A Denial-of-Sleep-Resilient Medium Access Control Layer for IEEE 802.15.4 Networks
With the emergence of the Internet of things (IoT), plenty of battery-powered and energy-harvesting devices are being deployed to fulfill sensing and actuation tasks in a variety of application areas, such as smart homes, precision agriculture, smart cities, and industrial automation. In this context, a critical issue is that of denial-of-sleep attacks. Such attacks deprive low-power devices of entering energy-saving sleep modes, thereby draining their charge. At the very least, a successful denial-of-sleep attack causes a long outage of the victim device. Moreover, as for battery-powered devices, successful denial-of-sleep attacks necessitate replacing batteries, which is tedious and sometimes even infeasible if a battery-powered device is deployed at an inaccessible location. While the research community came up with numerous defenses against denial-of-sleep attacks, most present-day IoT protocols include no denial-of-sleep defenses at all, presumably due to a lack of awareness and unsolved integration problems. After all, despite there are many denial-of-sleep defenses, effective defenses against certain kinds of denial-of-sleep attacks are yet to be found. The overall contribution of my PhD research, which I outline in this talk, is a denial-of-sleep-resilient medium access control (MAC) layer for IoT devices that communicate over IEEE 802.15.4 links. Internally, my MAC layer comprises two main components. The first component is a denial-of-sleep resilient protocol for establishing session keys among adjacent IEEE 802.15.4 nodes. The established session keys serve the dual purpose of implementing (i) basic wireless security and (ii) complementary denial-of-sleep defenses that belong to the second component. The second component is a denial-of-sleep-resilient MAC protocol. Notably, this MAC protocol not only incorporates novel denial-of-sleep defenses, but also state-of-the-art mechanisms for achieving low energy consumption, high throughput, and high delivery ratios. Altogether, my MAC layer resists, or at least greatly mitigates, all denial-of-sleep attacks against it we are aware of. Furthermore, my MAC layer is self-contained and thus can act as a drop-in replacement for IEEE 802.15.4-compliant, yet insecure MAC layers.
Toward a comprehensive framework for process mining
Process mining enables extraction of knowledge concerning the underlying processes from event data recorded in various information systems. In order to be able to perform process mining techniques data need to be in the form the so called, event log. As a relatively young research field, many techniques have been developed during the past few years and have proven to be able to extract useful insight across various domains. However, most of the focus of the research community have concentrated on the development of new and more efficient techniques, and other important aspects of the whole process of knowledge discovery such as event log extraction and transformation have often been neglected. In this talk we motivate the benefits of developing a comprehensive framework consisting of the full spectrum of process mining activities. Furthermore, I position my future research plan in order to collect feedback from fellow research school members.