Visible to the public DeadBolt: Securing IoT Deployments

TitleDeadBolt: Securing IoT Deployments
Publication TypeConference Paper
Year of Publication2018
AuthorsKo, Ronny, Mickens, James
Conference NameProceedings of the Applied Networking Research Workshop
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5585-8
Keywordsattestation, composability, Human Behavior, Internet of Things, IoT, pubcrawl, remote attestation, Resiliency, security, Security by Default
Abstract

In this paper, we introduce DeadBolt, a new security framework for managing IoT network access. DeadBolt hides all of the devices in an IoT deployment behind an access point that implements deny-by-default policies for both incoming and outgoing traffic. The DeadBolt AP also forces high-end IoT devices to use remote attestation to gain network access; attestation allows the devices to prove that they run up-to-date, trusted software. For lightweight IoT devices which lack the ability to attest, the DeadBolt AP uses virtual drivers (essentially, security-focused virtual network functions) to protect lightweight device traffic. For example, a virtual driver might provide network intrusion detection, or encrypt device traffic that is natively cleartext. Using these techniques, and several others, DeadBolt can prevent realistic attacks while imposing only modest performance costs.

URLhttp://doi.acm.org/10.1145/3232755.3232774
DOI10.1145/3232755.3232774
Citation Keyko_deadbolt:_2018