Published July 3, 2020 | Version v1
Journal article Restricted

The DNS in IoT: Opportunities, Risks, and Challenges

  • 1. SIDN Labs and University of Twente
  • 2. Double Shot Security
  • 3. Interisle Consulting Group
  • 4. CAIDA/UC San Diego
  • 5. Internet Archive
  • 6. Verisign
  • 7. nterisle Consulting Group
  • 8. ICANN
  • 9. Akamai Technologies
  • 10. CIRA
  • 11. R2 Cyber

Description

The Internet of Things (IoT) is widely expected to make our society safer, smarter, and more sustainable. However, a key challenge remains, which is how to protect users and Internet infrastructure operators from attacks on or launched through vast numbers of autonomously operating sensors and actuators. In this article, we discuss how the security extensions of the domain name system (DNS) offer an opportunity to help tackle that challenge, while also outlining the risks that the IoT poses to the DNS in terms of complex and quickly growing IoT-powered distributed denial of service (DDoS) attacks. We identify three challenges for the DNS and IoT industries to seize these opportunities and address the risks, for example, by making DNS security functions (e.g., response verification and encryption) available on popular IoT operating systems.

Files

Restricted

The record is publicly accessible, but files are restricted. <a href="https://zenodo.org/account/settings/login?next=https://zenodo.org/records/4313121">Log in</a> to check if you have access.

Additional details

Funding

European Commission
CONCORDIA - Cyber security cOmpeteNCe fOr Research anD InnovAtion 830927