David Barrera’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes
  • Conference Paper

December 2020

·

10 Reads

·

6 Citations

Corentin Thomasset

·

David Barrera

Figure 2: Supported devices for SERENIoT. Devices toward the left have simpler network behavior and tend to have a similar network footprint shared across devices of the same type. Devices toward the right have unique network footprints determined by their users.
Figure 3: Main components of a Sentinel. Description inline.
Figure 4: Device chain: The Sentinels add packet signatures into blocks. The chain grows and only signatures listed into the longest chain are trusted.
Figure 5: SERENIoT's Block architecture. The Sentinel Address is a unique identifier generated at Sentinels start up using the same algorithm used to generate Bitcoin's addresses.
Figure 6: Multichain support in SERENIoT. Block headers of device specific blockchains are incorporated into a single control chain.

+8

SERENIoT: Collaborative Network Security Policy Management and Enforcement for Smart Homes
  • Preprint
  • File available

March 2020

·

146 Reads

Network traffic whitelisting has emerged as a dominant approach for securing consumer IoT devices. However, determining what the whitelisted behavior of an IoT device should be remains an open challenge. Proposals to date have relied on manufacturers and trusted parties to provide whitelists, but these proposals require manufacturer involvement or placing trust in an additional stakeholder. Alternatively, locally monitoring devices can allow building whitelists of observed behavior, but devices may not exhaust their functionality set during the observation period, or the behavior may change following a software update which requires re-training. This paper proposes a blockchain-based system for determining whether an IoT device is behaving like other devices of the same type. Our system (SERENIoT, pronounced Serenity) overcomes the challenge of initially determining the correct behavior for a device. Nodes in the SERENIoT public blockchain submit summaries of the network behavior observed for connected IoT devices and build whitelists of behavior observed by the majority of nodes. Changes in behavior through software updates are automatically whitelisted once the update is broadly deployed. Through a proof-of-concept implementation of SERENIoT on a small Raspberry Pi IoT network and a large-scale Amazon EC2 simulation, we evaluate the security, scalability, and performance of our system.

Download

Citations (1)


... In [119], wireless packets were gathered, including Z-wave and ZigBee data. SERENIoT [109] packet signatures from network traffic. Mahadewa et al. collected an abstract definition of application-layer protocols and the internal behaviors of entities [74] [75]. ...

Reference:

Knowledge-based Cyber Physical Security at Smart Home: A Review
SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes
  • Citing Conference Paper
  • December 2020