Menu

IoT FEATURE NEWS

Creating a "Botnet" of Good IoT Devices

By

Although not by design, in reality IoT devices are not as secure as they could be. At any point in time, at least a small fraction of devices are under the control of threat actors and malicious software. Hackers’ resources are stronger than the defenses that can be implemented on the individual edge device being attacked - a completely lopsided battle.

A solution does exist, however – distributed computing.

The concept is far from new. SETI@home (Search for Extraterrestrial Intelligence) has been using a global distributed computing network since 1999 (although the program is shutting down at the end of March). https://en.wikipedia.org/wiki/SETI@home. In traditional distributed computing, the laptops, desktop devices, or even servers, have large bandwidths with multiple channels of communications to join together to create a whole greater than the sum of its parts.

In theory, it should be very easy to create a similar distributed computing network on IoT devices – they are in constant communication with each other and the centralized server. Furthermore, the sheer volume of devices means almost infinite scalability for an IoT-based distributed network.

However, the IoT devices also have limited memory, computing power, and interconnection capabilities and generally have no operating system or communication protocol standards.

Being in almost constant two-way communications limits their bandwidth, meaning the resources for the distributed computing component may be squeezed out. Also, adding an additional communications burden increases the costs of operations – someone needs to pay for the increased data going out on the cellular lines.

Challenges of Creating a Distributed IoT Security Network
Any onboard agent that takes care of security operations needs to be carefully crafted to use the IoT devices’ limited resources. The device itself also needs to be taught to “shut up” to increase the bandwidth. For example, a thermostat on a refrigerator holding critical medicines at a certain temperature doesn’t need to report second by second that the temperature is between 1oC and 2oC; it should only report anomalies when the temperature is falling outside the normal range. As a side note, this lowers cost, as data isn’t constantly being sent along the mobile network.

Furthermore, the algorithm should allow for self-learning – it must understand “normal” interactions and look for the anomalies indicating malware.

Now, that is on the individual device.

However, these millions of edge devices need to interact among themselves or send information or collaborate on joint decisions, which is very costly and slow. Taking into account the memory and processing issues, it just isn’t possible to implement more sophisticated algorithms.

Linking Individuals to Create a Strong Network
The IoT devices, the edge units living in the “wild” are already being used as distributed networks for malicious purposes. The Mirai botnet took advantage of the weaknesses and strengths of IoT devices – their low levels of security and their volume – to execute DDoS attacks.

Now, it’s time to join the benign devices into a distributed network, using algorithms to build their collaborative power to prevent the bad guys from capturing more devices and conquering our homes, offices, and factories.

The best approach to create a distributed network of IoT devices is to link them like an ant colony, where the sum of the strength of its members is stronger than one individual. Instead of constantly communicating with their centralized command and control service to inform them of non-anomalous data, the devices should be in constant contact with each other, “inspecting” the behavior of their peers and informing the network when there are behavioral anomalies. After the anomalies are reported to the security operations center, an AI system must analyze the data to further strengthen the network from attack.

The infrastructure itself must be able to distribute and broadcast the information and maintain the necessary cryptography to support “good” devices, ensuring the “bad” command and control networks cannot interfere with their operations. Furthermore, the infrastructure needs to be scalable to levels that are orders of magnitude beyond the traditional distributed system and do all of this efficiently without overhead and expensive operations that would defeat the entire solution.

This distributed network must become a large entity unto itself, performing self-inspections and operations not restricted by the power of a single server, monitoring and mitigating the influence of bad nodes before they can attack at the individual device level.

Furthermore, the solution should comprehensively protect all the applications and data within the devices to maximize IoT security and minimize the impact on the organization, factory, and consumer. A fully embedded, distributed, and multilayered approach should be used to deliver a comprehensive, multilayered IoT cybersecurity and analytics platform. Ideally, it would have an on-the-edge dynamic firewall and antivirus; use a distributed communications protocol; provide lightweight, secure and generic frameworks for data processing and analytic operations; and ensure end-to-end encryption. Communications with the security operations center is critical, with operational monitoring, and alerting for faster response. This type of solution would almost completely eliminate consumers’ responsibility for security in enterprise and industrial settings and ensure service continuity in large-scale IoT deployments.

As an added value, this type of solution would collect data across the entire operation, creating a critical mass of data, versus data from a single device. Instead of a set of millions of single devices, the connected infrastructure can be analyzed in real time as a unified whole. This allows the activities of the devices themselves to be analyzed in the aggregate to increase the efficiency of the devices and network itself.

Cybercriminals are already creating distributed networks to implement their nefarious activities. We can use similar paradigms to fight back.

About the author: Assaf Schuster, Research & Senior Consultant at Essence SigmaDots, is also faculty member of the Computer Science Department at the Technion University Israel. He is a researcher who has published more than 250 papers in the areas of Machine Learning, AI, Cybersecurity, Parallel and Distributed Computing, Scalability, Big data, Complex Event Streams, and others. He is a Fellow of the ACM and the IEEE.




Edited by Ken Briodagh


SHARE THIS ARTICLE
Related Articles

Connected Rail Even In The Most Remote Areas: Brazil's Largest Logistics Company Goes Sky High

By: Juhi Fadia    5/21/2020

We caught up with Steven Tompkins, Transport Director, Inmarsat, to learn more about what Rumo SA, Brazil's largest logistics company, is doing in IIo…

Read More

IoT Ready to Run: System-on-Chip Simplifies the Development of Smart Products

By: Juhi Fadia    5/21/2020

The promise of IoT "Plug and Play" allows developers to get an IoT device connected, up and running more easily, removing the friction associated with…

Read More

Cradlepoint Launches 5G-Optimized Wireless WAN Edge Router for Enterprise

By: Ken Briodagh    5/21/2020

Cradlepoint recently announced the new E3000 Series, a 5G-Optimized, all-in-one wireless edge router for enterprise branch deployment.

Read More

Smartrac And Suku To Authenticate COVID-19 Tests And PPE with NFC, Blockchain

By: Ken Briodagh    5/18/2020

Smartrac and blockchain startup SUKU have together launched a digital verification solution designed to authenticate COVID-19 testing kits and persona…

Read More

Ordr Expands Global Partner Program for Enterprise IoT Security

By: Ken Briodagh    5/13/2020

Growth in unmanaged and IoT device market presents a massive opportunity for channel partners worldwide

Read More