an approach for secure edge computing in the …endler//talks/csnet2017-slides.pdf1 an approach for...
TRANSCRIPT
![Page 1: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/1.jpg)
1
An Approach for Secure Edge Computing in the Internet of
Things
Markus Endler, Anderson O. da Silva and Rafael A.M.S. Cruz{endler, anderson}@inf.puc-rio.br and [email protected]
Laboratory for Advanced Collaboration
Departament of InformaticsPUC-Rio
![Page 2: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/2.jpg)
2 Why criminals have a lot of interest in IoT?
Key points of IoT that can contribute to form a digital army:
• Processing capability:• Execute malicious software (malware).
• Storage capability:• Spread parts of data from crime among the things (P2P).
• Transmission capability:• Transmit malicious data (attack messages).
• Internet communication capability:• Targeted massive attacks over the Internet (high density botnets).
![Page 3: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/3.jpg)
3 Criminals are already using IoT to increase their botnets and firepower
![Page 4: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/4.jpg)
4 Security Threats to IoT Systems
Threats in the IoT environment might be similar to those in the traditional IT environments, but…
• The overall impact could be very different because the targets are abundant and cover many different industry segments.• Currently, IoT technology already supports connection of millions
of smart devices and meters.• By 2025, it shall support more than 50 billion connected devices.
• The potential impact could span from minor irritant to grave and significant damage to the infrastructure and loss of life.
J. Frahim, C. Pignataro, J. Apcar, and M. Morrow. Securing the Internet of Things: A Proposed Framework, 2015.
![Page 5: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/5.jpg)
5 What are the threats to the classic topology of IoT Systems?
IoT Classic Three-Layer Topology: Data Acquisition – Data Aggregation – Data Analysis
![Page 6: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/6.jpg)
6 What are the threats to the generic topology of IoT Systems?
Threats that can compromise the security of IoT systems can be grouped into two distinct groups:
• Group of Threats 1 (GT1)• Threats to the operation of the entities of the IoT system.
• Smart Objects, Gateway and Cloud
• Group of Threats 2 (GT2) • Threats to the communication between the entities of the IoT
system.• Smart Objects – Gateway• Gateway – Coud
![Page 7: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/7.jpg)
7 Group of Threats 1 (GT1)
Threats of GT1, in general, aims to:
• Gain privileged or unprivileged access
• Tamper control information
• Tamper the firmware
• Produce false data
• Steal information
• Disrupt the system
![Page 8: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/8.jpg)
8 Group of Threats 2 (GT2)
Common threats of GT2: Monitoring the content of the messages (passive attack)
![Page 9: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/9.jpg)
9 Group of Threats 2 (GT2)
Common threats of GT2: Intercepting and tampering messages (active attack)
![Page 10: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/10.jpg)
10 Group of Threats 2 (GT2)
Common threats of GT2: Masquerading (active attack)
![Page 11: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/11.jpg)
11 Group of Threats 2 (GT2)
Common threats of GT2: Denial of Service (DoS) by Flooding (active attack)
![Page 12: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/12.jpg)
12 What are the suitable security controls for IoT Systems?
In order to determine the need of a security control, we first have to analyze the security risks.
• This means we have to evaluate, for each risk, its likelihood to occur, technical impact and harm to the business or organization.
• Sometimes, we will accept the risk and choose simple low-cost controls or even no control at all.
• However, other times, we will face scenarios in which it would be irresponsible to choose such simple controls. For these, we have to invest more to acquire equipment aligned with our security needs.
T.R. Peltier. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management. CRC Press, 2001.
