terraswarm - github pages · terraswarm research center cloud & edge computing • many...

16
TerraSwarm TerraSwarm Sponsored by the TerraSwarm Research Center, one of six centers administered by the STARnet phase of the Focus Center Research Program (FCRP) a Semiconductor Research Corporation program sponsored by MARCO and DARPA. An Architectural Mechanism for Resilient IoT Services Hokeun Kim 1 , Eunsuk Kang 1 , David Broman 2 , Edward A. Lee 1 SafeThings 2017 November 5, 2017 1 University of California, Berkeley 2 KTH Royal Institute of Technology

Upload: others

Post on 22-May-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarmTerraSwarm

Sponsored by the TerraSwarm Research Center, one of six centers administered by the STARnet phase of the Focus Center Research Program (FCRP) a Semiconductor Research Corporation program sponsored by MARCO and DARPA.

An Architectural Mechanism for Resilient IoT Services

Hokeun Kim1, Eunsuk Kang1, David Broman2, Edward A. Lee1

SafeThings 2017November 5, 2017

1University of California, Berkeley2KTH Royal Institute of Technology

Page 2: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

Safety and Security of the IoT

• Safety & Security: No longer separate issues!

2

https://techcrunch.com/2017/03/29/teslas-8-1-software-update-brings-autopilot-2-0-cars-up-to-speed/

https://www.lightbluetouchpaper.org/2017/06/01/when-safety-and-security-become-one/

Page 3: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

Availability and Safety• Shutting down critical IoT services can cause

disastrous problems!– Power grids– Hospitals– Transportation– many more…

3

http://www.csoonline.com/article/3141601/critical-infrastructure/is-critical-infrastructure-the-next-ddos-target.html

https://thycotic.com/company/blog/2016/11/01/the-risks-of-critical-infrastructure-and-iot-from-ddos-attacks-that-could-bring-the-internet-to-a-standstill/

Page 4: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

Research Question

4

How do we design an IoT network to be resilient against availability &

other types of attacks?

Page 5: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

Cloud & Edge Computing

• Many existing IoT solutions are based on clouds• Alternative emerging architecture: Edge Computing

5

More available resourcesHigher latency

Less stable connectionsGreater control over data

Restricted resourcesBetter connectivity Lower latency

More challenging to guarantee data privacy

Better context awareness(of local system)

Limited context awareness(of local system)

Cloud servers

Edge computers(Internet gateways)

IoT devices (Things)

Page 6: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

Secure Swarm Toolkit (SST)

• Locally centralized, globally distributed architecture

6

Page 7: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

SST Overview• Auth– Software solution deployed on edge devices– Local authentication/authorization entity– Responsible for authorization of local Things

through key distribution– Manages trust relationship with other Auths

7

Page 8: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

Challenges in Securing the IoT

• Authentication/Authorization• Heterogeneity• Open environment• Scalability• Availability

8

[*] “A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things”, ACM/IEEE IoTDI ’17, CPSWeek

Addressed our previous work [*]

Addressed in this paper

Page 9: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

• Attacker Capabilities– Disrupt IoT services by targeting edge devices– DoS attacks (packet flooding, etc.,)

• Assumption– Some subset of edge devices exposed to attacker

TerraSwarm Research Center

Threat Model

9

Our Goal Provide services to Things even in the presence of attacks on some Auths

Page 10: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

Proposed Approach

• A trusted Auth takes over authorization tasks of a failed Auth

10

A2 t6

t4t1 t3

A1

t5t2A1 fails

Original topology

SST + Proposed approach

A2 t6

t4t1 t3

A1

t5t2

Current SST

A2 t6

t4t1 t3

A1

t5t2

Auth (on edge computer)

Entity (on IoT device)

Trust between AuthsCommunication between entities

tjAi

Ai

tj

tj is authorized by Ai

A1 fails

Idea: Secure Migration

Page 11: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

Migration Policies• Which Auth should each Thing be migrated to?• Non-trivial! Hard constraints & alternative costs

11

A2t6

t3

t2 t7

A1

t5

t1

t4

A1's signal range A2's signal range

A2

t3

A1

•Which Auth is directly reachable through wireless communication? • Is Auth equipped with HW security support (e.g., TPM or Intel SGX)? • Is Auth located in a restricted-access area?

