TY - JOUR
T1 - A Network-Aware Internet-Wide Scan for Security Maximization of IPv6-Enabled WLAN IoT Devices
AU - Verma, Shikhar
AU - Kawamoto, Yuichi
AU - Kato, Nei
N1 - Funding Information:
Manuscript received September 29, 2020; revised November 27, 2020; accepted December 10, 2020. Date of publication December 18, 2020; date of current version May 7, 2021. This work was supported by the Ministry of Internal Affairs and Communications, Japan, through National Project “Research and Development of High-Efficiency Wide Area Network Scan for Efficient Use of Frequency in Wireless IoT,” under Grant JPJ000254. (Corresponding author: Shikhar Verma.) The authors are with the Graduate School of Information Sciences, Tohoku University, Sendai 9808579, Japan (e-mail: shikhar.verma@it.is.tohoku.ac.jp; youpsan@it.is.tohoku.ac.jp; kato@it.is.tohoku.ac.jp). Digital Object Identifier 10.1109/JIOT.2020.3045733
Publisher Copyright:
© 2014 IEEE.
PY - 2021/5/15
Y1 - 2021/5/15
N2 - Despite unprecedented advancements, wireless local area network (WLAN) technologies for the Internet of Things (IoT), such as IEEE 802.11ah (i.e., WiFi-HaLow), are prone to serious security threats, owing to their constrained computational and memory resources, which limit the use of heavyweight intrusion protection and security protocols. To address this problem, security administrators (sec-admins) must perform regular and comprehensive vulnerability assessments of IoT devices. An Internet-wide port scan (IWPS) is the initial step. However, the medium access control mechanism of IEEE 802.11ah, designed specifically for heterogeneous IoT traffic and low-power operations, can degrade network performance in the case of traditional port-scan traffic. Moreover, Internet-security (IPSec) protocol support is mandatory for IPv6-enabled IoT devices to ensure data confidentiality, integrity, and availability. Although the objective of a port scan is to improve IoT security, the resultant network performance can adversely affect IPSec services. Therefore, in this study, we optimize the IWPS to maximize the IoT security over IEEE 802.11ah WLAN. To this end, we propose novel mathematical models to evaluate IoT security based on port-scan network performance and IPsec services, which derives an optimal scan rate for sec-admins. The effectiveness of the proposed framework is verified by comprehensive numerical analysis, which shows that our approach minimizes the risk to IoT devices while probing them at an optimal scan rate.
AB - Despite unprecedented advancements, wireless local area network (WLAN) technologies for the Internet of Things (IoT), such as IEEE 802.11ah (i.e., WiFi-HaLow), are prone to serious security threats, owing to their constrained computational and memory resources, which limit the use of heavyweight intrusion protection and security protocols. To address this problem, security administrators (sec-admins) must perform regular and comprehensive vulnerability assessments of IoT devices. An Internet-wide port scan (IWPS) is the initial step. However, the medium access control mechanism of IEEE 802.11ah, designed specifically for heterogeneous IoT traffic and low-power operations, can degrade network performance in the case of traditional port-scan traffic. Moreover, Internet-security (IPSec) protocol support is mandatory for IPv6-enabled IoT devices to ensure data confidentiality, integrity, and availability. Although the objective of a port scan is to improve IoT security, the resultant network performance can adversely affect IPSec services. Therefore, in this study, we optimize the IWPS to maximize the IoT security over IEEE 802.11ah WLAN. To this end, we propose novel mathematical models to evaluate IoT security based on port-scan network performance and IPsec services, which derives an optimal scan rate for sec-admins. The effectiveness of the proposed framework is verified by comprehensive numerical analysis, which shows that our approach minimizes the risk to IoT devices while probing them at an optimal scan rate.
KW - IEEE 80211ah networks
KW - Internet of Things (IoT)
KW - IoT security
KW - IoT vulnerability assessment
KW - port scan
UR - http://www.scopus.com/inward/record.url?scp=85098754601&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85098754601&partnerID=8YFLogxK
U2 - 10.1109/JIOT.2020.3045733
DO - 10.1109/JIOT.2020.3045733
M3 - Article
AN - SCOPUS:85098754601
SN - 2327-4662
VL - 8
SP - 8411
EP - 8422
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
IS - 10
M1 - 9298846
ER -