Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3054977.3054997acmconferencesArticle/Chapter ViewAbstractPublication PagesiotdiConference Proceedingsconference-collections
short-paper

Designing a Micro-Moving Target IPv6 Defense for the Internet of Things

Published: 18 April 2017 Publication History

Abstract

As the use of low-power and low-resource embedded devices continues to increase dramatically with the introduction of new Internet of Things (IoT) devices, security techniques are necessary which are compatible with these devices. This research advances the knowledge in the area of cyber security for the IoT through the exploration of a moving target defense to apply for limiting the time attackers may conduct reconnaissance on embedded systems while considering the challenges presented from IoT devices such as resource and performance constraints. We introduce the design and optimizations for a Micro-Moving Target IPv6 Defense including a description of the modes of operation, needed protocols, and use of lightweight hash algorithms. We also detail the testing and validation possibilities including a Cooja simulation configuration, and describe the direction to further enhance and validate the security technique through large scale simulations and hardware testing followed by providing information on other future considerations.

References

[1]
Habtamu Abie and Ilangko Balasingham. 2012. Risk-based adaptive security for smart IoT in eHealth. In Proceedings of the 7th International Conference on Body Area Networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 269--275.
[2]
Ali-Amir Aldan, Omer Cerrahoglu, Erjona Topalli, and Xavier Soriano. 2016. Marauderfis Map: Sniffing MAC addresses in the MIT wireless network. (2016). https://courses.csail.mit.edu/6.857/2016/files/34.pdf
[3]
Ibrahim Ethem Bagci, Shahid Raza, Taeyoung Chung, Utz Roedig, and Thiemo Voigt. 2013. Combined secure storage and communication for the internet of things. In Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2013 10th Annual IEEE Communications Society Conference on. IEEE, 523--531.
[4]
Josep Balasch, Bariş Ege, Thomas Eisenbarth, Benoit Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, and others. 2012. Compact implementation and performance evaluation of hash functions in attiny devices. Springer.
[5]
Nabil Benamar, Antonio Jara, Latif Ladid, and Driss El Ouadghiri. 2014. Challenges of the internet of things: IPv6 and network management. In 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMS). IEEE, 328--333.
[6]
Riccardo Bonetto, Nicola Bui, Vishwas Lakkundi, Alexis Olivereau, Alexandru Serbanati, and Michele Rossi. 2012. Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples. In World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a. IEEE, 1--7.
[7]
Giacomo Brambilla, Marco Picone, Simone Cirani, Michele Amoretti, and Francesco Zanichelli. 2014. A simulation platform for large-scale internet of things scenarios in urban environments. In Proceedings of the First International Conference on IoT in Urban Space. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 50--55.
[8]
Paul Loh Ruen Chze and Kan Siew Leong. 2014. A secure multi-hop routing for IoT communication. In Internet of Things (WF-IoT), 2014 IEEE World Forum on. IEEE, 428--432.
[9]
OS Contiki. 2012. The Open Source OS for the Internet of Things. (2012).
[10]
Laurent Deru, Sébastien Dawans, Mathieu Ocaña, Bruno Quoitin, and Olivier Bonaventure. 2014. Redundant border routers for mission-critical 6lowpan networks. In Real-world wireless sensor networks. Springer, 195--203.
[11]
Matthew Dunlop, Stephen Groat, Randy Marchany, and Joseph Tront. 2011. The good, the bad, the IPv6. In Communication Networks and Services Research Conference (CNSR), 2011 Ninth Annual. IEEE, 77--84.
[12]
Matthew Dunlop, Stephen Groat, William Urbanski, Randy Marchany, and Joseph Tront. 2011. Mt6d: A moving target ipv6 defense. In Military Communications Conference, 2011-Milcom 2011. IEEE, 1321--1326.
[13]
Matthew Dunlop, Stephen Groat, William Urbanski, Randy Marchany, and Joseph Tront. 2012. The Blind Man's Bluff Approach to Security Using IPv6. Security & Privacy, IEEE 10, 4 (2012), 35--43.
[14]
Oscar Garcia-Morchon, Sye Loong Keoh, Sandeep Kumar, Pedro Moreno-Sanchez, Francisco Vidal-Meca, and Jan Henrik Ziegeldorf. 2013. Securing the IP-based internet of things with HIP and DTLS. In Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks. ACM, 119--124.
[15]
Jorge Granjal, Edmundo Monteiro, and Jorge Sa Silva. 2013. End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication. In IFIP Networking Conference, 2013. IEEE, 1--9.
[16]
Owen Russell Hardman. 2016. Optimizing a network layer moving target defense by translating software from python to c. Ph.D. Dissertation. Virginia Tech.
[17]
Bernhard Jungk, Leandro Rodrigues Lima, and Matthias Hiller. 2014. A systematic study of lightweight hash functions on FPGAs. In ReConFigurable Computing and FPGAs (ReConFig), 2014 International Conference on. IEEE, 1--6.
[18]
Arun Kanuparthi, Ramesh Karri, and Sateesh Addepalli. 2013. Hardware and embedded security in the context of internet of things. In Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles. ACM, 61--64.
[19]
Adarsh Kumar and Alok Aggarwal. 2012. Lightweight cryptographic primitives for mobile ad hoc networks. In Recent Trends in Computer Networks and Distributed Systems Security. Springer, 240--251.
[20]
Parikshit N Mahalle, Neeli Rashmi Prasad, and Ranga Prasad. 2014. Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT). In Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on. IEEE, 1--5.
[21]
Gurpreet Singh Matharu, Priyanka Upadhyay, and Lalita Chaudhary. 2014. The Internet of Things: Challenges & security issues. In Emerging Technologies (ICET), 2014 International Conference on. IEEE, 54--59.
[22]
Stefan Poslad, Mohamed Hamdi, and Habtamu Abie. 2013. Adaptive security and privacy management for the internet of things (ASPI 2013). In Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. ACM, 373--378.
[23]
Tanner Preiss, Matthew Sherburne, Randy Marchany, and Joseph Tront. 2014. Implementing dynamic address changes in contikios. In Information Society (i-Society), 2014 International Conference on. IEEE, 222--227.
[24]
Shahid Raza, Hossein Shafagh, Kasun Hewage, René Hummen, and Thiemo Voigt. 2013. Lithe: Lightweight secure CoAP for the internet of things. Sensors Journal, IEEE 13, 10 (2013), 3711--3720.
[25]
Ignacio Sanchez, Riccardo Satta, Igor Nai Fovino, Gianmarco Baldini, Gary Steri, David Shaw, and Andrea Ciardulli. 2014. Privacy leakages in Smart Home wireless technologies. In Security Technology (ICCST), 2014 International Carnahan Conference on. IEEE, 1--6.
[26]
Matthew Sherburne, Randy Marchany, and Joseph Tront. 2014. Implementing moving target ipv6 defense to secure 6lowpan in the internet of things and smart grid. In Proceedings of the 9th Annual Cyber and Information Security Research Conference. ACM, 37--40.
[27]
Marco Tiloca. 2014. Efficient Protection of Response Messages in DTLS-Based Secure Multicast Communication. In Proceedings of the 7th International Conference on Security of Information and Networks. ACM, 466.
[28]
Johanna Ullrich, Artemios G Voyiatzis, and Edgar R Weippl. 2016. The Quest for Privacy in the Consumer IoT. (2016).
[29]
Tim Winter. 2012. RPL: IPv6 routing protocol for low-power and lossy networks. (2012).
[30]
Teng Xu, James B Wendt, and Miodrag Potkonjak. 2014. Security of IoT systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design. IEEE Press, 417--423.
[31]
Lan Yushi, Jiang Fei, and Yu Hui. 2012. Study on application modes of military internet of things (miot). In Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on, Vol. 3. IEEE, 630--634.
[32]
Xiao Ming Zhang and Ning Zhang. 2011. An open, secure and flexible platform based on internet of things and cloud computing for ambient aiding living and telemedicine. In Computer and Management (CAMAN), 2011 International Conference on. IEEE, 1--4.
[33]
Zhi-Kai Zhang, Michael Cheng Yi Cho, and Shiuhpyng Shieh. 2015. Emerging security threats and countermeasures in IoT. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. ACM, 1--6.

