• Iot Forum
  • About us
  • Write for us
  • Contact us
  • Newsletter signup
IOT News - Internet of Things
  • IoT Forum
  • Hardware
    • Networking
  • Smart Home
  • Digital Transformation
    • All
    • Artificial Intelligence
    • Blockchain IoT
    • Enterprise IoT
    • Industrial IoT
    • Machine Learning
    • Smart City
    Top 5 trends for API-powered digital transformation in 2021

    Top 5 trends for API-powered digital transformation in 2021

    ONE Tech Launches Edge AI that Embeds and Trains AI Models Directly on MCU’s

    ONE Tech Launches Edge AI that Embeds and Trains AI Models Directly on MCU’s

    Awake Security Advances AI-powered Security for Faster Threat Protection and Remediation

    BlackSky awarded IARPA contract to develop next generation artificial intelligence platform

    • Wearables
    • Artificial Intelligence
    • Machine Learning
    • Industrial IoT
  • Cloud
  • Security
  • 5G IoT
  • Cars
No Result
View All Result
  • IoT Forum
  • Hardware
    • Networking
  • Smart Home
  • Digital Transformation
    • All
    • Artificial Intelligence
    • Blockchain IoT
    • Enterprise IoT
    • Industrial IoT
    • Machine Learning
    • Smart City
    Top 5 trends for API-powered digital transformation in 2021

    Top 5 trends for API-powered digital transformation in 2021

    ONE Tech Launches Edge AI that Embeds and Trains AI Models Directly on MCU’s

    ONE Tech Launches Edge AI that Embeds and Trains AI Models Directly on MCU’s

    Awake Security Advances AI-powered Security for Faster Threat Protection and Remediation

    BlackSky awarded IARPA contract to develop next generation artificial intelligence platform

    • Wearables
    • Artificial Intelligence
    • Machine Learning
    • Industrial IoT
  • Cloud
  • Security
  • 5G IoT
  • Cars
No Result
View All Result
IOT News - Internet of Things
No Result
View All Result
Home Security

Hiding the Military Internet of Things Devices in Plain Sight

Camouflaging IoT device signals remains a problem, and not just for the military. New research shows that network-connected device can be authenticated without revealing their individual identities.

iotnews.com by iotnews.com
January 29, 2020
in Security
0
Hiding the Military Internet of Things Devices in Plain Sight
8
SHARES
40
VIEWS
Share on FBShare on TwitterShare on LinkedinReddit

The internet of things is causing a headache for the military. Millions of devices unwittingly reveal their identities with every message they send or receive. The concern is that adversaries could be listening.

Commonly used safeguards to fend off identity data leakage include blind signatures, identity certificates and newer kinds of device authentication, such as verifiably common secret encoding. But adversaries have caught on and are finding ways to monitor, track and record use of many devices.

The fact is, camouflaging IoT device signals remains a problem, and not just for the military.

Lake Bu at Draper recently unveiled another approach. Bu found a way to hide the identity of a device inside a group identity. That way a device doesn’t reveal its individual identity, and the user can authenticate their access and still do their job. “Whether the device is a drone, robot, GPS app or soldier system, its identity is masked because it’s wrapped inside a secure Group Anonymous Authentication Protocol (GAAP),” Bu said.

Bu describes GAAP in a paper he co-authored with a team from Boston University’s Adaptive and Secure Computing Systems (ASCS) Laboratory. “GAAP enables a device to be authenticated without revealing its individual identity,” said Dr. Michel A. Kinsy, who directs the ASCS Laboratory.

GAAP works as a network-installed software application that goes out and gathers information about every device that’s been granted access to the network, including the groups, their members and their members’ privileges. GAAP uses the information to generate design parameters and construct and install a set of hardware modules on each device. The physical system is initialized when each device fetches its group identity certificates from the verifier on the network. If any malicious behavior is detected, the system diagnoses the issue and updates the network information.

