IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks

被引:15
作者
Aman, Muhammad Naveed [1 ]
Javaid, Uzair [2 ]
Sikdar, Biplab [2 ]
机构
[1] Natl Univ Singapore, Sch Comp, Singapore 117417, Singapore
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 117576, Singapore
来源
IEEE SYSTEMS JOURNAL | 2022年 / 16卷 / 03期
基金
新加坡国家研究基金会;
关键词
Logic gates; Malware; Security; Physical unclonable function; Protocols; Performance evaluation; Wireless fidelity; Internet of Things (IoT); malware; network security; patching; software attestation; ATTESTATION;
D O I
10.1109/JSYST.2021.3070404
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional malware propagation control schemes do not prevent device-to-device (D2D) malware spread, have high time cost, and may result in low probability of detecting compromised devices. Moreover, the unprecedented scale and heterogeneity of Internet of Things (IoT) devices make these schemes inapplicable to IoT networks. Therefore, to rectify these issues, this article presents a secure patching framework for IoT with different network isolation levels to efficiently mitigate and control malware propagation. It uses remote attestation to detect compromised devices with a high probability and identify the origin of malicious activities. It also proposes virtual patching of devices via physical unclonable functions (PUFs) to contain the malware spread. The isolation levels are based on the susceptible, exposed, infected, and resistant (SEIR) model that act as an access control list to quantify device operation and mitigate D2D malware spread. We present a security analysis based on the access control logic model. A performance evaluation with a comparative analysis is also discussed using the SEIR model. These analyses confirm the reduction in patching time and superior performance of our framework, i.e., with 10% of initially infected devices, IoT-Proctor had a reduction rate of malware five times faster than the existing techniques.
引用
收藏
页码:3468 / 3479
页数:12
相关论文
共 52 条
  • [11] [Anonymous], ALERT TA16288
  • [12] TyTAN: Tiny Trust Anchor for Tiny Devices
    Brasser, Ferdinand
    El Mahjoub, Brahim
    Sadeghi, Ahmad-Reza
    Wachsmann, Christian
    Koeberl, Patrick
    [J]. 2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [13] Modelling Spreading Process Induced by Agent Mobility in Complex Networks
    Chai, Wei Koong
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2018, 5 (04): : 336 - 349
  • [14] Chaudhry S. A., IEEE SYST J
  • [15] Traffic-Aware Patching for Cyber Security in Mobile IoT
    Cheng, Shin-Ming
    Chen, Pin-Yu
    Lin, Ching-Chao
    Hsiao, Hsu-Chun
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (07) : 29 - 35
  • [16] Chin S., 2010, Access Control, Security, and Trust: A Logical Approach
  • [17] Das R., 2018, 2018 IEEE INT C COMM, P1, DOI [DOI 10.1109/ICC.2018.8422832, 10.1109/ICCECE.2017.8526232]
  • [18] Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
  • [19] Eldefrawy K., 2012, NDSS, V12, P1
  • [20] Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key
    Ghani, Anwar
    Mansoor, Khwaja
    Mehmood, Shahid
    Chaudhry, Shehzad Ashraf
    Rahman, Arif Ur
    Saqib, Malik Najmus
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (16)