• DocumentCode
    13924
  • Title

    Energy-efficient replica detection for resource-limited mobile devices in the internet of things

  • Author

    Kwantae Cho ; Byung-Gil Lee ; Kyungho Lee ; Dong Hoon Lee

  • Author_Institution
    Cyber Security Res. Lab., Electron. & Telecommun. Res. Inst. (ETRI), Daejeon, South Korea
  • Volume
    7
  • Issue
    18
  • fYear
    2013
  • fDate
    December 17 2013
  • Firstpage
    2141
  • Lastpage
    2150
  • Abstract
    The forthcoming Internet of Things - an intelligent collaboration of resource-limited static/mobile devices that are embedded in the daily lives of users - poses new challenges to security and end-user privacy. One of the most challenging problems is how to thwart replica attacks. Once a device is captured physically by an attacker or contaminated by malicious code, it can be reprogrammed and the secret information inside can be duplicated into a large number of replicas that maliciously occupy the network and collect users private information without authorisation. In this study, the authors focus on studying the detection of replicas in mobile applications; which can consist of resource-limited static devices attached to mobile entities. Most existing solutions for detecting replicas have been designed for static devices, and cannot be immediately applied to mobile devices because of their unique properties, in particular, their node mobility. The authors present two efficient methods for detecting replicas in mobile devices. Through performance evaluations, they find that the proposed methods provide highly accurate replica detection with nearly zero detection errors. Furthermore, the distributed and cooperative strategy of the methods significantly reduces the energy required to detect replicas while providing faster replica detection than the existing solutions.
  • Keywords
    Internet of Things; mobile computing; security of data; Internet of things; end-user privacy; energy efficient replica detection; intelligent collaboration; malicious code; mobile applications; replica attacks; resource limited mobile devices; secret information; zero detection errors;
  • fLanguage
    English
  • Journal_Title
    Communications, IET
  • Publisher
    iet
  • ISSN
    1751-8628
  • Type

    jour

  • DOI
    10.1049/iet-com.2013.0283
  • Filename
    6678950