Author:
Wedaj Kibret Samuel,Paul Kolin,J. Ribeiro Vinay
Abstract
Application domains in embedded systems such as Industrial Internet of Things (IIoTs) involve smart, mobile, and interconnected devices that operate in large numbers (devices swarms). These devices process and exchange safety, privacy, and mission-critical information. Thus, message exchanges, task collaborations, and service deliveries necessitate the communicating devices to trust each other. In this regard, it is essential to have a suitable device verification technique that scales to device swarms and establishes trust among collaborating devices. However, state-of-the-art device swarm attestation schemes assume a single external verifier and do not offer resiliency. In addition, in a swarm of self-organizing IoT networks, each member device independently changes its position (i.e., continuously entering and leaving the network). Thus, it becomes very challenging for the trusted external verifier to track these mobile devices, which further exacerbates the problem of authentication, identification, and management of swarm members. We present a novel AI-powered self-healing decentralized attestation that distributes attestation among devices for systems that work in swarms. Decentralization decreases delay and overcomes the problem of a single point of failure. To ensure swarm security, interoperability, and management, we use a reusable digital identity for each physical system (IoT node), allowing authentication and authorization of access. Each device is leveraged with an ML model, where verifications are carried out on its device twin, that is, the digital representations of the attestable properties of the member device. After each attestation, our system quickly extracts information about swarm members and establishes a chained relationship (chains of trusted blocks) with one another. This chain comprises devices with benign software configurations. We evaluate performance and demonstrate if the execution overhead is negligible. We also analyze security and show that the proposed technique is very effective and robust against various attacks.
Reference48 articles.
1. Şahin E. Swarm robotics: From sources of inspiration to domains of application. In: International Workshop on Swarm Robotics. Berlin, Heidelberg: Springer; 2004. pp. 10-20. DOI: 10.1007/978-3-540-30552-1_2
2. Illera AG, Vidal JV. Lights off! The darkness of the smart meters. In: BlackHat Europe. 2014
3. Vijayan J. Stuxnet renews power grid security concerns. Computerworld. 2010:26. Available from:
4. Kabay M. Attacks on Power Systems: Hackers Malware. Network World Website. Norwich University; 2010. Available from:
5. Pollet J, Cummins J. Electricity for free? The dirty underbelly of scada and smart meters. In: Proceedings of Black Hat USA 2010. 2010