Cargando…
VerificationTalk: A Verification and Security Mechanism for IoT Applications
An Internet of Things (IoT) application typically involves implementations in both the device domain and the network domain. In this two-domain environment, it is possible that application developers implement the wrong network functions and/or connect some IoT devices that should never be linked, w...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8619704/ https://www.ncbi.nlm.nih.gov/pubmed/34833525 http://dx.doi.org/10.3390/s21227449 |
_version_ | 1784605058125529088 |
---|---|
author | Shieh, Min-Zheng Lin, Yi-Bing Hsu, Yin-Jui |
author_facet | Shieh, Min-Zheng Lin, Yi-Bing Hsu, Yin-Jui |
author_sort | Shieh, Min-Zheng |
collection | PubMed |
description | An Internet of Things (IoT) application typically involves implementations in both the device domain and the network domain. In this two-domain environment, it is possible that application developers implement the wrong network functions and/or connect some IoT devices that should never be linked, which result in the execution of wrong operations on network functions. To resolve these issues, we propose the VerificationTalk mechanism to prevent inappropriate IoT application deployment. VerificationTalk consists of two subsystems: the BigraphTalk subsystem which verifies IoT device configuration; and AFLtalk which validates the network functions. VerificationTalk provides mechanisms to conduct online anomaly detection by using a runtime monitor and offline by using American Fuzzy Lop (AFL). The runtime monitor is capable of intercepting potentially harmful data targeting IoT devices. When VerificationTalk detects errors, it provides feedback for debugging. VerificationTalk also assists in building secure IoT applications by identifying security loopholes in network applications. By the appropriate design of the IoTtalk execution engine, the testing capacity of AFLtalk is three times that of traditional AFL approaches. |
format | Online Article Text |
id | pubmed-8619704 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-86197042021-11-27 VerificationTalk: A Verification and Security Mechanism for IoT Applications Shieh, Min-Zheng Lin, Yi-Bing Hsu, Yin-Jui Sensors (Basel) Article An Internet of Things (IoT) application typically involves implementations in both the device domain and the network domain. In this two-domain environment, it is possible that application developers implement the wrong network functions and/or connect some IoT devices that should never be linked, which result in the execution of wrong operations on network functions. To resolve these issues, we propose the VerificationTalk mechanism to prevent inappropriate IoT application deployment. VerificationTalk consists of two subsystems: the BigraphTalk subsystem which verifies IoT device configuration; and AFLtalk which validates the network functions. VerificationTalk provides mechanisms to conduct online anomaly detection by using a runtime monitor and offline by using American Fuzzy Lop (AFL). The runtime monitor is capable of intercepting potentially harmful data targeting IoT devices. When VerificationTalk detects errors, it provides feedback for debugging. VerificationTalk also assists in building secure IoT applications by identifying security loopholes in network applications. By the appropriate design of the IoTtalk execution engine, the testing capacity of AFLtalk is three times that of traditional AFL approaches. MDPI 2021-11-09 /pmc/articles/PMC8619704/ /pubmed/34833525 http://dx.doi.org/10.3390/s21227449 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Shieh, Min-Zheng Lin, Yi-Bing Hsu, Yin-Jui VerificationTalk: A Verification and Security Mechanism for IoT Applications |
title | VerificationTalk: A Verification and Security Mechanism for IoT Applications |
title_full | VerificationTalk: A Verification and Security Mechanism for IoT Applications |
title_fullStr | VerificationTalk: A Verification and Security Mechanism for IoT Applications |
title_full_unstemmed | VerificationTalk: A Verification and Security Mechanism for IoT Applications |
title_short | VerificationTalk: A Verification and Security Mechanism for IoT Applications |
title_sort | verificationtalk: a verification and security mechanism for iot applications |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8619704/ https://www.ncbi.nlm.nih.gov/pubmed/34833525 http://dx.doi.org/10.3390/s21227449 |
work_keys_str_mv | AT shiehminzheng verificationtalkaverificationandsecuritymechanismforiotapplications AT linyibing verificationtalkaverificationandsecuritymechanismforiotapplications AT hsuyinjui verificationtalkaverificationandsecuritymechanismforiotapplications |