Security at the Edge for Resource-Limited IoT Devices

被引:19
作者
Canavese, Daniele [1 ]
Mannella, Luca [2 ]
Regano, Leonardo [3 ]
Basile, Cataldo [2 ]
机构
[1] CNRS, IRIT, 118 Route Narbonne, F-31062 Toulouse 9, France
[2] Politecn Torino, Dipartimento Automat & Informat, Corso Duca Abruzzi 24, I-10129 Turin, Italy
[3] Univ Cagliari, Dipartimento Ingn Elettr & Elettron, I-09123 Cagliari, Italy
关键词
authentication; cybersecurity; edge computing; Internet of Things (IoT); intrusion prevention system (IPS); machine learning; gateways; oblivious authentication; proxy; virtual private network (VPN); INTRUSION DETECTION; SYSTEM;
D O I
10.3390/s24020590
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) is rapidly growing, with an estimated 14.4 billion active endpoints in 2022 and a forecast of approximately 30 billion connected devices by 2027. This proliferation of IoT devices has come with significant security challenges, including intrinsic security vulnerabilities, limited computing power, and the absence of timely security updates. Attacks leveraging such shortcomings could lead to severe consequences, including data breaches and potential disruptions to critical infrastructures. In response to these challenges, this research paper presents the IoT Proxy, a modular component designed to create a more resilient and secure IoT environment, especially in resource-limited scenarios. The core idea behind the IoT Proxy is to externalize security-related aspects of IoT devices by channeling their traffic through a secure network gateway equipped with different Virtual Network Security Functions (VNSFs). Our solution includes a Virtual Private Network (VPN) terminator and an Intrusion Prevention System (IPS) that uses a machine learning-based technique called oblivious authentication to identify connected devices. The IoT Proxy's modular, scalable, and externalized security approach creates a more resilient and secure IoT environment, especially for resource-limited IoT devices. The promising experimental results from laboratory testing demonstrate the suitability of IoT Proxy to secure real-world IoT ecosystems.
引用
收藏
页数:16
相关论文
共 46 条
[1]   Deep Pain: Exploiting Long Short-Term Memory Networks for Facial Expression Classification [J].
Rodriguez, Pau ;
Cucurull, Guillem ;
Gonzalez, Jordi ;
Gonfaus, Josep M. ;
Nasrollahi, Kamal ;
Moeslund, Thomas B. ;
Roca, F. Xavier .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (05) :3314-3324
[2]   Security Function Virtualization for IoT Applications in 6G Networks [J].
Aman M.N. ;
Javaid U. ;
Sikdar B. .
1600, Institute of Electrical and Electronics Engineers Inc. (05) :90-95
[3]  
[Anonymous], 2012, NFV Whitepaper: Network Function Virtualization, Issue 1
[4]  
[Anonymous], 1981, RFC 792 (Internet Standard), DOI DOI 10.17487/RFC0792
[5]  
[Anonymous], 2014, ETSI GS NFV 003 V1.2.1: Network Functions Virtualisation (NFV)
[6]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[7]   PDAE: Efficient network intrusion detection in IoT using parallel deep auto-encoders [J].
Basati, Amir ;
Faghih, Mohammad Mehdi .
INFORMATION SCIENCES, 2022, 598 :57-74
[8]   A model of capabilities of Network Security Functions [J].
Basile, Cataldo ;
Canavese, Daniele ;
Regano, Leonardo ;
Pedone, Ignazio ;
Lioy, Antonio .
PROCEEDINGS OF THE 2022 IEEE 8TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2022): NETWORK SOFTWARIZATION COMING OF AGE: NEW CHALLENGES AND OPPORTUNITIES, 2022, :474-479
[9]  
Berbecaru Diana Gratiela, 2023, 2023 IEEE Symposium on Computers and Communications (ISCC), P758, DOI 10.1109/ISCC58397.2023.10217930
[10]  
Bruegge Fernando, 2023, Technical report