. Commun. ACM 52(7), 66–75
(2009)
40. Gelenbe, E.: Energy packet networks: ICT based energy allocation and storage.
In: Rodrigues, J.J.P.C., Zhou, L., Chen, M., Kailas, A. (eds.) GreeNets 2011.
LNICST, vol. 51, pp. 186–195. Springer, Heidelberg (2012). https://doi.org/10.
1007/978-3-642-33368-2 16
41. Gelenbe, E., Abdelrahman, O.H.: Countering mobile signaling storms with coun-
ters. In: Mandler, B., et al. (eds.) IoT360 2015. LNICST, vol. 169, pp. 199–209.
Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47063-4 18
42. Gelenbe, E., Abdelrahman, O.H.: An energy packet network model for mobile
networks with energy harvesting. Nonlinear Theory Its Appl. IEICE 9(3), 1–15
(2018) https://doi.org/10.1587/nolta.9.1
43. Gelenbe, E., Abdelrahman, O.H., Gorbil, G.: Detection and mitigation of signal-
ing storms in mobile networks. In: 2016 International Conference on Computing,
Networking and Communications (ICNC), pp. 1–5. IEEE (2016)
44. Gelenbe, E., Boryszko, P., Siavvas, M., Domanska, J.: Optimum checkpoints for
time and energy. In: 2020 28th International Symposium on Modeling, Analysis,
and Simulation of Computer and Telecommunication Systems (MASCOTS), pp.
1–8. IEEE (2020)
45. Gelenbe, E., et al. (eds.): Euro-CYBERSEC 2018. CCIS, vol. 821. Springer, Cham
(2018). https://doi.org/10.1007/978-3-319-95189-8
46. Gelenbe, E., Caseau, Y.: The impact of information technology on energy con-
sumption and carbon emissions. Ubiquity 2015, 1–15 (2015)
47. Gelenbe, E., Czachorski, T., Marek, D., Nakıp, M.: Mitigating the massive access
problem in the internet of things. In: Gelenbe, E., et al. (Eds.) EuroCybersec
2021, CCIS 1596, pp. 118–132. Springer, Cham (2022)
48. Gelenbe, E., Domanska, J., Czachorski, T., Drosou, A., Tzovaras, D.: Security
for internet of things: the SerIoT project. In: Proceedings of the International
Symposium on Networks, Computers and Communications. IEEE, June 2018
49. Gelenbe, E., Domanska, J., Frohlich, P., Nowak, M., Nowak, S.: Self-aware net-
works that optimize security, QoS and energy. Proc. IEEE 108(7), 1150–1167
(2020)
8 M. U. Çag̃layan
50. Gelenbe, E., Gellman, M.: Can routing oscillations be good? The benefits of route-
switching in self-aware networks. In: 2007 15th International Symposium on Mod-
eling, Analysis, and Simulation of Computer and Telecommunication Systems, pp.
343–352. IEEE (2007)
51. Gelenbe, E., Gellman, M.: Oscillations in a bio-inspired routing algorithm. In:
2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, pp.
1–7. IEEE (2007)
52. Gelenbe, E., et al.: NEMESYS: enhanced network security for seamless service
provisioning in the smart mobile ecosystem. In: Gelenbe, E., Lent, R. (eds.) Infor-
mation Sciences and Systems 2013, pp. 369–378. Springer, Cham (2013). https://
doi.org/10.1007/978-3-319-01604-7 36
53. Gelenbe, E., et al.: Security for smart mobile networks: the NEMESYS approach.
In: 2013 International Conference on Privacy and Security in Mobile Systems
(PRISMS), pp. 1–8. IEEE (2013)
54. Gelenbe, E., Hussain, K.F.: Learning in the multiple class random neural network.
IEEE Trans. Neural Networks 13(6), 1257–1267 (2002)
55. Gelenbe, E., Kadioglu, Y.M.: Energy life-time of wireless nodes with network
attacks and mitigation. In: Proceedings of ICC 2018, 20–24 May 2018, W04:
IEEE Workshop on Energy Harvesting Wireless Communications. IEEE (2018)
56. Gelenbe, E., Lent, R.: Power-aware ad hoc cognitive packet networks. Ad Hoc
Netw. 2(3), 205–216 (2004)
57. Gelenbe, E., Lent, R. (eds.): Computer and Information Sciences III - 27th Inter-
national Symposium on Computer and Information Sciences, Paris, France, 3–
4 October 2012. Springer, London (2013). https://doi.org/10.1007/978-1-4471-
4594-3
58. Gelenbe, E., Lent, R. (eds.): Information Sciences and Systems 2013 - Proceed-
ings of the 28th International Symposium on Computer and Information Sci-
ences, ISCIS 2013, Paris, France, 28–29 October 2013, Lecture Notes in Electri-
cal Engineering, vol. 264. Springer, Cham (2013). https://doi.org/10.1007/978-3-
319-01604-7
59. Gelenbe, E., Lent, R., Montuori, A., Xu, Z.: Cognitive packet networks: QoS
and performance. In: 10th IEEE International Symposium on Modeling, Analysis
and Simulation of Computer and Telecommunications Systems, MASCOTS 2002,
Proceedings, pp. 3–9. IEEE (2002)
60. Gelenbe, E., Lent, R., Sakellari, G., Sacan, A., Toroslu, I.H., Yazici, A.: Computer
and Information Sciences - Proceedings of the 25th International Symposium on
Computer and Information Sciences, London, UK, 22–24 September 2010. LNEE,
vol. 62. Springer, Dordrecht (2010). https://doi.org/10.1007/978-90-481-9794-1
61. Gelenbe, E., Lent, R., Xu, Z.: Design and performance of cognitive packet net-
works. Perform. Eval. 46(2), 155–176 (2001)
62. Gelenbe, E., Lent, R., Xu, Z.: Measurement and performance of a cognitive packet
network. Comput. Netw. 37(6), 691–701 (2001)
63. Gelenbe, E., Lent, R., Xu, Z.: Towards networks with cognitive packets. In: Goto,
K., Hasegawa, T., Takagi, H., Takahashi, Y. (eds.) Performance and QoS of Next
Generation Networking, pp. 3–17. Springer, London (2001). https://doi.org/10.
1007/978-1-4471-0705-7 1
64. Gelenbe, E., Liu, P.: QoS and routing in the cognitive packet network. In: Sixth
IEEE International Symposium on a World of Wireless Mobile and Multimedia
Networks, WoWMoM 2005, pp. 517–521. IEEE (2005)
65. Gelenbe, E., Loukas, G.: A self-aware approach to denial of service defence. Com-
put. Netw. 51(5), 1299–1314 (2007)
AI and Quality of Service Driven Attack Detection, Mitigation 9
66. Gelenbe, E., Mahmoodi, T.: Distributed energy-aware routing protocol. In:
Gelenbe, E., Lent, R., Sakellari, G. (eds.) Computer and Information Sciences
II, pp. 149–154. Springer, London (2011). https://doi.org/10.1007/978-1-4471-
2155-8 18
67. Gelenbe, E., Nakip, M., Marek, D., Czachorski, T.: Diffusion analysis improves
scalability of IoT networks to mitigate the massive access problem. In: IEEE
MASCOTS 2021: 29th International Symposium on Modelling, Analysis and Sim-
ulation of Computer and Telecommunication Systems, pp. 1–6 (2021). https://
zenodo.org/record/5501822#.YT3bri8itmA
68. Gelenbe, E., Ngai, E.C.H.: Adaptive QoS routing for significant events in wireless
sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and
Sensor Systems, MASS 2008, pp. 410–415. IEEE (2008)
69. Gelenbe, E., Ngai, E.C.: Adaptive random re-routing in sensor networks. In: Pro-
ceedings of the Annual Conference of ITA (ACITA 2008), 16–18 September, pp.
348–349 (2008)
70. Gelenbe, E., Ngai, E.C., Yadav, P.: Routing of high-priority packets in wireless
sensor networks. In: IEEE Second International Conference on Computer and
Network Technology. IEEE (2010)
71. Gelenbe, E., Nowak, M.P., Frohlich, P., Fiolka, J., Checinski, J.: Energy, QoS and
security aware services at the edge. In: Gelenbe, E., et al. (Eds.) EuroCybersec
2021, CCIS 1596, pp. 102–117. Springer, Cham (2022)
72. Gelenbe, E., Pavloski, M.: Performance of a security control scheme for a health
data exchange system. In: IEEE International Black Sea Conference on Commu-
nications and Networking, 26–29 May 2020, Virtual Conference (2020)
73. Gelenbe, E., Sakellari, G., D’arienzo, M.: Admission of QoS aware users in a smart
network. ACM Trans. Auton. Adapt. Syst. (TAAS) 3(1), 4 (2008)
74. Gelenbe, E., Sevcik, K.: Analysis of update synchronization for multiple copy data
bases. IEEE Trans. Comput. 10, 737–747 (1979)
75. Gelenbe, E., Sigman, K.: IoT traffic shaping and the massive access problem.
In: ICC 2022, IEEE International Conference on Communications, Seoul, South
Korea, 16–20 May 2022, pp. 1–6 (2022). https://zenodo.org/record/5918301#.
YgaCP
76. Gelenbe, E., Wu, F.J.: Future research on cyber-physical emergency management
systems. Future Internet 5(3), 336–354 (2013)
77. Gelenbe, E., Xu, Z., Seref, E.: Cognitive packet networks. In: 11th IEEE Interna-
tional Conference on Conference Tools with Artificial Intelligence, Proceedings,
pp. 47–54. Publisher IEEE (1999)
78. Gelenbe, E., Yin, Y.: Deep learning with random neural networks. In: 2016 Inter-
national Joint Conference on Neural Networks (IJCNN), pp. 1633–1638. IEEE
(2016)
79. Gelenbe, E., Yin, Y.: Deep learning with dense random neural networks. In:
Gruca, A., Czachórski, T., Harezlak, K., Kozielski, S., Piotrowska, A. (eds.)
ICMMI 2017. AISC, vol. 659, pp. 3–18. Springer, Cham (2018). https://doi.org/
10.1007/978-3-319-67792-7 1
80. Gelenbe, S.E.: Cognitive packet network, uS Patent 6,804,201, 12 October 2004
81. Gorbil, G., Abdelrahman, O.H., Gelenbe, E.: Modeling and analysis of RRC-based
signaling storms in 3G networks. IEEE Trans. Emerg. Top. Comput., 14 (2015).
Special Issue on Emerging Topics in Cyber Security
82. Gorbil, G., Abdelrahman, O.H., Pavloski, M., Gelenbe, E.: Storms in mobile net-
works. arXiv preprint arXiv:1411.1280 (2014)
10 M. U. Çag̃layan
83. Gorbil, G., Abdelrahman, O.H., Pavloski, M., Gelenbe, E.: Modeling and anal-
ysis of RRC-based signalling storms in 3G networks. IEEE Trans. Emerg. Top.
Comput. 4(1), 113–127 (2016)
84. Gorbil, G., Gelenbe, E.: Opportunistic communications for emergency support
systems. Procedia Comput. Sci. 5, 39–47 (2011)
85. Gorbil, G., Gelenbe, E.: Resilience and security of opportunistic communications
for emergency evacuation. In: Proceedings of the 7th ACM Workshop on Per-
formance Monitoring and Measurement of Heterogeneous Wireless and Wired
Networks, pp. 115–124 (2012)
86. Jiang, H., Liu, F., Thulasiram, R.K., Gelenbe, E.: Guest editorial: special issue
on green pervasive and ubiquitous systems. IEEE Syst. J. 11(2), 806–812 (2017).
https://doi.org/10.1109/JSYST.2017.2673218
87. Kadioglu, Y.M., Gelenbe, E.: Product-form solution for cascade networks with
intermittent energy. IEEE Syst. J. 13(1), 918–927 (2019)
88. Kehagias, D., Jankovic, M., Siavvas, M., Gelenbe, E.: Investigating the inter-
action between energy consumption, quality of service, reliability, security, and
maintainability of computer systems and networks. SN Comput. Sci. 2(1), 1–6
(2021)
89. Konar, D., Gelenbe, E., Bhandary, S., Sarma, A.D., Cangi, A.: Random quan-
tum neural networks (RQNN) for noisy image recognition. CoRR abs/2203.01764
(2022)
90. Levi, A., Çaglayan, M.U., Koç, Ç.K.: Use of nested certificates for efficient,
dynamic, and trust preserving public key infrastructure. ACM Trans. Inf. Syst.
Secur. 7(1), 21–59 (2004). https://doi.org/10.1145/984334.984336
91. Li, N., Hu, X., Ngai, E., Gelenbe, E.: Cooperative wireless edges with composite
resource allocation in hierarchical networks. In: 2020 IEEE International Confer-
ence on E-Health Networking, Application & Services (HEALTHCOM), pp. 1–6
(2021). https://doi.org/10.1109/HEALTHCOM49281.2021.9398997
92. Liu, P., Gelenbe, E.: Recursive routing in the cognitive packet network. In: 3rd
International Conference on Testbeds and Research Infrastructure for the Devel-
opment of Networks and Communities, TridentCom 2007, pp. 1–6. IEEE (2007)
93. Nakip, M., Gelenbe, E.: MIRAI botnet attack detection with auto-associative
dense random neural networks. In: 2021 IEEE Global Communications Confer-
ence, vol. 2021, pp. 1–6. IEEE Communications Society (2021)
94. Nakip, M., Gelenbe, E.: Randomization of data generation times improves perfor-
mance of predictive IoT networks. In: IEEE World Forum on Internet of Things
(WF IoT), 14–21 July 2021, p. 5161 (2021). https://wfiot2021.iot.ieee.org
95. Nakip, M., Gelenbe, E.: Botnet attack detection with incremental online learn-
ing. In: In: Gelenbe, E., et al. (Eds.) EuroCybersec 2021, CCIS 1596, pp. 51–60.
Springer, Cham (2022)
96. Nalin, M., et al.: The European cross-border health data exchange roadmap: case
study in the Italian setting. J. Biomed. Inform. 94, 103183 (2019)
97. Natsiavas, P., et al.: Developing an infrastructure for secure patient summary
exchange in the EU context: lessons learned from the KONFIDO project. Health
Inform. J. 27(2) (2021). 14604582211021460
98. Natsiavas, P., et al.: Comprehensive user requirements engineering methodology
for secure and interoperable health data exchange. BMC Med. Inform. Decis.
Mak. 18(1), 1–16 (2018)
99. Ngai, E.C., Gelenbe, E., Humber, G.: Information-aware traffic reduction for wire-
less sensor networks. In: IEEE 34th Conference on Local Computer Networks,
LCN 2009, pp. 451–458. IEEE (2009)
AI and Quality of Service Driven Attack Detection, Mitigation 11
100. Oke, G., Loukas, G., Gelenbe, E.: Detecting denial of service attacks with Bayesian
classifiers and the random neural network. In: IEEE International Fuzzy Systems
Conference, FUZZ-IEEE 2007, pp. 1–6. IEEE (2007)
101. Pavloski, M., Gelenbe, E.: Mitigating for signalling attacks in UMTS networks.
In: Czachórski, T., Gelenbe, E., Lent, R. (eds.) Information Sciences and Systems
2014, pp. 159–165. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-
09465-6 17
102. Pavloski, M., Görbil, G., Gelenbe, E.: Bandwidth usage—based detection of sig-
naling attacks. In: Abdelrahman, O.H., Gelenbe, E., Gorbil, G., Lent, R. (eds.)
Information Sciences and Systems 2015. LNEE, vol. 363, pp. 105–114. Springer,
Cham (2016). https://doi.org/10.1007/978-3-319-22635-4 9
103. Pernici, B., Aiello, M., Vom Brocke, J., Donnellan, B., Gelenbe, E., Kretsis, M.:
What is can do for environmental sustainability: a report from CAiSE? 11 panel
on green and sustainable is. Commun. Assoc. Inf. Syst. 30(1), 18 (2012)
104. Sakellari, G., Gelenbe, E.: Adaptive resilience of the cognitive packet network in
the presence of network worms. In: Proceedings of the NATO Symposium on C3I
for Crisis, Emergency and Consequence Management, pp. 11–12 (2009)
105. Sakellari, G., Hey, L., Gelenbe, E.: Adaptability and failure resilience of the cogni-
tive packet network. In: DemoSession of the 27th IEEE Conference on Computer
Communications (INFOCOM2008), Phoenix, Arizona, USA (2008)
106. Serrano, W., Gelenbe, E., Yin, Y.: The random neural network with deep learning
clusters in smart search. Neurocomputing 396, 394–405 (2020)
107. Siavvas, M., et al.: An empirical evaluation of the relationship between technical
debt and software security. In: ICIST 2019 Proceedings, vol. 1, pp. 199–203 (2019)
108. Siavvas, M., Gelenbe, E.: Optimum checkpoints for programs with loops. Simul.
Model. Pract. Theory 97 (2019)
109. Siavvas, M., Gelenbe, E.: Optimum interval for application-level checkpoints. In:
2019 6th IEEE International Conference on Cyber Security and Cloud Computing
(CSCloud)/2019 5th IEEE International Conference on Edge Computing and
Scalable Cloud (EdgeCom), pp. 145–150. IEEE (2019)
110. Siavvas, M., Kehagias, D., Tzovaras, D., Gelenbe, E.: A hierarchical model for
quantifying software security based on static analysis alerts and software met-
rics. Software Qual. J. 29(2), 431–507 (2021). https://doi.org/10.1007/s11219-
021-09555-0
111. Staffa, M., et al.: An openNCP-based solution for secure eHealth data exchange.
J. Netw. Comput. Appl. 116, 65–85 (2018)
112. Tugcu, T., Caglayan, M.U., Alagoz, F., Gelenbe, E.: New Trends in Computer
Networks: 20th International Symposium on Computer and Information Sciences.
World Scientific, September 2005. https://doi.org/10.1142/p415
113. Wang, L., Gelenbe, E.: Adaptive dispatching of tasks in the cloud. IEEE Trans.
Cloud Comput. 6(1), 33–45 (2018)
114. Yu, C., Ni, G., Chen, I., Gelenbe, E., Kuo, S.: Top-k query result completeness
verification in tiered sensor networks. IEEE Trans. Inf. Forensics Secur. 9(1),
109–124 (2014). https://doi.org/10.1109/TIFS.2013.2291326
115. Yu, C.M., Ni, G.K., Chen, Y., Gelenbe, E., Kuo, S.Y.: Top-k query result com-
pleteness verification in sensor networks. In: 2013 IEEE International Conference
on Communications Workshops (ICC), pp. 1026–1030. IEEE (2013)
12 M. U. Çag̃layan
Open Access This chapter is licensed under the terms of the Creative Commons
Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/),
which permits use, sharing, adaptation, distribution and reproduction in any medium
or format, as long as you give appropriate credit to the original author(s) and the
source, provide a link to the Creative Commons license and indicate if changes were
made.
The images or other third party material in this chapter are included in the
chapter’s Creative Commons license, unless indicated otherwise in a credit line to the
material. If material is not included in the chapter’s Creative Commons license and
your intended use is not permitted by statutory regulation or exceeds the permitted
use, you will need to obtain permission directly from the copyright holder.
Application of a Human-Centric Approach
in Security by Design for IoT Architecture
Development
Violeta Vasileva(B)
Abstract. The aim of this paper is to show the need for a comprehensive approach
to studying cybersecurity in order to get a focus on both, technological factors and
the human aspect in development a user level of IoT Reference Architecture. The
author presents a methodology for researching the capacity of users to manage their
digital identity and operate in a safe and secure cyber-physical environment. For
this purpose, an approach is proposed, that is based on a defined survey research
targeting personnel and individual users operating in cyber-physical environment.
Based on the analysed survey results and formed observations, the paper suggests
solutions for improving the competences of users in cyberspace and increase their
cyber awareness. As a practical implementation of the proposed methodology, the
author presents a developed Cyber Awareness platform. Its main purpose is to
provide information and resources on cybersecurity and IoT security, and to be
the main point of knowledge access. The portal also provides opportunities to test
users’ cyber knowledge, participate in public survey related to cyber topics, share
and exchange information, opinions and useful practices on cyber incidents and
cyber knowledge.
1 Introduction
1.1 Background
The rise of the Internet of Things (IoT) presents new opportunities for organizations
to develop new technologies that will enable them to better manage their business and
operations, create new products, improve daily work operations etc. However, imple-
menting these new solutions can also lead to security issues. Even though there are a lot
of studies related to Information Security, the research community seems to be little or
no interested in the relationship between human factors and breaches.
There are broad range of issues related to European Cybersecurity and national
experiences in the research in cybersecurity domain. A proper solution to respond to
the complex phenomenon of cybersecurity is to implement human-centric approach in
system designs. Among the important topics is human factor (HF), as an object of vul-
nerability and cyber-attacks. This means that an important aspect in implementing the
security by design approach are the cybersecurity aspects related to privacy by design
[2] such as testing vulnerability of organization’s cybersecurity of social engineering
attacks, modelling HF in cybersecurity, developing HF Framework for cyber vulnerabil-
ities investigations, as well as addressing the significance of cognitive user profiles for
improving usability of computer system interface and others. These issues are relevant
to the highest level of IoT Reference Architecture. Because the goal of the architecture
is to improve security in IoT systems, therefore the human factor plays a role in adding
security at the software application level as part of the user interfaces of the user domain.
Several studies have proved that half of data security breaches are caused by errors
due to activities of ordinary users [1]. This contradicts the notion that hackers are the ones
behind most breaches. Another key observation, from the study, is that human mistakes
lead to more incidents than malicious actions do. That is why the attention should be
focused on human factor activities. Moreover, in the current COVID-pandemic situation
many users prefer working by the so-called “Work From Home” model. It requires
more detailed research for cybersecurity in order to enhance user’s cyber awareness and
competence. According to ISACA’s Covid-19 Study, about 90% of participants believe
that an abrupt transition from the place of work to so called “home office” way of working
would increase the risk for data privacy and cause problems [8].
A key aspect of the human factor is related to identity management, which is an
important element of a cybersecurity system within organizations. With regard to the
management of digital identity, key issues are security and privacy. As digital identity has
become an increasingly popular attack vector and identity theft is widespread on the web,
measures to identify and validate digital identities are crucial for network management
and security in the public and private sectors.
Identity is the link that connects individuals to their community. It is a link between
the individuals and the world in which they live. According to the APA1 dictionary of
Psychology [3], identity is “an individual’s sense of self defined by (a) a set of physical,
psychological, and interpersonal characteristics that is not wholly shared with any other
person and (b) a range of affiliations (e.g., ethnicity) and social roles. Identity involves
a sense of continuity, or the feeling that one is the same person today that one was
yesterday or last year (despite physical or other changes). Such a sense is derived from
one’s body sensations; one’s body image; and the feeling that one’s memories, goals,
values, expectations, and beliefs belong to the self. Also called personal identity.”
The advent of digital technologies, the internet and social media have made possible
the shift of the identity paradigm into a digital (cyber) context. The management of digital
identity has many facets - technical, economic, social and cultural – and therefore it is
complex to understand it and address it as a universal concept. Nevertheless, digital
identity is essential for the further development of the Digital and Global Economy
[7]. Many initiatives have been set to explore the necessity of unique digital identity
1 American Psychological Association.
Application of a Human-Centric Approach in Security by Design for IoT 15
and it’s adoption on a global scale. For example, The United Nations (UN) and World
Bank ID4D initiatives aim to provide everyone on the planet with a legal identity by
2030. At the ID2020 summit in May 2016 in New York, the UN initiated discussions
around digital identity, blockchain, cryptographic technologies, and its benefits for the
underprivileged. During the summit, 400 experts shared best practices and ideas on how
to provide universal identity to all.
The problem that exists is that in today’s digital world it is a challenge to determine
exactly what data such as type, quantity and quality are available in cyberspace. There is
a huge amount of personal data on the Internet that is a “digital imprint” of a person and
is linked to a “digital identity”. Therefore, a key aspect of cyber security is the human
factor.
