It Is Not Where You Are, It Is Where You Are Registered: IoT Location Impact

12/03/2022
by   Bar Meyuhas, et al.
0

This paper investigates how and with whom IoT devices communicate and how their location affects their communication patterns. Specifically, the endpoints an IoT device communicates with can be defined as a small set of domains. To study how the location of the device affects its domain set, we distinguish between the location based on its IP address and the location defined by the user when registering the device. We show, unlike common wisdom, that IP-based location has little to no effect on the set of domains, while the user-defined location changes the set significantly. Unlike common approaches to resolving domains to IP addresses at close-by geo-locations (such as anycast), we present a distinctive way to use the ECS field of EDNS to achieve the same differentiation between user-defined locations. Our solution streamlines the network design of IoT manufacturers and makes it easier for security appliances to monitor IoT traffic. Finally, we show that with one domain for all locations, one can achieve succinct descriptions of the traffic of the IoT device across the globe. We will discuss the implications of such description on security appliances and specifically, on the ones using the Manufacturer Usage Description (MUD) framework.

READ FULL TEXT

page 6

page 7

research
09/10/2020

Network Traffic Analysis based IoT Device Identification

Device identification is the process of identifying a device on Internet...
research
11/03/2022

Machine Learning Methods for Device Identification Using Wireless Fingerprinting

Industrial Internet of Things (IoT) systems increasingly rely on wireles...
research
11/01/2019

NFV-based IoT Security for Home Networks using MUD

A new scalable ISP level system architecture to secure and protect all I...
research
05/01/2023

IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception

Over the years, honeypots emerged as an important security tool to under...
research
02/14/2018

ICN enabling CoAP Extensions for IP based IoT devices

The Constrained Application Protocol (CoAP) and its extensions, such as ...
research
06/06/2020

IP Geolocation Underestimates Regressive Economic Patterns in MOOC Usage

Massive open online courses (MOOCs) promise to make rigorous higher educ...
research
09/03/2023

The End of the Canonical IoT Botnet: A Measurement Study of Mirai's Descendants

Since the burgeoning days of IoT, Mirai has been established as the cano...

Please sign up or login with your details

Forgot password? Click here to reset