Deep Dive into the IoT Backend Ecosystem

Conference Paper (2022)
Author(s)

Said Jawad Saidi (Saarland University)

Srdjan Matic (IMDEA Software Institute)

Oliver Gasser (Max Planck Institut für Informatik)

G. Smaragdakis (TU Delft - Cyber Security)

Anja Feldmann (Max Planck Institut für Informatik)

Research Group
Cyber Security
Copyright
© 2022 Said Jawad Saidi, Srdjan Matic, Oliver Gasser, G. Smaragdakis, Anja Feldmann
DOI related publication
https://doi.org/10.1145/3517745.3561431
More Info
expand_more
Publication Year
2022
Language
English
Copyright
© 2022 Said Jawad Saidi, Srdjan Matic, Oliver Gasser, G. Smaragdakis, Anja Feldmann
Research Group
Cyber Security
Pages (from-to)
488–503
ISBN (print)
9781450392594
ISBN (electronic)
9781450392594
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Internet of Things (IoT) devices are becoming increasingly ubiquitous, e.g., at home, in enterprise environments, and in production lines. To support the advanced functionalities of IoT devices, IoT vendors as well as service and cloud companies operate IoT backendsÐthe focus of this paper. We propose a methodology to identify and locate them by (a) compiling a list of domains used exclusively by major IoT backend providers and (b) then identifying their server IP addresses. We rely on multiple sources, including IoT backend provider documentation, passive DNS data, and active scanning. For analyzing IoT traffic patterns, we rely on passive network flows from a major European ISP. Our analysis focuses on the top IoT backends and unveils diverse operational strategiesÐfrom operating their own infrastructure to utilizing the public cloud. We find that the majority of the top IoT backend providers are located in multiple locations and countries. Still, a handful are located only in one country, which could raise regulatory scrutiny as the client IoT devices are located in other regions. Indeed, our analysis shows that up to 35% of IoT traffic is exchanged with IoT backend servers located in other continents. We also find that at least six of the top IoT backends rely on other IoT backend providers. We also evaluate if cascading effects among the IoT backend providers are possible in the event of an outage, a misconfiguration, or an attack.