As an open system, man communicates through the information environment and
social networks. Through the physical environment the digital devices may turn into
a means of striking, using its output to the person to broadcast massive amount of
information or interfere with his everyday operations.
In addition, as a major challenge in IoT smart home infrastructure, is the security of
devices. The main problem comes from the heterogeneous nature of IoT networks and
large number of devices that differ on many criteria: the communication protocols that
they use and data protocols [9]. Therefore, the security implementation will vary from
device to device and finding a uniform solution is almost impossible [10]. Smart solutions
contain a large amount of confidential data (e.g. personal photos, videos, microphones).
The notion of human factor within cyber-physical systems leads to one main
observation in regard to user awareness within such systems.
In order to reach the above-mentioned aim of this paper, the issue has been explored,
from a user’s point of view, by applying a survey research methodology. It gave an
opportunity to select key research indicators, related to cyber awareness and digital
identity. They were explored and analysed, and then the evaluation criteria were defined.
The study is aimed to help users get certain skills when they operate in the cyberspace.
The survey was conducted and its results were compiled and examined. These results
are used for the development of solutions that would enhance users’ cyber awareness,
digital competences and help them maintain high level cyberhygiene.
Based on the survey results, a human-centric perspective for a practical solution is
applied by the development of a virtual online space - a website “Cyberawareness”.
It provides opportunities for active communication between users. They could submit
information to the platform, as well as receive information from it. The virtual space
of the platform has several functionalities. On one hand, it offers a tool for researching
skills and behaviour of citizens, verifying their competencies in cyber awareness, and
helps them manage their digital identity. On the other hand, it provides cyber awareness
resources, access to various free cybersecurity verification tools, information resources,
useful information and contacts, opportunities for sharing information related to cyber
incidents, etc.
In this way, the platform could strengthen information sharing and improve cyberse-
curity competence of the workforce and citizens, especially in the sphere of the cyberse-
curity continuous education and the related services. According to ACM study group and
the NICE framework (NIST Special Publication 800-181. Title. National Initiative for
16 V. Vasileva
The research method is based on the evaluation through analysis of collected data. The
data which is collected provides information about the users, their occupation, experience
and level of excellence. For the purpose of this study, the survey method was selected
as the most appropriate one.
The survey examines and analyses the opinion of a wide range of participants
that work in public and administrative structures. It provides an objective overview
of the needs and potential areas for improvement in the organization of information
infrastructures in those structures, as well as using IoT software applications.
The preparation of the survey is related to the following technology for work:
• Studying the general theory and technology of organizing and creating a survey;
• Exploring the possibilities for creating questionnaires or online forms with the relevant
topics;
• Selection of indicators and definition of criteria for assessment of information needs;
• Development of a questionnaire;
• Organizing and conducting the survey;
• Processing and analysis of the results of the survey;
• Synthesis of the results, development of conclusions, recommendations and lessons
for the users, administrators and developers;
• Applying the results of the survey to improve information security, defining them as
information resources within the package of capabilities they need to implement.
Indicators for the Formation of the Criteria. As part of information security, indica-
tors for the formation of criteria for cyber awareness assessment are related to capability
building, as follows:
The needs for information security and services of the systems are planned and
built-in accordance with their taxonomic grouping. It is a part of the comprehensive
service-oriented, security by design and privacy by design approaches. The taxonomy
is a hierarchical model consisting of a certain layer of services, including information
security services.
Also, the capacity building for monitoring cyberspace is related to sharing data in
real time through a subsystem for cyber incident detection.
In order to manage increased cyber risks and to improve cyber awareness, it is
essential for users to counter detected threats, as well as to be capable and adaptable
to neutralize new cyber threats generated by some innovative information technologies
and especially those connected to IoT infrastructure and Personal Area Networks.
Evaluation Criteria. The definition of evaluation criteria is based on analysis of the
proposed indicators for information security. It can be concluded that the basis for
building the information environment should be a service-oriented architecture. That
is why the evaluation criteria can be:
The set of indicators and defined criteria for evaluation of cyber awareness and infor-
mation security are the basis that forms resources necessary to guarantee information
security when users work in cyberspace.
A variant of such a consistent method for cyber awareness research, identity man-
agement, and proposing solution in order to enhance user competencies regarding
cyberspace could be successfully applied, both at the national level for one country
and in EU Cybersecurity Domain, as well.
The survey was conducted online between several different user groups. The “Forms”
applications of the Microsoft Teams and Google Forms platforms have been used as
implementation technology.
The analysis of the results of the survey is used in the development of a solution to
increase cyber awareness.
Thirty-eight (38) people took part in the survey at the user level respondents. In
the second survey, forty-three (43) respondents were interviewed, of which information
security specialists were fifteen (15). Along with the specific answers to the questions,
concrete proposals were made. The main one identified the need to provide opportunities
for cyber awareness. These are opportunities to improve competencies of public sector
users when working in cyberspace.
Some key observations are identified as follows:
• More than 50% of participants underwent security training within their organizations
• 78% of respondents say that in the corporations where they work there are established
security policies. In a very small part of them these rules are related only to certain
activities. Here the role of the leadership is positive and obvious.
• 72% of the respondents would accept when working in cyberspace to comply with the
recommendations by observing their own user, monitor their device, knowing their
correspondents, use virtual cards for your payments and more. However, 27% would
not comply with such recommendations. Although a small percentage of dissenters,
yet in a public administrative structure, such percentage is unacceptable.
• Over 60% of employees would like to be involved in training on the implementation of
software capabilities to protect information and networks and especially IoT devices.
The training can be done by external training structures, but also by the cyber security
specialists.
• The results of the recommendations concern the exclusive administrator on informa-
tion security. Highly recommended are end-user protection and awareness systems.
They recommend having analysis systems in the information infrastructure, incident
monitoring and reporting IoT vulnerabilities.
• More than 50% of the participants recommend the information infrastructure to have
cyber threat systems and indicators, along with incident analysis, monitoring and
reporting systems.
• More than 50% of the breakthroughs in the networks of corporate structures are due
to the human factor of the organization itself and about 30% are caused by external
factors and resources. This presupposes prevention in the work of the management
with the users in the electronic environment and daily control over the users and
the administrators in the IoT infrastructure. These conclusions also apply to network
administrators for daily work with employees.
Application of a Human-Centric Approach in Security by Design for IoT 19
Based on the analysis of the results of the survey the following recommendations
could be made towards the work of the users, managers and network and security
administrators within public organizations.
Regarding Users and Managers in Institutions. The above data gathered from this
group shows that justified cybersecurity concerns are present. This requires the lead-
ership of institutions to develop measures and recommendations for safe work of their
employees in the digital environment and enhance their cyber awareness.
• About cyber awareness level analysis – public sector organizations should create and
use a cybersecurity policy during crises.
• About data analysis, smaller sized organizations with lower budgets and less
employees are less prepared and less aware of cybersecurity risks. Therefore, more
cybersecurity awareness is need.
cyber hygiene and consumer behaviour through cyber awareness, education and training
which corresponds to advances in psychology, state of the art technologies and security.
The human factor vulnerability is a major target of social engineering attacks, which
completely circumvent all technical protection measures taken. Social engineering is
method for unauthorized acquisition of information resources and/or user rights without
the use of technical means. Social engineering uses mainly psychological methods,
namely a person’s tendency to trust. Social attacks engineering take place on two levels:
Developing the Project Portal “Cyber Awareness”. In line with the observations
based on survey results, the author presents a methodology for enhancing the knowledge
of users to work in a secure environment and to refine and improve their cyber awareness
and IoT security skills. As a practical implementation of the proposed methodology, the
author presents a developed Cyber Awareness portal. Its main purpose is to provide
information and resources on cybersecurity and IoT security, and to be the main point of
knowledge access. The portal also provides opportunities to test your cyber knowledge,
participate in public survey related to cyber topics, share and exchange information,
opinions and useful practices on cyber incidents and knowledge.
4 Conclusion
IoT technologies became everyday commodities, peculating both our social and work
environments. The complexity, variety, and frequency of cyber incidents have increased
Application of a Human-Centric Approach in Security by Design for IoT 21
significantly over the last decade. Understanding cybersecurity risk requires a certain
level of discipline and cautious mentality, which requires increasing cyber awareness
levels among regular users of IoT.
The developed portal is a good practice which can be further improved in a collabo-
rative platform that enables regular editing and enrichment of the content with additional
up-to-date information, setting up a forum and discussion structure, as well as adding
tools. The proposed approach for improving cyber awareness of people has an inter-
disciplinary effect, as it could be successfully applied in other cyber domains. Human
vulnerabilities need to be identified and managed before they lead to an actual security
breach. For that reason, we need a common research perspective to study cybersecu-
rity that focuses on the interaction of technology and software development, concepts
and architectures, organizational processes improvement and human performance. This
means to apply a human–centred approach, which provides a comprehensive foundation
to analyse cybersecurity as a socio-technical system that cover diverse aspects such as
psychological, cultural, technology and software development.
References
1. 2018 IT Risks Report: Netwrix Corporation. netwrix.com
2. Annual Report 2020: European Data Protection Supervisor PDF ISBN 978-92-9242-617-0
ISSN 1830-9585. https://doi.org/10.2804/205036QT-AA-21-001-EN-N. https://edps.europa.
eu/system/files/2021-04/2021-04-19-annual-report-2020_EN.pdf
3. APA dictionary of Psychology. https://dictionary.apa.org/
4. Borka Jerman Blažič (March 31st 2021): Cybersecurity Skills in EU: New Educational Con-
cept for Closing the Missing Workforce Gap. IntechOpen. https://doi.org/10.5772/intechopen.
97094. https://www.intechopen.com/online-first/75922
5. Department for Digital, Culture, Media & Sport UK: Code of Practice for Consumer
IoT Security (2018). https://assets.publishing.service.gov.uk/government/uploads/system/
uploads/attachment_data/file/971440/Code_of_Practice_for_Consumer_IoT_Security_Oct
ober_2018_V2.pdf
6. Department of Home Affairs Australia: Code of Practice “Securing the Internet of Things
for Consumers” (2020). https://www.homeaffairs.gov.au/reports-and-pubs/files/code-of-pra
ctice.pdf
7. Digital Identity Management Enabling Innovation and Trust in the Internet Economy – OECD
(2011). https://www.oecd.org/sti/ieconomy/49338380.pdf
8. ISACA’s COVID-19 Study (2020). www.isaca.org/covid19study
9. Larsson, M., Lipkin, L.: Exploring the viability of intrusion detection in a centralized smart
hub (2018). https://odr.chalmers.se/handle/20.500.12380/256483
10. Rehman, S., Manickam, S.: A study of smart home environment and its security
threats (2016). https://www.researchgate.net/publication/303089918_A_Study_of_Smart_H
ome_Environment_and_it%27s_Security_Threats
22 V. Vasileva
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
An Empirical Evaluation of the Usefulness
of Word Embedding Techniques in Deep
Learning-Based Vulnerability Prediction
1 Introduction
models (VPMs) are typically built using machine learning (ML) techniques that
use software attributes as input to differentiate between vulnerable and clean (or
neutral) software components. Several VPMs have been proposed over the years,
each of which uses different software factors as inputs to predict the presence
of vulnerable components [1]. Text mining-based techniques have been found
to be the most reliable, according to the bibliography [2] and have attracted
the most of the recent research interest [3–10]. The first attempts in the field
of vulnerability prediction using text mining, have focused on the concept of
Bag-of-Words (BoW) as a method for predicting software vulnerabilities using
the text terms and their respective appearance frequencies in the source code.
Recently, researchers have shifted their focus from simple BoW to more com-
plex approaches, investigating whether more complex textual patterns in the
source code could lead to more accurate vulnerability prediction. In particular,
the authors in [4,5,8] transformed the source code into sequences of word tokens
and trained deep neural networks capable of learning sequences of data
When using sequences of tokens to identify software components with vul-
nerabilities, vulnerability prediction has a lot in common with text classification
tasks such as sentiment analysis [11]. The word embedding vectors are com-
monly used in the field of text classification. Word embedding is a term used to
describe the representation of words for text analysis, typically in the form of
a real-valued vector that encodes the meaning of the word in such a way that
words that are close in the vector space are expected to have similar meanings.
Most of the studies about VP make use of the word embeddings [4–6,12].
Tokens can be embedded into vectors in a variety of ways. One option is to
use an embedding layer that is jointly trained with the vulnerability prediction
task [13]. Another method is to use an external word embedding tool, such as
word2vec [14], to generate vector representations of each token. One can also use
the vectors that are already generated from these tools (e.g. word2vec, Glove [15],
Fast-text [16]) based on natural language documents of billions of words. Finally,
there is also the option to produce custom embedding representations.
The purpose of this study is to emerge the worth of the sophisticated embed-
ding algorithms (e.g., word2vec, fast-text) in text mining-based vulnerability
prediction showing their contribution to the effectiveness and the efficiency of
the VPMs and to compare them with the use of a trainable embedding layer that
updates its values during the training of the VP classifier. A dataset has been
collected and an experimental analysis has been conducted by comparing the
use of a simple embedding layer with the utilization of word2vec and fast-text
algorithms. We also compare the word2vec and fast-text algorithms with each
other. Finally, we compare our best model with a state-of-the-art model.
The remainder of the paper is organized as follows. Section 2 discusses related
work regarding the utilization of word embeddings in the field of vulnerability
prediction. Section 3 provides the theoretical background in order to familiarize
the reader with the main concepts of the present work. Section 4 discusses the
methodology that we followed, while Sect. 5 presents the results of our analysis.
Finally, Sect. 6 wraps up the paper and discusses future research directions.
An Empirical Evaluation of the Usefulness of Word Embedding Techniques 25
2 Related Work
Vulnerability prediction using text mining is very popular and has demonstrated
promising results in the related literature [2,4,9,10]. Initial research endeav-
ors focused on the concept of BoW (i.e., occurrences of tokens) [2,9]. Recent
attempts focus on predicting the existence of vulnerabilities through learning
more complex patterns from the source code. They consider the software com-
ponents as sequences of tokens and train deep learning models capable of learning
sequences, such as the Recurrent Neural Networks (RNNs) [4,5]. The challeng-
ing part of these recent studies is to add syntactic and semantic meaning to
the sequences of code tokens. Word embeddings are one of the most promising
solutions.
The word embedding vectors have evolved into an integral part of the text
classification tasks since Mikolov et al. [17] proposed two architectures for learn-
ing distributed representations of words. The authors in [18], conducted a com-
parative study between different ML algorithms including fast-text, Glove and
word2vec, while in [19] a deep learning method is proposed utilizing the semantic
knowledge provided by the word embeddings.
Word embeddings have already been used in the field of text mining-based
vulnerability prediction. Dam et al. [8] mapped every code token with an index
of their vocabulary and then they constructed an embedding matrix which con-
tained a unique vector representation for every token of the vocabulary in the
position that corresponds to the vocabulary index. In other words, the embed-
ding matrix worked as a look-up table.
The authors in [5,6] used the word2vec tool to generate embedding vectors
for their vocabulary, while Zhou et al. [4] used the pre-trained word2vec vectors.
Russel et al. in [12] created a vulnerability detection tool based on deep learning
and capable of interpreting lexical source code. They conducted a compara-
tive study between simple source code embedding using Bag-of-Words and more
advanced code representations learned automatically by deep learning models
inside the embedding layer. Fang et al. [20] proposed the fastEmbed model which
is an extension of the fast-text algorithm. This way they developed a model for
predicting the exploitability of software vulnerabilities on imbalanced datasets
by understanding key features of vulnerability-related text.
To this end, it is quite clear that a lot of studies make use of word embed-
ding vectors as a representative format for the source code’s tokens (i.e., words).
There are papers that refer the use of simple vector representations just in order
to replace the text features [8], other papers that use the BoW methodology to
represent the text in the source code [9], other studies that utilize the pre-trained
embedding vectors produced by the pre-trained word2vec model [4], but most
of them choose to encode the code tokens into embedding vectors trained on
their own data [5,6]. However, to the best of our knowledge, there is no study
examining the difference between the internal embeddings that are trained in
the embedding layer together with the classifier, and the external embeddings
that are trained alone prior to the model’s training. The former are part of the
supervised learning of the model and update their weights through the Back-
26 I. Kalouptsoglou et al.
propagation process [21], while the latter are trained once, using an advanced
unsupervised algorithm, and then they can be saved for future use. Moreover,
there is a need for an experimental analysis examining the improvement in terms
of accuracy and performance that these word embeddings provide to the DL-
based vulnerability predictors. In the present work, we attempt to address these
open issues through an empirical analysis on a popular dataset. Furthermore,
the present paper includes a comparison between two popular types of word
embedding tools (i.e., word2vec, fast-text) as well as a comparison with a state-
of-the-art BoW model.
3 Theoretical Background
3.1 Vulnerability Prediction Based on Text-Mining
Word embedding methods use a corpus of text to learn a real-valued vector rep-
resentation for a predefined fixed-sized vocabulary [17]. The learning process is
either collaborative with the neural network model on a task, or unsupervised,
using document statistics. An embedding layer is a word embedding learned in
conjunction with a neural network model on a specific natural language process-
ing task, such as document classification. It necessitates cleaning and preparing
the document text so that each word can be one-hot encoded. The model specifies
the size of the vector space. The vectors are seeded with small random numbers.
The embedding layer is used at the front end of a neural network and is fitted in
a supervised manner using the Backpropagation algorithm. However, it can be
An Empirical Evaluation of the Usefulness of Word Embedding Techniques 27
4 Methodology
4.1 Dataset
As part of the current work, we created several VPMs for two widely-used pro-
gramming languages, C and C++ combined. We used a vulnerability dataset
derived from two National Institute of Standards and Technology (NIST) data
sources: the National Vulnerability Database (NVD3 and the Software Assur-
ance Reference Dataset (SARD)4 . This dataset contains 7651 class files, 3438 of
which are classified as vulnerable and the remaining 4213 as clean. The dataset
has been presented by Li et al. [5].
4.2 Pre-processing
of specific libraries in the class, were removed from the dataset. Subsequently,
we removed the code-specific constants (i.e., numbers, literals, etc.), in order to
make the produced sequences more generalizable. In particular, the numeric val-
ues (i.e., integers, floats, etc.) were then replaced by a unique identifier “numId$”,
while the string values and characters were replaced by a different unique identi-
fier “strId$”. All blank lines are also removed, and the text is finally transformed
into a list of code tokens (i.e., new, char, strlen, etc.) in the order they appear
in the source code. After data cleansing, these produced tokens are replaced by
a unique integer (integer encoding process5 ) and these integers are mapped to
one-hot vectors (one-hot encoding6 ).
Table 1. The selected parameters for the training of word2vec and fast-text embedding
vectors.
5
https://scikit-learn.org/stable/modules/generated/sklearn.preprocessing.
LabelEncoder.html.
6
https://scikit-learn.org/stable/modules/generated/sklearn.preprocessing.
OneHotEncoder.html.
An Empirical Evaluation of the Usefulness of Word Embedding Techniques 29
occurrence less than the “min count”. The parameter epochs is just the number
of iterations that the model parses the data.
In Fig. 1, there is a depiction of word2vec vectors trained at the dataset
used in the present study, generated by the t-distributed stochastic neighbor
embedding (TSNE) algorithm [22]. Vectors that are in close proximity in the
depicted figure, correspond to words that are in close proximity in the actual
source code. For instance, in Fig. 1 we can see that the tokens “for” and “i”
which actually are used together in a lot of circumstances, are indeed placed
one next to the other. The same applies also for the tokens “free” and “malloc”,
which is another very representative example.
Fig. 1. The word2vec embedding vectors placed in the vector space by the TSNE
algorithm.
30 I. Kalouptsoglou et al.
In this analysis, various DL algorithms are used to create models that can dis-
tinguish between vulnerable and neutral source code files. As the input to the
models consists of sequential data (i.e., series of tokens) we chose DL algorithms
capable of handling sequences. The RNNs are the most suitable ones as language
models [23]. Convolutional Neural Networks (CNNs) are used on code classifi-
cation tasks, as well [4,24]. Regarding the RNNs, there are several improved
versions such as the Long-Short Term Memory networks (LSTMs) [25], the
Gate Recurrent Units (GRUs) [26] and the Bidirectional LSTMs (BiLSTMs)
[27], which can solve the vanishing gradient problem [28] that the original RNNs
face. The hyper-parameters chosen for our RNN and CNN models are presented
in Table 2. Their values were selected after consecutive tuning and re-evaluation.
Several evaluation metrics are available in the literature and are commonly used
to assess the predictive effectiveness of the ML models. In the vulnerability pre-
diction case, a special emphasis is placed on the Recall of the produced models,
An Empirical Evaluation of the Usefulness of Word Embedding Techniques 31
because the higher the Recall of the model is, the more real vulnerabilities it
predicts. Apart from the capability of the produced models to identify the great
majority of vulnerable files contained in a software project, the volume of the
produced False Positives (FP) (i.e., clean files marked as vulnerable) is impor-
tant to consider because it is known to affect the models’ utilization in practice.
The number of FP is closely related to the amount of manual effort required
by developers to identify files that contain actual vulnerabilities. The lower the
number of FP is, the higher the precision of the model. This fact emphasizes the
significance of the f1-score, which represents the balance of precision and recall.
However, because identifying vulnerable files at the expense of producing FP is
more important in VP, we chose f2-score as our evaluation metric. The f2-score
is a weighted average of precision and recall, with recall being more important
than precision. It is equal to:
5 × precision × recall
F2 =
4 × precision + recall
Table 3. The f2-score of all the utilized methods after 10 fold cross-validation.
From Table 3, we can see that the use of sophisticated word embeddings
trained prior to the deep learning model is beneficial at each model case. The
32 I. Kalouptsoglou et al.
average f2-score of the four models when using an algorithm for the genera-
tion of the word embedding vector is significantly bigger. Furthermore, it is
clear that the skip-gram model is better than the CBOW in our dataset as it
achieves greater average f2-score both at the word2vec and the fast-text case.
Similarly, we notice that the word2vec method provides better f2-score, both at
the CBOW and the skip-gram variation, compared with the fast-text embed-
dings. All the aforementioned foundings lead to the conclusion that the skip-
gram variation of the word2vec embeddings is the best choice for embedding
the tokens of the source code of our dataset before giving them as input to the
sequential deep learning model. An 11% increase in terms of f2-score when using
word2vec embeddings compared with the trainable embedding layer is a signifi-
cant improvement and indicates to the initial hypothesis that these sophisticated
models are capable of capturing semantic and syntactic relationships between
the words of the source code.
Furthermore, the training of the embedding vectors outside from the embed-
ding layer (i.e., non-trainable embedding layer) is beneficial not only in accu-
racy but also in terms of performance. The training time of the DL models has
decreased significantly. Table 4 sums up the results about the training time.
Table 4. The training time in milliseconds (ms) both in case of trainable embedding
layer and in case of sophisticated embeddings trained independently of the neural
network.
From Table 4, it is clear that the training times when having ready the embed-
ding vectors are by far smaller compared with the case of joint training along
with the rest layers. Another interesting note derived from Table 3 and 4 is the
fact that the CNN model is more accurate than the RNNs and much faster as
well.
Finally, another interesting question would be to examine whether the adop-
tion of word embedding vectors lead to better vulnerability prediction models
compared to the traditional (and simpler) BoW approach. For this purpose,
we compare our best model that utilizes the word embedding concept to the
best model that uses BoW and is trained and evaluated on the same dataset.
In particular, in Table 5, we present the results of the comparison between the
state-of-the-art BoW method, versus the CNN model with skip-gram word2vec
vectors, which was found to be the best model in our previous analysis. In the
case of BoW, we chose Random Forest (composed of 100 trees) as a classifier,
based on bibliography [2,9]. From Table 5, it is observed that the f2-score is
An Empirical Evaluation of the Usefulness of Word Embedding Techniques 33
Table 5. BoW versus CNN that uses the skip-gram word2vec representations.
Appendix
In the Appendix Section we provide some extra Tables of the results produced
by our study, including values for accuracy, precision and recall aside from the
f2-score.
