Security at the Edge for Resource-Limited IoT Devices
Author:
Canavese Daniele1ORCID, Mannella Luca2ORCID, Regano Leonardo3ORCID, Basile Cataldo2ORCID
Affiliation:
1. IRIT, CNRS, 118 Route de Narbonne, CEDEX 9, F-31062 Toulouse, France 2. Dipartimento di Automatica e Informatica, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Turin, Italy 3. Dipartimento di Ingegneria Elettrica ed Elettronica, Università degli Studi di Cagliari, Piazza d’Armi, 09123 Cagliari, Italy
Abstract
The Internet of Things (IoT) is rapidly growing, with an estimated 14.4 billion active endpoints in 2022 and a forecast of approximately 30 billion connected devices by 2027. This proliferation of IoT devices has come with significant security challenges, including intrinsic security vulnerabilities, limited computing power, and the absence of timely security updates. Attacks leveraging such shortcomings could lead to severe consequences, including data breaches and potential disruptions to critical infrastructures. In response to these challenges, this research paper presents the IoT Proxy, a modular component designed to create a more resilient and secure IoT environment, especially in resource-limited scenarios. The core idea behind the IoT Proxy is to externalize security-related aspects of IoT devices by channeling their traffic through a secure network gateway equipped with different Virtual Network Security Functions (VNSFs). Our solution includes a Virtual Private Network (VPN) terminator and an Intrusion Prevention System (IPS) that uses a machine learning-based technique called oblivious authentication to identify connected devices. The IoT Proxy’s modular, scalable, and externalized security approach creates a more resilient and secure IoT environment, especially for resource-limited IoT devices. The promising experimental results from laboratory testing demonstrate the suitability of IoT Proxy to secure real-world IoT ecosystems.
Funder
Fondazione CRT project SERICS
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference46 articles.
1. Bruegge, F., Hasan, M., Kulezak, M., Lasse Lueth, K., Pasqua, E., Sinha, S., Wegner, P., Baviskar, K., and Taparia, A. (2023). State of IoT—Spring 2023, IoT Analytics GmbH. Technical Report. 2. Kumar, D., Shen, K., Case, B., Garg, D., Alperovich, G., Kuznetsov, D., Gupta, R., and Durumeric, Z. (2019, January 14–16). All things considered: An analysis of IoT devices on home networks. Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, USA. 3. Langiu, A., Boano, C.A., Schuß, M., and Römer, K. (2019, January 7–10). UpKit: An Open-Source, Portable, and Lightweight Update Framework for Constrained IoT Devices. Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA. 4. Helping novice developers harness security issues in cloud-IoT systems;Corno;J. Reliab. Intell. Environ.,2022 5. Corno, F., and Mannella, L. (2023). Security Evaluation of Arduino Projects Developed by Hobbyist IoT Programmers. Sensors, 23.
|
|