Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things †
Abstract
:1. Introduction
- We address the importance of context in the software supply chain. We emphasize the fundamental requirements that supply chain of binary objects should be followed as the provider originally intended. That is, the delivered binary objects must be able to prove the legitimacy of their delivery history as well as the integrity of their contents.
- We leverage the blockchain as a faithful, delegated authenticator for the distributed watchdog system. The blockchain system automatically authenticates every report and authorizes the watchdogs. To do so, we map every action onto a non-fungible event token in the blockchain.
- We identify every instance of a binary object in the supply chain as a distinguishable, traceable product. For this purpose, we propose an identity binding between a binary object and a blockchain entity. Thus, a binary object is uniquely identified with its own context and records. This is helpful to rapidly discover the product-wise problem and spot corruption.
2. Background and Related Work
2.1. Collaborative Intrusion Detection Systems
2.2. Blockchain
3. IndWatch
3.1. Motivations
- R1
- Identity binding: An entity specified in the system should have a dual identity, respectively working in IIoT networks and blockchain networks. The one-to-one mapping between the two identities should be verifiable.
- R2
- Authenticated reports: The reports from evaluators, watchdogs, and receivers are authenticated in terms of the origin and the integrity.
- R3
- Joint decision: An individual watchdog monitors the behavior of nodes and solely decides on the occurrence of a local event. However, to identify malicious nodes, multiple watchdogs should collaborate with each other in the same region.
- R4
- Distributed management of the software supply chain: In covering IIoT networks, the distributed approach is effective, but each entity cannot cover the whole area alone. Thus, distributed watchdogs must verify the end-to-end integrity of binary objects and identify misbehaving nodes on the software supply chain.
- R5
- Trustless watchdogs: The watchdog is also a node that can malfunction or be compromised. Thus, the regulation is required for the evaluation process, in addition to the authenticated reports.
3.2. Blockchain-Based Reputation System
3.3. Overview
4. Design
4.1. Token System
4.2. Provider
- Create an address for , a, based on the hash value of .
- Assign the address to : .
- Calculate the fingerprint (i.e., hash value) of the address-imprinted binary object.
- Put the fingerprint into the context of the binary object, (a).
4.3. Watchdog and Segment
4.4. Recipient
- Is the identity binding valid? The recipient checks whether the embedded address of the received binary object and the address of the context are the same. If the binary object is encrypted, the recipient first decrypts it to get the binary in plain text.
- Is the integrity of the binary preserved? The recipient matches the fingerprint of the received binary object and that in the context.
- Does the specification in the context show that the binary object is applicable to the recipient’s system? The specification may have an expiration time.
4.5. Judge
5. IndWatch Model
5.1. Segment
5.2. Evaluators
5.3. Blockchain System (Token and Judge)
6. Evaluation
- Is this system correctly designed for distributed environments (Section 6.1)?
- Can this system securely deliver software to IIoT devices (Section 6.2)?
- Is this system efficient (Section 6.3)?
6.1. Correctness of the Design
6.2. Security Analysis
6.2.1. Setup
6.2.2. Attack Models
- Payload modification is a traditional attack that modifies the contents of the binary objects. We model it as flipping random bits of the contents.
- Target mismatching is an attack that delivers legitimate binary object to wrong target devices in order to cause malfunction of the victims. We model this as replacing a receiver (each receiver is a unique target in the simulation).
- Out of order delivery is similar to the target mismatching attack: the attacker sends a legitimate binary object to a matched target but swaps it with old one. The old software updates may contain disclosed vulnerabilities that the attacker will use. We model this as replacing the binary object with the previously delivered binary object.
- Delayed delivery is an attack that delays software update deliberately to increase attack time windows for the old vulnerabilities. We model it as delaying for pre-defined time (which is effectively similar to packet dropping due to the timeout of watchdogs).
6.2.3. Attack Detection Rate
6.2.4. Comparison to CIDS
6.3. Performance
7. Conclusions and Future Work
Author Contributions
Funding
Conflicts of Interest
Appendix A
References
- O’Halloran, D.; Kvochko, E. Industrial Internet of Things: Unleashing the Potential of Connected Products and Services; World Economic Forum, 2015; p. 40. Available online: https://www.weforum.org/press/2015/01/industrial-internet-of-things-unleashing-the-potential-of-connected-products-and-services/ (accessed on 25 June 2021).
- The Industrial IoT: 125+ Startups Transforming Factory Floors, Oil Fields, and Supply Chains. Available online: https://www.cbinsights.com/blog/top-startups-iiot/ (accessed on 25 June 2021).
- Dunn, W.R. Designing safety-critical computer systems. Computer 2003, 36, 40–46. [Google Scholar] [CrossRef]
- Unni, R.K.; Vijayanand, P.; Dilip, Y. FPGA Implementation of an Improved Watchdog Timer for Safety-critical Applications. In Proceedings of the 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), Pune, India, 6–10 January 2018; pp. 55–60. [Google Scholar]
- Hecke, G.V. IIoT & Intelligent OTA Firmware Updates. 2020. Available online: https://www.linkedin.com/pulse/iiot-intelligent-ota-firmware-updates-geert-van-hecke?trk=public_profile_article_view (accessed on 25 June 2021).