Simple Embedding Layer:
References
1. Siavvas, M., Gelenbe, E., Kehagias, D., Tzovaras, D.: Static analysis-based
approaches for secure software development. In: Gelenbe, E., et al. (eds.) Euro-
CYBERSEC 2018. CCIS, vol. 821, pp. 142–157. Springer, Cham (2018). https://
doi.org/10.1007/978-3-319-95189-8 13
2. Walden, J., Stuckman, J., Scandariato, R.: Predicting vulnerable components: soft-
ware metrics vs text mining. In: 2014 IEEE 25th International Symposium on
Software Reliability Engineering. IEEE (2014)
3. Chakraborty, S., Krishna, R., Ding, Y., Ray, B.: Deep learning based vulnerability
detection: are we there yet. IEEE Trans. Softw. Eng. (2021)
4. Zhou, Y., Liu, S., Siow, J., Du, X., Liu, Y.: Devign: effective vulnerability identi-
fication by learning comprehensive program semantics via graph neural networks.
arXiv preprint arXiv:1909.03496 (2019)
5. Li, Z., et al.: Vuldeepecker: a deep learning-based system for vulnerability detec-
tion. arXiv preprint arXiv:1801.01681 (2018)
6. Cao, S., Sun, X., Bo, L., Wei, Y., Li, B.: BGNN4VD: constructing bidirectional
graph neural-network for vulnerability detection. Inf. Softw. Technol. 136, 106576
(2021)
7. Pang, Y., Xue, X., Wang, H.: Predicting vulnerable software components through
deep neural network. In: Proceedings of the 2017 International Conference on Deep
Learning Technologies, pp. 6–10 (2017)
36 I. Kalouptsoglou et al.
8. Dam, H.K., Tran, T., Pham, T.T.M., Ng, S.W., Grundy, J., Ghose, A.: Automatic
feature learning for predicting vulnerable software components. IEEE Trans. Softw.
Eng. 47, 67–85 (2018)
9. Scandariato, R., Walden, J., Hovsepyan, A., Joosen, W.: Predicting vulnerable
software components via text mining. IEEE Trans. Softw. Eng. 40, 993–1006 (2014)
10. Hovsepyan, A., Scandariato, R., Joosen, W., Walden, J.: Software vulnerability
prediction using text analysis techniques. In: Proceedings of the 4th International
Workshop on Security Measurements and Metrics, pp. 7–10 (2012)
11. Medhat, W., Hassan, A., Korashy, H.: Sentiment analysis algorithms and applica-
tions: a survey. Ain Shams Eng. J. 5(4), 1093–1113 (2014)
12. Russell, R., et al.: Automated vulnerability detection in source code using deep
representation learning. In: 2018 17th IEEE International Conference on Machine
Learning and Applications (ICMLA), pp. 757–762. IEEE (2018)
13. Turian, J., Ratinov, L., Bengio, Y.: Word representations: a simple and general
method for semi-supervised learning. In: Proceedings of the 48th Annual Meeting
of the Association for Computational Linguistics, pp. 384–394 (2010)
14. Rong, X.: word2vec parameter learning explained. arXiv (2014)
15. Pennington, J., Socher, R., Manning, C.D.: Glove: global vectors for word repre-
sentation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural
Language Processing (EMNLP), pp. 1532–1543 (2014)
16. Joulin, A., Grave, E., Bojanowski, P., Mikolov, T.: Bag of tricks for efficient text
classification. arXiv preprint arXiv:1607.01759 (2016)
17. Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word repre-
sentations in vector space. arXiv preprint arXiv:1301.3781 (2013)
18. Stein, R.A., Jaques, P.A., Valiati, J.F.: An analysis of hierarchical text classification
using word embeddings. Inf. Sci. 471, 216–232 (2019)
19. Ma, Y., Peng, H., Cambria, E.: Targeted aspect-based sentiment analysis via
embedding commonsense knowledge into an attentive LSTM. In: Thirty-Second
AAAI Conference on Artificial Intelligence (2018)
20. Fang, Y., Liu, Y., Huang, C., Liu, L.: Fastembed: Predicting vulnerability exploita-
tion possibility based on ensemble machine learning algorithm. Plos One 15,
e0228439 (2020)
21. Goldberg, Y.: Neural network methods for natural language processing. Synth.
Lect. Hum. Lang. Technol. 10(1), 1–309 (2017)
22. Van der Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn.
Res. 9(11) (2008)
23. Sundermeyer, M., Oparin, I., Gauvain, J.L., Freiberg, B., Schlüter, R., Ney, H.:
Comparison of feedforward and recurrent neural network language models. In:
2013 IEEE International Conference on Acoustics, Speech and Signal Processing
(2013)
24. Filus, K., Siavvas, M., Domańska, J., Gelenbe, E.: The random neural network
as a bonding model for software vulnerability prediction. In: Calzarossa, M.C.,
Gelenbe, E., Grochla, K., Lent, R., Czachórski, T. (eds.) MASCOTS 2020. LNCS,
vol. 12527, pp. 102–116. Springer, Cham (2021). https://doi.org/10.1007/978-3-
030-68110-4 7
25. Sundermeyer, M., Schlüter, R., Ney, H.: LSTM neural networks for language mod-
eling. In: Thirteenth Annual Conference of the ISCA (2012)
An Empirical Evaluation of the Usefulness of Word Embedding Techniques 37
26. Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recur-
rent neural networks on sequence modeling. arXiv (2014)
27. Schuster, M., Paliwal, K.K.: Bidirectional recurrent neural networks. IEEE Trans.
Signal Process. 45(11), 2673–2681 (1997)
28. Hochreiter, S.: The vanishing gradient problem during learning recurrent neural
nets and problem solutions. Int. J. Uncertainty 6, 107–116 (1998)
Open Access This chapter is licensed under the terms of the Creative Commons
Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/),
which permits use, sharing, adaptation, distribution and reproduction in any medium
or format, as long as you give appropriate credit to the original author(s) and the
source, provide a link to the Creative Commons license and indicate if changes were
made.
The images or other third party material in this chapter are included in the
chapter’s Creative Commons license, unless indicated otherwise in a credit line to the
material. If material is not included in the chapter’s Creative Commons license and
your intended use is not permitted by statutory regulation or exceeds the permitted
use, you will need to obtain permission directly from the copyright holder.
Correlation-Based Anomaly Detection
for the CAN Bus
1 Introduction
Modern vehicles are equipped with a large number of embedded controllers
(ECUs) and other embedded computing devices, which are interconnected with
networks internal to the vehicle (e.g., CAN buses, Ethernet), and some of these
devices also have interfaces to external networks (e.g., Bluetooth, WiFi, 4G).
The ECUs are responsible for various functions of the vehicle, some of which are
safety critical. This setup makes vehicles subject to cyberattacks, whereby mali-
cious actors may try to interfere with the behavior of the vehicle by accessing its
internal components via its aforementioned external interfaces. The feasibility
of such attacks on road vehicles have been demonstrated by researchers as a
proof-of-concept [10], and there have been some real cases as well [16]. Unfortu-
nately, attacks affecting safety critical functions may result in potentially fatal
The presented work was carried out within the MASPOV Project (KTI KVIG 4-
1 2021), which has been implemented with support provided by the Government of
Hungary in the context of the Innovative Mobility Program of KTI. The research
presented in this paper have also been supported by the NRDI Office, Ministry of
Innovation and Technology, Hungary, within the framework of the Autonomous Sys-
tems National Laboratory Programme, and the NRDI Fund based on the charter of
bolster issued by the NRDI Office.
c The Author(s) 2022
E. Gelenbe et al. (Eds.): EuroCybersec 2021, CCIS 1596, pp. 38–50, 2022.
https://doi.org/10.1007/978-3-031-09357-9_4
Correlation-Based Anomaly Detection for the CAN Bus 39
state. The solution proposed in this paper can represent these high level rela-
tionships between the vehicle signals with the correlation values that correspond
to the normal state of the vehicle. During an attack, if a vehicle signal is over-
written by the attacker in a CAN message, some of the measured correlation
values may deviate from those of the normal state, and this can be detected as
an anomaly. An advantage of this approach, compared to previously proposed
algorithms where only a single signal value is used in the anomaly detection, is
that if the attacker does not modify all the correlating signals precisely at the
same time, the attack can likely be detected.
The rest of the paper is structured as follows. Section 2 presents the related
work. Section 3 introduces our proposed anomaly detection method and Sect. 1
summarizes its testing and validation. Finally, Sect. 5 concludes the paper.
2 Related Work
Academic papers proposing solutions for securing in-vehicle networks can be
divided into three groups: (1) a relatively large body of work (e.g., [5,18,25]) is
concerned with adding extensions to the CAN protocol, and by doing so, fixing
its inherent security weaknesses; (2) a few papers (e.g., [14]) discuss intrusion
prevention either by introducing firewalls or other techniques; and (3) another set
of papers (which we discuss in more details below) deal with intrusion detection
on the CAN bus using various approaches. Given the considerable amount of
work done in the field, a few surveys have also been published: [9,19] have the
broad scope of in-vehicle security as a whole, and [11,26,27] are more focused on
in-vehicle intrusion detection. As our work falls in the domain of anomaly-based
intrusion detection, we focus on that domain in the rest of this section.
Anomaly-based intrusion detection can take two approaches: specification-
based and model-based anomaly detection. In case of the former, the normal
behavior of the monitored system is explicitly specified. For instance, in the
automotive case, the car manufacturer can have specifications for the normal
frequency of different periodic messages at which they appear on the CAN bus.
Deviations from the specification can easily be identified as signs of attack.
In the case of model-based anomaly detection, on the other hand, no explicit
specification of normal behavior is given, but instead, a model of the normal
behavior is somehow obtained (e.g., learned by observing the system in the
non-attacked state), and deviations from this model are detected as attacks.
Different academic proposals differ in what modelling technique they use and
what features of the system are modelled.
As for the modelling technique, many papers propose to use some statistical
model (e.g., mean, variance, or entropy) of some parameter, with simple heuristic
rules (e.g., comparison to a threshold) [4,15,17,20,21] or more sophisticated sta-
tistical hypothesis testing methods [12,24] to detect deviations from the model.
Other papers (e.g., [7,13,22,23]) use some machine learning model (e.g., classi-
fier or neural network), with the corresponding model specific method to decide
if some input deviates from the learned model. Regarding the features that are
Correlation-Based Anomaly Detection for the CAN Bus 41
modelled, many papers consider properties of the network traffic itself, such as
packet timing features (e.g., frequency of certain types of packets) [17,20,21,24]
and features related to the content of the packets (e.g., the time series of packet
IDs or certain signal values) [8,12,13], whereas some papers use physical char-
acteristics as features, such as voltage level and clock drift of physical signals on
the CAN bus [2,6].
In this paper, we propose a model-based anomaly detection method for the
CAN bus that uses correlations across different types of messages as features. To
the best of our knowledge the only other paper using correlation-based anomaly
detection is [1] therefore, we make a more in-depth comparison here. The method
proposed in [1] computes the correlation between two specific signals, velocity
and RPM, and detects attacks where extra messages containing incorrect val-
ues of these signals are injected into the bus. In contrast to this, our method
computes the correlation between all pairs of signals, and identifies those pairs
that have high correlation without identifying the actual signals. In addition,
we detect message modification attacks, which are more difficult to detect than
injection attacks. We simulate seven different types of modification attacks and
evaluate the performance of our method for each of them. Otherwise, both [1] and
our work use the Pearson correlation function, while in [1], the authors applied
other analysis techniques (such as K-Means and Hidden Markov Models) as well.
3.2 Overview
every signal pair, we also calculated four thresholds to identify the boundaries of
normal behaviour: (1) two thresholds define a narrow normal interval, such that
measurement outside of this interval are considered potential anomalies for fur-
ther analysis; (2) and another two thresholds define a wider interval, such that
measurements outside of this interval are considered anomalies immediately.
In the detection phase, correlation values are determined in both a one minute
long and a three minutes long window. Then the measured values are compared
to the previously defined threshold for anomaly detection.
In the training and testing phases we used a 31 min long CAN traffic log captured
from a middle class vehicle. The traffic contains both periodic and non-periodic
messages. This means that some messages arrive regularly with a fix repetition
times, while others are only transmitted upon specific events. Before the train-
ing, we filtered out the non-periodic messages and those periodic messages that
appear less than once per minute. After the filtering step, 92% of the original
data remained.
The next step was the signal extraction from the traffic log. For this we
used an algorithm from the Automated CAN Payload Reverse Engineering1
project. This algorithm separates the bits of the CAN data field into signals based
on bit flip frequencies, called Transition Aggregation N-Grams. The method
builds on the property that the MSB bits of a signal change less frequently
than the LSB bits. If there is a significant change in the bit flip frequencies of
two neighboring bits that shows the boundary between two signals. The same
statistical information can also be used to determine the signal encoding.
We calculated correlation values pairwise for the identified signals in different
time windows. We tested window sizes from 1 to 8 min. For every interval, we
re-sampled the signals to have two signal values per second within the chosen
window. This rarefying speeds up the correlation calculation. Our measurements
showed that the best results can be achieved by choosing 1 min and 3 min as final
time windows. This allows us to detect significant anomalies fast and smaller
anomalies in a reasonable time.
Five matrices are calculated for both time windows for the purpose of anomaly
detection. A matrix C contains the correlation values and there are four addi-
tional threshold matrices that store two upper (Cth+,1 Cth+,2 ) and two lower
thresholds (Cth−,1 Cth−,2 ) for the detection.
Each cell ci,j in matrix C contains the Pearson correlation value calculated
between signals i and j in the given time window. The correlation value is stored
the following way:
1
https://github.com/brent-stone/CAN Reverse Engineering.
Correlation-Based Anomaly Detection for the CAN Bus 43
During the training phase, we randomly select a starting point in the CAN
log and calculate the correlation values for all signal pairs for both time intervals.
Selecting the starting point randomly allows us to use the original trace multiple
times generating a correlation matrix with small differences for every starting
point. With this method, we created 300 training matrices for the threshold
calculations.
These training matrices gave us a good representation of the typical correla-
tion value for all pairs of signals. In order to find thresholds characterizing the
normal behaviour, we fitted different continuous probability distribution func-
tions onto the ci,j values of every training matrix. For every distribution, we
performed a Kolmogorov-Smirnov (K-S) test to find the distribution that fits
best the correlation values. The K-S test gave us two results: a D statistics and
a p-value. For the former, we calculated2 a critical value at significance level
α = 1% using (1) (where n is the number of samples in the dataset):
1.6276
d1% = √ (1)
n
Those distributions, where the resulting D statistic was less than or equal
to the critical value and the resulting fitted probability distribution’s stan-
dard deviation was greater than 0 and less than 0.2, we accepted the distri-
bution as a potential candidate. Then, for all these candidates, we calculated
the probability distribution’s percent-point (or quantile) function value for the
10−3 , 1 − 10−3 , 10−6 , 1 − 10−6 probabilities. These gave us candidates for the
minimum (mini,j ), maximum (maxi,j ), significant minimum (sigmini,j ) and
significant maximum (sigmaxi,j ) thresholds.
To choose the best option from the candidates, a scoring technique was used,
which is based on the length of the normalized significant min-max interval
(sigmaxi,j −sigmini,j ) and the normalized min-max intervals (maxi,j −mini,j ).
The candidate with the minimum final score was selected as the final probability
distribution. We used the following function (Fig. 1 and Eq. 2) with a minimum
value of 0.6 for the significant min-max, and a minimum value of 0.5 for the
min-max intervals:
(x − min)2 , if x <
= min
score(x) = x−min (2)
min∗x , if x > min
f inal score = 0.65 ∗ minmax score + 0.35 ∗ signif icant minmax score (3)
2
https://www.real-statistics.com/statistics-tables/kolmogorov-smirnov-table/.
44 A. Gazdag et al.
Fig. 1. Visualization of the function used to score the normal min-max threshold inter-
vals.
The used scoring system assigns the smallest score to the candidates with a
min-max interval length closest to 0.5 and a significant min-max interval length
closest to 0.6. This approach prefers the candidates where the intervals are rel-
atively small but not too tight. Our measurements showed that these typically
used statistical constants in the calculations with this weighting gives the best
trade-off between false positive and false negative results. We used a larger weight
for the min-max score to reflect that it is more important to detect and attack
the speed of the detection.
These final chosen threshold values are stored in the threshold matrices,
given that there was at least one candidate distribution, in the following way:
the minimum values are stored in matrix Cth−,1 ; the maximum values are stored
in matrix Cth+,1 ; the significant minimum values are stored in matrix Cth−,2 ,
and finally, the significant maximum values are stored in matrix Cth+,2 . If there
was no candidate probability distribution found, the signal pair was excluded
from the study.
In Fig. 2, we present an example of the measured correlation values of a signal
pair and the fitted probability distribution function (‘loggamma’). The vertical
blue and red lines show the determined minimum and maximum, and significant
minimum and maximum values, respectively.
3.5 Detection
In the detection phase, the current correlation values are calculated for the last
1 and 3 min of the network traffic, and then, the results are compared to the
threshold matrices in the following way:
Fig. 2. One example of a signal pair with a fitted ‘loggamma’ probability distribution
– if the value is only outside the normal min-max interval, but not outside the
significant one, we consider it a potential attack only, which will be a real
attack if our model with the other time interval also gets a similar result.
4.1 Testing
In the testing phase, we took 270 1-min long samples of the original trace, which
we also used for training. We performed the detection step of the algorithm on
these samples with a previously trained model and found the following result:
the model signaled an attack in 14 out of 270 cases, resulting in a false positive
rate of 5.2%.
4.2 Validation
Fig. 3. Testing results for 16 bit long signal with strong correlations.
Figure 3 shows detailed results for a signal with strong correlations. The 16
bit long signal was attacked with all attack types. For each type, 3 attacks were
performed where the affected number of bits increase from 8 to 16. The two
colors of the columns indicate which time window was successful for the attack
detection. The detection rate varies between 55% and 100% with an above 90%
result for attacks modifying more than 12 bits.
Correlation-Based Anomaly Detection for the CAN Bus 47
The results found in the others groups, as expected, are less accurate. The
average detection accuracy of attacks of signals with one strong correlation is
58% while this falls to 20% for the third group where the signals only have weak
correlations.
Figure 4 shows a summary of the results for messages with the highest priority
(based on the CAN ID field). It can be seen, that most messages with the highest
priority contain signals with high correlation, making them ideal candidates for
a correlation based anomaly detection.
References
1. Ben Othmane, L., Dhulipala, L., Abdelkhalek, M., Multari, N., Govindarasu, M.:
On the performance of detecting injection of fabricated messages into the can
bus. IEEE Trans. Dependable Secure Comput., 1 (2020). https://doi.org/10.1109/
TDSC.2020.2990192
2. Choi, W., Joo, K., Jo, H.J., Park, M.C., Lee, D.H.: VoltageIDS: low-level com-
munication characteristics for automotive intrusion detection system. IEEE Trans.
Inf. Forensics Secur. 13(8), 2114–2129 (2018). https://doi.org/10.1109/TIFS.2018.
2812149
3. Gazdag, A., Ferenczi, C., Buttyán, L.: Development of a man-in-the-middle attack
device for the can bus. In: Proceedings of the 1st Conference on Information Tech-
nology and Data Science Debrecen, Hungary, 6–8 November 2020, pp. 115–130
(2020)
4. Gmiden, M., Mohamed, H., Trabelsi, H.: An intrusion detection method for secur-
ing in-vehicle CAN bus. In: Proceedings of the 17th International Conference on
Sciences and Techniques of Automatic Control and Computer Engineering (STA)
(2016). https://doi.org/10.1109/STA.2016.7952095
5. Groza, B., Murvay, S., van Herrewege, A., Verbauwhede, I.: LiBrA-CAN: a
lightweight broadcast authentication protocol for controller area networks. In:
Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp.
185–200. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35404-
5 15
6. Ji, H., Wang, Y., Qin, H., Wu, X., Yu, G.: Investigating the effects of attack
detection for in-vehicle networks based on clock drift of ECUs. IEEE Access 6,
49375–49384 (2018). https://doi.org/10.1109/ACCESS.2018.2841884
7. Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for
in-vehicle network security. PLoS One 11(6), e0155781 (2016)
8. Kang, M.J., Kang, J.W.: A novel intrusion detection method using deep neural
network for in-vehicle network security. In: Proceedings of the 83rd IEEE Vehicular
Technology Conference (VTC Spring), pp. 1–5 (2016). https://doi.org/10.1109/
VTCSpring.2016.7504089
9. Kim, K., Kim, J.S., Jeong, S., Park, J.H., Kim, H.K.: Cybersecurity for autonomous
vehicles: review of attacks and defense. Comput. Secur. 103 (2021). https://doi.
org/10.1016/j.cose.2020.102150
10. Koscher, K., et al.: Experimental security analysis of a modern automobile. In:
2010 IEEE Symposium on Security and Privacy, pp. 447–462 (2010). https://doi.
org/10.1109/SP.2010.34
11. Lokman, S.-F., Othman, A.T., Abu-Bakar, M.-H.: Intrusion detection system for
automotive Controller Area Network (CAN) bus system: a review. EURASIP
J. Wirel. Commun. Netw. 2019(1), 1–17 (2019). https://doi.org/10.1186/s13638-
019-1484-3
12. Marchetti, M., Stabili, D.: Anomaly detection of can bus messages through analysis
of id sequences. In: Proceedings of the IEEE Intelligent Vehicles Symposium (IV),
pp. 1577–1583 (2017). https://doi.org/10.1109/IVS.2017.7995934
13. Markovitz, M., Wool, A.: Field classification, modeling and anomaly detection in
unknown CAN bus networks. In: Proceedings of the Embedded Security in CARs
(ESCAR) Conference (2015)
Correlation-Based Anomaly Detection for the CAN Bus 49
14. Matsumoto, T., Hata, M., Tanabe, M., Yoshioka, K., Oishi, K.: A method of pre-
venting unauthorized data transmission in controller area network. In: Proceedings
of the 75th IEEE Vehicular Technology Conference (VTC Spring), pp. 1–5 (2012).
https://doi.org/10.1109/VETECS.2012.6240294
15. Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. Techni-
cal report, IOActive (2014). https://ioactive.com/pdfs/IOActive Remote Attack
Surfaces.pdf
16. Miller, C., Valasek, C.: Adventures in automotive networks and control units. Tech-
nical report, IOActive (2013)
17. Moore, M.R., Bridges, R.A., Combs, F.L., Starr, M.S., Prowell, S.J.: Modeling
inter-signal arrival times for accurate detection of CAN bus signal injection attacks.
In: Proceedings of the 12th Annual Conference on Cyber and Information Security
Research (2017)
18. Nürnberger, S., Rossow, C.: vatiCAN - vetted, authenticated CAN bus. In: Pro-
ceedings of the International Conference on Cryptographic Hardware and Embed-
ded Systems (CHES), pp. 106–124 (2016)
19. Sharma, C., Moylan, S., Amariucai, G.T., Vasserman, E.Y.: An extended survey on
vehicle security. Computing Research Repository (CoRR) abs/1910.04150 (2019).
http://arxiv.org/abs/1910.04150
20. Song, H.M., Kim, H.R., Kim, H.K.: Intrusion detection system based on the anal-
ysis of time intervals of CAN messages for in-vehicle network. In: Proceedings of
the International Conference on Information Networking (ICOIN) (2016). https://
doi.org/10.1109/ICOIN.2016.7427089
21. Taylor, A., Japkowicz, N., Leblanc, S.: Frequency-based anomaly detection for the
automotive CAN bus. In: Proceedings of the World Congress on Industrial Control
System Security (WCICSS), December 2015
22. Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control
network data with long short-term memory networks. In: Proceedings of the IEEE
International Conference on Data Science and Advanced Analytics (DSAA), pp.
