Abstract
In the reliability and security challenges for the Internet of Things (IoT) systems, managing unpredictable events and controlling the abnormal situation automatically are provisioned by the integration of self-healing properties. Despite this, in our knowledge, this integration is not used to repair from malicious behaviors and potential distributed denial of service (DDoS) device attacks, especially in a collaborative way to maximize the quality of service parameters (availability). For that, we propose a diagnosable distributed protocol, in a hybrid-IoT system designed based on Service-Oriented Architecture (SOA) for IoT middleware in the things-oriented vision. The proposed protocol identifies and re-locates the denied service using the contextual recovery or the Sensing as a Service model (\(S^2\)aaS) in the Cloud-IoT platform, as a backup to ensure the service availability. On the basis of this idea, this paper defines the system states under self-healing (in collaboration state) and self-protection autonomic-control loops. Besides, the closure (safety) and the convergence (liveness) properties will be defined and proved satisfied by the proposed protocol. Furthermore, to highlight the interest of the protocol, we present an application in the context of the smart-building (Lab) as an IoT solution.
Similar content being viewed by others
Notes
An intermediate unit/node between the IoT devices and the cloud to manage the communication for both sides (e.g., hub or router).
The layer is used to send and receive data according to the chosen protocols, such as MQTT, Zigbee, etc.
Industrial Internet of Things.
An extension of Cloud paradigm to the network edge.
The CIA security threats are Confidentiality, Integrity, and Availability.
A type of DDoS detection approaches based anomaly detection.
Such as: study rooms, desktops, conference sections.
References
Abreu DP, Velasquez K, Curado M, Monteiro E (2017) A resilient internet of things architecture for smart cities. Ann Telecommun 72(1–2):19–30
Akram OK, Franco DJ, Ismail S (2016) Smart buildings-a new environment (theoretical approach). Int J Eng Technol Manag Appl Sci 4(4):1–5
Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surveys Tutor 17(4):2347–2376
Alshehri A, Benson J, Patwa F, Sandhu R (2018) Access control model for virtual objects (shadows) communication for aws internet of things. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, ACM, pp 175–185
Angarita R (2015) Responsible objects: towards self-healing internet of things applications. In: 2015 IEEE International Conference on Autonomic Computing, IEEE, pp 307–312
Anisetti M, Ardagna CA, Damiani E, Gaudenzi F, Jeon G (2020) Cost-effective deployment of certified cloud composite services. J Parallel Distrib Comput 135:203–218
Arora A, Gouda M (1993) Closure and convergence: a foundation of fault-tolerant computing. IEEE Trans Softw Eng 19(11):1015–1027
Ashraf QM, Habaebi MH (2015) Autonomic schemes for threat mitigation in internet of things. J Netw Comput Appl 49:112–127
Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
Baitiche H, Bouzenada M, Saidouni DE, Berkane Y, Chama H (2018) A context-aware distributed protocol for updating bdi agents abilities. In: International Symposium on modelling and implementation of complex systems, Springer, pp 243–256
Bajunaid N (2015) Autonomic iot systems realizing self-* properties in iot systems. https://docplayer.net/18033171-Autonomic-iot-systems-realizing-self-properties-in-iot-systems.html, Accessed 30 Sep 2019
Benayache A, Bilami A, Barkat S, Lorenz P, Taleb H (2019) Msm: a microservice middleware for smart wsn-based iot application. J Netw Comput Appl 144:138–154
