Share this
Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of
by Brett Daniel on Dec 9, 2020 9:28:50 AM
Graphic: Like any new computing paradigm, edge computing brings with it some significant security risks to be aware of.
Every new widely adopted computing technology begets a corresponding learning curve for businesses and organizations.
With cloud computing, this involved adapting to a simpler, more scalable, and more reliable version of the traditional client-server infrastructure, implementing it across entire companies, navigating new relationships and agreements with cloud service providers, learning more about how data storage and backup would be handled, and not least, understanding how providers would secure that data.
The advent of edge computing – in which cloud computation is decentralized and placed at or near data-generating devices - brings similar challenges, not the least of which is edge security, or the practice of understanding the cybersecurity vulnerabilities of edge computing and their corresponding countermeasures.
There's actually a bit of apprehension surrounding effectively securing edge computing devices, with 66 percent of IT teams viewing the architecture itself as a threat to their organizations. The main reason for concern? Edge security.
In this blog post, we’ll discuss four edge computing security risks and countermeasures, as highlighted in an Institute of Electrical and Electronics Engineering (IEEE) survey published earlier this year. At the end, we'll discuss the importance of trusting edge computing solutions providers that excel and partner with experts in cyber hygiene to ensure that your data is safe at the edge.
Photo: Adversaries are able to manipulate and sabotage edge computing network resources to access and steal your sensitive data.
Edge Computing Security Risk #1: Malicious Hardware/Software Injections
Cyberattackers seeking to corrupt, steal, alter, or delete data circulating within edge networks have a few different hardware- and software-based tools at their disposal, particularly when it comes to the infection and manipulation of edge nodes, or the servers and devices located at the edge.
Attackers can inject unauthorized software and hardware components into the edge network that wreak havoc on the efficacy of existing edge servers and devices and even allow for service provider exploitation, by which those entities providing the software and hardware solutions that make edge computing possible begin unwittingly executing hacking processes on the attacker’s behalf.
One such frightening practice highlighted by IEEE researchers is known as node replication, whereby adversaries insert a malicious node into the edge network and assign it an ID number identical to that of an existing node. Then, like a spy incognito usurping valuable intelligence from the enemy, attackers can steal data from within the network. They can even delegitimize other nodes in the network using node-revocation protocols.
There’s also the practice of camouflaging, whereby attackers inject a counterfeit edge computing node that appears and functions like any other - sharing, receiving, storing, processing, redirecting, and transmitting data packets - as well as the practice of hardware trojan injection, which gives attackers control over a node’s integrated circuits, and thus, their data and software.
Countermeasure
The IEEE researchers propose three countermeasures to deal with malicious hardware/software injections. They are:
- Side-channel signal analyses, which detect hardware trojans using timing, power, and spatial temperature analyses. Basically, this method detects malicious firmware or software installed on edge nodes by identifying unusual system behaviors, such as increases in execution time and power consumption.
- Trojan activation methods, which compare Trojan-afflicted integrated circuits with non-Trojan-afflicted circuits to detect and model malicious attacks
- Circuit modification or replacing, which is a series of countermeasures that offers protections at the circuit level and even allows the node to self-destruct in the event of an attack
Graphic: Physical tampering has always been a cybersecurity risk, and edge computing's increased attack surface makes it that much more concerning.
Edge Computing Security Risk #2: Physical Tampering & Attacks
Physical tampering of devices is a likely possibility in an edge computing architecture, depending on their location and level of physical protection from adversaries.
Edge computing, by its very nature, creates an increased attack surface by locating computational resources closer to data sources. Although an increased attack surface creates more ground to cover for physical attackers seeking to compromise entire edge networks, the fact that there’s a greater number of devices in a greater number of places also makes physical attacks that much easier to carry out.
Once physical access is gained, attackers can:
- Extract valuable and sensitive cryptographic information
- Tamper with node circuits
- Change or modify node software and operating systems
There’s also the possibility of an attacker literally damaging or destroying edge nodes, and in turn, compromising the efficacy of the entire network.
Countermeasure
The same methods used to prevent malicious hardware injection, such as system analysis and self-destruction, can be used to prevent or mitigate the harmful effects of physical tampering and attacks. Businesses and organizations can also look at creative ways to boost the physical security of any edge nodes that aren’t located in highly secure edge data centers. This might include employing additional ruggedization techniques during manufacture or implementing locking mechanisms and other physical safeguards in the field.
Graphic: Adversaries can also weaponize where and how much data travels to sabotage the efficacy of an edge network.
