Swarm-Net: Firmware Attestation in IoT Swarms Using Graph Neural Networks and Volatile Memory

IF 8.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Internet of Things Journal Pub Date : 2024-11-18 DOI:10.1109/JIOT.2024.3501854
Varun Kohli;Bhavya Kohli;Muhammad Naveed Aman;Biplab Sikdar
{"title":"Swarm-Net: Firmware Attestation in IoT Swarms Using Graph Neural Networks and Volatile Memory","authors":"Varun Kohli;Bhavya Kohli;Muhammad Naveed Aman;Biplab Sikdar","doi":"10.1109/JIOT.2024.3501854","DOIUrl":null,"url":null,"abstract":"Amidst the large-scale deployment of Internet of Things (IoT) networks worldwide, studies have highlighted critical security concerns many of which stem from firmware-related issues. IoT swarms have become more prevalent in industries, smart homes, and agricultural applications and malicious activity on one node can propagate to other network sections. While several remote attestation (RA) techniques have been proposed in the literature, they are limited by their latency, availability, complexity, hardware assumptions, and uncertain access to firmware copies under intellectual property (IP) rights. To address these problems, we present Swarm-Net, a novel swarm attestation technique that uses graph neural networks (GNNs) to exploit the inherent, interconnected, graph-like structure of IoT networks and the runtime information stored in the static random access memory (SRAM). We also present the first datasets on SRAM-based swarm attestation encompassing different types of firmware and edge relationships. In addition, a secure swarm attestation protocol is proposed to ensure authentication, availability, and attestation. Swarm-Net is computationally lightweight and does not require a copy of the firmware. It achieves a 99.96% attestation rate on authentic firmware, 100% detection rate (DR) on anomalous firmware, and 99% DR on propagated anomalies, at a communication overhead and inference latency of ~1 s and <inline-formula> <tex-math>$\\sim 10^{-5}$ </tex-math></inline-formula> s (on a laptop CPU), respectively. In addition to the collected datasets, Swarm-Net’s effectiveness is evaluated on simulated trace replay, random trace perturbation, and dropped attestation responses, showing robustness against such threats. Lastly, we compare Swarm-Net with past works and present a security analysis.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 7","pages":"8338-8352"},"PeriodicalIF":8.9000,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10756576/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Amidst the large-scale deployment of Internet of Things (IoT) networks worldwide, studies have highlighted critical security concerns many of which stem from firmware-related issues. IoT swarms have become more prevalent in industries, smart homes, and agricultural applications and malicious activity on one node can propagate to other network sections. While several remote attestation (RA) techniques have been proposed in the literature, they are limited by their latency, availability, complexity, hardware assumptions, and uncertain access to firmware copies under intellectual property (IP) rights. To address these problems, we present Swarm-Net, a novel swarm attestation technique that uses graph neural networks (GNNs) to exploit the inherent, interconnected, graph-like structure of IoT networks and the runtime information stored in the static random access memory (SRAM). We also present the first datasets on SRAM-based swarm attestation encompassing different types of firmware and edge relationships. In addition, a secure swarm attestation protocol is proposed to ensure authentication, availability, and attestation. Swarm-Net is computationally lightweight and does not require a copy of the firmware. It achieves a 99.96% attestation rate on authentic firmware, 100% detection rate (DR) on anomalous firmware, and 99% DR on propagated anomalies, at a communication overhead and inference latency of ~1 s and $\sim 10^{-5}$ s (on a laptop CPU), respectively. In addition to the collected datasets, Swarm-Net’s effectiveness is evaluated on simulated trace replay, random trace perturbation, and dropped attestation responses, showing robustness against such threats. Lastly, we compare Swarm-Net with past works and present a security analysis.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Swarm-Net:使用图神经网络和易失性存储器在物联网蜂群中进行固件鉴定
随着物联网(IoT)网络在全球范围内的大规模部署,研究强调了关键的安全问题,其中许多源于固件相关问题。物联网集群在工业、智能家居和农业应用中变得越来越普遍,一个节点上的恶意活动可以传播到其他网络部分。虽然文献中已经提出了几种远程证明(RA)技术,但它们受到延迟、可用性、复杂性、硬件假设以及在知识产权(IP)下对固件副本的不确定访问的限制。为了解决这些问题,我们提出了swarm - net,这是一种新型的群体认证技术,它使用图神经网络(gnn)来利用物联网网络固有的、相互连接的、类似图的结构和存储在静态随机存取存储器(SRAM)中的运行时信息。我们还介绍了基于sram的群体认证的第一个数据集,包括不同类型的固件和边缘关系。此外,还提出了一种安全的群体认证协议,以保证认证、可用性和认证。Swarm-Net在计算上是轻量级的,不需要固件的副本。它在真实固件上实现99.96%的认证率,在异常固件上实现100%的检测率(DR),在传播异常上实现99%的DR,通信开销和推理延迟分别为~1 s和$\sim 10^{-5}$ s(在笔记本电脑CPU上)。除了收集的数据集,Swarm-Net的有效性在模拟跟踪重播、随机跟踪扰动和丢失的认证响应上进行了评估,显示出对此类威胁的鲁棒性。最后,我们将Swarm-Net与以往的工作进行了比较,并给出了安全性分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Internet of Things Journal
IEEE Internet of Things Journal Computer Science-Information Systems
CiteScore
17.60
自引率
13.20%
发文量
1982
期刊介绍: The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.
期刊最新文献
Dynamic Event-Triggered Constraint Control with Predefined-Time Convergence for Delayed Multi-Agent Systems Split Federated Learning-Enabled Deep Q-Networks for Generalized Path Planning in Distributed IoT Edge Platform A Multi-Layered Framework for Adaptive and Optimized Real-Time Data Processing in Edge-Fog IoT Environments A Novel Contactless Human Attention and Task Focus Estimation During Tabletop Object Interactions using millimeter-wave radar Dynamic Computation Offloading Optimization Based on Meta-Reinforcement Learning in UAV-Assisted MEC Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1