130–139 (2016). https://doi.org/10.1109/DSAA.2016.20
23. Theissler, A.: Anomaly detection in recordings from in-vehicle networks. In: Pro-
ceedings of the International Workshop on Big Data Applications and Principles
(2014)
24. Tomlinson, A., Bryans, J., Shaikh, S.A., Kalutarage, H.K.: Detection of automotive
CAN cyber-attacks by identifying packet timing anomalies in time windows. In:
Proceedings of the 48th Annual IEEE/IFIP International Conference on Depend-
able Systems and Networks Workshops (DSN-W), pp. 231–238 (2018). https://doi.
org/10.1109/DSN-W.2018.00069
25. Van Herrewege, A., Singelée, D., Verbauwhede, I.: CANAuth - a simple, backward
compatible broadcast authentication protocol for CAN bus. In: Proceedings of the
ESCAR Conference (2011)
26. Wu, W., et al.: A survey of intrusion detection for in-vehicle networks. IEEE Trans.
Intell. Transp. Syst. 21(3) (2020). https://doi.org/10.1109/TITS.2019.2908074
27. Young, C., Zambreno, J., Olufowobi, H., Bloom, G.: Survey of automotive con-
troller area network intrusion-detection systems. IEEE Des. Test (2019). https://
doi.org/10.1109/MDAT.2019.2899062
50 A. Gazdag et al.
Open Access This chapter is licensed under the terms of the Creative Commons
Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/),
which permits use, sharing, adaptation, distribution and reproduction in any medium
or format, as long as you give appropriate credit to the original author(s) and the
source, provide a link to the Creative Commons license and indicate if changes were
made.
The images or other third party material in this chapter are included in the
chapter’s Creative Commons license, unless indicated otherwise in a credit line to the
material. If material is not included in the chapter’s Creative Commons license and
your intended use is not permitted by statutory regulation or exceeds the permitted
use, you will need to obtain permission directly from the copyright holder.
Botnet Attack Detection
with Incremental Online Learning
Abstract. In recent years, IoT devices have often been the target of
Mirai Botnet attacks. This paper develops an intrusion detection method
based on Auto-Associated Dense Random Neural Network with incre-
mental online learning, targeting the detection of Mirai Botnet attacks.
The proposed method is trained only on benign IoT traffic while the
IoT network is online; therefore, it does not require any data collection
on benign or attack traffic. Experimental results on a publicly available
dataset have shown that the performance of this method is consider-
ably high and very close to that of the same neural network model with
offline training. In addition, both the training and execution times of the
proposed method are highly acceptable for real-time attack detection.
1 Introduction
Since IoT devices in the Massive IoT segment are low-cost devices, they can
often perform a single task at a time and their computational power is not
sufficient to execute complex attack detection algorithms. Therefore, Massive
IoT is vulnerable to network attacks. According to a study by HP [1], 70% of
IoT devices are vulnerable to attacks, while one of the most common attacks is
the Denial of Service (DoS) attack which comprises 20% of all attacks against
the IoT [6].
Network attacks can include worms based on propagating software [37,38],
DoS attacks where an attacker or an infected device aims to prevent the normal
functioning of a device (or a system) by forwarding superfluous requests [10,11],
and Botnets which are the subject of this work. Traffic which may cause attacks
can be detected as a form of anomaly [22,26] which is concealed as part of normal
innocuous traffic.
c The Author(s) 2022
E. Gelenbe et al. (Eds.): EuroCybersec 2021, CCIS 1596, pp. 51–60, 2022.
https://doi.org/10.1007/978-3-031-09357-9_5
52 M. Nakip and E. Gelenbe
When a network attack occurs following the same techniques as DoS attacks,
but affecting more devices it is called a Distributed DoS (DDoS) attack [14].
One of the most popular kinds of DDoS attacks is the Botnet attack which
mainly targets IoT devices. In a Botnet attack, a victim device turns into a
bot via malware and generates traffic that floods other servers and devices with
meaningless requests that lead to threats [21].
Detecting Botnet attacks is an important task considering the high threat
level for a massive number of devices. To this end, a recent trend of research
has focused on developing Machine Learning (ML) based techniques. Most of
earlier work [5,13,24,28–30,34–36,39,40,42] in this trend develops techniques
for classification by supervised learning; however, these techniques require large
numbers of samples for both normal traffic and malicious traffic; collecting data
for realistic malicious traffic is no easy task. Only a few works evaluated the lack
of attack data during the training of ML models (via auto-associative learning)
for Botnet attacks [33,43] and for DoS attacks [15].
In 2016, a massive DDoS, Botnet, attack affected many web sites including
Netflix, Reddit, Spotify, and Twitter through the Dyn service for domain name
system (DNS) management [7,23] as well as numerous IP addresses creating
access through the servers of some cyber-security companies [41]. It is known
that the botnets in this DDoS attack were infected by the Mirai malware, in
which the infected devices generate traffic that overwhelms servers and other
devices with nonsense requests, sometimes leading to threats [21]. Reference [4]
has analyzed the characteristics of this class of attacks, while a recent work [27]
has analyzed the characteristics of IoT traffic generated by Botnet. In addition,
Reference [3] used blockchains to protect IoT networks against Mirai Botnet
attacks.
The RNN [17] with gradient descent learning [18] has been used to detect Denial
of Service attacks in early work [34] and was recently used also to detect SYN
attacks [15].
The Dense RNN was introduced in [16,20] to address various pattern recogni-
tion problems, including character and object recognition. It has been previously
used with auto-associative offline training to detect SYN attacks [8], and was
used more recently also to detect Mirai Botnet attacks [33].
In this paper, we use a Dense Random Neural Network (Dense RNN) [16,
20] based Mirai Botnet attack detection method, but extend it specifically for
incremental online learning. Similar to [8], this method learns the statistics of
the IoT traffic under normal circumstances while the network is online (via
auto-associative and incremental online learning); that is, it does not require the
offline collection of any IoT traffic data (either benign or attack) for the learning
procedure.
In the rest of this paper, Sect. 2 presents the methodology of the proposed
method for Mirai Botnet attack detection while Sect. 4 presents the performance
Botnet Attack Detection with Incremental Online Learning 53
Fig. 1. The architectural design of AA-Dense RNN based Botnet attack detector with
incremental online training
4 Experimental Results
In order to evaluate the performance of our AA-Dense RNN based Botnet attack
detector with incremental online learning, we use publicly-available Kitsune
Botnet Attack Detection with Incremental Online Learning 55
dataset [2,31] which contains 764, 137 normal and malicious packets for Mirai
Botnet attack. During the performance evaluation, we compare the performance
of AA-Dense RNN under online training with that under offline training.
For AA-Dense RNN, we first set the number of neurons in each layer l as
nl = I = 3, and p = 0.05, r = 0.001 and λ+ = λ− = 0.1. We also set N = 500
packets and T = 100 secs for the extraction of metrics, and we set Θ = 0.02 for
Attack Decision Maker module.
First, we evaluate the performance of the proposed AD method for varying
number of training packets K between 100 and 1000. In this way, we shall also
select the best value of K and set it for the rest of this section.
Fig. 2. Average accuracy of AA-Dense RNN attack detector with incremental online
learning for different values of K ∈ {100, 250, 500, 750, 1000}
56 M. Nakip and E. Gelenbe
Figure 2 presents the average classification accuracy (over all packets) for
each value of K ∈ {100, 250, 500, 750, 1000}. The results in Fig. 2 show that AA-
Dense RNN with incremental online learning achieves its best performance for
K = 750 packets, where the average accuracy equals 99.54. In addition, one may
see that AA-Dense RNN achieves acceptable accuracy for all K.
5 Computation Time
For the proposed method, Table 1 presents the execution time (i.e. time elapsed)
for making a decision on a single packet as well as the initialization and incremen-
tal update stages of the training algorithm for K = 750. Note that we measured
the computation times on a PC with 32 GB ram and AMD Ryzen 7 3.70 GHz
processor.
The results in this table first show that the execution time of AA-Dense
RNN is very low and acceptable for real-time attack detection. Also, we see that
the initialization and incremental online learning of our method take 15 ms and
4.3 ms, respectively. As observed in the evaluated dataset, 4.3 ms is slightly
less than the minimum measured time for transmission of 22 packets; that is,
the parameters of AA-Dense RNN will be updated until the transmission of the
22nd packet after the incremental online learning phase has begun.
Table 1. Training and online run-times of the proposed attack detection method with
incremental online learning
6 Conclusions
Devices in the Massive IoT segment are vulnerable targets for Mirai Botnet
attacks as they are often deployed quickly with low-security measures. There-
fore, in this paper, we developed a Mirai Botnet attack detection method based
on Auto-Associative Dense Random Neural Network (AA-Dense RNN) with
an incremental online learning algorithm. One of the main advantages of this
method is that it learns the statistics of the normal (benign) IoT traffic when
the IoT network is online, so it does not require collecting any (benign or attack)
traffic beforehand.
We have evaluated the performance of the proposed method on a publicly
available dataset containing 764, 137 packet transmissions and compared the per-
formance of the proposed online AA-Dense RNN based attack detection method
with that of offline trained AA-Dense RNN.
Botnet Attack Detection with Incremental Online Learning 57
Our experimental results show that the proposed method achieves 99.54%
accuracy with 99.79% TPR and 98.19% TNR while both training time (initial-
ization and update) and execution time are very small and highly acceptable for
real-time lightweight Mirai Botnet attack detection.
Our future work will extend our design to detect the various type of attacks
via a single detector with incremental online training on only benign IoT traffic.
References
1. Hp study reveals 70 percent of Internet of Things devices vulnerable to attack.
https://www.hp.com/us-en/hp-news/press-release.html?id=1744676
2. Kitsune Network Attack Dataset, August 2020. https://www.kaggle.com/ymirsky/
network-attack-dataset-kitsune
3. Ahmed, Z., Danish, S.M., Qureshi, H.K., Lestas, M.: Protecting IoTs from Mirai
Botnet attacks using blockchains. In: 2019 IEEE 24th International Workshop on
Computer Aided Modeling and Design of Communication Links and Networks
(CAMAD), pp. 1–6 (2019). https://doi.org/10.1109/CAMAD.2019.8858484
4. Antonakakis, M., et al.: Understanding the Mirai Botnet. In: Proceedings of the
26th USENIX Security Symposium (2017). https://www.usenix.org/conference/
usenixsecurity17/technical-sessions/presentation/antonakakis
5. Banerjee, M., Samantaray, S.: Network traffic analysis based iot botnet detection
using honeynet data applying classification techniques. Int. J. Comput. Sci. Inf.
Secur. (IJCSIS) 17(8) (2019)
6. Benzarti, S., Triki, B., Korbaa, O.: A survey on attacks in Internet of Things based
networks. In: 2017 International Conference on Engineering & MIS (ICEMIS), pp.
1–7. IEEE (2017)
7. Biggs, J.: Hackers release source code for a powerful DDoS app called Mirai.
TechCrunch, October 2018. https://techcrunch.com/2016/10/10/hackers-release-
source-code-for-a-powerful-ddos-app-called-mirai/
8. Brun, O., Yin, Y., Gelenbe, E., Kadioglu, Y.M., Augusto-Gonzalez, J., Ramos,
M.: Deep learning with dense random neural networks for detecting attacks against
IoT-connected home environments. In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC
2018. CCIS, vol. 821, pp. 79–89. Springer, Cham (2018). https://doi.org/10.1007/
978-3-319-95189-8 8
9. Cancela, H., Robledo, F., Rubino, G.: A grasp algorithm with RNN based local
search for designing a wan access network. Electron. Not. Discrete Math. 18, 59–65
(2004). https://doi.org/10.1016/j.endm.2004.06.010. https://www.sciencedirect.
com/science/article/pii/S1571065304010674
10. Carl, G., Kesidis, G., Brooks, R., Rai, S.: Denial-of-service attack-detection tech-
niques. IEEE Internet Comput. 10(1), 82–89 (2006). https://doi.org/10.1109/MIC.
2006.5
11. CISA: Understanding Denial-of-Service attacks. https://us-cert.cisa.gov/ncas/
tips/ST04-015
58 M. Nakip and E. Gelenbe
12. Cramer, C.E., Gelenbe, E.: Video quality and traffic QoS in learning-based sub-
sampled and receiver-interpolated video sequences. IEEE J. Sel. Areas Commun.
18(2), 150–167 (2000)
13. Doshi, R., Apthorpe, N., Feamster, N.: Machine learning DDoS detection for con-
sumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops
(SPW), pp. 29–35. IEEE (2018)
14. Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classifica-
tion and state-of-the-art. Comput. Netw. 44(5), 643–666 (2004)
15. Evmorfos, S., Vlachodimitropoulos, G., Bakalos, N., Gelenbe, E.: Neural network
architectures for the detection of SYN flood attacks in IoT systems. In: Proceedings
of the 13th ACM International Conference on PErvasive Technologies Related to
Assistive Environments, pp. 1–4 (2020)
16. Gelenbe, E., Yin, Y.: Deep learning with random neural networks. In: 2016 Inter-
national Joint Conference on Neural Networks (IJCNN), pp. 1633–1638 (2016).
https://doi.org/10.1109/IJCNN.2016.7727393
17. Gelenbe, E.: Random neural networks with negative and positive signals and prod-
uct form solution. Neural Comput. 1(4), 502–510 (1989)
18. Gelenbe, E.: Learning in the recurrent random neural network. Neural Comput.
5(1), 154–164 (1993)
19. Gelenbe, E., Stafylopatis, A.: Global behavior of homogeneous random neural sys-
tems. Appl. Math. Model. 15(10), 534–541 (1991)
20. Gelenbe, E., Yin, Y.: Deep learning with dense random neural networks. In: Gruca,
A., Czachórski, T., Harezlak, K., Kozielski, S., Piotrowska, A. (eds.) ICMMI 2017.
AISC, vol. 659, pp. 3–18. Springer, Cham (2018). https://doi.org/10.1007/978-3-
319-67792-7 1
21. Goodin, D.: 100,000-strong Botnet built on router 0-day could strike at any time.
Ars Technica, December 2017. https://arstechnica.com/information-technology/
2017/12/100000-strong-botnet-built-on-router-0-day-could-strike-at-any-time/
22. Grenet, I., Yin, Y., Comet, J.-P., Gelenbe, E.: Machine learning to predict toxicity
of compounds. In: Kůrková, V., Manolopoulos, Y., Hammer, B., Iliadis, L., Maglo-
giannis, I. (eds.) ICANN 2018. LNCS, vol. 11139, pp. 335–345. Springer, Cham
(2018). https://doi.org/10.1007/978-3-030-01418-6 33
23. Hackett, R.: Why a hacker dumped code behind colossal website-trampling botnet,
October 2016
24. Htwe, C.S., Thant, Y.M., Thwin, M.M.S.: Botnets attack detection using machine
learning approach for IoT environment. J. Phys. Conf. Ser. 1646, 012101 (2020)
25. Javed, A., Larijani, H., Ahmadinia, A., Gibson, D.: Smart random neural network
controller for HVAC using cloud computing technology. IEEE Trans. Industr. Inf.
13, 351–360 (2017)
26. Kim, H., Gelenbe, E.: Anomaly detection in gene expression via stochastic models
of gene regulatory networks. In: BMC Genomics, vol. 10, pp. 1–10. BioMed Central
(2009)
27. Kumar, A., Lim, T.J.: Early detection of Mirai-like IoT bots in large-scale networks
through sub-sampled packet traffic analysis. In: Arai, K., Bhatia, R. (eds.) FICC
2019. LNNS, vol. 70, pp. 847–867. Springer, Cham (2020). https://doi.org/10.1007/
978-3-030-12385-7 58
28. Letteri, I., Del Rosso, M., Caianiello, P., Cassioli, D.: Performance of botnet detec-
tion by neural networks in software-defined networks. In: ITASEC (2018)
29. Liu, J., Liu, S., Zhang, S.: Detection of IoT botnet based on deep learning. In:
2019 Chinese Control Conference (CCC), pp. 8381–8385. IEEE (2019)
Botnet Attack Detection with Incremental Online Learning 59
30. McDermott, C.D., Majdani, F., Petrovski, A.V.: Botnet detection in the Internet
of Things using deep learning approaches. In: 2018 International Joint Conference
on Neural Networks (IJCNN), pp. 1–8. IEEE (2018)
31. Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A.: Kitsune: an ensemble of
autoencoders for online network intrusion detection. In: The Network and Dis-
tributed System Security Symposium (NDSS) 2018 (2018)
32. Mohamed, S., Rubino, G.: A study of real-time packet video quality using random
neural networks. IEEE Trans. Circuits Syst. Video Technol. 12(12), 1071–1083
(2002)
33. Nakip, M., Gelenbe, E.: MIRAI botnet attack detection with auto-associative dense
random neural network. In: IEEE Global Communications Conference (GLOBE-
COM), pp. 1–6 (2021)
34. Oke, G., Loukas, G., Gelenbe, E.: Detecting denial of service attacks with Bayesian
classifiers and the random neural network. In: 2007 IEEE International Fuzzy Sys-
tems Conference, pp. 1–6. IEEE (2007)
35. Parra, G.D.L.T., Rad, P., Choo, K.K.R., Beebe, N.: Detecting Internet of Things
attacks using distributed deep learning. J. Netw. Comput. Appl. 163, 102662
(2020)
36. Prokofiev, A.O., Smirnova, Y.S., Surov, V.A.: A method to detect internet of things
botnets. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and
Electronic Engineering (EIConRus), pp. 105–108. IEEE (2018)
37. Sakellari, G., Gelenbe, E.: Adaptive resilience of the cognitive packet network in
the presence of network worms. In: Proceedings of the NATO Symposium on C3I
for Crisis, Emergency and Consequence Management, pp. 11–12 (2009)
38. Sakellari, G., Gelenbe, E.: Demonstrating cognitive packet network resilience to
worm attacks. In: Proceedings of the 17th ACM Conference on Computer and
Communications Security, pp. 636–638 (2010)
39. Soe, Y.N., Feng, Y., Santosa, P.I., Hartanto, R., Sakurai, K.: Machine learning-
based IoT-botnet attack detection with sequential architecture. Sensors 20(16),
4372 (2020)
40. Sriram, S., Vinayakumar, R., Alazab, M., Soman, K.: Network flow based IoT bot-
net attack detection using deep learning. In: IEEE INFOCOM 2020-IEEE Con-
ference on Computer Communications Workshops (INFOCOM WKSHPS), pp.
189–194. IEEE (2020)
41. Statt, N.: How an army of vulnerable gadgets took down the web today,
October 2016. https://www.theverge.com/2016/10/21/13362354/dyn-dns-ddos-
attack-cause-outage-status-explained
42. Tuan, T.A., Long, H.V., Kumar, R., Priyadarshini, I., Son, N.T.K., et al.: Perfor-
mance evaluation of botnet DDOS attack detection using machine learning. Evol.
Intell., 1–12 (2019)
43. Tzagkarakis, C., Petroulakis, N., Ioannidis, S.: Botnet attack detection at the IoT
edge based on sparse representation. In: 2019 Global IoT Summit (GIoTS), pp.
1–6. IEEE (2019)
60 M. Nakip and E. Gelenbe
Open Access This chapter is licensed under the terms of the Creative Commons
Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/),
which permits use, sharing, adaptation, distribution and reproduction in any medium
or format, as long as you give appropriate credit to the original author(s) and the
source, provide a link to the Creative Commons license and indicate if changes were
made.
The images or other third party material in this chapter are included in the
chapter’s Creative Commons license, unless indicated otherwise in a credit line to the
material. If material is not included in the chapter’s Creative Commons license and
your intended use is not permitted by statutory regulation or exceeds the permitted
use, you will need to obtain permission directly from the copyright holder.
Optimizing Energy Usage for an Electric
Drone
1 Introduction
The recent advances in Unmanned Arial Vehicle (UAV) technologies (e.g., data
collection, data storage, data processing, data transmission, data security, deliv-
ery of loads) [32] have increased their adoption rate for military and commercial
applications. The fast adoption rate is partly driven by the decrease in the cost of
drones and granting licenses to commercial service providers and hobbyists. Some
of the industries that are being transformed through the application of drones
include agriculture, environmental management, supply chains, law enforcement,
surveillance, and photography [27–29]. At the beginning of the COVID-19 pan-
demic, drones were used for deliveries [11] and to enforce restriction rules (social
distancing, no mass gatherings in open public spaces) designed to slow down the
transmission of the virus.
Most drones are powered by batteries, making energy a critical resource that
must be optimised during the mission of the drone. One of the responsibility
c The Author(s) 2022
E. Gelenbe et al. (Eds.): EuroCybersec 2021, CCIS 1596, pp. 61–75, 2022.
https://doi.org/10.1007/978-3-031-09357-9_6
62 T. Czachórski et al.
of a drone pilot is to ensure that the drone returns with enough energy in the
battery that is sufficient for safe landing after its mission. If the drone’s bat-
tery is completely depleted during its mission, it will crash to the ground and
could damage the drone or result in a lawsuit if it damages properties or causes
harm to human life. Even the most experienced drone “ground pilots” sometimes
encounter drone crashes due to battery depletion. It is difficult to estimate how
much time is required to completely deplete the energy stored in the battery
during flight because a complex interaction of multiple factors influences the
battery energy depletion process in drones. These factors include weather (e.g.,
wind, temperature), drone speed, the ICT-related functionalities performed by
the drone, and the weight of the drone and the load carried by the drone (if
any). The energy stored in the battery could also be rapidly depleted due to
cyber attacks, which are designed to induce the ICT systems of the drone to
draw more energy from the drone unnecessarily. Some drones are configured to
return to the operator at predefined battery levels and to land at 15% battery
level automatically. Therefore, the drone operator should ensure the safe landing
of the drone while preventing any harm to human lives.
To adapt a UAV to perform its functionalities for a given application,
advanced on-board information and communication technology significantly
increase its energy needs during a mission [6] because of the computationally
intensive visual information processing before transmission or storage [9]. Using
multiple cooperating UAVs to conduct a mission [23] also increases the com-
putational burden and energy consumption of each UAV, in order to coordi-
nate movements and create a consistent view of the events or scenes that are
monitored [21], also leading to additional on-board energy consumption from
communications [22], and more on-board software [31]. On-board computing
and communication equipment cannot easily be put to sleep to save energy, to
avoid compromising the real-time needs which would be impaired by “wake-up”
delays [17].
Since careful usage of the UAVs energy budget is needed to achieve the best
possible mission output from the battery storage and possible other on-board
energy sources such as phtovoltaic and fuel cells, the optimization of the power
consumption of an UAV via its speed was studied in [5,7,34]. More broadly,
energy consumption is also a major concern in information processing systems
[31] and it has been analyzed via a variety of models with the purpose of under-
standing and minimizing the energy consumption in this area in general [16,22].
However, the energy used to perform functions such as encryption, com-
pression of multimedia data, and communications is significant. In addition,
the interplay of multiple factors influencing energy consumption implies that
the energy drawn from the battery is not deterministic. Any energy harvesting
mechanism that is used on-board is also influenced by the environment. There-
fore, both the energy generation and consumption processes on-board a UAV
need to be modelled as stochastic processes.
Markovian stochastic models have been applied to model the changes in
the energy content of a battery [4,10,18,19,24–26,33]. However, the Poisson
Drone Battery Optimization 63
assumption in the arrival of energy packets into the battery [15] may deviate
from reality. This is why we apply a diffusion model [12,14,20,30] where the
interarrival times of energy and the depletion times of the energy follow any
distribution, as proposed in earlier work on energy consumption and battery
models [1,2,13].
In this paper, we present an optimization model to minimize the energy
consumption of a low power drone, and hence maximize the time required to
completely drain the drone’s battery and ensure the safe landing of the drone.
The rest of the paper is organised as follows: Sect. 2 contains a diffusion model of
a drone’s battery, Sect. 3 contains the proposed optimization model, we present
some numerical examples in Sect. 4 and then conclude in Sect. 5.
1 (x − x0 − βt)2
f (x, t; x0 ) = √ exp( ) (2)
2Παt 2αt
and the incremental changes of X(t) at interval dt
64 T. Czachórski et al.
are normally distributed with the mean βdt and variance αdt.
