Affiliation:
1. Florida International University, Miami, FL
Abstract
Enterprise Internet of Things (E-IoT) systems allow users to control audio, video, scheduled events, lightning fixtures, door access, and relays in complex smart installations. These systems are widely used in government or smart private offices, smart buildings/homes, conference rooms, schools, hotels, and similar professional settings. However, even with their widespread use, the security of many E-IoT systems and components has not been researched in the literature. To address this research gap, we focus on E-IoT communication buses, one of the core components used to connect E-IoT devices, and introduce
LightningStrike
attacks that demonstrate several weaknesses with E-IoT proprietary communication protocols used in E-IoT communication buses. Specifically, we show that popular E-IoT proprietary communication protocols are susceptible to Denial-of-Service (DoS), eavesdropping, impersonation, and replay attacks. As such threats cannot be mitigated through traditional defense mechanisms due to the limitations posed by E-IoT, we propose
LGuard
, a defense system to protect E-IoT systems against the attacks over communication buses.
LGuard
uses closed-circuit television footage and computer vision techniques to detect replay attacks. For impersonation and DoS attacks,
LGuard
utilizes traffic analysis. Finally,
LGuard
obfuscates the E-IoT traffic via inserting redundant traffic to the bus against eavesdropping attacks. We evaluated the performance of
LGuard
in a realistic E-IoT deployment, and our detailed evaluations show that
LGuard
achieves an overall accuracy and precision of 99% in detecting DoS, impersonation, and replay attacks while effectively increasing the difficulty of extracting valuable information for eavesdroppers. In addition,
LGuard
does not incur any operational overhead or modification to the existing E-IoT system.
Funder
U.S. National Science Foundation
Microsoft Research Grant
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture,Safety Research,Information Systems,Software
Reference54 articles.
1. SoK: Security Evaluation of Home-Based IoT Deployments
2. A. Arabo and B. Pranggono. 2013. Mobile malware and smart device security: Trends, challenges and solutions. In Proceedings of the 2013 19th International Conference on Control Systems and Computer Science.
3. A system-level behavioral detection framework for compromised CPS devices: Smart-grid case;Babun Leonardo;ACM Transactions on Cyber-Physical Systems,2019
4. Leonardo Babun Z. Berkay Celik Patrick McDaniel and A. Selcuk Uluagac. 2019. Real-time analysis of privacy-(un)aware IoT applications. arxiv:1911.10461 [cs.CR].
5. The OpenCV Library;Bradski G.;Dr. Dobb’s Journal of Software Tools,2000