SoK: Beyond IoT MUD Deployments - Challenges and Future Directions
2020, ArXiv
Abstract
Due to the advancement of IoT devices in both domestic and industrial environments, the need to incorporate a mechanism to build accountability in the IoT ecosystem is paramount. In the last few years, various initiatives have been started in this direction addressing many socio-technical concerns and challenges to build an accountable system. The solution that has received a lot of attention in both industry and academia is the Manufacturer Usage Description (MUD) specification. It gives the possibility to the IoT device manufacturers to describe communications needed by each device to work properly. MUD implementation is challenging not only due to the diversity of IoT devices and manufacturer/operator/regulators but also due to the incremental integration of MUD-based flow control in the already existing Internet infrastructure. To provide a better understanding of these challenges, in this work, we explore and investigate the prototypes of three implementations proposed by diffe...
References (20)
- Cisco. (2018) Manufacturer usage descriptions. [Online]. Available: https://developer.cisco.com/site/mud/
- E. Lear, R. Droms, and D. Romascanu, "Manufacturer Usage Description Specification," RFC 8520, Mar. 2019. [Online]. Available: https://rfc-editor.org/rfc/rfc8520.txt
- L. Lhotka, R. Droms, and D. Romascanu, "Manufacturer Usage Description Specification," RFC 7951, August 2016. [Online]. Available: https://tools.ietf.org/html/rfc7951
- D. Dodson, T. Polk, M. Souppaya, W. C. Barker, P. Grayeli, M. Raguso, and S. Symington, "Securing small-business and home internet of things (iot) devices," https://www.nccoe.nist.gov/projects/ building-blocks/mitigating-iot-based-ddos, 2019.
- R. Mudumbai, D. Montgomery, and O. E. Mimouni, "Soft mud: Imple- menting manufacturer usage descriptions on openflow sdn switches," in International Conference on Networks (ICN), 2019.
- A. consortium of network security companies, "Open source manufac- ture usage specification," https://osmud.org, 2018.
- D. Dodson, W. Polk, M. Souppaya, W. Barker, E. Lear, B. Weis, Y. Fashina, P. Grayeli, J. Klosterman, B. Mulugeta et al., "Securing small business and home internet of things (iot) devices: Mitigating network- based attacks using manufacturer usage description (mud)," National Institute of Standards and Technology, Tech. Rep., 2019.
- A. Mortensen, T. Reddy, and R. Moskowitz, "DDoS Open Threat Signaling (DOTS) Requirements," RFC 8612, May 2019. [Online]. Available: https://tools.ietf.org/html/rfc8612
- 2018) Opensource mud manager. [Online]. Available: https://github. com/osmud/osmud
- OpenWRT. Openwrt table of hardware. [Online]. Available: https: //openwrt.org/toh/start
- A. Wool, "A quantitative study of firewall configuration errors," Com- puter, vol. 37, no. 6, pp. 62-67, 2004.
- ayyoob. (2019) Generate mud profiles using pcap. [Online]. Available: https://github.com/ayyoob/mudgee
- A. Feraudo, P. Yadav, V. Safronov, D. A. Popescu, R. Mortier, S. Wang, P. Bellavista, and J. Crowcroft, "Colearn: Enabling federated learning in mud compliant iot edge networks," in In 3rd International Workshop on Edge Systems, Analytics and Net-working (EdgeSys20). New York: ACM, April 2020.
- V. Andalibi, D. Kim, and L. J. Camp, "Throwing MUD into the FOG: Defending iot and fog by expanding MUD to fog network," in 2nd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 19). Renton, WA: USENIX Association, July 2019. [Online]. Available: https://www.usenix.org/conference/hotedge19/presentation/andalibi
- P. Yadav, V. Safronov, and R. Mortier, "Poster abstract: Enforcing accountability in smart built-in iot environment using mud," in The 6th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation (BuildSys 2019). New York: ACM, Nov 2019.
- A. Hamza, H. H. Gharakheili, and V. Sivaraman, "Combining mud policies with sdn for iot intrusion detection," in Proceedings of the 2018 Workshop on IoT Security and Privacy, ser. IoT S&P '18. New York, NY, USA: ACM, 2018, pp. 1-7. [Online]. Available: http://doi.acm.org/10.1145/3229565.3229571
- A. Hamza, H. H. Gharakheili, T. A. Benson, and V. Sivaraman, "Detecting volumetric attacks on lot devices via sdn-based monitoring of mud activity," in Proceedings of the 2019 ACM Symposium on SDN Research, ser. SOSR'19. New York, NY, USA: ACM, 2019, pp. 36-48. [Online]. Available: http://doi.acm.org/10.1145/3314148.3314352
- S. N. M. Garca, A. Molina Zarca, J. L. Hernndez-Ramos, J. B. Bernab, and A. S. Gmez, "Enforcing behavioral profiles through software-defined networks in the industrial internet of things," Applied Sciences, vol. 9, no. 21, p. 4576, Oct 2019. [Online]. Available: http://dx.doi.org/10.3390/app9214576
- S. N. Matheu, A. Robles Enciso, A. Molina Zarca, D. Garcia-Carrillo, J. L. Hernndez-Ramos, J. Bernal Bernabe, and A. F. Skarmeta, "Security architecture for defining and enforcing security profiles in dlt/sdn-based iot systems," Sensors, vol. 20, no. 7, March 2020. [Online]. Available: http://dx.doi.org/10.3390/s20071882
- Y. Afek, A. Bremler-Barr, D. Hay, R. Goldschmidt, L. Shafir, G. Abraham, and A. Shalev, "Nfv-based iot security for home networks using MUD," CoRR, vol. abs/1911.00253, 2019. [Online]. Available: http://arxiv.org/abs/1911.00253