Botta A, De Donato W, Persico V, Pescapé A (2014) On the integration of cloud computing and internet of things. In: 2014 International Conference on Future Internet of Things and Cloud, IEEE, pp 23–30
Botta A, De Donato W, Persico V, Pescapé A (2016) Integration of cloud computing and internet of things: a survey. Future Gener Comput Syst 56:684–700
Boukharrou R, Chaouche AC, Seghrouchni AEF, Ilié JM, Saïdouni DE (2015) Dealing with temporal failure in ambient systems: a dynamic revision of plans. J Ambient Intell Humaniz Comput 6(3):325–336
Carl G, Kesidis G, Brooks RR, Rai S (2006) Denial-of-service attack-detection techniques. IEEE Internet Comput 10(1):82–89
Cavalcante E, Pereira J, Alves MP, Maia P, Moura R, Batista T, Delicato FC, Pires PF (2016) On the interplay of internet of things and cloud computing: a systematic mapping study. Comput Commun 89:17–33
Chaouche AC, Seghrouchni AEF, Ilié JM, Saïdouni DE (2016) Learning from situated experiences for a contextual planning guidance. J Ambient Intell Hum Comput 7(4):555–566
Cirani S, Ferrari G, Mancin M, Picone M (2018) Virtual replication of iot hubs in the cloud: A flexible approach to smart object management. J Sens Actuator Netw 7(2):16
Computing A et al (2006) An architectural blueprint for autonomic computing. IBM White Paper 31(2006):1–6
Da Xu L, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inf 10(4):2233–2243
Das A, Thulasiraman K, Agarwal VK (1994) Diagnosis of t/(t+1)-diagnosable systems. SIAM J Comput 23(5):895–905
Djenna A, Saïdouni DE (2018) Cyber attacks classification in iot-based-healthcare infrastructure. In: 2018 2nd Cyber Security in Networking Conference (CSNet), IEEE, pp 1–4
FarlexInc (2016) The free dictionary. https://www.thefreedictionary.com/diagnosable. Accessed 30 Sep 2019
Ferdous MS, Hussein R, Alassafi M, Alharthi A, Walters R, Wills G (2016) Threat taxonomy for cloud of things. Internet Things Big Data Anal Recent Trends Chall 1:149–191
Friedman AD, Simoncini L (1980) System-level fault diagnosis. Computer 3:47–53
Fruhlinger J (2018) The mirai botnet explained: how teen scammers and cctv cameras almost brought down the internet. https://www.csoonline.com/article/3258748/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html. Accessed 30 Sep 2019
Ghosh D, Sharman R, Rao HR, Upadhyaya S (2007) Self-healing systems–survey and synthesis. Decis Support Syst 42(4):2164–2185
Hallman R, Bryan J, Palavicini G, Divita J, Romero-Mariona J (2017) Ioddos-the internet of distributed denial of sevice attacks. In: 2nd International Conference on internet of things, big data and security. SCITEPRESS, pp 47–58
Hu P, Indulska J, Robinson R (2008) An autonomic context management system for pervasive computing. In: 2008 Sixth Annual IEEE International Conference on pervasive computing and communications (PerCom), IEEE, pp 213–223
IoTSec (2019) The denial of service attack from iot devices. https://its-wiki.no/wiki/IoTSec:The_Denial_of_Service_Attack_from_IoT_devices. Accessed 30 Sep 2019
Kaur P, Kumar M, Bhandari A (2017) A review of detection approaches for distributed denial of service attacks. Syst Sci Control Eng 5(1):301–320
Kephart J, Chess D (2003) The vision of autonomic computing. Computer 36:41–50
Kim H, Kang E, Broman D, Lee EA (2017) An architectural mechanism for resilient iot services. In: Proceedings of the 1st ACM Workshop on the Internet of Safe Things, ACM, pp 8–13
Kolias C, Kambourakis G, Stavrou A, Voas J (2017) Ddos in the iot: Mirai and other botnets. Computer 50(7):80–84
Kühn F, Hellbrück H, Fischer S (2018) A model-based approach for self-healing iot systems. In: Proceedings of the 7th International Conference on sensor networks, SCITEPRESS-Science and Technology Publications, Lda, pp 135–140
Li S, Da Xu L, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17(2):243–259
