WEKO3
アイテム
Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device
https://ipsj.ixsq.nii.ac.jp/records/212859
https://ipsj.ixsq.nii.ac.jp/records/2128598f1b7261-865e-422c-9162-e8aba0375c37
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2021 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | Journal(1) | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2021-09-15 | |||||||||||||||
タイトル | ||||||||||||||||
タイトル | Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device | |||||||||||||||
タイトル | ||||||||||||||||
言語 | en | |||||||||||||||
タイトル | Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device | |||||||||||||||
言語 | ||||||||||||||||
言語 | eng | |||||||||||||||
キーワード | ||||||||||||||||
主題Scheme | Other | |||||||||||||||
主題 | [特集:Society 5.0を実現するコンピュータセキュリティ技術] authentication, IoT security, port knocking, remote management | |||||||||||||||
資源タイプ | ||||||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||||||
資源タイプ | journal article | |||||||||||||||
著者所属 | ||||||||||||||||
Graduate School of Environment and Information Sciences, Yokohama National University | ||||||||||||||||
著者所属 | ||||||||||||||||
Graduate School of Environment and Information Sciences, Yokohama National University | ||||||||||||||||
著者所属 | ||||||||||||||||
Graduate School of Environment and Information Sciences, Yokohama National University | ||||||||||||||||
著者所属 | ||||||||||||||||
Graduate School of Environment and Information Sciences, Yokohama National University/Institute of Advanced Sciences, Yokohama National University | ||||||||||||||||
著者所属 | ||||||||||||||||
Graduate School of Environment and Information Sciences, Yokohama National University/Institute of Advanced Sciences, Yokohama National University | ||||||||||||||||
著者所属(英) | ||||||||||||||||
en | ||||||||||||||||
Graduate School of Environment and Information Sciences, Yokohama National University | ||||||||||||||||
著者所属(英) | ||||||||||||||||
en | ||||||||||||||||
Graduate School of Environment and Information Sciences, Yokohama National University | ||||||||||||||||
著者所属(英) | ||||||||||||||||
en | ||||||||||||||||
Graduate School of Environment and Information Sciences, Yokohama National University | ||||||||||||||||
著者所属(英) | ||||||||||||||||
en | ||||||||||||||||
Graduate School of Environment and Information Sciences, Yokohama National University / Institute of Advanced Sciences, Yokohama National University | ||||||||||||||||
著者所属(英) | ||||||||||||||||
en | ||||||||||||||||
Graduate School of Environment and Information Sciences, Yokohama National University / Institute of Advanced Sciences, Yokohama National University | ||||||||||||||||
著者名 |
Aamir, H. Bokhari
× Aamir, H. Bokhari
× Yuta, Inoue
× Seiya, Kato
× Katsunari, Yoshioka
× Tsutomu, Matsumoto
|
|||||||||||||||
著者名(英) |
Aamir, H. Bokhari
× Aamir, H. Bokhari
× Yuta, Inoue
× Seiya, Kato
× Katsunari, Yoshioka
× Tsutomu, Matsumoto
|
|||||||||||||||
論文抄録 | ||||||||||||||||
内容記述タイプ | Other | |||||||||||||||
内容記述 | The digital boom brought empowerment to seamless connectivity by enabling manufacturers to harness the power of the Internet into their products, opening up the world of the Internet of Things (IoT). However, such connectivity has also brought the side effect of such power being abused by unscrupulous agents, who scan open ports for services and exploit vulnerabilities in the system. The Mirai botnet malware attack is one such example that caused havoc by compromising millions of IoT devices having unpatched/weaker security. There is an increasing need to enable IoT devices to be fully patched and secured, but such methods are often under attack. This paper examines a stealth technology and its impact on the CPU and power consumption to secure resource-constraint IoT devices that are growing exponentially. By enabling secure remote operations and management of such devices using a unique but practical method of security called “Port Knocking,” we can ensure timely patching of security vulnerabilities in a safe and stealthy manner. Our experimental results on a resource-constraint IoT device show that port knocking not only secures the device and provides a secure remote management option but also helps in keeping its power consumption low. The results obtained make it an effective security layer for securing resource-constraint IoT devices. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.29(2021) (online) DOI http://dx.doi.org/10.2197/ipsjjip.29.572 ------------------------------ |
|||||||||||||||
論文抄録(英) | ||||||||||||||||
内容記述タイプ | Other | |||||||||||||||
内容記述 | The digital boom brought empowerment to seamless connectivity by enabling manufacturers to harness the power of the Internet into their products, opening up the world of the Internet of Things (IoT). However, such connectivity has also brought the side effect of such power being abused by unscrupulous agents, who scan open ports for services and exploit vulnerabilities in the system. The Mirai botnet malware attack is one such example that caused havoc by compromising millions of IoT devices having unpatched/weaker security. There is an increasing need to enable IoT devices to be fully patched and secured, but such methods are often under attack. This paper examines a stealth technology and its impact on the CPU and power consumption to secure resource-constraint IoT devices that are growing exponentially. By enabling secure remote operations and management of such devices using a unique but practical method of security called “Port Knocking,” we can ensure timely patching of security vulnerabilities in a safe and stealthy manner. Our experimental results on a resource-constraint IoT device show that port knocking not only secures the device and provides a secure remote management option but also helps in keeping its power consumption low. The results obtained make it an effective security layer for securing resource-constraint IoT devices. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.29(2021) (online) DOI http://dx.doi.org/10.2197/ipsjjip.29.572 ------------------------------ |
|||||||||||||||
書誌レコードID | ||||||||||||||||
収録物識別子タイプ | NCID | |||||||||||||||
収録物識別子 | AN00116647 | |||||||||||||||
書誌情報 |
情報処理学会論文誌 巻 62, 号 9, 発行日 2021-09-15 |
|||||||||||||||
ISSN | ||||||||||||||||
収録物識別子タイプ | ISSN | |||||||||||||||
収録物識別子 | 1882-7764 |