With the large-scale deployment of industrial internet of things (IIoT) devices, the number of vulnerabilities that threaten IIoT security is also growing dramatically, including a mass of undisclosed IIoT vulnerabilities that lack mitigation measures. Coordination Vulnerabilities Disclosure (CVD) is one of the most popular vulnerabilities sharing solutions, in which some security workers (SWs) can develop undisclosed vulnerabilities patches together. However, CVD assumes that sharing participants (SWs) are all honest, and thus offering chances for dishonest SWs to leak undisclosed IIoT vulnerabilities. To combat such threats, we propose an Undisclosed IIoT Vulnerabilities Trusted Sharing Protection (UIV-TSP) scheme with dynamic token. In this article, a dynamic token is an implicit access credential for an SW to acquire an undisclosed vulnerability information, which is only held by the system and constantly updated as the SW access. Meanwhile, the latest updated token can be stealthily sneaked into the acquired information as the traceability token. Once the undisclosed vulnerability information leaves the SW host, the embedded self-destruct program will be automatically triggered to prevent leaks since the destination MAC address in the traceability token has changed. To quickly distinguish dishonest SWs, trust mechanism is adopted to evaluate the trust value of SWs. Moreover, we design a blockchain-assisted continuous logs storage method to achieve the tamper-proofing of dynamic token and the transparency of undisclosed IIoT vulnerabilities sharing. The simulation results indicate that our proposed scheme is resilient to suppress dishonest SWs and protect the IoT undisclosed vulnerabilities effectively.
翻译:工业互联网(IIOT)装置大规模部署后,威胁IIOT安全的脆弱程度数量也急剧增加,包括大量未披露的IIOT脆弱性缺乏缓解措施。协调脆弱性披露(CVD)是最常见的脆弱性共享解决方案之一,其中一些安全工作者(SW)可以开发未披露的脆弱性信息,但CVD认为共享参与者(SW)都是诚实的,从而为不诚实的SW提供机会,让不诚实的SWS披露未披露的IMO脆弱性。为了应对此类威胁,我们建议采用一个具有动态标志的未披露的IIOT弹性共享保护(UIV-TSP)机制。在这个文章中,动态信号是一种隐含的准入标志,让SW(SW)获得一个不公开的脆弱性信息信息,这些信息仅由系统保存,并随着SW访问的不断更新。同时,最新信号可以悄悄地悄悄地悄悄地隐藏到已获取的信息,作为追踪信号。一旦未披露的脆弱性信息离开SWEVT的SWSO(I-V-V)保密性存储机制,自毁模式将自动转换成信任机制。