Tack: attack-resistant internet of things networks

the internet of things (iot) was expected to enable applications of utmost societal value, such as energy-efficient buildings, smart cities, intelligent grids, and next-generation healthcare. Such a promise is only partly fulfilled. The more demanding and critical applications, that is, those with strict dependability requirements, still fall short of expectations. These applications require sensor data and actuation commands to be delivered in a timely fashion and with high reliability, while the battery-powered devices must last for a pre-defined amount of time, often in the order of years. Despite the iot developments and corresponding standardization efforts, such as 802.15.4, rpl, 6tisch and coap, all we can provide right now are soft guarantees in benign environments.&Nbsp;

simultaneously, we witnessed a tremendous increase in attacks on the internet infrastructures. For instance, iot devices were hacked and used as a source of a ddos attack by the mirai botnet. The attack targeted dns services, and successfully took down a number of major websites for almost a full day in october 2016. Iot networks of embedded devices are even more vulnerable than the existing (wired) internet infrastructure, since they usually communicate wirelessly and at a much lower output power than other devices (such as wifi) in the same frequency band which makes them more vulnerable to e.G. Jamming attacks. Furthermore, due to their resource constraints, these devices cannot run the most sophisticated cryptography algorithms and other defenses against attacks. The challenge is thus to provide guarantees iot networks not only under benign circumstances but also in more challenging situations, for example, when iot networks are under attack. Other related challenges include exposure to hard radio environments and cross-technology interference, whose solutions need to be reconciled with the use of resource-constrained operating systems. Solving these challenges would enable a new class of critical iot applications that significantly advance the guarantees currently provided by the best-effort nature of present-day iot networks.&Nbsp; 

in this project we will provide more robust iot communication by exploiting frequency and technology diversity combined with novel network scheduling approaches. We will provide physical layer security, attack prevention and detection by performance and interference monitoring, as well as anomaly detection shared between resource-constrained devices and the edge cloud. Furthermore, we will harden iot oses by exposing hardware-level protection mechanisms, such as arm trustzone, at the system and application programming interface and by improving software security with the help of fuzzing techniques, a technique to find bugs that has not been employed for resource-constrained iot devices.&Nbsp;

we will evaluate and validate our developed concepts through several challenging use cases that address critical applications areas that require high reliability, timeliness, and scalability even in harsh conditions and that function to a developer-defined extend even when being under attack.&Nbsp; 

Start date: 
Project Duration: 
Technological Area: 
Market Area: 

Raising the productivity and competitiveness of European businesses through technology. Boosting national economies on the international market, and strengthening the basis for sustainable prosperity and employment.