- Mugarza, I.; Flores, J.L.; Montero, J.L. Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era. Sensors 2020, 20, 7160. [Google Scholar] [CrossRef] [PubMed]
- Command Five Pty Ltd. SK Hack by an Advanced Persistent Threat; Research Paper; Command Five Pty Ltd., 2011; Available online: https://dokumen.tips/documents/sk-hack-by-an-advanced-persistent-threat.html (accessed on 25 June 2021).
- Nicho, M.; Oluwasegun, A.; Kamoun, F. Identifying vulnerabilities in apt attacks: A simulated approach. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018; pp. 1–4. [Google Scholar]
- Neubert, T.; Vielhauer, C. Kill Chain Attack Modelling for Hidden Channel Attack Scenarios in Industrial Control Systems. IFAC-PapersOnLine 2020, 53, 11074–11080. [Google Scholar] [CrossRef]
- Cybersecurity and Infrastructure Security Agency. Defending Against Software Supply Chain Attacks; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2021.
- Thomson, I. Firmware Update Blunder Bricks Hundreds of Home ‘Smart’ Locks. The Register. 11 August 2017. Available online: https://www.theregister.co.uk/2017/08/11/lockstate_bricks_smart_locks_with_dumb_firmware_upgrade (accessed on 25 June 2021).
- San, I.; Fern, N.; Koc, C.K.; Cheng, K.T. Trojans modifying soft-processor instruction sequences embedded in FPGA bitstreams. In Proceedings of the 2016 26th International Conference on Field Programmable Logic and Applications (FPL), Lausanne, Switzerland, 29 August–2 September 2016; pp. 1–4. [Google Scholar]
- Bellissimo, A.; Burgess, J.; Fu, K. Secure Software Updates: Disappointments and New Challenges. In Proceedings of the First USENIX Workshop on Hot Toics in Security (HotSec), Vancouver, BC, Canada, 31 July 2006. [Google Scholar]
- Nikitin, K.; Kokoris-Kogias, E.; Jovanovic, P.; Gailly, N.; Gasser, L.; Khoffi, I.; Cappos, J.; Ford, B. CHAINIAC: Proactive software-update transparency via collectively signed skipchains and verified builds. In Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, Canada, 16–18 August 2017; pp. 1271–1287. [Google Scholar]
- Quarta, D.; Pogliani, M.; Polino, M.; Maggi, F.; Zanchettin, A.M.; Zanero, S. An Experimental Security Analysis of an Industrial Robot Controller. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2017; pp. 268–286. [Google Scholar]
- Yu, T.; Sekar, V.; Seshan, S.; Agarwal, Y.; Xu, C. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, 16–17 November 2015; p. 5. [Google Scholar]
- Michiardi, P.; Molva, R. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced Communications and Multimedia Security; Springer: Berlin/Heidelberg, Germany, 2002; pp. 107–121. [Google Scholar]
- Ioannis, K.; Dimitriou, T.; Freiling, F.C. Towards intrusion detection in wireless sensor networks. In Proceedings of the 13th European Wireless Conference, Paris, France, 1–4 April 2007; pp. 1–10. [Google Scholar]
- Chen, J.; Kher, S.; Somani, A. Distributed fault detection of wireless sensor networks. In Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Los Angeles, CA, USA, 26 September 2006; pp. 65–72. [Google Scholar]
- Cho, Y.; Qu, G.; Wu, Y. Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks. In Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops (SPW), San Francisco, CA USA, 24–25 May 2012; pp. 134–141. [Google Scholar]
- Gong, F. Next Generation Intrusion Detection Systems (IDS); McAfee Network Security Technologies Group: San Jose, CA USA, 2002. [Google Scholar]
- Lu, L. IoT Network Watchdog. 2018. Available online: https://www.diva-portal.org/smash/get/diva2:1228677/FULLTEXT01.pdf (accessed on 25 June 2021).
- Meng, W.; Tischhauser, E.; Wang, Q.; Wang, Y.; Han, J. When Intrusion Detection Meets Blockchain Technology: A Review. IEEE Access 2018, 6, 10179–10188. [Google Scholar] [CrossRef]
- Alexopoulos, N.; Vasilomanolakis, E.; Ivánkó, N.R.; Muhlhauser, M. Towards Blockchain-Based Collaborative Intrusion Detection Systems. In Proceedings of the International Conference on Critical Information Infrastructures Security, Lucca, Italy, 8–13 October 2017. [Google Scholar]
- Blockchains: The great chain of being sure about things. The Economist. 31 October 2015. Available online: https://www.economist.com/briefing/2015/10/31/the-great-chain-of-being-sure-about-things (accessed on 25 June 2021).
