Design and Development of Effective Cyber Threat Intelligence Platform to Improve Cyber Resilience

Main Article Content

Neelima Kant, Amrita

Abstract

Cyber-Physical Systems (CPS) are a ubiquitous notion in which items that are networked and equipped with internet connectivity may sense and send data via a network. Examine how CPS devices might be used in a smart home setting. The Internet of Things, or IoT, has become increasingly popular because of all of its advantages, which include increased human comfort, cost effectiveness, time efficiency, and wise use of electricity. The low-capacity sensor node, which consists of many parts linked by a wireless network and can function as either hosts or clients on the internet, is the central component of the cyber-physical system. Resources such as limited processing power, storage capacity, and energy backup make traditional desktop security techniques ineffective in these systems. Introducing Secure Auth Key, a lightweight key agreement and authentication system ready to tackle confidentiality problems and security risks present in modern constraint-based CPS systems.


The intended result consists of a security algorithm that guarantees trust, security, and user data privacy without sacrificing the adaptability and autonomy of CPS devices, as well as a lightweight authentication system for cyber-physical devices. Dynamicity and scalability are ensured by an inventive middleware module that is implemented on the Raspberry platform and makes CPS-based devices and services interoperable. The main objective is to provide a flexible framework for a safe Internet of Things infrastructure and assess its efficacy in various contexts that are focused on the user.


The goal of the suggested technique is to achieve mutual authentication across CPS devices as efficiently and as little as possible in terms of computing overhead. In order to safeguard wireless connections and strengthen the system against several cyberthreats, it produces dynamic session keys. A novel lightweight security solution that balances security, performance, and cost is desperately needed, as constraint-based CPS systems have limited resources. Secure Auth Key is tested on the Smart Home System, where a proof-of-concept prototype shows the robustness of the system.


 Even with modest computing power, little storage, and little energy backup, the algorithm performs well. Experiments conducted in real life, such as replay assaults, man-in-the-middle attacks, and penetration testing, highlight how effective the system is in a variety of situations. By generating fresh session keys, each 128 bits in length, the proposed technique ensures a lightweight end-to-end key formation mechanism for every session, easing worries about session expiration. This small key size helps algorithms run more quickly, and pre-configuring every device improves system security by preventing hackers from knowing the exact configuration settings.

Article Details

Section
Articles