STdef Sum
STdef Sum
Abstract These features include constrained resources, het- The authors propose
erogeneous links, and vulnerable usability, which a novel traffic-aware
The various types of communication technol- are discussed as follows. patching scheme to select
ogies and mobility features in IoT on one hand Resource-Constrained IoT Devices: Compared important intermediate
enable fruitful and attractive applications, but to the intermediate nodes located at the end side nodes to patch, which
on the other hand facilitate malware propaga- of the infrastructure with wired connectivity, IoT
tion, thereby raising new challenges in handling devices designed to perform simple sensing and applies to the IoT system
IoT-empowered malware for cyber security. actuation operations have limited computation with limited patching
Compared to the malware propagation control and communication capabilities. In this case, the resources and response
scheme in traditional wireless networks, where algorithm and mechanism applied on IoT devic- time constraint. Experi-
nodes can be directly repaired and secured, in es are relatively simple. As a result, the attacker ments on real-world trace
IoT, compromised end devices are difficult to can spend much less resources to break into IoT
patch. Alternatively, blocking malware via patch- devices, rendering them the targets of malicious datasets in IoT networks
ing intermediate nodes turns out to be a more users. For example, due to the overhead of certif- are conducted to demon-
feasible and practical solution. Specifically, patch- icate management and public key cryptography, strate the advantage of
ing intermediate nodes can effectively prevent the many existing IoT devices fail to support state- the proposed traffic-aware
proliferation of malware propagation by securing of-the-art secure communication protocols (e.g., patching scheme in
infrastructure links and limiting malware propaga- SSL/TLS). Therefore, the adversary can eavesdrop
tion to local device-to-device dissemination. This on sensitive sensor data and even manipulate alleviating malware
article proposes a novel traffic-aware patching data without being detected. Another example is propagation.
scheme to select important intermediate nodes to that IoT devices often have limited entropy sourc-
patch, which applies to the IoT system with lim- es, which results in weak cryptographic keys that
ited patching resources and response time con- can be predicted by the attacker. Moreover, since
straint. Experiments on real-world trace datasets in most IoT devices run on embedded Linux operat-
IoT networks are conducted to demonstrate the ing systems (OSs), the attacker can easily create
advantage of the proposed traffic-aware patching IoT malware by recompiling existing Linux mal-
scheme in alleviating malware propagation. ware for other instruction set architectures.
Heterogeneity: In order to support different
Introduction kinds of IoT applications, IoT devices are often
By integrating the ability to sense the physical equipped with heterogeneous communication
world and the privilege of availing communication and computation capabilities for the purpose of
capabilities, the Internet of Things (IoT) enables seamless operations. However, the heterogeneity
close interactions between humans and machines. and potentially vast amount of IoT devices facilitate
IoT generally consists of numerous IoT end devic- the fabrication of identity and hiding of malware.
es for sensing and action, intermediate nodes with Moreover, as shown in Fig. 1, compromised IoT
wired connectivity for data relaying, and appli- devices might disseminate malware via heteroge-
cation servers in the cloud for data control and neous communication links as described below.
analysis. Typically, IoT devices can communicate Infrastructure Links: IoT malware can propa-
with each other with minimal human intervention gate using infrastructure-based communication
and build an autonomous and complex network. technologies, such as GSM/GPRS/UMTS/LTE and
As the boundary between machines and humans WLAN, via intermediate nodes, such as access
gets blurry, adversaries in cyberspace can threat- point (AP), base station (BS), or gateway. In par-
en human users’ safety and privacy in the physical ticular, IoT malware inherits the threats caused
world. Obviously, the growing popularity of devic- by computer malware. Similar to computer mal-
es with rich wireless communication capabilities ware, most IoT malware families today scan the IP
has made IoT attractive to digital viruses and mali- address space for vulnerable victims and spread
cious contents. Consequently, in recent years the via the Internet. Due to the widespread use of
security issues in IoT have been an ever increasing weak login credentials and the fact that many
concern [1–3]. IoT devices are Internet-accessible, some botnets
From an adversary’s perspective, the unique have allegedly harvested more than one mil-
features of IoT facilitate the exploitation of devic- lion infected IoT devices (http://thehackernews.
es as well as the propagation of IoT malware. com/2016/10/iot-dyn-ddos-attack.html).
Shin-Ming Cheng and Ching-Chao Lin are with National Taiwan University of Science and Technology; Digital Object Identifier:
Pin-Yu Chen is with IBM Thomas J. Watson Research Center; Hsu-Chun Hsiao is with National Taiwan University. 10.1109/MCOM.2017.1600993
BS 2
Device d
Device-to-device links
BS 3
Infrastructure links Device e
Compromised device
Normal device Device d Device d
BS 2 BS 2
Device a Device a
BS 3 Device c BS 3 Device
De c
Device e Device e
Step 2 Step 3
Concluding Remarks
Figure 6. Performance comparison between random patching and traffic-aware This article considers the security threats incurred
patching in terms of the difference between the fraction of compromised by the heterogeneous links of IoT and designs
users under random patching to that of traffic-aware patching. linf = a novel patching scheme to alleviate malware
0.00004 and ldir = 0.00001. The results are averaged over 500 trials. propagation. Instead of the impractical solution
of directly patching compromised IoT devices,
to enable transfer learning for defending real-life we propose to patch important intermediate
unknown security threats are ongoing challenges. nodes based on the traffic volumes to prevent
Predictive Malware Propagation Models for major security exploits and to avoid catastroph-
Mobile IoT: In this article, we have addressed ic malware propagation. With the proposed
patching issues in mobile IoT as link recovery traffic-aware patching scheme, malware propaga-
instead of node recovery, where the latter has tion is restricted to direct device-to-device con-
been extensively studied in traditional wireless nection, and therefore the damage of malware
networking scenarios. How to establish effective propagation can be significantly reduced. We
mathematical models for predicting malware conduct experiments in an IoT environment to
propagation dynamics in mobile IoT that take into demonstrate the effectiveness of the proposed
account the traffic-aware and random patching traffic-aware patching scheme, and we also dis-
schemes are new research challenges. cuss some ongoing research challenges and open
Various Importance Metrics for Intermedi- research questions related to IoT patching.
ate Nodes: The proposed scheme simply applies The proposed traffic-aware patching scheme
traffic volume as the metric to determine the and the experimental results bring new insights to
importance of intermediate nodes and the patch- IoT security. For instance, the infeasibility of direct
ing sequence. It can be regarded as protecting patching on IoT devices calls for new IoT malware
the entire network by patching a relatively small models and security assessment approaches. The
fraction of intermediate nodes with the highest experimental results can assist in developing new
degree metric. The operator could consider more attack detection techniques and patching strate-
information about intermediate nodes, such as gies for preventing malware propagation.