A Formal Assisted Approach for Modeling and Testing Security Attacks in IoT Edge Devices

10/11/2022
by   A. Bhanpurawala, et al.
0

With the rapid growth in the number of IoT devices being added to the network, a major concern that arises is the security of these systems. As these devices are resource constrained, safety measures are difficult to implement on the edge. We propose a novel approach for the detection of IoT device attacks based on the use of formal modeling and mutation testing. Namely, we model the behavior of small IoT devices such as motion sensors and RFID reader as state machines with timeouts. We also model basic IoT attacks; namely, battery draining, sleep deprivation, data falsification, replay, and man in the middle attacks, as special mutants of these specifications. We also consider tests for detecting actual physical device manipulation. Mutation testing is then used to derive tests that distinguish these attacks from the original specifications. The behavior of these mutants is tested in real environment by running the tests on them. Our experiments show that derived the number of attack mutants and tests is small and thus these tests can be executed many times with limited overhead on the physical device. Consequently, our approach is not deterred by related high costs of traditional mutation testing. In addition, we also show that tests derived by our method which cover all IoT attacks do not provide good coverage of mutants derived using traditional mutation code-based operators and this indicates the need of using our method. A framework that implements our approach is presented along with some other relevant case studies.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/13/2018

U-PoT: A Honeypot Framework for UPnP-Based IoT Devices

The ubiquitous nature of the IoT devices has brought serious security im...
research
12/08/2018

IoT Lotto: Utilizing IoT Devices in Brute-Force Attacks

The number of IoT devices in use is increasing rapidly and so is the num...
research
02/07/2019

Verifying and Monitoring IoTs Network Behavior using MUD Profiles

IoT devices are increasingly being implicated in cyber-attacks, raising ...
research
05/30/2023

Design and implementation of intelligent packet filtering in IoT microcontroller-based devices

Internet of Things (IoT) devices are increasingly pervasive and essentia...
research
04/12/2018

Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report)

IoT devices are increasingly being implicated in cyber-attacks, driving ...
research
05/12/2021

Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference

The proliferation of Internet of Things (IoT) devices has made people's ...
research
01/17/2021

A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment

Selected procedures in [1] and additional simulation results are present...

Please sign up or login with your details

Forgot password? Click here to reset