Abstract

Security presents itself as one of the biggest threats to the enabling and the deployment of the Internet of Things (IoT). Security challenges are evident in light of recent cybersecurity attacks that targeted major internet service providers and crippled a significant portion of the entire Internet by taking advantage of faulty and ill-protected embedded devices. Many of these devices reside at home networks with user-administrators who are not familiar with network security best practices, making them easy targets for the attackers. Therefore, security solutions are needed to navigate the insecure and untrusted public networks by automating protections through affordable and accessible first-hand network information sharing. This paper proposes and implements a proof of concept (PoC) to secure Internet Service Providers (ISPs), home networks, and home-based IoT devices using blockchain technologies. The results obtained support the idea of a distributed cyber threat intelligence data sharing network capable of protecting various stakeholders.

Highlights

  • The Internet of Things (IoT) is constituted of resource-limited devices connected to the Internet and interacting with other entities in the network, with or without direct human intervention

  • The work presented in this paper proposes the utilization of first-hand data from the end-users, their network components, such as IoT devices or service providers, and their detection systems to share intelligence information using the blockchain

  • The traffic carried by the Control group was normal traffic and attack traffic, whereas the traffic carried by the Experimental group was normal traffic, blockchain transactions, and reduced attack traffic due to automated deny entries in the IPTables

Read more

Summary

Introduction

The Internet of Things (IoT) is constituted of resource-limited devices connected to the Internet and interacting with other entities in the network, with or without direct human intervention. Attack was enabled by a botnet army of IoT infected devices. It overwhelmed Dyn, a major domain name system (DNS) infrastructure provider, and paralyzed a significant portion of the Internet. The incident highlighted the alarming consequence that faulty IoT protections and poor security standards could incur [2]. Such intrusions and attacks accentuate the need for additional research in the IoT security domain

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.