? ?

A2

t5

A3

A1

t4

When A1 fails, migrate t4 from A1 to A2

t4 can't communicate with t5 after migration

Auth (on edge computer)

Entity (on IoT device)

Trust between AuthsCommunication between entities

tjAi

Ai

tj

tj is authorized by Ai

Page 12: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

Migration Policy Construction as ILP

• Computing a migration policy as an optimization problem!

12

• Formulation in Integer Linear Programming (ILP)– Variables: Boolean, set true if Thing X assigned to Auth Y– Coefficients: Communication costs– Constraints:

• Thing-Thing communication requirements• Auth-Auth trust relationships• Auth capacity: Max # Things for each Auth

More details in paper!

Page 13: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

Preliminary Experiment• Application: Smart Door Control through Mobile App

13

Simulation environment:• 4 Auths, 19 door

controllers, 26 apps• Implemented & running

on Linux Containers• ns-3 for simulating wired

& wireless communication• Gurobi as the ILP solver

Floor map of 5th floor Cory Hall, UC Berkeley

Page 14: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

• Measuring availability (i.e, “open door” request accepted) when different numbers of Auths fail– Three different migration cases

14

020406080100120

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Availability!(%)

Time!Elapse!(min.)

Chart!Title

ILP-Based!MigrationNaïve!MigrationNo!Migrat ion

1Auth!fails020406080100120

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Availability!(%)

Time!Elapse!(min.)

Chart!Title

ILP-Based!Migrat ionNaïve!MigrationNo!Migration

2!Auths!fail020406080100120

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Availability!(%)

Time!Elapse!(min.)

Chart!Title

ILP-Based!MigrationNaïve!Migrat ionNo!Migration

3!Auths!fail020406080100120

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Availability!(%)

Time!Elapse!(min.)

Chart!Title

ILP-Based!Migrat ionNaïve!MigrationNo!Migration

1Auth!fails020406080100120

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Availability!(%)

Time!Elapse!(min.)

Chart!Title

ILP-Based!MigrationNaïve!MigrationNo!Migrat ion

2!Auths!fail020406080100120

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Availability!(%)

Time!Elapse!(min.)

Chart!Title

ILP-Based!MigrationNaïve!MigrationNo!Migration

3!Auths!fail

020406080100120

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Availability!(%)

Time!Elapse!(min.)

Chart!Title

ILP-Based!Migrat ionNaïve!MigrationNo!Migration

1Auth!fails020406080100120

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Availability!(%)

Time!Elapse!(min.)

Chart!Title

ILP-Based!MigrationNaïve!MigrationNo!Migrat ion

2!Auths!fail020406080100120

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Availability!(%)

Time!Elapse!(min.)

Chart!Title

ILP-Based!MigrationNaïve!MigrationNo!Migration

3!Auths!fail

Experimental Results

020406080100120

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15Availability!(%)

Time!Elapse!(min.)

Chart!Title

ILP-Based!MigrationNaïve!MigrationNo!Migrat ion

1Auth!fails020406080100120

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Availability!(%)

Time!Elapse!(min.)

Chart!Title

ILP-Based!Migrat ionNaïve!MigrationNo!Migration

2!Auths!fail020406080100120

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Availability!(%)

Time!Elapse!(min.)

Chart!Title

ILP-Based!MigrationNaïve!Migrat ionNo!Migration

3!Auths!fail

Page 15: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

Summary

• Edge-based architecture has certain advantages over cloud-based security solutions

• Proposed migration approach is promising for higher availability under failures of some edge computers– Suitable for safety-critical environments

• Computing migration policy can be formulated as an ILP problem

15

Page 16: TerraSwarm - GitHub Pages · TerraSwarm Research Center Cloud & Edge Computing • Many existing IoT solutions are based on clouds • Alternative emerging architecture: Edge Computing

TerraSwarm Research Center

Future Work

• Scalability: For large networks, ILP may become too complex (on-going work)

• Hybrid solution for better availability (Auths on both clouds & edges)

• Theoretical bounds & resiliency analysis depending on network topology

• Advanced threat model– Selectively attack Auths to maximize damage

(instead of random DoS)

16