SERENIoT: Collaborative Network Security Policy Management and Enforcement for Smart Homes

03/05/2020
by   Corentin Thomasset, et al.
0

Network traffic whitelisting has emerged as a dominant approach for securing consumer IoT devices. However, determining what the whitelisted behavior of an IoT device should be remains an open challenge. Proposals to date have relied on manufacturers and trusted parties to provide whitelists, but these proposals require manufacturer involvement or placing trust in an additional stakeholder. Alternatively, locally monitoring devices can allow building whitelists of observed behavior, but devices may not exhaust their functionality set during the observation period, or the behavior may change following a software update which requires re-training. This paper proposes a blockchain-based system for determining whether an IoT device is behaving like other devices of the same type. Our system (SERENIoT, pronounced Serenity) overcomes the challenge of initially determining the correct behavior for a device. Nodes in the SERENIoT public blockchain submit summaries of the network behavior observed for connected IoT devices and build whitelists of behavior observed by the majority of nodes. Changes in behavior through software updates are automatically whitelisted once the update is broadly deployed. Through a proof-of-concept implementation of SERENIoT on a small Raspberry Pi IoT network and a large-scale Amazon EC2 simulation, we evaluate the security, scalability, and performance of our system.

READ FULL TEXT
research
05/11/2018

Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution

The prevalence of IoT devices makes them an ideal target for attackers. ...
research
08/30/2022

Software Update Practices on Smart Home IoT Devices

Smart home IoT devices are known to be breeding grounds for security and...
research
08/09/2018

Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management

The emerging Internet of Things (IoT) drastically increases the number o...
research
12/11/2017

IDIoT: Securing the Internet of Things like it's 1994

Over 20 billion Internet of Things devices are set to come online by 202...
research
02/11/2019

Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things

A large number of IoT devices are connected via the Internet. However, m...
research
07/13/2018

ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices

Secure firmware update is an important stage in the IoT device life-cycl...
research
02/29/2020

Improving Sustainability of Cryptocurrency Payment Networks for IoT Applications

Blockchain-based cryptocurrencies received a lot of attention recently f...

Please sign up or login with your details

Forgot password? Click here to reset