Edge Computing Security Risk #3: Routing Information Attacks
Another edge computing security risk to be aware of is what’s known as a “routing information attack,” or simply “routing attack,” which occurs at the communication level of an edge network. Essentially, routing attacks interfere with the way data is transferred within a network, which can affect throughput, latency, and data paths.
The IEEE researchers highlight four distinct routing information attacks in their paper:
- Black holes
- Grey holes
- Wormholes
- Hello Flood
During a black hole attack, incoming and outgoing network data packets are simply deleted, ensuring that they never reach their destination. This decreases throughput and can increase latency if the data needs to be retransmitted. The lower the throughput and the higher the latency, the worse the network performs.
A grey hole attack is like a black hole attack but instead involves gradually and selectively deleting data packets in a network. This type of attack is more sophisticated than the black hole attack, and as such, can be more difficult to identify.
A wormhole attack involves recording packets at one network location, tunneling them to another, and replaying them. According to a study conducted at the University of British Columbia, a strategic placement of a wormhole can disrupt an average of 32 percent of all communications across an ad hoc network.
Finally, there’s the Hello Flood attack, in which a malicious node broadcasts hello packets to nodes claiming to be their neighbor, causing general routing confusion within the network.
Countermeasure
According to the IEEE researchers, establishing reliable routing protocols and implementing a high-quality intrusion detection system (IDS) that monitors for malicious traffic and detects policy violations can serve as effective countermeasures against routing information attacks. Nodes with reliable routing protocols can create a table of trusted nodes for sharing sensitive information, the researchers say, and an adequate IDS can detect common routing information attacks, such as black holes.
Graphic: DDoS attacks can render edge computing solutions completely inoperable.
Edge Computing Security Risk #4: Distributed Denial of Service (DDoS) Attacks
Distributed denial of service (DDoS) attacks, whereby an existing network resource is overwhelmed with traffic from other compromised resources within the network, are another edge computing security risk to be aware of. In their paper, the IEEE researchers highlighted three famous DDoS attacks carried out on edge computing devices, specifically: outage attacks, sleep deprivation attacks, and battery draining attacks.
An outage attack has occurred when a DDoS attack causes nodes to stop functioning altogether. A sleep deprivation attack is when adversaries overwhelm nodes with legitimate requests that keep them from entering a power-saving state, which greatly increases power consumption. A battery draining attack, or barrage attack, can cause an outage by sapping certain nodes or sensors of their battery life through the continued re-execution of energy-demanding programs or applications.
In addition, the researchers highlight the potential for jamming attacks, which may be either continuous or intermittent. In a jamming attack, the network is flooded with counterfeit messages and interference that can exhaust resources at each level: communication, computation, and storage.
Countermeasure
For sleep deprivation and battery draining attacks, the researchers suggest policy-based mechanisms. These are established to ensure that standard rules within the network are not broken. Basically, they control the behavior of devices within a network. So, if a sleep deprivation or barrage attack is initiated, a predefined security policy will identify it as suspicious or unusual, allowing administrators to contain the attack quickly.
Conclusion: Is Edge Computing Secure?
The edge computing security risks highlighted in this article are just four of many that could potentially harm an edge network and compromise one’s sensitive data. It’s always important to stay abreast of the latest threats to your edge computing setup so that you can be prepared if disaster strikes.
In general, edge computing is considered a secure computing paradigm as long as effective cybersecurity practices are in place throughout the network.
It’s never bad practice to place your trust in manufacturers who have policies and practices in place to help ensure the cybersecurity effectiveness of their edge servers and other edge computing solutions.
This includes manufacturers who have obtained or are working toward obtaining their Cybersecurity Maturity Model Certification (CMMC), are DFARS/NIST SP 800-71-compliant, and who have partnered with leading cybersecurity companies to offer operating system (OS) hardening and data-at-rest encryption key management for self-encrypting drives (SEDs). Purchasing an edge server from a manufacturer with a Counterfeit Protection Program (CPP) and other strict quality inspection programs in place is also highly recommended to help ward off hardware-based attacks.
For more information about the edge computing security risks and countermeasures listed in this blog post, check out the resources below, and as always, don’t hesitate to contact us with any questions about how we can equip your edge program or application with a trusted, reliable, cybersecure rugged computing solution.
Resources
- Edge Computing Security and Challenges
- A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet of Things
- Security and Privacy Issues in Cloud, Fog and Edge Computing
- What does the rise of edge computing mean for cybersecurity?