![Page 13: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/13.jpg)
13 What are the suitable security controls for IoT Systems?
Analysis of the security risks: IoT example scenarios
• In a non-mission critical scenario where we need to acquire data about the soil moisture or the environment temperature in order to keep the well-being of the plantation, we can accept the risk to use low-cost smart things with simple security controls.
low risk
![Page 14: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/14.jpg)
14 What are the suitable security controls for IoT Systems?
Analysis of the security risks: IoT example scenarios
• In mission critical scenario, where we have to monitor the same kind of data related to the reactor of a nuclear power plant, we will eventually need special smart things with the necessary processing capabilities to implement classic and well-known high security standards.
high risk
![Page 15: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/15.jpg)
15 Security Architecture for the Generic Three-Layer Topology of IoT Systems
Defeating targeted attacks on the cloud and on the gateway:
![Page 16: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/16.jpg)
16 Security Architecture for the Generic Three-Layer Topology of IoT Systems
Defeating targeted attacks on the gateway and on the smart thing:
![Page 17: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/17.jpg)
17 Security Architecture for the Generic Three-Layer Topology of IoT Systems
Defeating targeted attacks on the smart things:
• In order to reinforce the security in the smart things, we propose that these sensors/devices shall provide two distinct operating modes: • (i) configuration mode
• Allows configuration actions such as the modification of operating parameters (e.g. signal strength, cryptographic keys, network address, authentication method) and updating of the firmware, among others.
• (ii) service mode• Common operating mode in which the smart thing do what it is
intended to do and allows data to be collected or changed. • As a security measure, the smart thing shall use an access control
method before switching modes, such as validating a PIN (Personal Identification Number).
![Page 18: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/18.jpg)
18 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Middleware for IoT Systems (developed at the Laboratory for Advanced Collaboration)
• Uses a scalable mobile-cloud communication layer, SDDL (Scalable Data Distribution Layer), plus the mobile component Mobile Hub, which is responsible for discovering and connecting Smart Objects to the Internet.
Introduces the concept of IoMT
(Internet of Mobile Things)
![Page 19: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/19.jpg)
19 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Smart Object Service Broker (the cloud)
security perimet
er
security perimet
er
VPN
VP N
![Page 20: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/20.jpg)
20 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub), which is the ContextNet IoT Gateway
security perimet
er
security perimet
er
VPN
VP N
SNMP
SNMP
AUTH
AUTH
![Page 21: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/21.jpg)
21 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• For the proposed protocol, the following elements must be acknowledged:Smart Thing /
Object (S-Obj)
Mobile Hub
(M-Hub)
SDDL Core Gateway
(SDDL-C GW)
Symetric Authentication
Keys (Kauth_s-obj) (Kauth_sddl-c-
gw)
Symetric Cipher Key (Kcipher_s-
obj)
Private Key (Kpriv_m-
hub)
Private Key (Kpriv_sddl-c-
gw)
Public Key (Kpriv_m-
hub)
Public Key (Kpub_ssdl-c-
gw)
S-Objs Key
Database
Access Control
Database
Symetric Authenticatio
n Key (Kauth_sddl-
c-gw)
![Page 22: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/22.jpg)
22 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 1: Discovery Request Message: broadcast to all in-range S-ObjsS-Obj M-Hub SDDL-C GW
Discovery_Request(broadcast)
![Page 23: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/23.jpg)
23 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 2: Discovery Response Message: sent by in-range S-Objs to M-HubS-Obj M-Hub SDDL-C GW
Discovery_Response(S-Obj_ID)
![Page 24: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/24.jpg)
