Committed to connecting the world

Using manufacturer usage descriptions for IoT network security: An experimental investigation of smart home network devices

Using manufacturer usage descriptions for IoT network security: An experimental investigation of smart home network devices

Authors: Milad Kazemi Darazam, Pelin Angin, Cengiz Acarturk
Status: Final
Date of publication: 22 September 2022
Published in: ITU Journal on Future and Evolving Technologies, Volume 3 (2022), Issue 2, Pages 388-407
Article DOI : https://doi.org/10.52953/NSQZ3214
Abstract:
The Internet of Things (IoT) has shown significant growth in the past decades. Recently, IoT networks have been subject to cybersecurity threats on multiple fronts. A lack of improvement in IoT infrastructures' cybersecurity may result in challenges with a broad impact, such as DDoS attacks that target global DNS services. This paper reviews existing solutions to mitigate attacks on and from IoT networks. As a specific mitigation approach, we propose the use of a standardized whitelisting method, namely Manufacturer Usage Description (MUD), which provides enhanced explainability over machine learning-based approaches and is complementary to them. For evaluating the use of MUD in IoT networks, we report a case study, which we conducted through traffic analysis of two IoT devices by detecting recognizable and distinctive traffic patterns, which demonstrate the feasibility of MUD-based intrusion prevention.

Keywords: IoT networks, manufacturer usage description, smart home security, traffic patterns
Rights: © International Telecommunication Union, available under the CC BY-NC-ND 3.0 IGO license.
electronic file
ITEM DETAILARTICLEPRICE
ENGLISH
PDF format   Full article (PDF)
Free of chargeDOWNLOAD