- Edge computing security risks and how to overcome them
Share this
- High-performance computers (42)
- Military computers (38)
- Rugged computers (32)
- Cybersecurity (25)
- Industrial computers (25)
- Military servers (24)
- MIL-SPEC (20)
- Rugged servers (19)
- Press Release (17)
- Industrial servers (16)
- MIL-STD-810 (16)
- 5G Technology (14)
- Intel (13)
- Rack mount servers (12)
- processing (12)
- Computer hardware (11)
- Edge computing (11)
- Rugged workstations (11)
- Made in USA (10)
- Partnerships (9)
- Rugged computing (9)
- Sales, Marketing, and Business Development (9)
- Trenton Systems (9)
- networking (9)
- Peripheral Component Interconnect Express (PCIe) (7)
- Encryption (6)
- Federal Information Processing Standards (FIPS) (6)
- GPUs (6)
- IPU (6)
- Joint All-Domain Command and Control (JADC2) (6)
- Server motherboards (6)
- artificial intelligence (6)
- Computer stress tests (5)
- Cross domain solutions (5)
- Mission-critical servers (5)
- Rugged mini PCs (5)
- AI (4)
- BIOS (4)
- CPU (4)
- Defense (4)
- Military primes (4)
- Mission-critical systems (4)
- Platform Firmware Resilience (PFR) (4)
- Rugged blade servers (4)
- containerization (4)
- data protection (4)
- virtualization (4)
- Counterfeit electronic parts (3)
- DO-160 (3)
- Edge servers (3)
- Firmware (3)
- HPC (3)
- Just a Bunch of Disks (JBOD) (3)
- Leadership (3)
- Navy (3)
- O-RAN (3)
- RAID (3)
- RAM (3)
- Revision control (3)
- Ruggedization (3)
- SATCOM (3)
- Storage servers (3)
- Supply chain (3)
- Tactical Advanced Computer (TAC) (3)
- Wide-temp computers (3)
- computers made in the USA (3)
- data transfer (3)
- deep learning (3)
- embedded computers (3)
- embedded systems (3)
- firmware security (3)
- machine learning (3)
- Automatic test equipment (ATE) (2)
- C6ISR (2)
- COTS (2)
- COVID-19 (2)
- Compliance (2)
- Compute Express Link (CXL) (2)
- Computer networking (2)
- Controlled Unclassified Information (CUI) (2)
- DDR (2)
- DDR4 (2)
- DPU (2)
- Dual CPU motherboards (2)
- EW (2)
- I/O (2)
- Military standards (2)
- NVIDIA (2)
- NVMe SSDs (2)
- PCIe (2)
- PCIe 4.0 (2)
- PCIe 5.0 (2)
- RAN (2)
- SIGINT (2)
- SWaP-C (2)
- Software Guard Extensions (SGX) (2)
- Submarines (2)
- Supply chain security (2)
- TAA compliance (2)
- airborne (2)
- as9100d (2)
- chassis (2)
- data diode (2)
- end-to-end solution (2)
- hardware security (2)
- hardware virtualization (2)
- integrated combat system (2)
- manufacturing reps (2)
- memory (2)
- mission computers (2)
- private 5G (2)
- protection (2)
- secure by design (2)
- small form factor (2)
- software security (2)
- vRAN (2)
- zero trust (2)
- zero trust architecture (2)
- 3U BAM Server (1)
- 4G (1)
- 4U (1)
- 5G Frequencies (1)
- 5G Frequency Bands (1)
- AI/ML/DL (1)
- Access CDS (1)
- Aegis Combat System (1)
- Armed Forces (1)
- Asymmetric encryption (1)
- C-RAN (1)
- COMINT (1)
- CPUs (1)
- Cloud-based CDS (1)
- Coast Guard (1)
- Compliance testing (1)
- Computer life cycle (1)
- Containers (1)
- D-RAN (1)
- DART (1)
- DDR5 (1)
- DMEA (1)
- Data Center Modular Hardware System (DC-MHS) (1)
- Data Plane Development Kit (DPDK) (1)
- Defense Advanced Research Projects (DARP) (1)
- ELINT (1)
- EMI (1)
- EO/IR (1)
- Electromagnetic Interference (1)
- Electronic Warfare (EW) (1)
- FIPS 140-2 (1)
- FIPS 140-3 (1)
- Field Programmable Gate Array (FPGA) (1)
- Ground Control Stations (GCS) (1)
- Hardware-based CDS (1)
- Hybrid CDS (1)
- IES.5G (1)
- ION Mini PC (1)
- IP Ratings (1)
- IPMI (1)
- Industrial Internet of Things (IIoT) (1)
- Industry news (1)
- Integrated Base Defense (IBD) (1)
- LAN ports (1)
- LTE (1)
- Life cycle management (1)
- Lockheed Martin (1)
- MIL-S-901 (1)
- MIL-STD-167-1 (1)
- MIL-STD-461 (1)