If the value of the diffusion process represents the energy content of the
battery, then the life time the battery is corresponds to the time the diffusion
process needs to pass from the initial point x0 = B > 0, where B is the maximum
volume of the battery to x = 0. If we refer it to the UAV mission, it corresponds
to its maximal duration.
The distribution of the amount of energy present in the battery at time t is
given by the Eq. (1) with the absorbing barrier at x = 0, i.e. the process is ended
when it comes to zero. It corresponds to the condition
lim f (x, t; x0 ) = 0.
x→0
The problem of diffusion with absorbing barrier was studied e.g. in [8] and
the solution in Eq. (3) was obtained with the use of the method of images: on
may treat the barrier as a mirror, and the solution is a superposition of two
unrestricted processes, one of unit strength, starting at the origin, and the other
of strength − exp( 2βx0
α ) starting at x = 2x0 . It yields
1 (x − βt)2
f (x, t; x0 ) = √ exp(− )
2Παt 2αt
2βx0 (x − 2x0 − βt)2
− exp( − ) (3)
α 2αt
The pdf of the first passage time distribution for a diffusion process that
starts from the point x = x0 and is absorbed at x = 0 is
∞
∂f (x, t; x0 )
γx0 ,0 (t) = dx
0+ ∂t
∞
α ∂ 2 f (x, t; x0 ) ∂f (x, t; x0 )
= [ 2
−β ]dx
0+ 2 ∂x ∂x
α ∂f (x, t; x0 )
= lim [ − βf (x, t; x0 ]
x→0 2 ∂x
2
x0 (x0 −βt)
=√ e− 2αt , (4)
2Παt 3
Equation (4) presents a probability density function in case of β < 0, when
∞
probability that the process will reach the barrier equals 1, and 0 γx0 ,0 (t)dt =
1. Otherwise, for β > 1, the probability that the process ends at the barrier
is e−2βx0 /α and the conditional pdf is γx 0 ,0 (t) = γx0 ,0 (t)e2βx0 /α and γ̄x 0 ,0 (s) =
Drone Battery Optimization 65
γ̄x0 ,0 (s)e2βx0 /α . The same refers to the case β < 0 with the initial point x0 placed
left to the absorbing barrier.
From (4) or (5) we compute the moments of the time the battery is active
x0 |β|x20 + αx0
E[γx0 ,0 ] = , E[γx20 ,0 ] = .
|β| |β|3
In battery model, assuming x0 = B, the pdf given by Eq. (3) determines the
distribution of the energy still in the battery, and Eq. (4) the battery life time
distribution. Let us imagine that the units of energy are consumed with the
2
mean rate μ units and σB is the variance of time intervals between consumption
of energy units. It means that the number of consumed energy units in time Δ
2 3
has the distribution close to normal with mean μΔ and variance σB μ Δ and
the parameters of the diffusion process are β = −μ and α = σB μ = CB 2 3 2
μ,
2 2 2 2
where CB = σB μ is the squared coefficient of variation (variance/mean ) of
this distribution. A numerical example illustrating the pdf of the first passage
time distribution is given in Fig. 1.
Fig. 1. Probability density function γB,0 (t) of the first passage time from a full battery
at B = 50 to an empty battery at x = 0, i.e. the pdf of the battery life time distribution,
when the mean power consumption (energy consumption per time unit) is μ = 1. The
curves show the influence of the squared coefficient of variation of energy consumption
2 2 2 2
per time unit CB = σB μ on the life time. We see how the increase of CB increases
the variance of the battery life time distribution
66 T. Czachórski et al.
Fig. 2. The two phases of the UAV mission: in the first phase we assume that energy
is used for flying, for ground communications and data acquisition. The second phase
focuses on the landing phase, including any indispensable data acquisition and com-
munications for the return to the landing base.
The data recorded during the second phase may be accessed only after land-
ing when their validity has partially deteriorated. We assume in the reward func-
tion (7) that the value (relevance) of these data is decreasing following a certain
function Θ(·) with the time elapsed between their acquisition and availability.
The formal description of the problem is as follows.
Let B > 0 denotes the battery capacity before the UAV platform starts its
mission, and S be a minimum value of energy that the UAV battery must contain
when it lands after ending the mission, with B > S ≥ 0.
Let u, v be non-negative real numbers such that B ≥ u > v ≥ S.
Define the non-negative random variables τu and Yτu [u, v] such that the dif-
fusion process D ≡ {Xt , t ≥ 0} with X0 = B has the values
The first phase’s duration corresponds to the first passage time from B to b,
and the second phase is the first passage time from b to S.
Denote by μi the mean intensity of the power consumption per time unit at
phase i, i = 1, 2 (i.e. 1/μi is the mean consumption per time unit) and αi its
variance, representing diffusion parameters.
The densities of the duration of the phases are
B−b (B − b − μ1 t)2
f1 (t) = γB,b (t) = √ exp(− )
2Πα1 t3 2α1 t
b−S (b − S − μ2 t)2
f2 (t) = γb,S (t) = √ exp(− )
2Πα2 t3 2α2 t
and the mean time of the first phase is
∞
(B − b)
E1 = tf1 (t)dt = .
0 μ1
4 Numerical Example
We assume that the battery capacity is B = 50 energy units, safety margin is S =
5 energy units, and μ1 = 0.2, μ2 takes several values μ2 = 0.05, 0.1, 0.12, 0.15,
and α1 = α2 = 1.
A few numerical results giving C(b) for various parameters are displayed in
Figs. 3, 4, 5, 6, 7, 8 and 9. In general, they demonstrate the sensibility of C(b)
on its parameters and demonstrate the important differences introduced by the
deterioration function type. In some cases, the maximum of C(b) is inside the
interval [0, B − S], sometimes the function is monotonic, and the maximum is
on the edge of the interval. Maximum of C(b) at b = 50 means that only the
second phase is recommended; maximum at b = 5 means we should have only the
first phase. It depends on the ratio of the speed of energy consumption in both
phases and the function lowering the value of delayed results. A few numerical
results giving C(b) for various parameters are displayed in Figs. 3–9. In general,
they demonstrate the sensibility of C(b) on its parameters and demonstrate the
notable differences introduced by the deterioration function type. In some cases,
the maximum of C(b) is inside the interval [0, B − S], sometimes the function is
monotonic, and the maximum is on the edge of the interval. Maximum of C(b)
at b = 50 means that only the second phase is recommended; maximum at b = 5
means we should have only the first phase. It depends on the ratio of the speed
of energy consumption in both phases and the function lowering the value of
Fig. 3. The reward function C(b) defined by Eq. (9) and to be maximized; b is the
energy level switching the performance of UAV from normal mode to energy saving
mode, for exponential function Θ defining the decrease with time of the value of pre-
viously gathered data, see Eq. (10), with parameters μ2 = 0.1, a ∈ [1.8, 1.9]
Drone Battery Optimization 69
Fig. 4. The reward function C(b) defined by Eq. (9) and to be maximized; b is the
energy level switching the performance of UAV from normal mode to energy saving
mode, for exponential function Θ defining the decrease with time of the value of pre-
viously gathered data, see Eq. (10), with parameters μ2 = 0.1, a ∈ [1.0, 1.1]
Fig. 5. The reward function C(b) defined by Eq. (9) and to be maximized; b is the
energy level switching the performance of UAV from normal mode to energy saving
mode, for exponential function Θ defining the decrease with time of the value of pre-
viously gathered data, see Eq. (10), with parameters μ2 = 0.12, a ∈ [1.8, 1.9]
70 T. Czachórski et al.
Fig. 6. The reward function C(b) defined by Eq. (9) and to be maximized; b is the
energy level switching the performance of UAV from normal mode to energy saving
mode, for exponential function Θ defining the decrease with time of the value of pre-
viously gathered data, see Eq. (10), with parameters μ2 = 0.15, a ∈ [1.326, 1.336]
Fig. 7. The reward function C(b) defined by Eq. (9) and to be maximized; b is the
energy level switching the performance of UAV from normal mode to energy saving
mode, for exponential function Θ defining the decrease with time of the value of pre-
viously gathered data, see Eq. (10), with parameters μ2 = 0.05, a ∈ [1.8, 1.9]
Drone Battery Optimization 71
Fig. 8. The reward function C(b) defined by Eq. (9) and to be maximized; b is the
energy level switching the performance of UAV from normal mode to energy saving
mode, for linear function Θ defining the decrease with time of the value of previously
gathered data, see Eq. (11), with parameters μ2 = 0.10, a = 0.01, 0.1, 1000
Fig. 9. The reward function C(b) defined by Eq. (9) and to be maximized; b is the
energy level switching the performance of UAV from normal mode to energy saving
mode, for linear function Θ defining the decrease with time of the value of previously
gathered data, see Eq. (11), with parameters μ2 = 0.10, a ∈ [0.6, 0.9].
72 T. Czachórski et al.
Fig. 10. The value of b, i.e. the energy level switching the performance of UAV from
normal mode to energy saving mode, maximizing the reward function C(b) defined by
Eq. (9) plotted as a function of μ1 /μ2 , where μ1 is the speed of energy consumption in
normal mode and μ2 is the speed of energy consumption in energy saving mode, for
fixed μ1 = 0.2.
delayed results. We see it in a more general way in Fig. 10 where the values of b
giving the maximum of C are plotted as the function of μ1 /μ2 (μ1 = 0.2).
5 Conclusions
The duration of a done’s mission depends on the amount of energy required to
perform some manoeuvering actions (takeoff, level flight, hovering, and landing)
[3] and the energy required to power the ICT modules in the drone. The energy
required to drive the drone depends on the manoeuvering action taken, the
drone’s speed, payload, and the wind. Although the amount of energy required
to drive the drone is often far greater than the energy required to power the
ICT modules, the influence of ICT energy consumption on the duration of the
drone’s mission could become significant (especially for drones that draw small
amount of energy for flight but perform complex ICT functionalities). Also, cyber
security attacks designed to increase the amount of transmission or computations
executed by the drone and deplete its battery faster could rapidly deplete the
energy stored in the battery.
Since for some set of parameters, the reward function c(b) has a maximum for
b ∈ [0, B −S], the by devising strategies to reduce the energy consumption, when
the energy in the battery reaches a define threshold level b, increases the chances
that it will complete its mission and land safely. Therefore, the decision point
Drone Battery Optimization 73
to transition from the normal phase to the energy saving phase to be chosen in
such as way as to minimise the energy consumption and maximise the battery
lifetime.
References
1. Abdelrahman, O., Gelenbe, E.: A diffusion model for energy harvesting sensor
nodes. In: Proceedings of 24th IEEE International Symposium on Modeling, Anal-
ysis and Simulation of Computer and Telecommunication Systems (MASCOTS),
pp. 154–158. IEEE (2016)
2. Abdelrahman, O.H., Gelenbe, E.: Packet delay and energy consumption in non-
homogeneous networks. Comput. J. 55(8), 950–964 (2012)
3. Abeywickrama, H.V., Jayawickrama, B.A., He, Y., Dutkiewicz, E.: Comprehensive
energy consumption model for unmanned aerial vehicles, based on empirical studies
of battery performance. IEEE Access 6, 58383–58394 (2018)
4. Arabi, S., Sabir, E., Elbiaze, H., Sadik, M.: Data gathering and energy transfer
dilemma in UAV-assisted flying access network for IoT. Sensors 18(1519), 1–20
(2018)
5. Baek, D., Chen, Y., Poncino, M.: Battery-aware energy model of drone delivery
tasks. In: Proceedings of the International Symposium on Low Power Electronics
and Design, pp. 1–6. ACM (2018). https://doi.org/10.1145/3218603.3218614
6. Cai, L.X., Poor, H.V., Liu, Y., Luan, T.H., Shen, X., Mark, J.W.: Dimension-
ing network deployment and resource management in green mesh networks. IEEE
Wirel. Commun. 18, 58–65 (2011)
7. Chen, Y., Baek, D., Bocca, A., Macii, A., Macii, E., Poncino, M.: A case for a
battery-aware model of drone energy consumption. In: Proceedings of the 2018
IEEE International Telecommunications Energy Conference (INTELEC), pp. 1–8.
IEEE (2018). https://doi.org/10.1109/INTLEC.2018.8612333
8. Cox, R.P., Miller, H.D.: The Theory of Stochastic Processes. Chapman and Hall,
London (1965)
9. Cramer, C.E., Gelenbe, E.: Video quality and traffic QoS in learning-based sub-
sampled and receiver-interpolated video sequences. IEEE J. Sel. Areas Commun.
18(2), 150–167 (2000)
10. De Cuypere, E., De Turck, K., Fiems, D.: A queueing model of an energy harvest-
ing sensor node with data buffering. Telecommun. Syst. 67(2), 281–295 (2017).
https://doi.org/10.1007/s11235-017-0338-8
11. Euchi, J.: Do drones have a realistic place in a pandemic fight for delivering medical
supplies in healthcare systems problems? Chin. J. Aeronaut. 34, 182–190 (2020)
12. Gelenbe, E.: Probabilistic models of computer systems, Part II: diffusion approxi-
mations, waiting times and batch arrivals. Acta Informatica 12(4), 285–303 (1979)
13. Gelenbe, E.: A diffusion model for packet travel time in a random multihop
medium. ACM Trans. Sen. Netw. 3(2), 10-es (2007). https://doi.org/10.1145/
1240226.1240230
74 T. Czachórski et al.
14. Gelenbe, E.: Search in unknown random environments. Phys. Rev. E 82(6), 061112
(2010)
15. Gelenbe, E.: Energy packet networks: ICT based energy allocation and storage. In:
Rodrigues, J.J.P.C., Zhou, L., Chen, M., Kailas, A. (eds.) GreeNets 2011. LNICST,
vol. 51, pp. 186–195. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-
642-33368-2 16
16. Gelenbe, E.: Synchronising energy harvesting and data packets in a wireless sensor.
Energies 8(1), 356–369 (2015)
17. Gelenbe, E., Iasnogorodski, R.: A queue with server of walking type (autonomous
service). In: Annales de l’IHP Probabilités et statistiques, vol. 16, pp. 63–73 (1980)
18. Gelenbe, E., Kadioglu, Y.M.: Battery attacks on sensors. In: International Sympo-
sium on Computer and Information Sciences, Security Workshop (2018)
19. Gelenbe, E., Kadioglu, Y.M.: Energy life-time of wireless nodes with network
attacks and mitigation. In: 2018 IEEE International Conference on Communica-
tions Workshops (ICC Workshops), pp. 1–6. IEEE (2018)
20. Gelenbe, E., Muntz, R.R.: Probabilistic models of computer systems. Part I: exact
results. Acta Informatica 7(1), 35–60 (1976)
21. Gelenbe, E., Sevcik, K.: Analysis of update synchronization for multiple copy data-
bases. In: 3rd Berkeley Workshop on Distributed Data and Computer Networks,
pp. 69–90 (1978)
22. Gelenbe, E., Silvestri, S.: Reducing power consumption in wired networks. In: 2009
24th International Symposium on Computer and Information Sciences, pp. 292–
297. IEEE (2009)
23. Hu, J., Lanzon, A.: An innovative tri-rotor drone and associated distributed
aerial drone swarm control. Rob. Auton. Syst. 103, 162–174 (2018) https://doi.
org/10.1016/j.robot.2018.02.019. https://www.sciencedirect.com/science/article/
pii/S0921889017308163
24. Kadioglu, Y.M., Gelenbe, E.: Packet transmission with k energy packets in an
energy harvesting sensor. In: Proceedings of the 2nd International Workshop on
Energy-Aware Simulation, pp. 1–6 (2016)
25. Kadioglu, Y.M., Gelenbe, E.: Wireless sensor with data and energy packets. In:
2017 IEEE International Conference on Communications Workshops (ICC Work-
shops), pp. 564–569. IEEE (2017)
26. Kadioglu, Y.M., Gelenbe, E.: Product-form solution for cascade networks with
intermittent energy. IEEE Syst. J. 13(1), 918–927 (2018)
27. Koparan, C., Koc, A.B., Privette, C.V., Sawyer, C.B.: In situ water quality mea-
surements using an unmanned aerial vehicle (UAV) system. Water 10(3), 264
(2018). https://doi.org/10.3390/w10030264
28. Koparan, C., Koc, A.B., Privette, C.V., Sawyer, C.B.: Autonomous in situ mea-
surements of noncontaminant water quality indicators and sample collection with
a UAV. Water 11(3), 604 (2019). https://doi.org/10.3390/w11030604
29. Koparan, C., Koc, A.B., Privette, C.V., Sawyer, C.B.: Adaptive water sam-
pling device for aerial robots. Drones 4(1), 5 (2020). https://doi.org/10.3390/
drones4010005
30. Marin, G.A., Mang, X., Gelenbe, E., Onvural, R.O.: Statistical call admission
control. IEEE Commun. Lett. 222(824) (2001)
31. Pernici, B., Aiello, M., Vom Brocke, J., Donnellan, B., Gelenbe, E., Kretsis, M.:
What is can do for environmental sustainability: a report from CAISE’11 panel on
green and sustainable is. Commun. Assoc. Inf. Syst. 30(1), 18 (2012)
Drone Battery Optimization 75
32. Sharma, A., Basnayaka, C.M., Jayakody, D.N.K.: Communication and networking
technologies for UAVs: a survey. J. Netw. Comput. Appl. 168, 102739 (2020).
https://doi.org/10.1016/j.jnca.2020.102739.S2CID221507920
33. Sharma, V., Rajesh, R.: Queuing theoretic and information theoretic capacity of
energy harvesting sensor nodes. In: Proceedings of 2011 Conference Record of
the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILO-
MAR), pp. 383–388. IEEE, Pacific Grove (2011). https://doi.org/10.1109/ACSSC.
2011.6190024
34. Thibbotuwawa, A., Nielsen, P., Zbigniew, B., Bocewicz, G.: Energy consumption
in unmanned aerial vehicles: a review of energy consumption models and their
relation to the UAV routing. In: Światek,
J., Borzemski, L., Wilimowska, Z. (eds.)
ISAT 2018. AISC, vol. 853, pp. 173–184. Springer, Cham (2019). https://doi.org/
10.1007/978-3-319-99996-8 16
Open Access This chapter is licensed under the terms of the Creative Commons
Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/),
which permits use, sharing, adaptation, distribution and reproduction in any medium
or format, as long as you give appropriate credit to the original author(s) and the
source, provide a link to the Creative Commons license and indicate if changes were
made.
The images or other third party material in this chapter are included in the
chapter’s Creative Commons license, unless indicated otherwise in a credit line to the
material. If material is not included in the chapter’s Creative Commons license and
your intended use is not permitted by statutory regulation or exceeds the permitted
use, you will need to obtain permission directly from the copyright holder.
T-RAID: TEE-based Remote Attestation
for IoT Devices
1 Introduction
The presented work was carried out within the SETIT Project (2018-1.2.1-NKP-2018-
00004), which has been implemented with the support provided from the National
Research, Development and Innovation Fund of Hungary, financed under the 2018-
1.2.1-NKP funding scheme.
c The Author(s) 2022
E. Gelenbe et al. (Eds.): EuroCybersec 2021, CCIS 1596, pp. 76–88, 2022.
https://doi.org/10.1007/978-3-031-09357-9_7
T-RAID: TEE-based Remote Attestation for IoT Devices 77
bodies are also making steps1 to ensure that those solutions, standards, and
guidelines are indeed used and followed in practice.
One particular security issue is that IoT devices can be infected by mal-
ware [2,4], which can alter their behavior, endangering the integrity and the
availability of IoT systems, and undermining the trustworthiness of the smart
applications based on them. Hence, system operators need malware detection
solutions adapted to the constraints of IoT systems [20]. In addition, they also
need scalable methods to reliably verify malware freedom of IoT devices in their
systems. In this paper, we address this problem by proposing a remote attes-
tation scheme for IoT devices that takes advantage of the security guarantees
provided by a Trusted Execution Environment (TEE) running on the device.
Attestation is meant to be a process whereby a trusted verifier reliably checks
the state of an untrusted prover, and remote attestation is when this verification
is done remotely via a network. In our case, the prover is (a process running
on) an IoT device, and it is untrusted, because the device may be compromised
by a malware. The verifier is a trusted remote server operated by the system
operator. We use remote attestation to prove the malware-free state of the IoT
devices to the system operator. Doing this remotely means that the operator
does not need physical access to the devices, allowing for large scale, automated
verification of all devices in an entire IoT system.
The structure of the paper is the following: We start by giving a brief overview
on different approaches to remote attestation in Sect. 2, serving as a review of
relevant related work and also providing technical background for our proposal.
Next, we introduce T-RAID, our TEE-based solution to secure remote attesta-
tion for IoT devices, by first providing a general overview of it in Sect. 3, and
then presenting its protocols in more details in Sects. 4 and 5. Finally, we eval-
uate T-RAID and discuss its properties in Sect. 6, and conclude the paper in
Sect. 7.
1
The California IoT cybersecurity law SB-327 became effective Jan 1, 2020.
2
https://trustedcomputinggroup.org/work-groups/trusted-platform-module/ Last
visited: Sep 12, 2021.
78 R. Nagy et al.
3. Read-only-memory (ROM);
4. Instructions for enabling and atomically disabling interrupts;
5. Custom hardware to enforce that the attestation (checksum) routine can only
be invoked by running its first instruction;
6. Secure reset mechanism.
1. A privileged process handles the secret key and enforces proper access control
to it;
2. Reliable and secure memory erasure is required by [9] to ensure that no infor-
mation about the secret key is leaked after using it in the checksum authenti-
cation. However, the strict memory separation of the seL4 microkernel ensures
the same property;
3. ROM is required by [9] to make sure that the checksum routine cannot be
modified. Isolated process memory and code integrity checks in seL4 can
provide the same property;
4. Prioritized interrupt handling of the microkernel ensures uninterruptable exe-
cution of the checksum code that runs with the highest possible priority;
5. Controlled invocation is enforced by operating system support;
6. Secure reset is initiated in [9] whenever an attempt is detected to execute the
checksum function from the middle of its code. This is not needed if controlled
invocation is enforced.
The authors of [5] claim that using seL4 imposes fewer hardware requirements
on the underlying microprocessor, and building upon a formally verified software
component increases confidence in security of the overall solution.
3 Overview of T-RAID
Our main idea is to follow the approach of HYDRA [5], but instead of a secure
microkernel, we rely on a Trusted Execution Environment (TEE). A TEE pro-
vides an isolated environment for trusted processes where they can execute with-
out being interfered by normal, potentially compromised processes. In addition,
a TEE also provides secure storage for secrets that is not accessible from out-
side the TEE. Thus, checking malware-freedom can be implemented in a trusted
process running in the TEE and the key used for authenticating the result of
the check can be stored in TEE-protected secure memory.
We note that embedded devices equipped with ARM or similarly power-
ful processors are typically capable of hosting such a TEE. We also note that
TEEs usually rely on hardware support to provide their security guarantees.
80 R. Nagy et al.
3
https://developer.arm.com/ip-products/security-ip/trustzone Last visited: Sep 12,
2021.
T-RAID: TEE-based Remote Attestation for IoT Devices 81
4
https://www.qemu.org/ Last visited: Sep 12, 2021.
5
https://www.op-tee.org/ Last visited: Sep 12, 2021.
6
https://github.com/ARMmbed/mbedtls Last visited: Sep 12, 2021.
82 R. Nagy et al.
and HMAC with SHA-256 as the hash function to authenticate (encrypted and
numbered) messages.
The attestation protocol consists of the exchange of a single attestation
request and response. The secure channel guarantees the freshness, integrity,
authenticity, and confidentiality of these messages, and most importantly, the
Prover’s response. The request of the Verifier may contain multiple challenges,
each triggering the call of a specific integrity check function of the Rootkit Detec-
tor TA. The response of the Prover contains the results of the integrity check
functions called. The integrity check functions may return a status code (e.g., 0
for a successful check and 1 for a failure), a hash value (e.g., hash of the REE OS
kernel’s text segment or recursive hash of some part of the REE file system), or
a list of process IDs and process names extracted from various OS kernel data
structures (e.g., the process list, the process tree, and the run queues).