The authors give examples of GAAP at work and point out how it could be used, for instance, in an army unit, a home with IoT devices or a department or team at a company with multiple employees. GAAP enables users to control access to services and resources granted to the individual devices or components based on their group information or privileges, and establish and enforce data-sharing policies that preserve the privacy of the critical information on end-users. GAAP makes devices resistant to ploys such as man-in-the-middle attacks, imposters, hijacking, counterfeiting and eavesdropping.

Authors include Bu and a team from Boston University’s Adaptive and Secure Computing Systems Laboratory, including Rashmi Agrawal, Eliakin Del Rosario and Kinsy.

Draper’s capabilities used in the development of the secure Group Anonymous Authentication Protocol and architecture include image and data analytics and secure and assured systems.

JOIN OUR IoT COMMUNITY
IoTForums.com
×
Continue to iotForums.com
Internet of Things platforms, projects, development, devices & support forum
for developers and enthusiasts
Tags: iot devicesmilitarymilitary iotsecurity
Share4Tweet2ShareShare
Previous Post

Honeywell and Verizon partner to create LTE-connected smart meters

Next Post

Molex Highlights Future-Ready Infrastructure and CoreSync IoT Network Platform

Related Posts

AWS Announces General Availability of Amazon Fraud Detector

ExtraHop Threat Research Team Finds One in Three IT Environments Vulnerable to Ripple20 Threat

by IoTNews.com
September 11, 2020
0

SEATTLE: ExtraHop, the leader in cloud-native network detection and response, today issued a report warning of the potential impact of...

Awake Security Advances AI-powered Security for Faster Threat Protection and Remediation

Awake Security Advances AI-powered Security for Faster Threat Protection and Remediation

by IoTNews.com
July 24, 2020
0

Awake Security, the only advanced network detection and response company that delivers answers, not alerts, today announced platform enhancements that...

Sequitur Labs Launches EmSPARK 2.0 Security Suite for Critical IoT Device Protection

Sequitur Labs Launches EmSPARK 2.0 Security Suite for Critical IoT Device Protection

by IoTNews.com
July 22, 2020
0

Sequitur Labs today debuted the next generation of its comprehensive approach to embedded system security with the launch of EmSPARK™...

IoT Forum Discussions

Realtek RTL8722DM Arduino Compatible WiFi + BLE IoT development board
Realtek RTL8722DM Arduino Compatible WiFi + BLE IoT development board

Realtek's RTL8722DM development board has recently added support for the Arduino IDE. It is an IoT-ready MCU powered by an ARM Cortex-M4 core at up to 200MHz coupled with a Cortex-M0 core at up to 20MHz. It is specially designed to be pin-compatible with the Arduino UNO, can be programmed using the Arduino IDE and supports most of the Arduino base examples and expansion boards. In addition to the standard MCU... Realtek RTL8722DM Arduino Compatible WiFi + BLE IoT development board [...]

SUBSCRIBE TO OUR FREE NEWSLETTER
* we never share your e-mail with third parties.
SUBSCRIBE NOW

Categories

  • 5G IoT
  • Artificial Intelligence
  • Blockchain IoT
  • Cloud Computing
  • Connected Car
  • Digital Transformation
  • Enterprise IoT
  • Industrial IoT
  • IoT Hardware
  • Machine Learning
  • Networking
  • Security
  • Smart City
  • Smart Home
  • Wearables

Stay Connected with IoTNews

IOT News - Internet of Things

© 2020 IoTNews.com

Navigate Site

  • Home
  • About us
  • Write for us
  • Contact Us
  • Newsletter signup

Follow Us

No Result
View All Result
  • IoT Forum
  • Hardware
    • Networking
  • Smart Home
  • Digital Transformation
    • Wearables
    • Artificial Intelligence
    • Machine Learning
    • Industrial IoT
  • Cloud
  • Security
  • 5G IoT
  • Cars

© 2020 IoTNews.com