- MIL-STD-464 (1)
- MOSA (1)
- Multi-Access Edge Computing (1)
- NASA (1)
- NIC (1)
- NIC Card (1)
- NVMe (1)
- O-RAN compliant (1)
- Oil and Gas (1)
- Open Compute Project (OCP) (1)
- OpenRAN (1)
- P4 (1)
- PCIe card (1)
- PCIe lane (1)
- PCIe slot (1)
- Precision timestamping (1)
- Product life cycle (1)
- ROM (1)
- Raytheon (1)
- Remotely piloted aircraft (RPA) (1)
- Rugged computing glossary (1)
- SEDs (1)
- SIM Card (1)
- Secure boot (1)
- Sensor Open Systems Architecture (SOSA) (1)
- Small form-factor pluggable (SFP) (1)
- Smart Edge (1)
- Smart NIC (1)
- SmartNIC (1)
- Software-based CDS (1)
- Symmetric encryption (1)
- System hardening (1)
- System hardening best practices (1)
- TME (1)
- Tech Partners (1)
- Total Memory Encryption (TME) (1)
- Transfer CDS (1)
- USB ports (1)
- VMEbus International Trade Association (VITA) (1)
- Vertical Lift Consortium (VLC) (1)
- Virtual machines (1)
- What are embedded systems? (1)
- Wired access backhaul (1)
- Wireless access backhaul (1)
- accredidation (1)
- aerospace (1)
- air gaps (1)
- airborne computers (1)
- asteroid (1)
- authentication (1)
- autonomous (1)
- certification (1)
- cognitive software-defined radios (CDRS) (1)
- command and control (C2) (1)
- communications (1)
- cores (1)
- custom (1)
- customer service (1)
- customer support (1)
- data linking (1)
- data recording (1)
- ethernet (1)
- full disk encryption (1)
- hardware monitoring (1)
- heat sink (1)
- hypervisor (1)
- in-house technical support (1)
- input (1)
- integrated edge solution (1)
- international business (1)
- licensed spectrum (1)
- liquid cooling (1)
- mCOTS (1)
- microelectronics (1)
- missile defense (1)
- mixed criticality (1)
- moving (1)
- multi-factor authentication (1)
- network slicing (1)
- neural networks (1)
- new headquarters (1)
- next generation interceptor (1)
- non-volatile memory (1)
- operating system (1)
- output (1)
- outsourced technical support (1)
- post-boot (1)
- pre-boot (1)
- private networks (1)
- public networks (1)
- radio access network (RAN) (1)
- reconnaissance (1)
- secure flash (1)
- security (1)
- self-encrypting drives (SEDs) (1)
- sff (1)
- software (1)
- software-defined radios (SDRs) (1)
- speeds and feeds (1)
- standalone (1)
- storage (1)
- systems (1)
- tactical wide area networks (1)
- technical support (1)
- technology (1)
- third-party motherboards (1)
- troposcatter communication (1)
- unlicensed spectrum (1)
- volatile memory (1)
- vpx (1)
- zero trust network (1)
- November 2024 (1)
- October 2024 (1)
- August 2024 (1)
- July 2024 (1)
- May 2024 (1)
- April 2024 (3)
- February 2024 (1)
- November 2023 (1)
- October 2023 (1)
- July 2023 (1)
- June 2023 (3)
- May 2023 (7)
- April 2023 (5)
- March 2023 (7)
- December 2022 (2)
- November 2022 (6)
- October 2022 (7)
- September 2022 (8)
- August 2022 (3)
- July 2022 (4)
- June 2022 (13)
- May 2022 (10)
- April 2022 (4)
- March 2022 (11)
- February 2022 (4)
- January 2022 (4)
- December 2021 (1)
- November 2021 (4)
- September 2021 (2)
- August 2021 (1)
- July 2021 (2)
- June 2021 (3)
- May 2021 (4)
- April 2021 (3)
- March 2021 (3)
- February 2021 (8)
- January 2021 (4)
- December 2020 (5)
- November 2020 (5)
- October 2020 (4)
- September 2020 (4)
- August 2020 (6)
- July 2020 (9)
- June 2020 (11)
- May 2020 (13)
- April 2020 (8)
- February 2020 (1)
- January 2020 (1)
- October 2019 (1)
- August 2019 (2)
- July 2019 (2)
- March 2019 (1)
- January 2019 (2)
- December 2018 (1)
- November 2018 (2)
- October 2018 (5)
- September 2018 (3)
- July 2018 (1)
- April 2018 (2)
- March 2018 (1)
- February 2018 (9)
- January 2018 (27)
- December 2017 (1)
- November 2017 (2)
- October 2017 (3)
No Comments Yet
Let us know what you think