The Verifier must be able to verify the results of the checks received in the
response of the Prover. For this, we assume that the Verifier stores the hash
values expected in correct responses. In case of file system checks, the computed
hash value depends on what parts of the file system are actually hashed, there-
fore, we assume that the Verifier has a mirror of the file system of the IoT device
and performs the same hash computation on this mirror to obtain the expected
correct hash value. Finally, if the response contains a list of process names, the
Verifier can compare that to a pre-defined white list of process names allowed
on the IoT device.
5 Integrity Checks
Our integrity checks perform rootkit detection on the IoT device; hence, their
successful execution is an assurance of malware freedom. The software compo-
nent implementing the checks is capable of accessing components of the REE,
such as the memory and the file system. The latter is not supported by OP-
TEE, so we had to extend and slightly modify the OP-TEE kernel and the
tee-supplicant daemon (a component of OP-TEE running in the REE). More
details on this can be found in our earlier paper [15]. Using the aforementioned
capabilities, we implemented numerous checks, each aiming at detecting a dif-
ferent rootkit technique or ensuring the integrity of REE components that our
checks rely upon. In this section, we present the integrity checks that the Prover
TA can invoke.
The most important functionality of any kernel is to manage and schedule pro-
cesses. In order to achieve these goals, the Linux kernel uses so called tasks. A
task is approximately equivalent to a thread. Single-threaded processes consist of
one task, while multi-threaded processes have one task for each thread, sharing
the same address space. These tasks are organized into multiple dynamic data
structures. Here we present the ones used by the 5.1 version of the Linux kernel.
T-RAID: TEE-based Remote Attestation for IoT Devices 83
Our solution uses these data structures to enumerate processes on the system.
Currently, we can list process IDs and names of the processes.
The oldest and simplest data structure in the kernel holding process-related
information is the so called process list. This is a doubly-linked circular list of
task structures; each task has a next and prev pointer, pointing to the next
and previous tasks in the list, respectively. Using these pointers, we can easily
traverse the whole list, starting from the init task; this is the first kernel thread,
started at boot.
Another data structure is the process tree. When a process starts another
process, it becomes its child, while the new process refers to the original one as
its parent. Via this relation, processes form a tree, whose root is the init task.
The Linux kernel uses lists to implement this tree. Each process has a pointer to
its first and last child, while the children are linked into a doubly-linked circular
list. We traverse this data structure recursively in a depth-first manner.
Pid namespaces are used by the kernel as an isolation mechanism. There is an
initial pid namespace containing every process. These namespaces use radix trees
to account the process IDs in use. These radix trees store pid structures with
pointers to the tasks using the specific ID. To traverse the initial pid namespace,
we implemented a function capable of finding the corresponding pid structure
in the tree for a given ID.
Finally, we extract process related information from runqueues. These queues
are used by the scheduler, and unlike the previous data structures, not every
process is accessible from these, only the runnable ones. These are the processes
not waiting for anything and not stopped, they can continue their execution,
if assigned to a CPU core. Each core has its own runqueue, and runqueues
implement data structures for every scheduling policy. For Linux 5.1, this means
3 subschedulers, using lists, red-black trees and nested red-black trees.
We check the integrity of two memory areas of the Linux kernel that are fre-
quently targeted by rootkits: the system call table and the text segment of the
kernel itself. System calls are the interface the kernel offers to user-space pro-
cesses. When processes need to perform actions that are the kernel’s responsi-
bility, they invoke the appropriate system call. Such actions include interactions
with files, network sockets, etc. The kernel uses an array of function pointers,
known as the system call table. Rootkits often replace pointers in this array and
re-implement certain system calls. Therefore, we compute the hash of the system
call table using the SHA-256 hash algorithm.
Another common and similar rootkit technique is inline hooking [11]. In this
case, the attacker modifies the code of an existing function, usually by rewriting
the first few instructions to a jump such that during execution, the code jumps
to the desired replacement. To detect inline hooks, we compute the SHA-256
hash of the entire text segment of the kernel, which contains all the code of the
Linux kernel.
84 R. Nagy et al.
By-default OP-TEE does not provide access to the file systems of the REE,
however, it is capable of using it for Secure Storage. The API written for this
does not aim to be a general purpose API for file access, so we had to extend it
and apply some patches in order to be able to access arbitrary files. Again, for
implementation details, the reader is referred to [15].
Our implementation provides a simple interface which can be used to check
the integrity of any part of the REE file systems. This can be done invoking two
functions, namely hash file and hash dir. The former one expects a filename
as parameter, and an output buffer, where the computed hash of the file will be
stored. If the file exists, it opens it, reads it by 4096-byte-long blocks, and feeds
these blocks into a hash context. After reaching the end of the file, the SHA-256
hash is written to the output buffer. The latter one expects more parameters:
a directory name, an output buffer, a boolean indicating if it should hash the
directory recursively, and an optional blacklist. In case of non-recursive hash-
ing, all subdirectories will be ignored. If a blacklist is supplied, all elements are
checked against it, thereby the hashing files or directories with volatile content
can be avoided. The contents of directories are sorted alphabetically.
We also implemented checks targeting the network stack of the kernel. In this
subsystem, rootkits typically implement two kind of attacks: hiding open con-
nections and implementing “magic packet” functionality. In the case of rootkits,
this means performing a predefined action, when the infected system receives
a specially crafted network packet. So far, we identified one way to hide open
sockets and three mechanisms what can be abused by attackers to implement
magic packets. For these checks to work properly, we assume that every necessary
driver is compiled into the kernel.
The most common way to implement magic packets is using the Netfilter
subsystem, the backend of Linux firewall solutions. Netfilter stores firewall rules
in so-called chains. Each supported protocol (like IPv4, IPv6, ARP, etc.) has five
chains, one for each stage of packet processing. Each chain acts as an arraylist,
containing Netfilter hooks, storing function pointers. When a packet is checked
against a specific chain, all hooks in the chain are invoked, and the packet is
accepted only, if all hooks accept it. These hook functions, however, can have side
effects, so an attacker can implement a firewall rule which executes his payload,
if certain conditions are met. Our solution traverses all the hooks of every chain,
and if any of the function pointers store a value that is not pointing into the
text segment of the kernel, it is considered to be a sign of rootkit infection.
We also check structures called icmp control. The kernel uses an array of
these to determine what handler function should be executed for different kinds
of ICMP packets. The packet’s type field is used to index this array. We check
all function pointers the same way as we did in the case of Netfilter hooks.
T-RAID: TEE-based Remote Attestation for IoT Devices 85
The kernel uses net protocol structures to register handler functions for
different protocols, like UDP, TCP and IGMP. These structures contain handler,
error handler and demultiplexer functions, which can be hooked and used to
implement magic packet functionality. We perform the same integrity check on
these pointers as described above.
Finally, we implemented a check targeting hidden network connections. Files
in the /proc/net directory give information about open connections. The con-
tent of these files is generated on-demand using seq ops. These objects store
function pointers to iterate a specific data structure and display information
about its elements. Rootkits often target these to hide open connections, there-
fore we check these function pointers the same way as we checked the others.
using OP-TEE as the TEE, one has to be aware that property 4 may not hold.
Disabling the file system related integrity checks would make property 4 satisfied,
but then malware could clear itself from memory and hide its components in
persistent storage, from which it may be potentially reloaded later on.
The second weakness is that on multi-core processors, such as most ARM pro-
cessors, other, potentially untrusted processes may run in parallel to our TAs on
different cores. Those processes may interfer with the execution of our integrity
checks. For instance, a malware running on a different core could remove a hook
from the system call table before it is hashed by our Rootkit Detector TA and
put the hook back once the hashing is completed. The only reliable countermea-
sure to this is disabling all but one cores during the entire attestation process.
At the time of this writing, we are experimenting with the implementation of
this idea.
7 Conclusions
In this paper, we proposed T-RAID, a TEE-based remote attestation scheme
for IoT devices. T-RAID follows the hybrid approach to remote attestation: it
is mostly based on software and uses only limited hardware support. Notably,
T-RAID relies only on the hardware support provided for the TEE itself by
the processor and its memory management unit. Considering that TEEs are
already widely supported by certain classes of embedded devices, T-RAID is an
affordable solution for IoT systems built from such devices.
We showed that T-RAID has similar security properties to those of HYDRA,
a secure remote attestation scheme proposed in the past. T-RAID, however, per-
forms more complex integrity checks on the device aiming at detecting rootkits
both in memory and in persistent storage. While our integrity checks effectively
detect malware, unfortunately, our current prototype implementation of T-RAID
has some weaknesses stemming from limitations of OP-TEE, the TEE implemen-
tation that we use, and the inherent parallelism provided by multi-core processor
architectures.
References
1. Alrawi, O., Lever, C., Antonakakis, M., Monrose, F.: SoK: security evaluation of
home-based IoT deployments. In: IEEE Symposium on Security and Privacy, pp.
1362–1380 (2019). https://doi.org/10.1109/SP.2019.00013
2. Antonakakis, M., et al.: Understanding the Mirai botnet. In: USENIX Security
Symposium, pp. 1093–1110. USENIX Association, August 2017
3. Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of
software-based attestation of embedded devices. In: ACM Conference on Com-
puter and Communications Security (CCS), pp. 400–409 (2009). https://doi.org/
10.1145/1653662.1653711
4. Cozzi, E., Vervier, P.A., Dell’Amico, M., Shen, Y., Bigle, L., Balzarotti, D.: The
tangled genealogy of IoT malware. In: Annual Computer Security Applications
Conference (ACSAC) (2020)
T-RAID: TEE-based Remote Attestation for IoT Devices 87
5. Eldefrawy, K., Rattanavipanon, N., Tsudik, G.: HYDRA: hybrid design for remote
attestation (using a formally verified microkernel). In: ACM Conference on Security
and Privacy in Wireless and Mobile Networks (WiSec), pp. 99–110 (2017). https://
doi.org/10.1145/3098243.3098261
6. Eldefrawy, K., Tsudik, G., Francillon, A., Perito, D.: SMART: Secure and minimal
architecture for (establishing a dynamic) root of trust. In: Network and Distributed
Systems Symposium (NDSS) (2012)
7. ENISA: Guidelines for securing the Internet of Things. ENISA study, November
2020
8. ETSI: CYBER; Cyber security for consumer Internet of Things: Baseline require-
ments. ETSI TS 103 645 v2.1.2, June 2020
9. Francillon, A., Nguyen, Q., Rasmussen, K.B., Tsudik, G.: A minimalist approach
to remote attestation. In: Conference on Design, Automation & Test in Europe
(DATE), pp. 1–6 (2014)
10. Global Platform: Security evaluation standard for IoT platforms v1.1 (SESIP).
Global Platform Standard, June 2021
11. Gu, J., Xian, M., Chen, T., Du, R.: A Linux rootkit improvement based on inline
hook. In: Proceedings of the 2nd International Conference on Advances in Mechan-
ical Engineering and Industrial Informatics, pp. 793–798. Atlantis Press (2016).
https://doi.org/10.2991/ameii-16.2016.155
12. Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on
IoT security: application areas, security threats, and solution architectures. IEEE
Access 7, 82721–82743 (2019). https://doi.org/10.1109/ACCESS.2019.2924045
13. Kumar Jain, V., Gajrani, J.: IoT security: a survey of issues, attacks and defences.
In: Sharma, H., Saraswat, M., Kumar, S., Bansal, J.C. (eds.) CIS 2020. LNDECT,
vol. 61, pp. 219–236. Springer, Singapore (2021). https://doi.org/10.1007/978-981-
33-4582-9 18
14. Li, Y., Cheng, Y., Gligor, V., Perrig, A.: Establishing software-only root of trust
on embedded systems: facts and fiction. In: International Workshop on Security
Protocols, pp. 50–68 (2015). https://doi.org/10.1007/978-3-319-26096-9 7
15. Nagy, R., Németh, K., Papp, D., Buttyán, L.: Rootkit detection on embedded IoT
devices. Acta Cybernetica, August 2021. https://doi.org/10.14232/actacyb.288834
16. NIST: Considerations for managing Internet of Things (IoT) cybersecurity and
privacy risks. NISTIR 8228, June 2019
17. NIST: Baseline security criteria for consumer IoT devices. NIST draft white paper,
August 2021
18. Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: SWATT: software-based attes-
tation for embedded devices. In: IEEE Symposium on Security and Privacy, pp.
272–282 (2004). https://doi.org/10.1109/SECPRI.2004.1301329
19. Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer:
verifying code integrity and enforcing untampered code execution on legacy sys-
tems. ACM SIGOPS Oper. Syst. Rev. 35(5), 1–16 (2005). https://doi.org/10.1145/
1095809.1095812
20. Tamás, C., Papp, D., Buttyán, L.: SIMBIoTA: similarity-based malware detection
on IoT devices. In: Proceedings of the 6th International Conference on Internet of
Things, Big Data and Security - IoTBDS, pp. 58–69. SciTePress (2021). https://
doi.org/10.5220/0010441500580069
88 R. Nagy et al.
Open Access This chapter is licensed under the terms of the Creative Commons
Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/),
which permits use, sharing, adaptation, distribution and reproduction in any medium
or format, as long as you give appropriate credit to the original author(s) and the
source, provide a link to the Creative Commons license and indicate if changes were
made.
The images or other third party material in this chapter are included in the
chapter’s Creative Commons license, unless indicated otherwise in a credit line to the
material. If material is not included in the chapter’s Creative Commons license and
your intended use is not permitted by statutory regulation or exceeds the permitted
use, you will need to obtain permission directly from the copyright holder.
Secure Authentication for Everyone!
Enabling 2nd-Factor Authentication
Under Real-World Constraints
1 Introduction
The number of leaked credentials caused by data breach attacks has been
increased tremendously over the past years [16,20,23]. According to our statis-
tics, there is a steady increase in the number of breaches since 2005 and an
increase of 45% just in the year 2017 [15]. Moreover, many users use the same or
a similar password for every service, hence more than just the targeted service
is under threat [16]. To tackle this issue, companies and researchers are trying
their best to secure user logins against password stuffing attacks.
c The Author(s) 2022
E. Gelenbe et al. (Eds.): EuroCybersec 2021, CCIS 1596, pp. 89–101, 2022.
https://doi.org/10.1007/978-3-031-09357-9_8
90 J. Fietkau et al.
– We discuss the issue of data breaches and how they are threatening all online
services, not only those that have been attacked recently.
– We compare the current approaches for 2nd-factor authentication, discuss
their limitations and identify the main reasons for the lack of adoption.
– We design and implement a mobile authenticator that combines the most
recent advancements of the FIDO authentication standard and Android Secu-
rity, to enable secure authentication for everyone.
– To simplify the overall process, we integrate our solution into the Avira Pass-
word Manager, which is freely available via the following link:
https://www.avira.com/en/password-manager
2 Background
This section provides the necessary background knowledge about password secu-
rity, data breaches, authentication, and security keys.
Secure Authentication for Everyone 91
2.3 FIDO
The Fast IDentity Online (FIDO) Alliance came into existence to promote new
authentication standards and reduce the use of passwords [21]. Because this is
an issue of many, the open industry association is supported by big companies,
e.g., Amazon, Facebook, Google, Microsoft, and American Express [9]. FIDO
covers a large number of technologies, including security tokens, smart cards,
NFC, communication standards, and also biometrics such as fingerprint, iris,
92 J. Fietkau et al.
voice, and facial recognition. The core of FIDO mainly establishes the following
two processes:
The most relevant parts of the FIDO specification for this work are FIDO
UAF, U2F, and CTAP [11]. FIDO Universal 2nd-factor (U2F) specifies a uni-
versal 2nd-factor experience. The Universal Authentication Framework (UAF)
defines the use of native device features like biometric authentication, e.g., finger-
print or face recognition [12]. FIDOs Client To Authenticator Protocol (CTAP)
describes how the OS and a browser, can establish a connection with external
devices via Bluetooth (BLE), Near Field Communication (NFC) or USB [10].
Fig. 2. More accounts, more breaches: The probability of owning a account that is part
of a data breach increases with the number of accounts the user owns [7].
an estimate of 140 million new email addresses and 10 million new passwords
from unknown sources [8]. In fact, for many breaches, it’s not clear where data
originates, because data get hacked, scrapped, and dropped in so many ways.
Sometimes hackers are selling label the data with the name of the affected com-
pany, sometimes the data is assembled from various data breaches, and in other
cases, the data is dropped without any further means. It’s also not clear, why
all the data get hacked in the first place because companies are often not able
to detect the breaches and avoid speaking about it. But we know, there are a
lot of bad security habits, such as weak and recycled passwords across various
accounts, badly maintained software that can be exploited, and poorly secured
databases. For example, leaked passwords are often available in plaintext rather
than in their hashed version [23]. One reason might be, that passwords are not
handled properly in the first place (hashing and salting passwords before they get
stored in a database). Another reason is, that hackers might be able to decrypt
them because weak or broken hashing algorithms have been used.
Whatever the reasons are, we often don’t know, but we can measure its
impact. As shown in Fig. 2, the more accounts a person owns, the higher the
probability that they will be hacked. This is the result of a study conducted
by Avira in early 2019 [6]. The data tell us, that users with 6 to 10 accounts
have a 15% chance of a breach. This probability jumps up to 35% when the
number of accounts is 100+. The main reason behind this increase seems to be
the heavy reuse of account names and passwords across various online services.
To follow up on this, Avira conducted an online survey with 2519 respondents
aged between 20–65 years in the US [6]. A key insight from this study is, that
users are more interested in simplifying authentication rather than just securing
it. When they have been asked for reasons to adopt password managers, 48% of
the participants said that they would adopt password managers, if they can log
in more quickly and easily. A few less (44% of the participants) have indicated
that they would use it to protect their passwords against hackers. Nevertheless,
another study from 2019 by Pearman et al., tells us that most people don’t want
to pay for a password manager solution and prefer to use a free version. Just a
few people said they might be willing to pay for this, and only if the tool was
very secure and very easy to use [22].
94 J. Fietkau et al.
The setup comprises certain devices, owned and managed by two parties: a user
owning a client device and a smartphone with the mobile authenticator installed.
On the other side, a server, owned by the service that supports FIDO compliant
authentication. This service can be anything from cloud services, social networks,
or just a simple mail service. The owner of the service needs to implement FIDO
compliant authentication. Therefore, he can use several FIDO certified third-
party products, e.g. WebAuthn Awesome, that need to be integrated into the
provided service [2]. While it requires some effort, it’s probably one of the best
ways to protect the service and its customers.
The communication between the components, shown in Fig. 3, can be estab-
lished as follows. The client device has a secure HTTPS connection to com-
municate with the service he wants to authenticate with. In addition, another
secure connection via BLE, NFC, or USB is created connection with the smart-
phone. The smartphone application, storing the private keys within the secure
key storage, can not directly access the keys, instead, it needs to authenticate
and communicate with the Trusted Execution Environment to execute crypto-
graphic operations that use the key. When the components have been assembled
in the right way, the registration and authentication procedures are ready to go.
Both registration and authentication, require 4 steps, as shown in Fig. 1. To
implement these operations, we build four Java modules i) a module to establish
a Bluetooth connection; ii) a module to encode, send and receive FIDO messages;
iii) a module to use the cryptographic operations of the secure TEE; iv) a module
to protect the access of the authenticator using biometric authentication. Using
these modules we have implemented two generic functions that can perform
FIDO registration and authentication procedures. Some of the implementation
details can be described by stepping through the typical use cases. Please note,
that we discuss the implementation for the smartphone only because the user
device and web service are not part of our work.
Fig. 4. Message flow between authenticator, client device and the service [10]
we have used the ECPublicKey class to generate a public and private key
and to directly stored the private key within the Android Keystore. During
registration, the public key is transferred to the service using the message
API. Every registration will start another key setup and repeat the previously
described steps.
– Authentication: After registration, the user will be asked to provide the
2nd-factor on every new login attempt. At this point, the authenticator needs
to be unlocked using the local authentication feature. The authenticator sends
the username and implicitly requests a challenge from the service with the
message API. The message flow of this procedure is shown in Fig. 4. After
receiving the challenge, the authenticator needs to look up the private key
in the key manager of the Android Keystore. To sign the message within the
Android Keystore we used the KeyStore signMessage() method. Afterward,
the signature is passed to the app and the message API is used to transfer
the signature and some additional metadata to the service. A final response
will indicate if the access is granted or not.
Fig. 5. Integration of the mobile authenticator into the avira password manager
of apps used which improves user confidence and makes it more quick and easy
to use. Only a single app needs to be installed and managed to grant access to
your credentials and to unlock the 2nd-factor capabilities. Furthermore, only a
single authentication, using finger or face recognition, is required to unlock all
the secrets and access the mobile authentication functionality.
For these reasons, we integrated the mobile authenticator into the Avira
Password Manager, as shown in Fig. 5. The mobile authenticator can be enabled
within the settings of the PWM. Afterward, the authenticator is active in the
background and will communicate with the user via different prompts.
To implement the mobile authenticator we used Java and Kotlin, the stan-
dard programming language for Android development. Furthermore, we have
used the following libraries to build our solution. Jackson data-bind library is
used for data binding, which is used to convert JSON to and from plain java
objects. For the UI integration of the Authenticator, we used the Android Mate-
rial Design library, which provides some easy-to-use front-end widgets. Google
guava API providing an advanced Java collection framework and offers a lot of
handy features for functional programming, range objects, and hashing.
5 Discussion
In this section, we want to have a short discussion on the security of the imple-
mented authenticator. Furthermore, we want to discuss how the authenticator
compares to one-time passwords (OTP), which are often used to implement 2nd-
factor authentication while avoiding the various drawbacks of hardware tokens.
a lost or broken OTP token can be easily replaced with just another one that
only needs to be synchronized with a service [14]. A lost authenticator instead,
will be a real disaster. Once the authenticator is lost or broken, the keys can
never be extracted or recovered. When changing the smartphone device, it is
necessary to deregister or deactivate the authenticator for each service on its
own. A centralized deregistration of all authenticator tokens managed by the
app could be implemented within a PWM solution. This could help a user to
disable all 2nd-factor tokens managed by the current phone before deactivating
or reselling it. When activating a new phone, the user can start again to register
a new authenticator with the services, without the issue of being logged out.
6 Conclusion
In the following, we will summarize our work and discuss the milestones we have
achieved. The goal of our work was to investigate how the most recent advance-
ments in FIDO specifications and smartphone security can be leveraged to build
a secure mobile authenticator on the smartphone. To motivate our work, we dis-
cussed the various issues related to data breaches and presented some insights
and statistics that have been collected from Avira’s password manager. The data
shows clearly that 2nd-factor authentication is a strong requirement nowadays.
Hardware tokens are one way to implement this and they can prevent creden-
tial stuffing and brute-force attacks that can be affiliated to the rising number
of leaked credentials and data beaches [23]. While hardware tokens are a great
solution for many, they face some major issues when talking about worldwide
adoption. Hence, we build a mobile authenticator that connects the most recent
advancements in authentication standards and smartphone security, to enable
secure 2nd-factor authentication without additional hardware cost. We discussed
how to implement such a solution within the Android Trusted Execution Envi-
ronment and how to integrate it within the Avira Password Manager to make
the user experience more seamless and reduce user interaction. For the evalu-
ation, we have reviewed our solution in terms of security and we compared it
with one-time passwords, which are often used to implement 2nd-factor authen-
tication without additional hardware costs. Based on our work, we perceive the
mobile authenticator to be a robust, secure, and easy-to-use replacement for
hardware authenticators, which can reduce the key disadvantages of hardware
tokens, namely costs, management overhead, and usability.
Acknowledgements. The authors want to thank the Review Committee for the valu-
able feedback and comments. The project has received funding from the European
Union’s Horizon 2020 research and innovation program under grant agreement No
952684. Opinions, views, and conclusions are those of the authors and do not reflect
the views of anyone else.
