Network Level Defenses for Internet of Things (IoT)
University of Canterbury
Time & Place
Mon, 30 Nov 2020 15:00:37 NZDT in E16 - Engineering Core
All are welcome
Internet of Things (IoT) has become a point of attraction to the industry and academia recently. The IoT is becoming popular because of the lesser prices and easy availability of smart devices. IoT network consists of heterogeneous devices with limited computational and power resources, and not equipped dynamically to respond to abnormalities. Besides, some of the IoT nodes in an IoT network are associated with vulnerabilities those are easy to exploit and hard to exploit. To ensure the security for such types of IoT networks, we propose a reactive defense mechanism and integrated proactive defense mechanism. The reactive defense mechanism reconfigures the IoT network topology and provides the maximum number of hard to exploit IoT nodes along the path to the base station. In the proactive defense mechanism, we use cyber deception along with the Moving Target Defense (MTD). The cyber deception includes the decoy system and attracts the attacker towards itself. The MTD makes the attack surface hard by shuffling the connections between IoT nodes. To analyze the effectiveness of our proposed defense mechanisms, we measure the security metrics using the Hierarchical Attack Representation Model (HARM).
Bilal Ishfaq is in his final year of studies, in cybersecurity lab. He is working on network level defenses for IoT, under the supervision of Dr. Fabian Gilson, Dr. Dong Seong Kim and Dr. Mengmeng Ge.