Smart City

Smart City Sentinel

Creating a "Botnet" of Good IoT Devices

By Special Guest
Assaf Schuster, Research & Senior Consultant, Essence SigmaDots

Although not by design, in reality IoT devices are not as secure as they could be. At any point in time, at least a small fraction of devices are under the control of threat actors and malicious software. Hackers’ resources are stronger than the defenses that can be implemented on the individual edge device being attacked - a completely lopsided battle.

A solution does exist, however – distributed computing.

The concept is far from new. [email protected] (Search for Extraterrestrial Intelligence) has been using a global distributed computing network since 1999 (although the program is shutting down at the end of March).[email protected]. In traditional distributed computing, the laptops, desktop devices, or even servers, have large bandwidths with multiple channels of communications to join together to create a whole greater than the sum of its parts.

In theory, it should be very easy to create a similar distributed computing network on IoT devices – they are in constant communication with each other and the centralized server. Furthermore, the sheer volume of devices means almost infinite scalability for an IoT-based distributed network.

However, the IoT devices also have limited memory, computing power, and interconnection capabilities and generally have no operating system or communication protocol standards.

Being in almost constant two-way communications limits their bandwidth, meaning the resources for the distributed computing component may be squeezed out. Also, adding an additional communications burden increases the costs of operations – someone needs to pay for the increased data going out on the cellular lines.

Challenges of Creating a Distributed IoT Security Network
Any onboard agent that takes care of security operations needs to be carefully crafted to use the IoT devices’ limited resources. The device itself also needs to be taught to “shut up” to increase the bandwidth. For example, a thermostat on a refrigerator holding critical medicines at a certain temperature doesn’t need to report second by second that the temperature is between 1oC and 2oC; it should only report anomalies when the temperature is falling outside the normal range. As a side note, this lowers cost, as data isn’t constantly being sent along the mobile network.

Furthermore, the algorithm should allow for self-learning – it must understand “normal” interactions and look for the anomalies indicating malware.

Now, that is on the individual device.

However, these millions of edge devices need to interact among themselves or send information or collaborate on joint decisions, which is very costly and slow. Taking into account the memory and processing issues, it just isn’t possible to implement more sophisticated algorithms.

Linking Individuals to Create a Strong Network
The IoT devices, the edge units living in the “wild” are already being used as distributed networks for malicious purposes. The Mirai botnet took advantage of the weaknesses and strengths of IoT devices – their low levels of security and their volume – to execute DDoS attacks.

Now, it’s time to join the benign devices into a distributed network, using algorithms to build their collaborative power to prevent the bad guys from capturing more devices and conquering our homes, offices, and factories.

The best approach to create a distributed network of IoT devices is to link them like an ant colony, where the sum of the strength of its members is stronger than one individual. Instead of constantly communicating with their centralized command and control service to inform them of non-anomalous data, the devices should be in constant contact with each other, “inspecting” the behavior of their peers and informing the network when there are behavioral anomalies. After the anomalies are reported to the security operations center, an AI system must analyze the data to further strengthen the network from attack.

The infrastructure itself must be able to distribute and broadcast the information and maintain the necessary cryptography to support “good” devices, ensuring the “bad” command and control networks cannot interfere with their operations. Furthermore, the infrastructure needs to be scalable to levels that are orders of magnitude beyond the traditional distributed system and do all of this efficiently without overhead and expensive operations that would defeat the entire solution.

This distributed network must become a large entity unto itself, performing self-inspections and operations not restricted by the power of a single server, monitoring and mitigating the influence of bad nodes before they can attack at the individual device level.

Furthermore, the solution should comprehensively protect all the applications and data within the devices to maximize IoT security and minimize the impact on the organization, factory, and consumer. A fully embedded, distributed, and multilayered approach should be used to deliver a comprehensive, multilayered IoT cybersecurity and analytics platform. Ideally, it would have an on-the-edge dynamic firewall and antivirus; use a distributed communications protocol; provide lightweight, secure and generic frameworks for data processing and analytic operations; and ensure end-to-end encryption. Communications with the security operations center is critical, with operational monitoring, and alerting for faster response. This type of solution would almost completely eliminate consumers’ responsibility for security in enterprise and industrial settings and ensure service continuity in large-scale IoT deployments.

As an added value, this type of solution would collect data across the entire operation, creating a critical mass of data, versus data from a single device. Instead of a set of millions of single devices, the connected infrastructure can be analyzed in real time as a unified whole. This allows the activities of the devices themselves to be analyzed in the aggregate to increase the efficiency of the devices and network itself.

Cybercriminals are already creating distributed networks to implement their nefarious activities. We can use similar paradigms to fight back.

About the author: Assaf Schuster, Research & Senior Consultant at Essence SigmaDots, is also faculty member of the Computer Science Department at the Technion University Israel. He is a researcher who has published more than 250 papers in the areas of Machine Learning, AI, Cybersecurity, Parallel and Distributed Computing, Scalability, Big data, Complex Event Streams, and others. He is a Fellow of the ACM and the IEEE.

Edited by Ken Briodagh
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Related Articles

The Future of Buildings is Smart

By: Erik Linask    6/2/2023

IoT-based smart building tech is growing due to a range of benefits, from energy- and cost-efficiency to comfort, safety, and security improvements.

Read More

Revolution at the Grid Edge: A Pioneering Approach to Energy Management

By: Erik Linask    5/26/2023

GridX and Sense announced a partnership that will translate smart meter data into meaningful benefits for customers and utility grid operators.

Read More

IoT and Real Estate Footprints: How AVUITY's VuAI Sensors Help Maximize Investments

By: Alex Passett    4/28/2023

AVUITY, provider of workplace technology and space utilization solutions, announced the launch of its newest line of sensors: VuAI. These, per AVUITY,…

Read More

Going the Extra (Smarter) Mile: Curiosity Lab to Collaborate with Smartmile

By: Alex Passett    4/12/2023

Smartmile, builder of smart parcel lockers and related software (in order to centralize last-mile deliveries and reduce carbon emissions) is collabora…

Read More

Curiouser and Curiouser: Seoul Robotics Establishes its US Office in the Curiosity Lab of Peachtree Corners

By: Alex Passett    4/6/2023

The South Korean-based company Seoul Robotics established its U.S. office in the Curiosity Lab at Peachtree Corners, accelerating the smart city's pro…

Read More