- Cervantes, C.; Poplade, D.; Nogueira, M.; Santos, A. Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada, 11–15 May 2015; pp. 606–611. [Google Scholar]
- Pu, C.; Hajjar, S. Mitigating forwarding misbehaviors in RPL-based low power and lossy networks. In Proceedings of the 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 12–15 January 2018; pp. 1–6. [Google Scholar]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2018. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 25 June 2021).
- Ethereum Project. Available online: https://ethereum.org (accessed on 25 June 2021).
- Berdik, D.; Otoum, S.; Schmidt, N.; Porter, D.; Jararweh, Y. A survey on blockchain for information systems management and security. Inf. Process. Manag. 2021, 58, 102397. [Google Scholar] [CrossRef]
- Kelly, J. Forty big banks test blockchain-based bond trading system. Reuters. 3 March 2016. Available online: https://www.reuters.com/article/banking-blockchain-bonds-idUSL8N16A30H (accessed on 25 June 2021).
- Araoz, M. Proof of Existence. Available online: https://proofofexistence.com (accessed on 25 June 2021).
- Christidis, K.; Devetsikiotis, M. Blockchains and Smart Contracts for the Internet of Things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
- Colored Coins. Available online: https://en.bitcoin.it/wiki/Colored_Coins (accessed on 25 June 2021).
- ERC20 Token Standard. Available online: https://theethereum.wiki/erc20_token_standard/ (accessed on 25 June 2021).
- ERC721 Token Standard. Available online: https://erc721.org (accessed on 25 June 2021).
- Abadi, M.; Budiu, M.; Erlingsson, U.; Ligatti, J. Control-flow integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 7–11 November 2005; pp. 340–353. [Google Scholar]
- Walls, R.J.; Brown, N.F.; Le Baron, T.; Shue, C.A.; Okhravi, H.; Ward, B.C. Control-flow integrity for real-time embedded systems. In Proceedings of the 31st Euromicro Conference on Real-Time Systems (ECRTS 2019), Stuttgart, Germany, 9–12 July 2019; Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik: Wadern, Germany, 2019. [Google Scholar] [CrossRef]
- Lamport, L. Specifying Systems: The TLA+ Language and Tools for Hardware and Soft Ware Engineers; Addison-Wesley Longman Publishing Co., Inc.: Boston, MA, USA, 2002. [Google Scholar]
- Lamport, L. Distributed algorithms in TLA. In Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, Portland, OR, USA, 16–19 July 2000; p. 3. [Google Scholar]
- Hawblitzel, C.; Howell, J.; Kapritsos, M.; Lorch, J.R.; Parno, B.; Roberts, M.L.; Setty, S.; Zill, B. IronFleet: Proving practical distributed systems correct. In Proceedings of the 25th Symposium on Operating Systems Principles, Monterey, CA, USA, 4–7 October 2015; pp. 1–17. [Google Scholar]
- Latif, S.; Rehman, A.; Zafar, N.A. Blockchain and iot based formal model of smart waste management system using tla+. In Proceedings of the 2019 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, 16–18 December 2019; pp. 304–3045. [Google Scholar]
- Braithwaite, S.; Buchman, E.; Konnov, I.; Milosevic, Z.; Stoilkovska, I.; Widder, J.; Zamfir, A. Formal Specification and Model Checking of the Tendermint Blockchain Synchronization Protocol (Short Paper). In Proceedings of the 2nd Workshop on Formal Methods for Blockchains (FMBC 2020), Los Angeles, CA, USA, 20–21 July 2020; Schloss Dagstuhl-Leibniz-Zentrum für Informatik: Wadern, Germany, 2020. [Google Scholar]
- Thomsen, S.E.; Spitters, B. Formalizing Nakamoto-Style Proof of Stake. arXiv 2020, arXiv:2007.12105. [Google Scholar]
- Thomas, S.; Schwartz, E. A Protocol for Interledger Payments. 2015. Available online: https://interledger.org/interledger.pdf (accessed on 25 June 2021).
- Ouyang, A. Formal Analysis of the CBC Casper Consensus Algorithm with TLA+. 2019. Available online: https://blog.trailofbits.com/2019/10/25/formal-analysis-of-the-cbc-casper-consensus-algorithm-with-tla/ (accessed on 25 June 2021).
- Øhrstrøm, P.; Hasle, P. Temporal Logic: From Ancient Ideas to Artificial Intelligence; Springer: Berlin/Heidelberg, Germany, 2007; Volume 57. [Google Scholar]
- Sengupta, J.; Ruj, S.; Bit, S.D. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 2020, 149, 102481. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lee, J.; Kwon, T. Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things. Sensors 2021, 21, 4393. https://doi.org/10.3390/s21134393
Lee J, Kwon T. Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things. Sensors. 2021; 21(13):4393. https://doi.org/10.3390/s21134393
Chicago/Turabian StyleLee, JongHyup, and Taekyoung Kwon. 2021. "Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things" Sensors 21, no. 13: 4393. https://doi.org/10.3390/s21134393
APA StyleLee, J., & Kwon, T. (2021). Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things. Sensors, 21(13), 4393. https://doi.org/10.3390/s21134393