Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things 2019
DOI: 10.1145/3338507.3358615
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks

Abstract: In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT) edge devices with timing requirements from control spoofing attacks where an adversary sends malicious control signals to the actuators. We use a trusted computing base available in commodity processors (such as ARM TrustZone) and propose an invariant checking mechanism to ensure the security and safety of the physical system. A working prototype of Contego-TEE was developed using embedded Linux kernel. We demonstrate t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…Recently, some of the most frequent attacks initiated to target the IoT systems include: Spoofing: Attackers impersonate a legitimate IoT system in a network to gain control or illegal access to the network. When the attacker obtains access, they initiate DoS and Man-In-the-Middle attacks against targeted devices [ 38 , 39 , 40 ]. Denial of Service (DoS): A cyber-attack makes IoT systems or resources on the network unavailable to the intended legitimate users.…”
Section: Iot System and Security Issuesmentioning
confidence: 99%
“…Recently, some of the most frequent attacks initiated to target the IoT systems include: Spoofing: Attackers impersonate a legitimate IoT system in a network to gain control or illegal access to the network. When the attacker obtains access, they initiate DoS and Man-In-the-Middle attacks against targeted devices [ 38 , 39 , 40 ]. Denial of Service (DoS): A cyber-attack makes IoT systems or resources on the network unavailable to the intended legitimate users.…”
Section: Iot System and Security Issuesmentioning
confidence: 99%
“…Therefore, the distinction between the spoofing traffic and normal traffic is based on the sparsity, overall energy, and path gains of the virtual channel. Monowar Hasan et al [300] proposed a Contego-TEE framework to secure the IoT edge devices from the spoofing attacks where an adversary node sends the malicious signals to the controller and the framework developed using the embedded Linux kernel. The framework uses the trusted hardware and real-time characteristics of the system to safeguard the physical system from intrusions.…”
Section: ) Spoofing Attackmentioning
confidence: 99%
“…Contego-TEE [27] is a framework that prevents control spoofing attacks on a real-time embedded platform. It uses a trusted computing environment to guarantee the validity of protection mechanisms even when the host OS is corrupted.…”
Section: Trusted Computingmentioning
confidence: 99%
“…Therefore, we need trust computation to minimize the impact of a partially damaged system. Through security and isolation architecture, we can protect the data even when the host OS is compromised [27,149]. For each node in CPS, managers can judge their credibility through the experience-reputation model [60], game theory [72], or the trust assessment module [146].…”
Section: Application Layermentioning
confidence: 99%