Search papers, labs, and topics across Lattice.
This paper presents an empirical security analysis of LLM agents deployed on IoT edge devices across three architectures: cloud-hosted, edge-local swarm, and hybrid. Using a multi-device home-automation testbed, the authors identify five systems-level attack surfaces, including coordination-state divergence and induced trust erosion. They quantify core security properties as measurable systems metrics, revealing that edge-local deployments, while reducing cloud data exposure, can silently degrade sovereignty and create exploitable failover windows.
Edge-deployed LLM agents on IoT devices introduce silent sovereignty degradations and easily bypassed provenance chains, revealing critical security risks beyond model and prompt design.
Edge deployment of LLM agents on IoT hardware introduces attack surfaces absent from cloud-hosted orchestration. We present an empirical security analysis of three architectures (cloud-hosted, edge-local swarm, and hybrid) using a multi-device home-automation testbed with local MQTT messaging and an Android smartphone as an edge inference node. We identify five systems-level attack surfaces, including two emergent failures observed during live testbed operation: coordination-state divergence and induced trust erosion. We frame core security properties as measurable systems metrics: data egress volume, failover window exposure, sovereignty boundary integrity, and provenance chain completeness. Our measurements show that edge-local deployments eliminate routine cloud data exposure but silently degrade sovereignty when fallback mechanisms trigger, with boundary crossings invisible at the application layer. Provenance chains remain complete under cooperative operation yet are trivially bypassed without cryptographic enforcement. Failover windows create transient blind spots exploitable for unauthorised actuation. These results demonstrate that deployment architecture, not just model or prompt design, is a primary determinant of security risk in agent-controlled IoT systems.