IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source

被引:5
作者
Abbas, Syed Ghazanfar [1 ]
Husnain, Muhammad [1 ]
Fayyaz, Ubaid Ullah [1 ]
Shahzad, Farrukh [1 ]
Shah, Ghalib A. [1 ]
Zafar, Kashif [2 ]
机构
[1] Univ Engn & Technol, Al Khawarizmi Inst Comp Sci KICS, Lahore, Pakistan
[2] Natl Univ Comp & Emerging Sci, Lahore, Pakistan
来源
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) | 2020年
关键词
IoT; IoT devices security; Difference Between IoT and Non-IoT; IoT attacks; IoT communication; THINGS IOT; INTERNET;
D O I
10.1109/TrustCom50675.2020.00189
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this research we propose a framework that will strengthen the IoT devices security from dual perspectives; avoid devices to become attack target as well as a source of an attack. Unlike traditional devices, IoT devices are equipped with insufficient host-based defense system and a continuous internet connection. All time internet enabled devices with insufficient security allures the attackers to use such devices and carry out their attacks on rest of internet. When plethora of vulnerable devices become source of an attack, intensity of such attacks increases exponentially. Mirai was one of the first well-known attack that exploited large number of vulnerable IoT devices, that bring down a large part of Internet. To strengthen the IoT devices from dual security perspective, we propose a two step framework. Firstly, confine the communication boundary of IoT devices; IoT-Sphere. A sphere of IPs that are allowed to communicate with a device. Any communication that violates the sphere will be blocked at the gateway level. Secondly, only allowed communication will be evaluated for potential attacks and anomalies using advance detection engines. To show the effectiveness of our proposed framework, we perform couple of attacks on IoT devices; camera and google home and show the feasibility of IoT-Sphere.
引用
收藏
页码:1403 / 1410
页数:8
相关论文
共 26 条
[1]  
[Anonymous], LOW ORBIT ION CANNON
[2]  
[Anonymous], IOT BUSINESS NEWS
[3]  
[Anonymous], 1998, REAL TIME STREAMING
[4]  
[Anonymous], The 5 worst examples of IoT hacking and vulnerabilities in recorded history. IoT for all
[5]  
[Anonymous], CHALLENGES ENSURING
[6]  
[Anonymous], 2019, TL BOTS GITHUB
[7]  
Beavers J., 2019, BLOCKCHAIN CLIN TRIA
[8]  
Cañedo J, 2016, ANN CONF PRIV SECUR
[9]   The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective [J].
Caron, Xavier ;
Bosua, Rachelle ;
Maynard, Sean B. ;
Ahmad, Atif .
COMPUTER LAW & SECURITY REVIEW, 2016, 32 (01) :4-15
[10]   IoT Botnet: The Largest Threat to the IoT Network [J].
Dange, Smita ;
Chatterjee, Madhumita .
DATA COMMUNICATION AND NETWORKS, GUCON 2019, 2020, 1049 :137-157