Security in the Internet of Things through obfuscation and diversification

Shohreh Hosseinzadeh, Sampsa Rauti, Sami Hyrynsalmi, Ville Leppänen

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

3 Citations (Scopus)

Abstract

Internet of Things (IoT) is composed of heterogeneous embedded and wearable sensors and devices that collect and share information over the Internet. This may contain private information of the users. Thus, securing the information and preserving the privacy of the users are of paramount importance. In this paper we look into the possibility of applying the two techniques, obfuscation and diversification, in IoT. Diversification and obfuscation techniques are two outstanding security techniques used for proactively protecting the software and code. We propose obfuscating and diversifying the operating systems and APIs on the IoT devices, and also some communication protocols enabling the external use of IoT devices. We believe that the proposed ideas mitigate the risk of unknown zero-day attacks, large-scale attacks, and also the targeted attacks.
Original languageEnglish
Title of host publication2015 International Conference on Computing, Communication and Security (ICCCS)
Subtitle of host publication4-5 Dec. 2015, Mauritius
PublisherIEEE COMPUTER SOCIETY PRESS
Pages1-5
Number of pages5
ISBN (Electronic)978-1-4673-9354-6
DOIs
Publication statusPublished - 4 Dec 2015
Externally publishedYes
Publication typeA4 Article in conference proceedings

Publication forum classification

  • No publication forum level

Fingerprint

Dive into the research topics of 'Security in the Internet of Things through obfuscation and diversification'. Together they form a unique fingerprint.

Cite this