Combination of Techniques Could Improve Security for Internet of Things Devices
October 15, 2019 | Pennsylvania State UniversityEstimated reading time: 3 minutes
A multi-pronged data analysis approach that can strengthen the security of Internet of Things (IoT) devices — such as smart TVs, home video cameras and baby monitors — against current risks and threats has been created by a team of Penn State World Campus students pursuing master of professional studies degrees in information sciences.
Image Caption: A team of Penn State World Campus students have created an approach to strengthen the security of Internet of Things (IoT) devices — such as smart TVs, home video cameras and baby monitors — against current risks and threats. Credit: Bence Boros, Unsplash
“By 2020, more than 20 billion IoT devices will be in operation, and these devices can leave people vulnerable to security breaches that can put their personal data at risk, or worse, affect their safety,” said Beulah Samuel, who is majoring in information sciences. “Yet no strategy exists to identify when and where a network security attack on these devices is taking place and what such an attack even looks like.”
The team applied a combination of approaches often used in traditional network security management to an IoT network simulated by the University of New South Wales Canberra, Australia. Specifically, the team showed how statistical data, machine learning and other data analysis methods could be applied to assure the security of IoT systems across their lifecycle. The researchers then used intrusion detection and a visualization tool, to determine whether or not an attack had already occurred or was in progress within that network.
The researchers describe their approach and findings in a paper to be presented today (Oct. 10) at the 2019 IEEE Ubiquitous Computing, Electronics and Mobile Communication Conference. The researchers received the “Best Paper” award for their work.
One of the data analysis techniques the team applied was the open-source, freely available, R statistical suite, which they used to characterize the IoT systems in use on the Canberra network. In addition, they used machine learning solutions to search for patterns in the data that were not apparent using R.
“One of the challenges in maintaining security for IoT networks is simply identifying all the devices that are operating on the network,” said John Haller, an information sciences major. “Statistical programs, like R, can characterize and identify the user agents.”
The researchers used the widely available Splunk intrusion detection tool, which comprises software for searching, monitoring and analyzing network traffic, via a web-style interface.
“Splunk is an analytical tool that is often used in traditional network-traffic monitoring, but had only seen limited application to IoT traffic, until now,” said information sciences major Melanie Seekins.
Using these tools, and others, the team identified three IP addresses that were actively trying to break into the Canberra network’s devices.
“We observed three IP addresses attempting to attach to the IoT devices multiple times over a period of time using different protocols,” said Andrew Brandon, who is majoring in information sciences. “This clearly indicates a Distributed Denial of Service attack, which aims to disrupt and/or render devices unavailable to the owners.”
As the basis for their approach, the researchers compared it to a common framework used to help manage risk, the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF).
“The NIST RMF was not created for IoT systems, but it provides a framework that organizations can use to tailor, test and monitor implemented security controls. This lends credibility to our approach,” said Brandon.
Ultimately, Seekins said, the ability to analyze IoT data using the team’s approach may enable security professionals to identify and manage controls to mitigate risk and analyze incidents as they occur.
“Knowing what has taken place in an actual attack helps us write scripts and monitors to look for those patterns,” she said. “These predictive patterns and the use of machine learning and artificial intelligence can help us anticipate and prepare for major attacks using IoT devices.”
The team hopes their approach will contribute to the creation of a standard protocol for IoT network security.
“There is no standardization for IoT security,” said Seekins. “Each manufacturer or vendor creates their own idea of what security looks like, and this can become proprietary and may or may not work with other devices. Our strategy is a good first step toward alleviating this problem.”
Testimonial
"In a year when every marketing dollar mattered, I chose to keep I-Connect007 in our 2025 plan. Their commitment to high-quality, insightful content aligns with Koh Young’s values and helps readers navigate a changing industry. "
Brent Fischthal - Koh YoungSuggested Items
productronica 2025: iTAC Presents AI-supported Knowledge Platform for Connected Production
10/29/2025 | iTAC Software AGIn modern manufacturing facilities, valuable knowledge is stored in systems, documents, and the minds of employees – often fragmented, isolated, and not centrally available.
Unlocking the Promise of AI in Electronic Manufacturing
10/29/2025 | Shobhit Agrawal, Keysight TechnologiesThe electronics manufacturing industry is rapidly evolving as more complicated products are introduced in the production lines, which require technological advancements even in the production processes. The requirements for production that is efficient, product quality that is greater, and product life cycles that are shorter are more crucial than ever before. In the electronic device life cycle, from design to maintenance, test phases have a significant impact on the economy of the company. Test processes are closely linked to the production volume and impacted by the complexity of the product. For businesses to maintain their competitive edge, they need to adopt innovative solutions and redefine processes.
Better Sustainability Policies for Electronics
10/29/2025 | Diana Radovan, Global Electronics AssociationI joined the Global Electronics Association in August 2025 as the director of sustainability policy. Since then, much has happened in terms of geopolitics and in the development and re-envisioning of sustainability policies in the industry. While the European Commission has released several legislative packages to simplify sustainability requirements (“omnibus”), these developments haven’t yet settled and are not in effect. Given the many recent and ongoing public consultations, with often conflicting input from a broad range of stakeholders, final negotiations remain rather polarized among policymakers.
SEMI Reports Global Silicon Wafer Shipments to Rebound 5.4% in 2025, with New Record Expected by 2028
10/29/2025 | SEMIGlobal shipments of silicon wafers are projected to increase 5.4% in 2025 to 12,824 million square inches (MSI) followed by steady growth through 2028 when the market is expected to reach a new industry record of 15,485 MSI, SEMI reported today in its annual silicon shipment forecast.
WestDev Announces Advanced Thermal Analysis Integration for Pulsonix PCB Design Suite
10/29/2025 | WestDev Ltd.Pulsonix, the industry-leading PCB design software from WestDev Ltd., announced a major enhancement to its design ecosystem: a direct interface between Pulsonix and ADAM Research's TRM (Thermal Risk Management) analysis software.