References
1. Etienne, S.: The best hardware security keys for two-factor authentication (2019).
https://www.theverge.com/2019/2/22/18235173/
100 J. Fietkau et al.
Open Access This chapter is licensed under the terms of the Creative Commons
Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/),
which permits use, sharing, adaptation, distribution and reproduction in any medium
or format, as long as you give appropriate credit to the original author(s) and the
source, provide a link to the Creative Commons license and indicate if changes were
made.
The images or other third party material in this chapter are included in the
chapter’s Creative Commons license, unless indicated otherwise in a credit line to the
material. If material is not included in the chapter’s Creative Commons license and
your intended use is not permitted by statutory regulation or exceeds the permitted
use, you will need to obtain permission directly from the copyright holder.
Energy, QoS and Security Aware Edge
Services
1 Introduction
Today’s communication technologies are capable of transmitting increasing
amounts of data per second. Their source is not only the data of human-operated
applications, but increasingly the sensors and hubs of major applications such
as healthcare [6,31] and the of the Internet of Things (IoT) and other services.
However, the Internet’s ease of use and high bandwidth also creates tremendous
opportunities for attackers, so that all these Internet accessible systems need to
be protected from malicious attacks [5,32].
Since the computational capabilities of servers and workstations are limited
and they are not always able to process data at an appropriate speed, Cloud
This work has been supported by the European Commission H2020 Program through
the IoTAC Research and Innovation Action, under Grant Agreement No. 952684.
c The Author(s) 2022
E. Gelenbe et al. (Eds.): EuroCybersec 2021, CCIS 1596, pp. 102–117, 2022.
https://doi.org/10.1007/978-3-031-09357-9_9
Energy & QoS for Secure Edge Services 103
architectures have become the answer to this problem, grouping servers into
structures that provide huge computing capacities, but these need to be properly
accessed and scheduled [4,40,42]. The second trend, which is gaining momentum
especially with the development of 5G networks, is the multiplication of com-
puting services and their movement to the Edge, close to the users and to the
sources of data.
The primary purpose of a computer system aand network is to process and
transmit data while maintaining adequate Quality of Service (QoS) [20]. Dis-
turbances in QoS result in the need to wait for data, thus wasting computing
power, and often in the need to resend data, which in addition, in the case of
IoT devices, is associated with energy expenditure and shortening the life of
a battery-powered device. QoS problems could be avoided if it were possible
to place processing nodes close enough to the data source so that transmission
would not be a problem. However, this can be too costly, both at the invest-
ment stage and later when it comes to covering energy costs. Electricity, apart
from being an obvious cost for the operator, is obtained in the overwhelming
majority from non-renewable energy sources, and its unnecessary consumption
has an impact on the climate of our planet. It should therefore be saved for
both economic and ecological reasons [22]. How important, although underesti-
mated, is ‘green computing’ and ‘green networking’ [3,35] is shown by the fact
that, at present, the energy consumption of IT systems accounts for roughly 10%
of global electricity consumption, and by 2030 this share may even reach 20%
[1,16].
Another problem is security which needs to be assured [19,21]. As the value of
data transmitted over the network and processed on external servers increases, so
do the number of attacks on the infrastructure for transmitting, processing and
storing information. Modern computer systems must take this issue into account
already at the design level, according to the security-by-design principle.
Our ppaer addresses all these issues, improving network performance in terms
of QoS, power consumption and security [27]. This article is composed of six
main sections. In Sect. 2 we briefly introduce the reader to the topic of RNNs,
referring to previous publications on the subject. We show the specifics of the
environment that is the subject of the current research and the tailored solutions
that we have used. Section ?? discusses how to collect QoS, energy and security
data that RNNs use to make decisions. Section 3 presents the experimental part,
including a description of the implementation and the testbed. It also includes a
discussion of the obtained results. The whole work is summarised in the Sect. 4.
The optimization the QoS of distributed systems has been discussed in numer-
ous publications [28,38,39,41,42]. QoS versus energy consumption of distributed
services has also been examined experimentallly in [18]. However, the focus on
104 E. Gelenbe et al.
security is more recent and its impact on network management and routing is
examined in [10,11,17].
To control the network in terms of multiple criteria, including QoS, secu-
rity and energy in our case, we use a solution based on Random Neural Net-
works (RNNs) [12,13], trained using Reinforcement Learning. RNNs optimize
data packet transmission paths as well as the selection of Egde Computing ser-
vices in such a way as to maintain an appropriate (predefined) balance between
QoS, energy consumption and security. The switches and servers of a computer
network form a distributed system, and its optimization is a variation of a well-
known problem. However, by using the RNN and placing our system in a Soft-
ware Defined Network (SDN) environment as in [8,9], we show that familiar
Machine Learning techniques can also be used in state-of-the-art network archi-
tectures.
It should be noted, however, that the use of an SDN controller to implement
the presented solutions is convenient from the point of view of demonstrating
the usefulness of RNN in computer network control, but due to the distributed
architecture of the RNN-based Decision Engine the same solutions can - under
certain conditions - also be applied to a traditional, fully distributed network
architecture.
The problems of SDN design and optimization are discussed in survey paper
[36], taking into account not only energy efficiency issues, but also touching on
security problems. Security issues in SDN have received a number of publica-
tions, for example in [2]. An interesting survey article on system deployment and
optimization, shedding light on our work, was published in [25]. The popularity
of this technology and the ease of implementation of routing control algorithms
are also significant.
The Goal of the decision system is to find a P among the set of switches S to
connect the pair of clients (c, c ), c, c ∈ C or the client-service pair (c, e), c ∈
Energy & QoS for Secure Edge Services 105
C, e ∈ E. The choice of the path is based on the QoS, security and energy
criteria, or one or two of these criteria. For ease of notation we will denote a
connection (c, c ) or (, e) as a “flow” f .
Thus a path:
– P = P (c, c ) from c to c is P (c, c ) = (s(c), s(P )1 , ... .s(P )l(P )−2 , s(c )), or
– A path P = P (c, e) from c to e is P (c, e) = (s(c), s(P )1 , ... .s(P )l(P )−2 , s(e)),
where
– A(s(c), s(P )1 ) = 1, A(s(P )i , s(P )i+1 ) = 1, for 1 ≤ i ≤ l(P ) − 3,
A(Pl(P )−2 , s(c )) = 1, A(Pl(P )−2 , s(e)) = 1,
– and l(P ) denotes the length of the path P in number of switches or nodes.
Thus we can now formulate the goal function G for given flow and path as the
weighted sum of three criteria:
J(f, P ) is the energy consumed per packet by flow f by devices along path P ,
which can be computed from the power consumption and traffic rate, as follows:
Π(s, λ(s))
J(f, P ) = , (3)
λ(s)
s∈P
where Π(s) is the power consumption when switch or node s carries the traffic
rate λ(s) while:
λ(s) = λ(f ), (4)
f ∈F s∈f
and λ(f ) is the traffic rate of connection f , and F = {f } is the set of all active
connections.
106 E. Gelenbe et al.
The approach taken here is to use the Cognitive Packet Network (CPN) idea
[14,15,23], so as to store inside the SDN Controller a “good” or near-optimal
path P (f ) for flow f = (c, e) from client c to edge device e that minimizes
G(f, P (f )). Thus, rather than calculate ex-nihilo for each upcoming connection
f = (c, e) the path P (f ), we follow the CPN approach that maintains for each
router or switch (i.e. node) s, a Random Neural Network [12] that computes
the best “next hop” from s to s (s, e)), where s (s, e) is the node to which s is
connected and that minimizes G((s, e), P (s, e)).
Since our study is focused on the IoT where the real-time operation is crucial,
the path link latencies were chosen as the key QoS metric. Since a SDN controller
within its standard means has no direct way to measure the latency on the
links and paths, Cognitive Packets (CP) were employed as described in [24]
were described for this purpose. CPs have also been employed in SDN networks
previously [9,33,34], but the concept of the Cognitive Network Map (CNM) was
extended with all necessary data within single data structure.
2.3 Energy
Most network devices do not have the ability to directly measure energy during
operation. However, since each network packet handled needs to be processed and
transmitted, it is obvious that the amount of energy consumed during operation
of a network switch depends on the traffic intensity. The energy characteristic
reflecting the amount of energy in Watts [W] depending on the amount of net-
work traffic passing through the switch is, on the one hand, easy to measure in
Energy & QoS for Secure Edge Services 107
the laboratory, and on the other hand - during operation in the real system -
gives the SDN controller, knowing the current throughput of the node, a suf-
ficiently precise answer to the question “How much energy does the network
switch consume at this moment”.
The SDN switches used in our experiments are Intel NUC devices [26] that
run Open vSwitch [29]. Our approach, however, is universal in the sense that it
can be applied to any network switch or router.
The laboratory setup used for the measurements if the power drawn during
data transfer is presented in Fig. 1. After setting of the traffic level given in Mb/s
the energy measurement was done. The traffic was generated and received by
workstations connected to the NUC device. The experiment was carried out for
successive for increasing traffic levels as shown in Fig. 2.
The electronic circuit which is used to condition the signal obtained from a
sensor which measures the current, is based on precision operational amplifiers.
The Hall effect-based current sensor ACS712-05 (0–5A current range) is galvan-
ically isolated from the copper conduction path, integrated into the IC, which
is used to pass the measured current. This path was connected in series with
the supply wire on the constant DC voltage side at UDC = 19.5V , of the AC
adapter used for the NUC’s as shown in Fig. 1. The output signal from the sen-
sor is amplified in a single-ended amplifier and then converted to the differential
form. The instantaneous value of the measured power can then be found from
the following relationship:
Um
P = UDC .i = UDC = AUm , in W atts , (5)
ku S
2.4 Security
The level of trust in a given flow, and therefore in the device that generates it,
can be assessed using external entities. Within the network, nodes and devices
with higher and lower sensitivity may be defined. For example, the failure of
some nodes has a greater impact on the operation of the entire network than in
the case of other nodes, and attacking such a node will cause more damage than
otherwise. Security-aware routing aims to direct suspicious traffic away from
108 E. Gelenbe et al.
Fig. 2. The dependence between the instantaneous power consumption and traffic load
of the Intel NUC when used as a switch or router.
The aim of the experiment was to reflect the situation of point-to-point com-
munication in the situation of an attack. As presented in Fig. 6, point-to-point
communication from c1 to c6 client devices was established and put under obser-
vation. In this experiment energy efficiency was not taken into consideration, to
avoid too many factors influencing the results, making it hard to separate the
influence of each of them on the final results.
The experiment had three steps:
Energy & QoS for Secure Edge Services 109
communication tsc . The second component of the goal function was energy effi-
ciency, and energy characteristics from the Fig. 3 was loaded into SDN controller
for readouts of energy usage based on traffic in each switch. The RNN decision
engine was used for path-and-service choice (Fig. 7).
The course of the experiment included loading the network with heavy traf-
fic of stress-test type, as such a load was best to show differences in energy
usage. Seven steps of experiments were performed, in every step the total load
in the network was increased by 1 Gb/s. In the first run only QoS optimisation
was performed as a reference result, then both QoS and Energy components
were included into the Goal functions. The results, presented in Figs. 10 and 11,
show positive influence of the latter version of Goal function on the total energy
consumption. with minor effect on QoS.
4 Conclusions
The paper presents the possibilities of using modern tools from the field of
Artificial Intelligence (AI) and Machine Learning (ML) to control the operation
of computer networks. It has been shown that theoretical capabilities of RNNs
can be translated into practical applications, and appropriately constructed goal
functions perform complex routing based on several criteria simultaneously.
Among the criteria tested experimentally are the possibilities of increasing
the security and reducing the energy consumption of the IT infrastructure, which
are very relevant for today’s IT systems. These very promising ideas have been
tested in several experiments which demonstrate their practical value in the
framework of Software Defined Networks.
Energy & QoS for Secure Edge Services 111
References
1. Andrae, A.S.G., Edler, T.: On global electricity usage of communication technol-
ogy: trends to 2030. Challenges 6(1), 117–157 (2015)
2. Aytaç, S., Ermiş, O., Çağlayan, M.U., Alagöz, F.: Authenticated quality of ser-
vice aware routing in software defined networks. In: Zemmari, A., Mosbah, M.,
Cuppens-Boulahia, N., Cuppens, F. (eds.) CRiSIS 2018. LNCS, vol. 11391, pp.
110–127. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12143-3 10
3. Berl, A., et al.: Energy-efficient cloud computing. Comput. J. 53(7), 1045–1051
(2010)
4. Brun, O., Wang, L., Gelenbe, E.: Big data for autonomic intercontinental overlays.
IEEE J. Sel. Areas Commun. 34(3), 575–583 (2016)
5. Brun, O., Yin, Y., Gelenbe, E.: Deep learning with dense random neural network
for detecting attacks against IoT-connected home environments. Procedia Comput.
Sci. 134, 458–463 (2018)
6. Diamantopoulos, S., et al.: Secure cross-border exchange of health related data:
the KONFIDO approach. In: Montella, R., Ciaramella, A., Fortino, G., Guerrieri,
A., Liotta, A. (eds.) IDCS 2019. LNCS, vol. 11874, pp. 318–327. Springer, Cham
(2019). https://doi.org/10.1007/978-3-030-34914-1 30
7. Evmorfos, S., Vlachodimitropoulos, G., Bakalos, N., Gelenbe, E.: Neural network
architectures for the detection of SYN flood attacks in IoT systems. In: PETRA
2020: Proceedings of the 13th ACM International Conference on PErvasive Tech-
nologies Related to Assistive Environments. Association for Computing Machinery,
New York, NY, United States, Corfu, Greece, June 2020. https://doi.org/10.1145/
3389189.3398000
8. Francois, F., Gelenbe, E.: Optimizing secure SDN-enabled inter-data centre overlay
networks through cognitive routing. In: 2016 IEEE 24th International Symposium
on Modeling, Analysis and Simulation of Computer and Telecommunication Sys-
tems (MASCOTS), pp. 283–288. IEEE (2016)
Energy & QoS for Secure Edge Services 113
9. François, F., Gelenbe, E.: Towards a cognitive routing engine for software defined
networks. In: 2016 IEEE International Conference on Communications (ICC),
Kuala Lumpur, May 22–27, pp. 1–6 (2016). https://doi.org/10.1109/ICC.2016.
7511138
10. Frohlich, P., Gelenbe, E., Nowak, M.P.: Smart SDN management of fog services.
In: GIOTS 2020: Global IoT Summit 2020, IEEE Communications Society, 1–5
June 2020, Dubin, Ireland. TechRxiv (2020)
11. Fröhlich, P., Gelenbe, E., Nowak, M.P.: Smart SDN management of fog services.
In: 2020 Global Internet of Things Summit (GIoTS), pp. 1–6 (2020). https://doi.
org/10.1109/GIOTS49054.2020.9119542
12. Gelenbe, E.: Random neural networks with negative and positive signals and prod-
uct form solution. Neural Comput. 1(4), 502–510 (1989)
13. Gelenbe, E.: Learning in the recurrent random neural network. Neural Comput.
5(1), 154–164 (1993)
14. Gelenbe, E.: Cognitive Packet Network. US Patent US6804201B1 (2004)
15. Gelenbe, E.: Steps toward self-aware networks. Commun. ACM 52(7), 66–75 (2009)
16. Gelenbe, E., Caseau, Y.: The impact of information technology on energy con-
sumption and carbon emissions. Ubiquity 2015, 1–15 (2015)
17. Gelenbe, E., Fröhlich, P., Nowak, M., Papadopoulos, S., Protogerou, A., Drosou,
A., Tzovaras, D.: IoT network attack detection and mitigation. In: 9th Mediter-
ranean Conference on Embedded Computing (MECO), Budva, Montenegro, pp.
1–6 (2020). https://doi.org/10.1109/MECO49872.2020.9134241
18. Gelenbe, E., Lent, R.: Energy-QoS trade-offs in mobile service selection. Future
Internet 5(2), 128–139 (2013). https://doi.org/10.3390/fi5020128
19. Gelenbe, E., Loukas, G.: A self-aware approach to denial of service defence. Com-
put. Netw. 51(5), 1299–1314 (2007)
20. Gelenbe, E., Mitrani, I.: Analysis and Synthesis of Computer Systems, vol. 4. World
Scientific, London (2010)
21. Gelenbe, E., Pavloski, M.: Performance of a security control scheme for a health
data exchange system. In: IEEE International Black Sea Conference on Commu-
nications and Networking 26–29 May 2020 // Virtual Conference, pp. 1–6. IEEE
(2020)
22. Gelenbe, E., Siavvas, M.: Minimizing energy and computation in long-running
software. Appl. Sci. 11(3), 1169 (2021)
23. Gelenbe, E., Xu, Z., Seref, E.: Cognitive packet networks. In: Proceedings 11th
International Conference on Tools with Artificial Intelligence, Chicago, IL, USA,
pp. 47–54 (1999). https://doi.org/10.1109/TAI.1999.809765
24. Gelenbe, E., Xu, Z., Seref, E.: Cognitive packet networks. In: Proceedings of the
11th IEEE International Conference on Tools with Artificial Intelligence, pp. 47.
ICTAI 1999, IEEE Computer Society, USA (1999)
25. Huang, X., Cheng, S., Cao, K., Cong, P., Wei, T., Hu, S.: A survey of deployment
solutions and optimization strategies for hybrid SDN networks. IEEE Commun.
Surv. Tutorials 21(2), 1483–1507 (2019). https://doi.org/10.1109/COMST.2018.
2871061
26. Intel: NUC - Small Form Factor Mini PC. https://en.wikipedia.org/wiki/Next-
Unit-of-Computing (2021)
27. Kehagias, D., Jankovic, M., Siavvas, M., Gelenbe, E.: Investigating the interaction
between energy consumption, quality of service, reliability, security, and maintain-
ability of computer systems and networks. SN Comput. Sci 2(1), 1–6 (2021)
28. Kim, C., Kameda, H.: An algorithm for optimal static load balancing in distributed
computer systems. IEEE Trans. Comput. 41, 381–384 (1992)
116 E. Gelenbe et al.
29. McKeown, N., et al.: OpenFlow: enabling innovation in campus networks. ACM
SIGCOMM Comput. Commun. Rev. 38(2), 69–74 (2008)
30. Nakip, M., Gelenbe, E.: MIRAI botnet attack detection with auto-associative
dense random neural network. In: 2021 IEEE Global Communications Conference.
Barcelona, Spain, December 2021
31. Nalin, M., et al.: The European cross-border health data exchange roadmap: case
study in the Italian setting. J. Biomed. Inf. 94, 103183 (2019)
32. Natsiavas, P., et al.: Developing an infrastructure for secure patient summary
exchange in the EU context: Lessons learned from the konfido project. Health
Inf. J. 27(2), 14604582211021460 (2021)
33. Nowak, M., Nowak, S., Domanska, J.: Cognitive routing for improvement of IoT
security. In: Proceedings of IEEE International Conference on Fog Computing
ICFC, Prague (2019). https://doi.org/10.13140/RG.2.2.28667.36648
34. Nowak, M., Nowak, S., Domańska, J., Czachórski, T.: Cognitive packet networks
for the secure internet of things. In: Global IoT Summit (GIoTS). Aarhus, Denmark
(2019)
35. Pernici, B., Aiello, M., Vom Brocke, J., Donnellan, B., Gelenbe, E., Kretsis, M.:
What is can do for environmental sustainability: a report from caise’11 panel on
green and sustainable is. Commun. Assoc. Inf. Syst. 30(1), 18 (2012)
36. Rawat, D.B., Lenkala, S.R.: Software defined networking architecture, security and
energy efficiency: a survey. IEEE Commun. Surv. Tutorials 19(1), 325–346 (2017).
https://doi.org/10.1109/COMST.2016.2618874
37. Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. 2nd Ed. MIT
Press, Cambridge (2018)
38. Tian, W., Zhao, Y., Zhong, Y., Xu, M., Jing, C.: A dynamic and integrated load-
balancing scheduling algorithm for cloud datacenters. In: Proceedings of IEEE
International Conference on Cloud Computing and Intelligence Systems, pp. 311–
315 (2011)
39. Topcuouglu, H., Hariri, S., Wu, M.Y.: Performance-effective and low-complexity
task scheduling for heterogeneous computing. IEEE Trans. Parallel Distrib. Syst.
13(3), 260–274 (2002)
40. Wang, L., Brun, O., Gelenbe, E.: Adaptive workload distribution for local and
remote clouds. In: 2016 IEEE International Conference on Systems, Man, and
Cybernetics (SMC), pp. 3984–3988 (2016)
41. Zhang, Z., Zhang, X.: A load balancing mechanism based on ant colony and com-
plex network theory in open cloud computing federation. In: Proceedings of 2nd
International Conference Industrial Mechatronics Automation, vol. 2, pp. 240–243
(2010)
42. Zhu, X., Qin, X., Qiu, M.: Qos-aware fault-tolerant scheduling for real-time tasks
on heterogeneous clusters. IEEE Trans. Comput. 60(6), 800–812 (2011)
Energy & QoS for Secure Edge Services 117
Open Access This chapter is licensed under the terms of the Creative Commons
Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/),
which permits use, sharing, adaptation, distribution and reproduction in any medium
or format, as long as you give appropriate credit to the original author(s) and the
source, provide a link to the Creative Commons license and indicate if changes were
made.
The images or other third party material in this chapter are included in the
chapter’s Creative Commons license, unless indicated otherwise in a credit line to the
material. If material is not included in the chapter’s Creative Commons license and
your intended use is not permitted by statutory regulation or exceeds the permitted
use, you will need to obtain permission directly from the copyright holder.
Mitigating the Massive Access Problem
in the Internet of Things
Abstract. The traffic from the large number of IoT devices connected
to the IoT is a source of congestion known as the Massive Access Problem
(MAP), that results in packet losses, delays and missed deadlines for real-
time data. This paper reviews the literature on MAP and summarizes
recent results on two approaches that have been designed to mitigate
MAP. One approach is based on randomizing the packet arrival instants
to IoT gateways within a given time interval that is chosen so that packet
arrivals do not exceed their deadlines, but also so that they do not consti-
tute bulk arrivals. The second approach is a novel traffic shaping policy
named the Quasi-Deterministic-Transmission-Policy (QDTP) which has
been proved to drastically reduce queue formation at the receiving gate-
way by delaying packet departures from the IoT devices in a judicious
manner. Both analytical and experimental results are summarized, that
describe the benefits of these techniques.
1 Introduction
The number of Internet of Things (IoT) devices is increasing rapidly with the
increasing needs of smart cities, healthcare applications, autonomous systems,
and smart vehicles [6,7,12,40], causing the overload of communication channels
and gateways [27]. This results in the Massive Access Problem (MAP) where
high latency and queue lengths can lead to packet loss and deadline violations.
In addition, congestion can lead to increased energy consumption at IoT devices
and gateways due to repeated requests for access and increased processing times
c The Author(s) 2022
E. Gelenbe et al. (Eds.): EuroCybersec 2021, CCIS 1596, pp. 118–132, 2022.
https://doi.org/10.1007/978-3-031-09357-9_10
Mitigating for Massive Access 119
IoT devices are quite simple and cannot easily be coordinated for timing or
scheduling [24] based on distributed control [8,10]. Thus recent experimental
results [37,38] show that machine learning techniques can be used to predict IoT
traffic generated by individual devices, and other work [11,39,46–48,50] designs
proactive/predictive access schemes that determine the transmission times from
IoT devices based on such predictions to mitigate the MAP.
Other work [31,45,48] has developed proactive access schemes for Machine-
to-Human (M2H) or Human-to-Machine (H2M) traffic, while earlier research
[43,44] has focused on Human-to-Human (H2H) traffic. In [43] a schedule-based
protocol an expert system is used to determine schedules that minimize delay and
maximize channel utilization. In [44], forecasts of data rates of individual appli-
cations are used to schedule channel scheduling, and network load has also been
balanced based on the forecast of the total load of all machine-type devices [31].
To mitigate the latency bottleneck due to the contention in optical or wireless
networks [48], the proactive allocation of bandwidth to transmissions of packet
bursts based on Artificial Neural Network (ANN) forecasts is studied, while in
[45] the prediction of network throughput for better Quality of Experience (QoE)
is investigated.
