Topics
In This Story

Sai Manoj聽Pudukotai聽Dinakarrao,聽Kai Zeng,聽碍丑补濒别诲听碍丑补蝉补飞苍别丑, and聽Brian Mark are collaborating with researchers at Virginia Tech to optimize the safety and energy-efficient tradeoff.听聽
The capabilities and reach of 5G聽are聽expanding, but with new capabilities聽come聽new security challenges. Four Mason Engineering researchers聽received a $1.6 million grant from DARPA to tackle one of the many security issues that 5G poses as part of a larger initiative called .听
The , entitled聽EPIC聽SWaPD: Energy Preserving聽Internet of Things (IoT)聽Cryptography for Small Weight and Power Devices, aims to聽optimize聽the security and energy efficiency tradeoff by creating a low-energy security architecture for various types of聽IoT聽devices.听聽
鈥淚n a network, there are many different devices of different sizes and capabilities. Many of these devices don鈥檛 have much computing power or battery life,聽and a common cybersecurity attack on these devices is to drain their battery life,鈥 says , co-principal investigator on the grant.听聽
惭补谤办,鈥,鈥 补苍诲鈥爄n the are collaborating聽with聽the company聽Kryptowire聽and Assistant Professor Matthew Hicks from for the project.听聽
These small IoT devices could be as simple as a thermometer or humidity sensor that is part of a larger smart home system. 鈥淭hese sensors聽can be聽very tiny,聽and聽they have limited聽computation and聽communication capabilities. The first step for each of these types of sensors would be to聽bootstrap, or link,聽a secure聽connection聽to the network, which requires authentication聽without pre-shared secrets. This is where the vulnerabilities lie,鈥 says Kai Zeng.听聽
When sensors or other types of small IoT devices聽must聽automatically authenticate themselves, attackers聽have many paths of attack.听They can drain the device's battery, rendering it useless, or steal sensitive information or data from the device.听Because of the many pathways that attackers could聽use to聽harm these devices, the team is聽combining聽cryptography, network protocol design,聽and machine learning to assure聽the聽success and scalability of their efforts.听聽
鈥淪omething really important for this effort is that聽the security architecture operates on the principles of zero trust and least privilege,鈥 says Mark. 鈥淶ero trust means聽that when a device comes in and wants to join the network, the assumption is that there is no prior trust聽or information shared between the devices,聽while least privilege implies the minimum permissions are granted to the entity to perform its task.听So,聽we needed to bootstrap the security association聽and grant an entity just enough authority to access the devices or data that it needs but no more than that.鈥澛犅
One way they are looking at聽securing the connection聽is through gait-inspired authentication, which leverages the kinetic energy generated by a human user. 鈥淓very device聽harvests聽energy in a different way, and we use the harvesting pattern聽for authentication聽of the聽device,聽which preserves energy and accomplishes a security task at the same time,鈥 says聽Dinakarrao.听聽
Another approach is to exploit the 鈥渁lways-on鈥 sensors in some devices like smartphones. 鈥淲e plan to employ always-on sensing to perform the exchange of device identification and cryptographic material,鈥 says聽Khasawneh.听
They are also using machine learning聽to ensure聽both聽authentication聽and聽authorization of different devices. 鈥淲e not only have to authenticate the devices聽and entities聽that are allowed on a network, but we have to verify their different roles聽and privileges. I might be granted聽access to the information that tells me the temperature of a room, but聽perhaps聽I might聽not have the authorization to change the thermostat聽setting,鈥 says Mark. 鈥淯sing graph-based聽models, we聽can verify聽the聽trust聽relationships of different devices聽or entities聽and this process can be accelerated聽using machine learning techniques,鈥澛燼dds聽Dinakarrao.听聽
Long-term, the team aspires for their security architecture to easily be applied to other devices.听鈥淲hen we talk about the energy and security tradeoff, we have to think about how we can do things in a smart way to conserve energy聽while enhancing聽security. But we also need to think about how to make our聽architecture聽scalable聽to larger, more聽geographically distributed聽networks.听Right聽now,聽this work is with smaller devices, but the hope is that聽our overall security architecture聽can apply to a variety of devices with different capabilities,鈥澛爏ays Mark.听