skip to main content
10.1145/2834050.2834095acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things

Published:16 November 2015Publication History

ABSTRACT

The Internet-of-Things (IoT) has quickly moved from the realm of hype to reality with estimates of over 25 billion devices deployed by 2020. While IoT has huge potential for societal impact, it comes with a number of key security challenges---IoT devices can become the entry points into critical infrastructures and can be exploited to leak sensitive information. Traditional host-centric security solutions in today's IT ecosystems (e.g., antivirus, software patches) are fundamentally at odds with the realities of IoT (e.g., poor vendor security practices and constrained hardware). We argue that the network will have to play a critical role in securing IoT deployments. However, the scale, diversity, cyberphysical coupling, and cross-device use cases inherent to IoT require us to rethink network security along three key dimensions: (1) abstractions for security policies; (2) mechanisms to learn attack and normal profiles; and (3) dynamic and context-aware enforcement capabilities. Our goal in this paper is to highlight these challenges and sketch a roadmap to avoid this impending security disaster.

Skip Supplemental Material Section

Supplemental Material

a5.mp4

mp4

843.1 MB

References

  1. Belkin Wemo. http://www.belkin.com/us/Products/home-automation/c/wemo-home-automation/.Google ScholarGoogle Scholar
  2. Commtouch Antivirus for Embedded OS Datasheet. http://www.commtouch.com/uploads/pdf/Commtouch-Antivirus-for-Embedded-OS-Datasheet.pdf.Google ScholarGoogle Scholar
  3. Fridge sends spam emails as attack hits smart gadgets. http://www.bbc.com/news/technology-25780908.Google ScholarGoogle Scholar
  4. Gartner Says 4.9 Billion Connected "Things" Will Be in Use in 2015. http://www.gartner.com/newsroom/id/2905717.Google ScholarGoogle Scholar
  5. Google ON hub. https://on.google.com/hub/.Google ScholarGoogle Scholar
  6. Hackers attack shipping and logistics firms using malware laden handheld scanners. http://www.securityweek.com/hackers-attack-shipping-and-logistics-firms-using-malware-laden-handheld-scanners.Google ScholarGoogle Scholar
  7. IFTTT Recipes. https://ifttt.com/recipes.Google ScholarGoogle Scholar
  8. Monkey. http://developer.android.com/tools/help/monkey.html.Google ScholarGoogle Scholar
  9. NEST. https://nest.com/.Google ScholarGoogle Scholar
  10. Netflix Simian Army. https://github.com/Netflix/SimianArmy.Google ScholarGoogle Scholar
  11. OpenDayLight. http://www.opendaylight.org/.Google ScholarGoogle Scholar
  12. Samsung Smartthings. http://www.smartthings.com/.Google ScholarGoogle Scholar
  13. Scout Alarm. https://www.scoutalarm.com/.Google ScholarGoogle Scholar
  14. SHODAN. https://www.shodan.io/.Google ScholarGoogle Scholar
  15. Smart meters can be hacked to cut power bills. http://www.bbc.com/news/technology-29643276.Google ScholarGoogle Scholar
  16. Squid. http://www.squid-cache.org/.Google ScholarGoogle Scholar
  17. The Internet of Things Is Wildly Insecure - And Often Unpatchable. http: //www.wired.com/2014/01/theres-no-good-way-to-patch-the-internet-of-things-and-thats-a-huge-problem/.Google ScholarGoogle Scholar
  18. Will giving the internet eyes and ears mean the end of privacy? http://www.theguardian.com/technology/2013/may/16/internet-of-things-privacy-google.Google ScholarGoogle Scholar
  19. S. K. Cha, M. Woo, and D. Brumley. Program-adaptive mutational fuzzing. In Proc. of the IEEE Symposium on Security and Privacy, pages 725--741, May 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Costin, J. Zaddach, A. Francillon, D. Balzarotti, and S. Antipolis. A large-scale analysis of the security of embedded firmwares. In USENIX Security Symposium, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. K. Datta, M. Gradinariu, M. Raynal, and G. Simon. Anonymous publish/subscribe in p2p networks. In Parallel and Distributed Processing Symposium, 2003. Proceedings. International, pages 8--pp. IEEE, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. P. Godefroid, M. Y. Levin, and D. Molnar. Sage: whitebox fuzzing for security testing. Queue, 10(1):20, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Kolbitsch, B. Livshits, B. Zorn, and C. Seifert. Rozzle: De-cloaking internet malware. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 443--457. IEEE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. T. Koponen et al. Onix: A Distributed Control Platform for Large-scale Production Network. In Proc. OSDI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. P. Levis, S. Madden, D. Gay, J. Polastre, R. Szewczyk, A. Woo, E. A. Brewer, and D. E. Culler. The emergence of networking abstractions and techniques in tinyos. In NSDI, volume 4, pages 1--1, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. Madhavapeddy, T. Leonard, M. Skjegstad, T. Gazagnaire, D. Sheets, D. Scott, R. Mortier, A. Chaudhry, B. Singh, J. Ludlam, et al. Jitsu: Just-in-time summoning of unikernels. In 12th USENIX Symposium on Networked System Design and Implementation, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. Martins, M. Ahmed, C. Raiciu, V. Olteanu, M. Honda, R. Bifulco, and F. Huici. ClickOS and the art of network function virtualization. In Proc. NSDI, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. F. McSherry and R. Mahajan. Differentially-private network trace analysis. ACM SIGCOMM Computer Communication Review, 41(4):123--134, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. P. Mittal, V. Paxson, R. Sommer, and M. Winterrowd. Securing mediated trace access using black-box permutation analysis. In HotNets. Citeseer, 2009.Google ScholarGoogle Scholar
  30. X. Ou, S. Govindavajhala, and A. W. Appel. Mulval: A logic-based network security analyzer. In USENIX security, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. J. Pang, B. Greenstein, M. Kaminsky, D. McCoy, and S. Seshan. Wifi-reports: Improving wireless network selection with collaboration. In Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, MobiSys '09, pages 123--136, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. A. Platzer. Verification of cyberphysical transportation systems. Intelligent Systems, IEEE, 24(4):10--13, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. C. Prakash, J. Lee, Y. Turner, J.-M. Kang, A. Akella, S. Banerjee, C. Clark, Y. Ma, P. Sharma, and Y. Zhang. Pga: Using graphs to express and automatically reconcile network policies. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pages 29--42. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. L. Ravindranath, S. Nath, J. Padhye, and H. Balakrishnan. Automatic and scalable fault detection for mobile applications. In Proceedings of the 12th annual international conference on Mobile systems, applications, and services, pages 190--203. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. M. Roesch et al. Snort: Lightweight intrusion detection for networks. In LISA, volume 99, pages 229--238, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. Automated generation and analysis of attack graphs. In Security and privacy, 2002. Proceedings. 2002 IEEE Symposium on, pages 273--284. IEEE, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. K. Walsh and E. G. Sirer. Experience with an object reputation system for peer-to-peer filesharing. In USENIX NSDI, volume 6, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        HotNets-XIV: Proceedings of the 14th ACM Workshop on Hot Topics in Networks
        November 2015
        189 pages
        ISBN:9781450340472
        DOI:10.1145/2834050

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 November 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate110of460submissions,24%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader