Toward Secure Edge Networks: Taming Device-to-Device (D2D) Communication in IoT

12/16/2017
by   Ibbad Hafeez, et al.
0

Security problems in environments hosting Internet-of-Things (IoT) devices have become apparent, as traditional signature-based anomaly detection techniques fail to secure them due to complex device-to-device (D2D) interactions and heterogeneous traffic patterns. To tackle this emerging security disparity, we propose IoT-KEEPER, a two-tier platform for securing IoT communications within and across edge networks. In specific, IoT-KEEPER secures not only the device-to-infrastructure (Internet) communication, but also D2D communications between devices within edge networks. Different from existing offline solutions that perform network traffic classification over already collected data, IoT-KEEPER continuously inspects the network to identify any suspicious activities and enforce necessary security policies to block such activities. Unlike legacy solutions such as firewall and NIDS, IoT-KEEPER is able to detect and block anomalous activities in the network with its feature-based clustering framework in real time, without requiring explicit traffic signatures nor additional hardware installation. We have deployed a real-world testbed to demonstrate that IoT-KEEPER can identify misbehaving IoT devices based on their network activity with high accuracy, and enforce security policies to isolate such devices in real time. IoT-KEEPER is lightweight, responsive and an effectively handle complex D2D interactions without requiring explicit attack signatures or sophisticated hardware.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/19/2018

IoT-KEEPER: Securing IoT Communications in Edge Networks

The increased popularity of IoT devices have made them lucrative targets...
research
05/30/2021

IoTAthena: Unveiling IoT Device Activities from Network Traffic

The recent spate of cyber attacks towards Internet of Things (IoT) devic...
research
10/07/2021

A Sidelink-Aided Approach for Secure Multicast Service Delivery: from Human-Oriented Multimedia Traffic to Machine Type Communications

To date, group-oriented communications have been mainly exploited for de...
research
03/14/2019

ETGuard: Detecting D2D Attacks using Wireless Evil Twins

In this paper, we demonstrate a realistic variant of wireless Evil Twins...
research
05/19/2020

Throughput and Age of Information in a Cellular-based IoT Network

In this paper, we consider a cellular-based Internet of things (IoT) net...
research
07/21/2017

Optimal Secure Multi-Layer IoT Network Design

With the remarkable growth of the Internet and communication technologie...
research
10/07/2021

Trusted and Secured D2D-Aided Communications in 5G Networks

The design of the forthcoming fifth generation (5G) system shall meet th...

Please sign up or login with your details

Forgot password? Click here to reset