IDIoT: Securing the Internet of Things like it's 1994

12/11/2017
by   David Barrera, et al.
0

Over 20 billion Internet of Things devices are set to come online by 2020. Protecting such a large number of underpowered, UI-less, network-connected devices will require a new security paradigm. We argue that solutions dependent on vendor cooperation such as secure coding and platform changes are unlikely to provide adequate defenses for the majority of devices. Similarly, regulation approaches face a number implementation challenges which limit their effectiveness. As part of the new paradigm, we propose IDIoT, a network security policy enforcement framework for IoT devices. IDIoT prevents widespread network attacks by restricting IoT devices to only their necessary network behavior. IDIoT is simple and effective, building on decades of tried-and-true network security principles without requiring changes to the devices or cloud infrastructure.

READ FULL TEXT
research
03/03/2019

A survey of security and privacy issues in the Internet of Things from the layered context

Internet of Things (IoT) is a novel paradigm, which not only facilitates...
research
08/27/2018

Internet of Entities (IoE): a Blockchain-based Distributed Paradigm to Security

The exponential growth of wireless-based solutions, such as those relate...
research
01/19/2022

Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits

Internet of Things devices are widely adopted by the general population....
research
02/26/2019

Selling a Single Item with Negative Externalities

We consider the problem of regulating products with negative externaliti...
research
09/09/2022

A Close Look at a Systematic Method for Analyzing Sets of Security Advice

We carry out a detailed analysis of the security advice coding method (S...
research
09/30/2018

Community-Based Security for the Internet of Things

With more and more devices becoming connectable to the internet, the num...
research
03/05/2020

SERENIoT: Collaborative Network Security Policy Management and Enforcement for Smart Homes

Network traffic whitelisting has emerged as a dominant approach for secu...

Please sign up or login with your details

Forgot password? Click here to reset