Fast Uplink Grant (FUG) is one of the predictive access schemes presented in
3GPP Release 14 to provide predetermined uplink allocations for IoT devices [4,
5,52]. In [50], IoT packet transmissions have been modelled with a binary Markov
process, while in [11] a FUG allocation technique was developed by combining
Support Vector Machines (SVM) and Long-Short Term Memory (LSTM) neural
networks.
Another trend [39,46,47] on predictive access schemes addresses MAP by
using Joint Forecasting Scheduling (JFS), and in [39] JFS was proposed to sched-
ule transmissions based on forecasts of generation times and sizes of bursts. JFS
can be recursively enhanced with a Multi-Scale Algorithm (MSA), where the per-
formance of JFS and the length of scheduling horizon, are significantly increased
[46] (over 96% throughput) for 6400 devices with variable latency constraints.
However, the computational requirements of MSA are very high and in [47] a
scheduling heuristic is used to determine JFS transmission times for using mul-
tiple frequency channels.
Most recently the Randomization of Generation Times (RGT) preprocessing
algorithm [36] is shown to significantly improve the performance of scheduling
heuristics with very low computational cost for large numbers of IoT devices.
Also, the Quasi-Deterministic Transmission Policy (QDTP) traffic shaping app-
roach [19,25] has been shown, using queueing theory, diffusion approximations
[16] and trace driven simulations, to mitigate the MAP by drastically reducing
the waiting time at gateways. This research has shown that RGT and QDTP
can mitigate MAP with very low computational requirements for up to 6400 IoT
devices. In the remainder of this article, we shall outline how these two avenues
of recent research can alleviate MAP.
Mitigating for Massive Access 121
where r0 = 0. Note that the conventional notation [X]+ , for a real number X,
means that [X]+ = 0 when X < 0, and [X]+ = X if X ≥ 0.
Assuming that the generation times coincide with the transmission times,
if the sequence generation and service times, and deadlines {rj , pj , Δj }j≥0
122 E. Gelenbe et al.
Next, in order to compute the interarrival and service time statistics, the app-
roach in [19] assumes that the pj ’s of all packets are independent random vari-
2
ables with the same distribution whose mean is E[P ] and its SCV is CB . More-
over, λ denotes the interarrival rate of packets, such that λ = E[rj+1 − rj ])−1 .
It has also been assumed that the value of λ increases with the number of IoT
devices M that are connected to the IoT gateway, and the system will oper-
ate under variable λ (or M ) but under stable conditions, i.e. λE[P ] < 1. Also,
2 2 2
let CA denote the SCV of interarrival times of packets. Then, CB and CA are
respectively defined as
E[P 2 ] E[(rj+1 − rj )2 ]
2
CB = − 1, and CA
2
= − 1. (7)
(E[P ])2 (E[rj+1 − rj ])2
Last, the diffusion approximation [13,33] has been used in order to determine
the probability that Rj ≤ Δj , denoted by FR (Δ), where Δj = Δ which is
Mitigating for Massive Access 123
constant for all packets of all IoT devices. Then, the probability of missing
deadline Π = 1 − FR (Δ).
Subsequently, using the diffusion approximations [19] one obtains the proba-
bility density function of the response time and the probability of missing dead-
line as
∞ Δ
x (x+βt)2
fR (t) = √ e− 2αt f (x)dx, then Π = 1 − fR (τ )dτ, (8)
0 2παt3 0
where β = λ − μ, α = λCA
2 2
+ μCB , μ = 1/E[P ], and f (x) is yielded by the
diffusion model [13].
Now, the results concerning a publicly available IoT traffic dataset [1] present
2
how Π varies with CA and Δ.
2
First, Fig. 1 displays log10 (Π) for λ = 0.8 and CB = 1 and different values of
2 2
Δ and CA . Note that the minimum and maximum values of CA for the traffic in
2
the dataset [1] which are 1.6 and 2.18, and the approximate value of CA for the
uniform distribution which will be used for the randomization policy in Sect. 3.5,
are shown as vertical bars. The results in this figure show that Π increases with
2
CA and decreases with Δ when λ remains constant.
Then, Fig. 2 presents the values of Π against increasing number of devices
2
M as well as the corresponding λ and CA . The results show that the measured
value of Π, which is the fraction of packets that do not meet their deadlines,
increases as M or corresponding λ increases.
In summary, the results in Fig. 1 and Fig. 2 from [19] show that reducing
2
CA significantly increases the probability that any IoT traffic packet meets its
deadline.
While the results in Sect. 2 show that fast and computationally inexpensive
heuristic algorithms are promising for MAP, the work in [36] develops the RGT
preprocessing algorithm which relieves the traffic load by distributing the gen-
eration times of packets over a scheduling window of duration of Tsch .
In RGT, rj is updated by adding to it an offset which is a uniformly dis-
2
tributed random variable (Recall that CA = 1/3 for uniform distribution which
is shown to be significantly lower than the minimum value in the dataset) as
where Sj is a safety delay that limits the upper bound of rjnew such that 0 ≤
Sj ≤ Δj which indicates the maximum randomization and Sj = Δj indicates
that there is no randomization.
124 E. Gelenbe et al.
Fig. 1. We show the probability of missing the deadline (y-axis) in logarithmic scale
(to the base ten), estimated with the diffusion approximation. We see that it increases
2
significantly as CA increases and when the deadline Δ measured in slots decreases, for
a fixed but high value of the arrival rate λ = 0.8. The average service rate μ and the
2
SCV of service time CB are both fixed to 1.
Then, in [36] the value of Sj was selected by using queueing theory [17,23]
as:
E[P ]
Sj ≈ min[ pj + , Δj ], (10)
ρ −1
1
We now review the performance evaluation of RGT for two known heuristic
scheduling algorithms, Priority based on Average Load (PAL) [39] and non-
preemptive version of Earliest Deadline First (EDF) [26], where PAL enhanced
with RGT is called R-PAL and EDF enhanced with RGT is called R-EDF. The
performance evaluation is performed on the publicly available dataset [1] with
respect to each of throughput η and fraction of successfully delivered bursts ζ
metrics. Also, the performances of R-PAL and R-EDF are compared with the
upper bound performances, where Sj = γΔj and exhaustively search for the
value of γ in the range [0, 1] with increments of 0.05 to maximize each of η and
ζ.
Accordingly, Fig. 3 displays the comparison of R-PAL and R-EDF with the
upper bounds of those as well as PAL and EDF heuristics for η and ζ. The results
in this figure show that RGT preprocessing significantly improves the throughput
performance of each heuristic while the fraction of successfully delivered bursts
Mitigating for Massive Access 125
Fig. 2. The probability of missing the deadline (y-axis) in logarithmic scale (to the
base ten) estimated with the diffusion approximation, using the traffic statistics of the
real dataset of [1], is plotted against the number of IoT devices M (x-axis) that are
being used. Note that each value of M corresponds to specific measured values of λ
2
and CA shown along the x − axis.
remains the same. Furthermore, the results in Fig. 3 (top) show that the R-PAL
and R-EDF significantly outperform the original versions of the heuristics PAL
and EDF for a higher number of devices while both R-PAL and R-EDF are able
to achieve almost the same throughput with their upper bounds. On the other
hand, in Fig. 3 (bottom), one sees that ζ is almost the same for the enhanced
heuristics (R-PAL and R-EDF) and the original heuristics (PAL and EDF).
As the diffusion analysis that is discussed in Sect. 3.4 suggests, minimizing the
2
SCV of interarrival times of traffic packets, CA , reduces the probability of missing
deadlines of those packets. Accordingly, in [19] a “Quasi-Deterministic Trans-
mission Policy” (QDTP) is developed to minimize the probability of missing
deadlines Π by setting almost all of the intertransmission times to a constant
126 E. Gelenbe et al.
Fig. 3. Comparison of the upper bound R-PAL, R-PAL, PAL and the upper bound
R-EDF, R-EDF, EDF algorithms for 12 to 6400 devices with respect to η (top) and ζ
(bottom)
2
D so as to reduce the value of CA . In QDTP whose pseudo-code is presented in
1
Algorithm 1, D = λ , where λ is the interarrival time of burst generation times.
Algorithm 1: Pseudo-code QDTP
n = 1;
tn = an ;
for n ∈ {2, . . . , N } do
if an ≤ tn−1 + D then
tn = an−1 + D;
else
tn = an ;
end
end
For the practical application of QDTP, the generation times of the packets
must be known in advance, similar to other predictive protocols. While advanced
knowledge of the λ value is required, it can be easily calculated based on the cre-
ation times of the packages. Also, each IoT device must be informed of the time
slot reserved for transmission of a packet created by that device before the start
of the reserved slot. For this purpose, information regarding channels reserved
for transmission permissions will be sent to devices via the downlink channel.
Therefore, the communication channel must be bidirectional or individual IoT
devices must also have the ability to detect the channel.
Mitigating for Massive Access 127
We now examine the performance evaluation of QDTP on the same dataset [1]
used for the evaluation of RGT. On the other hand, the bits are now packetized
as IP packets, where the 21 − Byte headers (similar to the header size in LoRa-
WAN) are followed by the payload, which is the bits in a burst. In addition,
considering the effective data transmission rate of LoRa-WAN in free space is
5400 bit/s [54], the transmission time for the average packet length in the dataset
is 33.33 ms.
2
Figure 4 presents the SCV of interarrival times of packets, CA , for both the
original generation times in the dataset and the transmission time determined
2
via QDTP. The results in this figure show that CA is significantly reduced for
all values of M when QDTP is used to schedule packet transmissions.
Figure 5 displays the comparison between the performance of QDTP and
that of original generation times in the dataset with respect to the base 10 of
the (empirically measured) probability Π that the deadline is missed for different
values of deadline Δ. In this figure, we see that Π is reduced to practically zero
for Δ ≥ 5 when QDTP is used. On the other hand, when QDTP is not used
(i.e. packets are transmitted when they are generated), Π increases with M and
approaches 1.
Fig. 4. Measurements of the SCV of interarrival times, both for the raw IoT data from
[1], and for the same data using QDTP, for a varying number of active IoT devices M .
2
We observe that QDTP has substantially reduced the empirically measured SCV CA ,
reducing it to zero for all the distinct numbers of devices M in the dataset of [1].
128 E. Gelenbe et al.
Fig. 5. We compare the logarithm to the base 10 of the (empirically measured) prob-
ability Π that the deadline is missed under both the raw dataset of [1] and under
the case where the QDTP is used with the same dataset for values of the deadline
Δ ∈ {2, 5, 10, 20}.
4 Conclusions
The MAP, which can occur when a massive number of devices attempt the access
a single gateway, is one of the most significant challenges for future IoT networks.
Due to a high latency during the transmissions of data packets caused by MAP,
the deadlines for delay-critical applications can be missed. Much work has been
conducted in recent years to address this problem.
This paper reviews the work on reactive and proactive approaches to MAP,
showing that methods based on proactive (i.e., predictive) techniques are a highly
promising avenue to mitigate MAP. The observations of the most recent research
results can be recapitulated with the following remarks:
1. The diffusion analysis proposed in [19] for the probability of missed dead-
lines in MAP shows that the latency requirements of IoT devices can be met
in networks with a massive number of devices by reducing the SCV of the
interarrival times of packets.
2. The Randomization of Generation Times (RGT) preprocessing algorithm
proposed by [36] significantly improves the performance of fast scheduling
heuristics by randomizing generation time of packets with uniform distribu-
tion yielding an inter-arrival time SCV of close to 1/3.
3. The Quasi-Deterministic Transmission Policy (QDTP) [25] meets the dead-
lines of almost all packets for up to 6400 IoT devices by reducing the queue
length at IoT gateways to nearly zero, and the SCV of packet inter-arival
times is also brought down to nearly zero.
Mitigating for Massive Access 129
References
1. IoT Traffic Generation Pattern Dataset, January 2021. https://www.kaggle.com/
tubitak1001118e277/iot-traffic-generation-patterns
2. Abdelrahman, O.H., Gelenbe, E.: A diffusion model for energy harvesting sensor
nodes. In: 2016 IEEE 24th International Symposium on Modeling, Analysis and
Simulation of Computer and Telecommunication Systems (MASCOTS), pp. 154–
158. IEEE (2016)
3. Alavikia, Z., Ghasemi, A.: Collision-aware resource access scheme for LTE-based
machine-to-machine communications. IEEE Trans. Veh. Technol. 67(5), 4683–4688
(2018)
4. Ali, S., Rajatheva, N., Saad, W.: Fast uplink grant for machine type communica-
tions: challenges and opportunities. IEEE Commun. Mag. 57(3), 97–103 (2019)
5. Astely, D., et al.: LTE release 14 outlook. IEEE Commun. Mag. 54(6), 44–49
(2016)
6. Augusto-Gonzalez, J., et al.: From internet of threats to internet of things: a cyber
security architecture for smart homes. In: 2019 IEEE 24th International Workshop
on Computer Aided Modeling and Design of Communication Links and Networks
(CAMAD), pp. 1–6. IEEE (2019)
7. Bello, O., Zeadally, S.: Toward efficient smartification of the internet of things
(IoT) services. Future Gener. Comput. Syst. 92, 663–673 (2019)
8. Chesnais, A., Gelenbe, E., Mitrani, I.: On the modeling of parallel access to shared
data. Commun. ACM 26(3), 196–202 (1983)
9. Cox, D.R., Miller, H.D.: The Theory of Stochastic Processes. Chapman and Hall,
London (1965)
10. Du, J., Gelenbe, E., Jiang, C., Zhang, H., Ren, Y.: Contract design for traffic
offloading and resource allocation in heterogeneous ultra-dense networks. IEEE J.
Sel. Areas Commun. 35(11), 2457–2467 (2017)
11. Eldeeb, E., Shehab, M., Alves, H.: A learning-based fast uplink grant for mas-
sive IoT via support vector machines and long short-term memory. IEEE Internet
Things J. (2021)
12. Frötscher, A., Monschiebl, B., Drosou, A., Gelenbe, E., Reed, M.J., Al-Naday, M.:
Improve cybersecurity of c-its road side infrastructure installations: the serIoT-
secure and safe IoT approach. In: 2019 IEEE International Conference on Con-
nected Vehicles and Expo (ICCVE), pp. 1–5. IEEE (2019)
13. Gelenbe, E.: On approximate computer system models. J. ACM (JACM) 22(2),
261–269 (1975)
14. Gelenbe, E., Caseau, Y.: The impact of information technology on energy con-
sumption and carbon emissions. Ubiquity 2015(June), 1–15 (2015)
15. Gelenbe, E., Ceran, E.T.: Energy packet networks with energy harvesting. IEEE
Access 4, 1321–1331 (2016). https://doi.org/10.1109/ACCESS.2016.2545340
16. Gelenbe, E., Mang, X., Feng, Y.: A diffusion cell loss estimate for ATM with
multiclass bursty traffic. In: ATM 1995. IAICT, pp. 233–248. Springer, Boston
(1996). https://doi.org/10.1007/978-0-387-35068-4 13
130 E. Gelenbe et al.
17. Gelenbe, E., Mitrani, I.: Analysis and Synthesis of Computer Systems, 2nd Edition.
World Scientific Ltd. & Imperial College Press, London (2010). https://doi.org/
10.1142/p643
18. Gelenbe, E., Nakip, M., Czachorski, T.: Improving massive access to an IoT gate-
way. Submitted for publication (2022)
19. Gelenbe, E., Nakip, M., Marek, D., Czachórski, T.: Diffusion analysis improves
scalability of IoT networks to mitigate the massive access problem. In: 29th Inter-
national Symposium on the Modelling, Analysis and Simulation of Computer and
Telecommunication Systems (MASCOTS) (2021). (in Press)
20. Gelenbe, E., Ngai, E.: Adaptive random re-routing for differentiated QoS in sensor
networks. Comput. J. 53(7), 1052–1061 (2010)
21. Gelenbe, E., Ngai, E., Yadav, P.: Routing of high-priority packets in wireless sensor
networks. In: IEEE Second International Conference on Computer and Network
Technology, IEEE (2010)
22. Gelenbe, E., Ngai, E.C.H.: Adaptive QoS routing for significant events in wireless
sensor networks. In: 2008 5th IEEE International Conference on Mobile Ad Hoc
and Sensor Systems, pp. 410–415. IEEE (2008)
23. Gelenbe, E., Pujolle, G.: Introduction to Networks of Queues. Wiley, Chichester
(1998)
24. Gelenbe, E., Sevcik, K.: Analysis of update synchronization for multiple copy data
bases. IEEE Trans. Comput. 10, 737–747 (1979)
25. Gelenbe, E., Sigman, K.: IoT traffic shaping and the massive access problem. In:
ICC 2022: IEEE International Conference on Communications, pp. 1–6. IEEE,
May 2022
26. George, L., Rivierre, N., Spuri, M.: Preemptive and non-preemptive real-time
uniprocessor scheduling (1996)
27. Ghavimi, F., Chen, H.H.: M2M communications in 3GPP LTE/LTE-A networks:
architectures, service requirements, challenges, and applications. IEEE Commun.
Surv. Tutorials 17(2), 525–549 (2015)
28. Jang, H.S., Jin, H., Jung, B.C., Quek, T.Q.: Resource-optimized recursive access
class barring for bursty traffic in cellular IoT networks. IEEE Internet Things J.
(2021)
29. Jiang, N., Deng, Y., Nallanathan, A., Yuan, J.: A decoupled learning strategy for
massive access optimization in cellular IoT networks. IEEE J. Sel. Areas Commun.
39(3), 668–685 (2020)
30. Jin, H., Toor, W.T., Jung, B.C., Seo, J.B.: Recursive pseudo-Bayesian access class
barring for M2M communications in LTE systems. IEEE Trans. Veh. Technol.
66(9), 8595–8599 (2017)
31. Kim, H.-Y., Kim, J.-M.: A load balancing scheme based on deep-learning in
IoT. Cluster Comput. 20(1), 873–878 (2016). https://doi.org/10.1007/s10586-016-
0667-5
32. Kleinrock, L.: Queueing Systems: Computer Applications. Wiley, Hoboken (1976)
33. Kobayashi, H.: Application of the diffusion approximation to queueing networks i:
equilibrium queue distributions. J. ACM (JACM) 21(2), 316–328 (1974)
34. Liang, L., Xu, L., Cao, B., Jia, Y.: A cluster-based congestion-mitigating access
scheme for massive M2M communications in internet of things. IEEE Internet
Things J. 5(3), 2200–2211 (2018)
35. Liu, J., Song, L., et al.: A novel congestion reduction scheme for massive machine-
to-machine communication. IEEE Access 5, 18765–18777 (2017)
Mitigating for Massive Access 131
36. Nakip, M., Gelenbe, E.: Randomization of data generation times improves per-
formance of predictive IoT networks. In: 2021 IEEE World Forum on Internet of
Things (WF-IoT) (2021). (in Press)
37. Nakip, M., Gül, B.C., Rodoplu, V., Güzeliş, C.: Comparative study of forecasting
schemes for IoT device traffic in machine-to-machine communication. In: Proceed-
ings of the 2019 4th International Conference on Cloud Computing and Internet
of Things, pp. 102–109 (2019)
38. Nakip, M., Karakayali, K., Güzeliş, C., Rodoplu, V.: An end-to-end trainable fea-
ture selection-forecasting architecture targeted at the internet of things. IEEE
Access 9, 1–1 (2021). https://doi.org/10.1109/ACCESS.2021.3092228
39. Nakip, M., Rodoplu, V., Güzeliş, C., Eliiyi, D.T.: Joint forecasting-scheduling for
the internet of things. In: 2019 IEEE Global Conference on Internet of Things
(GCIoT), pp. 1–7. IEEE (2019)
40. Natsiavas, P., et al.: Developing an infrastructure for secure patient summary
exchange in the EU context: lessons learned from the konfido project. Health Inf.
J. 27(2), 14604582211021460 (2021)
41. Newell, G.F.: Applications of Queueing Theory. Chapman and Hall, London, June
1971
42. Ngai, E.C.H., Gelenbe, E., Humber, G.: Information-aware traffic reduction for
wireless sensor networks. In: 2009 IEEE 34th Conference on Local Computer Net-
works, pp. 451–458. IEEE (2009)
43. Petkov, V., Obraczka, K.: The case for using traffic forecasting in schedule-based
channel access. In: 2011 IEEE Consumer Communications and Networking Con-
ference (CCNC), pp. 208–212. IEEE (2011)
44. Petkov, V., Obraczka, K.: Collision-free medium access based on traffic forecast-
ing. In: 2012 IEEE International Symposium on a World of Wireless, Mobile and
Multimedia Networks (WoWMoM), pp. 1–9. IEEE (2012)
45. Raca, D., et al.: On leveraging machine and deep learning for throughput prediction
in cellular networks: design, performance, and challenges. IEEE Commun. Mag.
58(3), 11–17 (2020)
46. Rodoplu, V., Nakıp, M., Eliiyi, D.T., Güzelis, C.: A multi-scale algorithm for joint
forecasting-scheduling to solve the massive access problem of IoT. IEEE Internet
Things J. (2020)
47. Rodoplu, V., Nakip, M., Qorbanian, R., Eliiyi, D.T.: Multi-channel joint
forecasting-scheduling for the internet of things. IEEE Access 8, 217324–217354
(2020)
48. Ruan, L., Dias, M.P.I., Wong, E.: Machine learning-based bandwidth prediction
for low-latency H2M applications. IEEE Internet Things J. 6(2), 3743–3752 (2019)
49. Shahin, N., Ali, R., Kim, Y.T.: Hybrid slotted-CSMA/CA-TDMA for efficient
massive registration of IoT devices. IEEE Access 6, 18366–18382 (2018)
50. Shehab, M., Hagelskjær, A.K., Kalør, A.E., Popovski, P., Alves, H.: Traffic pre-
diction based fast uplink grant for massive IoT. In: 2020 IEEE 31st Annual Inter-
national Symposium on Personal, Indoor and Mobile Radio Communications, pp.
1–6. IEEE (2020)
51. Shirvanimoghaddam, M., Dohler, M., Johnson, S.J.: Massive non-orthogonal multi-
ple access for cellular IoT: potentials and limitations. IEEE Commun. Mag. 55(9),
55–61 (2017)
52. Soltanmohammadi, E., Ghavami, K., Naraghi-Pour, M.: A survey of traffic issues
in machine-to-machine communications over LTE. IEEE Internet Things J. 3(6),
865–884 (2016)
132 E. Gelenbe et al.
53. Takács, L.: Introduction to the Theory of Queues. Oxford University Press, Oxford
(1962)
54. Tarab, H.: Real time performance testing of LoRa-LPWAN based environmental
monitoring UAV system. University of Windsor, Electronic Theses and Disserta-
tions. 7578 (2018). https://scholar.uwindsor.ca/etd/7578
55. Tello-Oquendo, L., et al.: Performance analysis and optimal access class bar-
ring parameter configuration in LTE-A networks with massive M2M traffic. IEEE
Trans. Veh. Technol. 67(4), 3505–3520 (2018)
56. Tello-Oquendo, L., Pacheco-Paramo, D., Pla, V., Martinez-Bauset, J.: Reinforce-
ment learning-based ACB in LTE-A networks for handling massive M2M and
H2H communications. In: 2018 IEEE International Conference on Communica-
tions (ICC), pp. 1–7. IEEE (2018)
Open Access This chapter is licensed under the terms of the Creative Commons
Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/),
which permits use, sharing, adaptation, distribution and reproduction in any medium
or format, as long as you give appropriate credit to the original author(s) and the
source, provide a link to the Creative Commons license and indicate if changes were
made.
The images or other third party material in this chapter are included in the
chapter’s Creative Commons license, unless indicated otherwise in a credit line to the
material. If material is not included in the chapter’s Creative Commons license and
your intended use is not permitted by statutory regulation or exceeds the permitted
use, you will need to obtain permission directly from the copyright holder.
Author Index