How to Improve the IoT Security Implementing IDS/IPS Tool using Raspberry Pi 3B+
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 9
Abstract
This work shows a methodology of implementation and testing of the system is proposed and tested with a prototype; it is constructed with sensors and actuators that allow monitoring the behavior of the system in an environment under threats. We used an IDS / IPS as a protection tool for IoT systems, based on Raspberry Pi and Raspbian operating system. It is described in a block diagram the testing method used. We implemented the IDS/IPS Snort tool in an embedded platform Raspberry. It presents also the state of the art of cloud frameworks that have the same objective of protecting. The main contribution is the implemented testing method for Snort that can be used with security rules in other applications of embedded IoT devices.
Authors and Affiliations
Ruíz-Lagunas Juan Jesús, Antolino-Hernández Anastacio, Reyes-Gutiérrez Mauricio René, Ferreira-Medina Heberto, Torres-Millarez Cristhian, Paniagua-Villagómez Omar
Multilevel Security Protocol using RFID
Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake. In this work, we have considered some existing security protocol...
A Low Cost FPGA based Cryptosystem Design for High Throughput Area Ratio
Over many years, Field Programmable Gated Ar-rays (FPGA) have been used as a target device for various prototyping and cryptographic algorithm applications. Due to the parallel architecture of FPGAs, the flexibility of c...
An Optimized Inset Feed Circular Cross Strip Antenna Design for C-Band Satellite Links
This proposed antenna model and progressing the investigation of an inset fed wideband circular slotted patch antenna is suitable for 5.2 GHz satellite C-band applications. A circularly shaped slot has been chosen to be...
Experimental Analysis of Color Image Scrambling in the Spatial Domain and Transform Domain
This paper proposes two image-scrambling algorithms based on self-generated keys. First color image scrambling method works in the spatial domain, and second, works in the transform domain. The proposed methods cull the...
A New Image-Based Model For Predicting Cracks In Sewer Pipes
Visual inspection by a human operator has been mostly used up till now to detect cracks in sewer pipes. In this paper, we address the problem of automated detection of such cracks. We propose a model which detects crack...