skip to main content
10.1145/3384217.3386395acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
poster

Improving architectures for automating network security using specification-based protocols

Published: 21 September 2020 Publication History

Abstract

The proliferation of the Internet of Things continues to be a critical issue today. The current landscape provides security with minimal oversight and is furthermore inadequate due to unaccounted human behavior in the design flow and management of personal networks. As a result, these inherently insecure devices exponentially increase the attack surface of our critical infrastructure. This research leverages a specification-based protocol called Manufacturer Usage Description or MUD that is designed to automate access control at the "edge" of the network where IoT devices reside. This research approaches improved network security by underlining inherent weaknesses and key research areas to create a resilient architecture that is both sustainable and scalable.

References

[1]
Ayyoob Hamza, Hassan Habibi Gharakheili, and Vijay Sivaraman. 2018. Combining MUD policies with SDN for IoT intrusion detection. IoT S and P 2018 - Proceedings of the 2018 Workshop on IoT Security and Privacy, Part of SIGCOMM 2018 (2018), 1--7.
[2]
Ayyoob Hamza, Dinesha Ranathunga, Hassan Habibi Gharakheili, Matthew Roughan, and Vijay Sivaraman. 2018. Clear as MUD: Generating, validating and applying IoT behavioral profiles. IoT S and P 2018 - Proceedings of the 2018 Workshop on IoT Security and Privacy, Part of SIGCOMM 2018 (2018), 8--14.
[3]
Knud Lasse Lueth. 2018. State of the IoT 2018: Number of IoT devices now at 7B - Market accelerating. https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/
[4]
E Lear, R Droms, and D Romascanu. 2019. Manufacturer Usage Description Specification. RFC 8520. RFC Editor.

Cited By

View all
  • (2021)Role of Device Identification and Manufacturer Usage Description in IoT Security: A SurveyIEEE Access10.1109/ACCESS.2021.30651239(41757-41786)Online publication date: 2021

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
HotSoS '20: Proceedings of the 7th Symposium on Hot Topics in the Science of Security
September 2020
189 pages
ISBN:9781450375610
DOI:10.1145/3384217
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 September 2020

Check for updates

Author Tags

  1. internet of things (IoT)
  2. intrusion detection system (IDS)
  3. network security
  4. security automation
  5. software defined network (SDN)

Qualifiers

  • Poster

Funding Sources

Conference

HotSoS '20
HotSoS '20: Hot Topics in the Science of Security
September 21 - 23, 2020
Kansas, Lawrence

Acceptance Rates

Overall Acceptance Rate 34 of 60 submissions, 57%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Role of Device Identification and Manufacturer Usage Description in IoT Security: A SurveyIEEE Access10.1109/ACCESS.2021.30651239(41757-41786)Online publication date: 2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media