MechAnism for household IoT Security Enhancement

碩士 === 國立中央大學 === 資訊工程學系 === 105 === With the advent of broadband, wireless networking, and convergence of different communication technologies being adopted by HANs, these insiderattack incidents have further increased because anyone could breakthrough the network and penetrate other insider device...

Full description

Bibliographic Details
Main Authors: Chun-Chung Shih, 史君仲
Other Authors: Guey-Yun Chang
Format: Others
Language:zh-TW
Published: 2017
Online Access:http://ndltd.ncl.edu.tw/handle/79694274625198376823
Description
Summary:碩士 === 國立中央大學 === 資訊工程學系 === 105 === With the advent of broadband, wireless networking, and convergence of different communication technologies being adopted by HANs, these insiderattack incidents have further increased because anyone could breakthrough the network and penetrate other insider devices if they are located within the wireless communication range. Our proposed security system/mechanism uses identity exchange of sensor agents and shadow hosts to redirect the attack. Since all the detail and characteristics of every sensor agents and shadow hosts cannot not be easily recognized,the attacker may be easily fooled and trapped into our shadow hosts. Moreover, it is not cost-effective to assign much computing resource to just penetrate one specific sensor agent. This forces the attacker to roughly scan and inspect all these shadow hosts one by one before reaching to our sensor agents, which resembles a MAZE for entrapping the attacker. In our performance analysis, we show that our proposed security system/mechanism can even detect and handle general insider attacks/intrusion with the limited hardware resources of a Raspberry Pi 3.