除非我说,否则不要说话!使用默认关闭网络保护物联网

James Hong, A. Levy, Laurynas Riliskis, P. Levis
{"title":"除非我说,否则不要说话!使用默认关闭网络保护物联网","authors":"James Hong, A. Levy, Laurynas Riliskis, P. Levis","doi":"10.1109/IoTDI.2018.00021","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is changing the way we interact with everyday objects. \"Smart\" devices will reduce energy use, keep our homes safe, and improve our health. However, as recent attacks have shown, these devices also create tremendous security vulnerabilities in our computing networks. Securing all of these devices is a daunting task. In this paper, we argue that IoT device communications should be default-off and desired network communications must be explicitly enabled. Unlike traditional networked applications or devices like a web browser or PC, IoT applications and devices serve narrowly defined purposes and do not require access to all services in the network. Our proposal, Bark, a policy language and runtime for specifying and enforcing minimal access permissions in IoT networks, exploits this fact. Bark phrases access control policies in terms of natural questions (who, what, where, when, and how) and transforms them into transparently enforceable rules for IoT application protocols. Bark can express detailed rules such as \"Let the lights see the luminosity of the bedroom sensor at any time\" and \"Let a device at my front door, if I approve it, unlock my smart lock for 30 seconds\" in a way that is presentable and explainable to users. We implement Bark for Wi-Fi/IP and Bluetooth Low Energy (BLE) networks and evaluate its efficacy on several example applications and attacks.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Don't Talk Unless I Say So! Securing the Internet of Things with Default-Off Networking\",\"authors\":\"James Hong, A. Levy, Laurynas Riliskis, P. Levis\",\"doi\":\"10.1109/IoTDI.2018.00021\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) is changing the way we interact with everyday objects. \\\"Smart\\\" devices will reduce energy use, keep our homes safe, and improve our health. However, as recent attacks have shown, these devices also create tremendous security vulnerabilities in our computing networks. Securing all of these devices is a daunting task. In this paper, we argue that IoT device communications should be default-off and desired network communications must be explicitly enabled. Unlike traditional networked applications or devices like a web browser or PC, IoT applications and devices serve narrowly defined purposes and do not require access to all services in the network. Our proposal, Bark, a policy language and runtime for specifying and enforcing minimal access permissions in IoT networks, exploits this fact. Bark phrases access control policies in terms of natural questions (who, what, where, when, and how) and transforms them into transparently enforceable rules for IoT application protocols. Bark can express detailed rules such as \\\"Let the lights see the luminosity of the bedroom sensor at any time\\\" and \\\"Let a device at my front door, if I approve it, unlock my smart lock for 30 seconds\\\" in a way that is presentable and explainable to users. We implement Bark for Wi-Fi/IP and Bluetooth Low Energy (BLE) networks and evaluate its efficacy on several example applications and attacks.\",\"PeriodicalId\":149725,\"journal\":{\"name\":\"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)\",\"volume\":\"125 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IoTDI.2018.00021\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IoTDI.2018.00021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

物联网(IoT)正在改变我们与日常物品互动的方式。“智能”设备将减少能源消耗,保证我们的家庭安全,改善我们的健康。然而,正如最近的攻击所显示的那样,这些设备也在我们的计算网络中造成了巨大的安全漏洞。保护所有这些设备是一项艰巨的任务。在本文中,我们认为物联网设备通信应该默认关闭,所需的网络通信必须明确启用。与传统的网络应用程序或设备(如web浏览器或PC)不同,物联网应用程序和设备服务于狭义定义的目的,不需要访问网络中的所有服务。我们的提案Bark是一种用于在物联网网络中指定和执行最小访问权限的策略语言和运行时,它利用了这一事实。Bark用自然问题(谁、什么、何地、何时、如何)来表达访问控制策略,并将其转换为物联网应用协议的透明可执行规则。Bark可以表达详细的规则,如“让灯随时看到卧室传感器的亮度”和“如果我同意,让一个设备在我的前门解锁我的智能锁30秒”,以一种可展示且可解释的方式向用户表达。我们在Wi-Fi/IP和蓝牙低功耗(BLE)网络中实现了Bark,并在几个示例应用和攻击中评估了它的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Don't Talk Unless I Say So! Securing the Internet of Things with Default-Off Networking
The Internet of Things (IoT) is changing the way we interact with everyday objects. "Smart" devices will reduce energy use, keep our homes safe, and improve our health. However, as recent attacks have shown, these devices also create tremendous security vulnerabilities in our computing networks. Securing all of these devices is a daunting task. In this paper, we argue that IoT device communications should be default-off and desired network communications must be explicitly enabled. Unlike traditional networked applications or devices like a web browser or PC, IoT applications and devices serve narrowly defined purposes and do not require access to all services in the network. Our proposal, Bark, a policy language and runtime for specifying and enforcing minimal access permissions in IoT networks, exploits this fact. Bark phrases access control policies in terms of natural questions (who, what, where, when, and how) and transforms them into transparently enforceable rules for IoT application protocols. Bark can express detailed rules such as "Let the lights see the luminosity of the bedroom sensor at any time" and "Let a device at my front door, if I approve it, unlock my smart lock for 30 seconds" in a way that is presentable and explainable to users. We implement Bark for Wi-Fi/IP and Bluetooth Low Energy (BLE) networks and evaluate its efficacy on several example applications and attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Brume - A Horizontally Scalable and Fault Tolerant Building Operating System Ride: A Resilient IoT Data Exchange Middleware Leveraging SDN and Edge Cloud Resources Real-Time Wireless Routing for Industrial Internet of Things Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems MARBLE: Mobile Augmented Reality Using a Distributed BLE Beacon Infrastructure
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1