Li Y, Pandis I, Guo Y (2016) Enabling virtual sensing as a service. In: Borne KD (ed) Informatics, vol 3. Multidisciplinary Digital Publishing Institute, p 3
Liang L, Zheng K, Sheng Q, Huang X (2016) A denial of service attack method for an iot system. In: 2016 8th International Conference on information technology in medicine and education (ITME), IEEE, pp 360–364
Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516
Mohanan V, Budiarto R, Aldmour I (2017) Powering the Internet of Things with 5G Networks. IGI Global, Hershey
Montoya M, Bacles-Min S, Molnos A, Fournier JJ (2018) Sward: a secure wake-up radio against denial-of-service on iot devices. In: Proceedings of the 11th ACM Conference on security & privacy in wireless and mobile networks, ACM, pp 190–195
Parhami B (2015) Dependable computing: a multilevel approach. Draft of book manuscript, available online at: https://web.ece.ucsb.edu/~parhami/text_dep_comp.htm. Accessed 10 Nov 2019
Perera C (2017) Sensing as a service for internet of things: a roadmap. Lulu.com, Morrisville
Preparata FP, Metze G, Chien RT (1967) On the connection assignment problem of diagnosable systems. IEEE Trans Electron Comput 6:848–854
Psaier H, Dustdar S (2011) A survey on self-healing systems: approaches and systems. Computing 91(1):43–73
Qureshi KN, Hussain R, Jeon G (2020) A distributed software defined networking model to improve the scalability and quality of services for flexible green energy internet for smart grid systems. Comput Electric Eng 84:106634
Ray PP (2016) A survey of iot cloud platforms. Future Comput Inf J 1(1–2):35–46
Ray PP (2018) A survey on internet of things architectures. J King Saud Univ Comput Inf Sci 30(3):291–319
Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 9:51–58
Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279
Rubio JE, Alcaraz C, Roman R, Lopez J (2019) Current cyber-defense trends in industrial control systems. Comput Secur 87:101561
Salehie M, Tahvildari L (2009) Self-adaptive software: landscape and research challenges. ACM Trans Auton Adapt Syst (TAAS) 4(2):1–42
Sharma V, Lee K, Kwon S, Kim J, Park H, Yim K, Lee SY (2017) A consensus framework for reliability and mitigation of zero-day attacks in iot. Secur Commun Netw 2017:4749085:1–4749085:24
Sterritt R (2005) Autonomic computing. Innov Syst Softw Eng 1(1):79–88
Tosi D (2004) Research perspectives in self-healing systems. In: LTA p 06
Ullaha H, Islam N, Jan Z, Farman H, Jan B, Jeon G, Ahmad A (2018) Optic disc segmentation and classification in color fundus images: a resource-aware healthcare service in smart cities. J Ambient Intell Human Comput 30:1–13
Weber J (2019) Fundamentals of iot device management. http://iotdesign.embedded-computing.com/articles/fundamentals-of-iot-device-management/. Accessed 30 Sep 2019
Whitmore A, Agarwal A, Da Xu L (2015) The internet of things–a survey of topics and trends. Inf Syst Front 17(2):261–274
WISeKey (2016) Solutions to prevent iot devices to be used for ddos attacks. chrome-extension://cbnaodkpfinfiipjblikofhlhlcickei/src/pdfviewer/web/viewer.html?file=https://docs.wisekey.com/site/justdownload.html?id=62. Accessed 30 Sep 2019
Yaseen Q, Aldwairi M, Jararweh Y, Al-Ayyoub M, Gupta B (2018) Collusion attacks mitigation in internet of things: a fog based model. Multimed Tools Appl 77(14):18249–18268
Zaslavsky A, Perera C, Georgakopoulos D (2013) Sensing as a service and big data. arXiv preprint arXiv:13010159
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Maati, B., Saidouni, D.E. CIoTAS protocol: CloudIoT available services protocol through autonomic computing against distributed denial of services attacks. J Ambient Intell Human Comput 14, 15175–15204 (2023). https://doi.org/10.1007/s12652-020-02556-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02556-0