A Top Down Approach to Network Protocol Security in the Internet of Things

Date and time: 
Thu, Jun 11 2020 - 9:30am
Samuel Mergendahl
University of Oregon
  • Jun Li (Chair)
  • Stephen Fickas
  • Reza Rejaie

As the Internet of Things (IoT) continues to pervade every aspect of our lives, IoT application designers and researchers must leverage a new suite of standardized network protocols specifically tailored for IoT. In particular, because IoT environments exhibit new network characteristics, such as lossy links and low capability end-hosts, network protocols designed for traditional wired networks become insufficient in IoT. Unfortunately, due to the constrained nature of IoT, these IoT-specific network protocols often exhibit new vulnerabilities, and, due to the high deployment rate of standardized IoT network protocols across IoT, these vulnerabilities frequently attract attackers' focus. To this end, this survey organizes and describes known attacks against the popular, standardized network protocols for IoT as well as popular defense strategies against these attacks. In particular, we first separate IoT network protocols into a layered architecture that resembles the traditional wired network layered architecture, and we contrast the differences in the protocols designed IoT from the traditional wired network protocols. Next, we deliver a comprehensive taxonomy of attacks against this standardized network protocol stack, and finally, we discuss popular strategies to defend against these attacks. In fact, we characterize the missing gapsin these defense strategies and depict a few frontiers of IoT network protocol security.