DocumentCode :
3694641
Title :
Protection scheme for IoT devices using introspection
Author :
Chulhyun Kang;Fizza Abbas;Heekuck Oh
Author_Institution :
Department of Computer Science and Engineering, Hanyang University, ERICA Campus, South Korea
fYear :
2015
Firstpage :
1
Lastpage :
5
Abstract :
These days Internet of Things (IoT) is considered to be the extension of machine-to-machine (M2M) communication that supports various domains, protocols, and applications. Users share their personal information with IoT device to get various services. However, if IoT device loses integrity or malfunctions due to some malicious attack, it causes direct or indirect risks to users´ privacy. Consequently, users´ personal information can be leaked through IoT devices. Moreover, IoT devices have limited computational resources as compared to general purpose computers and operating systems (OS). They also have various traits depending on the environment in which they are being used. Due to these reasons, general protection methods and integral solutions are difficult to be applied. In this regard, this paper proposes a protection method that detects malicious activity using introspection. Moreover, through experimental results we show that our proposed approach not only enhances the security of IoT devices but also effectively protects users´ personal information.
Keywords :
"Virtual machine monitors","Hardware","Kernel","Security","Virtualization","Decision support systems"
Publisher :
ieee
Conference_Titel :
Network of the Future (NOF), 2015 6th International Conference on the
Type :
conf
DOI :
10.1109/NOF.2015.7333292
Filename :
7333292
Link To Document :
بازگشت