Cited By

View all
  • (2024)MQTT-MTD: Integrating Moving Target Defense into MQTT Protocol as an Alternative to TLS2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet)10.1109/CommNet63022.2024.10793300(1-8)Online publication date: 4-Dec-2024
  • (2023)A Moving Target Defense Security Solution for IoT Applications2023 19th International Conference on the Design of Reliable Communication Networks (DRCN)10.1109/DRCN57075.2023.10108190(1-6)Online publication date: 17-Apr-2023
  • (2023)A Q-Learning Based Method to Simulate the Propagation of APT MalwareInternational Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023)10.1007/978-3-031-42519-6_17(177-186)Online publication date: 27-Aug-2023
  • Show More Cited By
  1. Designing a Micro-Moving Target IPv6 Defense for the Internet of Things

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IoTDI '17: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation
    April 2017
    353 pages
    ISBN:9781450349666
    DOI:10.1145/3054977
    © 2017 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 April 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Embedded Systems
    2. IoT
    3. Moving Target Defense

    Qualifiers

    • Short-paper
    • Research
    • Refereed limited

    Conference

    IoTDI '17
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)MQTT-MTD: Integrating Moving Target Defense into MQTT Protocol as an Alternative to TLS2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet)10.1109/CommNet63022.2024.10793300(1-8)Online publication date: 4-Dec-2024
    • (2023)A Moving Target Defense Security Solution for IoT Applications2023 19th International Conference on the Design of Reliable Communication Networks (DRCN)10.1109/DRCN57075.2023.10108190(1-6)Online publication date: 17-Apr-2023
    • (2023)A Q-Learning Based Method to Simulate the Propagation of APT MalwareInternational Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023)10.1007/978-3-031-42519-6_17(177-186)Online publication date: 27-Aug-2023
    • (2022)Toward Proactive and Efficient DDoS Mitigation in IIoT Systems: A Moving Target Defense ApproachIEEE Transactions on Industrial Informatics10.1109/TII.2021.309071918:4(2734-2744)Online publication date: Apr-2022
    • (2022)Moving Target Defense Techniques for the IoTIntelligent Security Management and Control in the IoT10.1002/9781394156030.ch11(267-292)Online publication date: Jul-2022
    • (2021)On Moving Target Techniques for Network Defense SecurityInternational Journal of Recent Technology and Engineering10.35940/ijrte.E5111.0195219:5(84-90)Online publication date: 30-Jan-2021
    • (2021)Proactive Defense for Internet-of-things: Moving Target Defense With CyberdeceptionACM Transactions on Internet Technology10.1145/346702122:1(1-31)Online publication date: 14-Sep-2021
    • (2021)MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoTIEEE Internet of Things Journal10.1109/JIOT.2020.30403588:10(7818-7832)Online publication date: 15-May-2021
    • (2021)Moving Target Defense Games for Cyber Security: Theory and ApplicationsGame Theory and Machine Learning for Cyber Security10.1002/9781119723950.ch10(160-179)Online publication date: 12-Sep-2021
    • (2020)Evolutionary Game for Confidentiality in IoT-Enabled Smart GridsInformation10.3390/info1112058211:12(582)Online publication date: 14-Dec-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media