We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things

Abstract: The ongoing trend to move industrial appliances from previously isolated networks to the Internet requires fundamental changes in security to uphold secure and safe operation. Consequently, to ensure end-to-end secure communication and authentication, (i) traditional industrial protocols, e.g., Modbus, are retrofitted with TLS support, and (ii) modern protocols, e.g., MQTT, are directly designed to use TLS. To understand whether these changes indeed lead to secure Industrial Internet of Things deployments, i.e., using TLS-based protocols, which are configured according to security best practices, we perform an Internet-wide security assessment of ten industrial protocols covering the complete IPv4 address space.
Our results show that both, retrofitted existing protocols and newly developed secure alternatives, are barely noticeable in the wild. While we find that new protocols have a higher TLS adoption rate than traditional protocols (7.2% vs. 0.4%), the overall adoption of TLS is comparably low (6.5% of hosts). Thus, most industrial deployments (934,736 hosts) are insecurely connected to the Internet. Furthermore, we identify that 42% of hosts with TLS support (26,665 hosts) show security deficits, e.g., missing access control. Finally, we show that support in configuring systems securely, e.g., via configuration templates, is promising to strengthen security.
Comments: 15 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
Journal reference: In Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22), Association for Computing Machinery, New York, NY, USA, pages 252-266
DOI: 10.1145/3488932.3497762
Cite as: arXiv:2206.00322 [cs.CR]
  (or arXiv:2206.00322v1 [cs.CR] for this version)

Submission history

From: Markus Dahlmanns [view email]
[v1] Wed, 1 Jun 2022 08:38:28 GMT (854kb,D)

Link back to: arXiv, form interface, contact.