24 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 3: TLS Connection: M-Hub creates a Sec. Assoc. with SDDL-CS-Obj M-Hub SDDL-C GW
TLS-Handshake(Cert_M-Hub)
TLS-Handshake(Cert_SDDL-C GW)
TLS-Handshake(master_secret)
Bi-directional Secure Channel
![Page 25: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/25.jpg)
25 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 4: Get Authorization: M-Hub sends message through TLS channelS-Obj M-Hub SDDL-C GW
TLS Secure Channel Get_Authorization(S-Obj_ID,
M-Hub_ID)
![Page 26: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/26.jpg)
26 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 4.1: SDDL-C verify if the M-Hub is authorized to access the S-ObjS-Obj M-Hub SDDL-C GW
- checkAuthorization(S-Obj_ID, M-Hub_ID) - If (DB_Check_Access_Authorization(S-
Obj_ID, M-Hub_ID)) Then - Return Go_To_Step_4.2
- Else - Return Authorization_Error
Query(S-Obj_ID, M-Hub_ID) Result(True/False)
![Page 27: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/27.jpg)
27 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 4.2: SDDL-C gets S-Obj keys (Kauth_s-obj, Kcipher_s-obj) from DBS-Obj M-Hub SDDL-C GW
- Get STKeys(S-Obj_ID) - If (DB_Get_Kauth_Kcipher(S-Obj_ID))
Then - Return Go_To_Step_4.3
- Else - Return S-Obj_Keys_Query_Error
Query(S-Obj_ID)
Result(True/False, Kauth_s-obj_id, kcipher_s-obj_id)
![Page 28: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/28.jpg)
28 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 4.3: SDDL-C generates the OTPChallenge (random positive value)S-Obj M-Hub SDDL-C GW
- GenerateOTPChallenge(nonce) -
OTPChallenge=GeneratePositiveRandom(nonce)
- Return OTPChallenge - Go To Step 4.4
OTP Challe
nge
![Page 29: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/29.jpg)
29 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 4.4: SDDL-C generates the OTP value (seed of the key used by HMAC)S-Obj M-Hub SDDL-C GW
- GenerateOTP(S-Obj_ID, M-Hub_ID, OTPChallenge, Kauth_s-obj)
- OTP=Concat(S-Obj_ID, M-Hub_ID, Kauth_s-obj, OTPChallenge)
- For i=1 To OTPChallenge Do - OTP=HASH(OTP)
- Return OTP - Go To Step 4.5
OTP
![Page 30: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/30.jpg)
30 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 4.5: SDDL-C generates the session cipher key (Ksession)S-Obj M-Hub SDDL-C GW
- GenerateKsession(nonce) - Ksession=GenerateRandomKey(nonce) - Return Ksession
- Go To Step 4.6
![Page 31: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/31.jpg)
31 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 4.6: SDDL-C generates the secret package for S-Obj (Package_K)S-Obj M-Hub SDDL-C GW
- GenerateST_PackageK(OTPChallenge, Ksession, Kchiper_s-obj)
- Package=CreatePackage(OTPChallenge, Ksession)
- Package_K=Encrypt(Package, Kcipher_s-obj)
- Return Package_K - Go To Step 4.7
encrypt
![Page 32: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/32.jpg)
32 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 4.7: SDDL-C signs the secret package for S-Obj (Signed_Package_K)S-Obj M-Hub SDDL-C GW
- SignST_Package_K(Package_K, Kauth_sddl-c)
- Package_K_HMAC= GenerateHMAC(Package_K, timestamp,
Kauth_sddl-c) - Return Package_K_HMAC
- Go To Step 5
HASH HMA
C
![Page 33: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/33.jpg)
33 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 5: SDDL-C sends OTP, Ksession and Package_K to the M-HubS-Obj M-Hub SDDL-C GW
TLS Secure Channel Authorization_Response(OT
P, Ksession, S-Obj_ID, Package_K_With_HMAC)
![Page 34: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/34.jpg)
34 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 5.1: M-Hub stores Ksession and OTP for the S-Obj_IDS-Obj M-Hub SDDL-C GW
OTP
- StoreKey(S-Obj_ID, Ksession, OTP) - If (DB_Insert_Key(S-Obj_ID, ksession,
OTP)) Then - Return Go_To_Step_5.2
- Else - Return Ksession_OTP_Insert_Error
Insert(S-Obj_ID, Ksession, OTP)
Result(True/False)
![Page 35: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/35.jpg)
35 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 5.2: M-Hub signs the Hello Message with HMAC (OTP is seed of key)S-Obj M-Hub SDDL-C GW
OTP
- signHelloMessage(M-Hub_ID, OTP, timestamp, Package_K_With_HMAC)
- Kauth_m-hub=Generate_M-Hub_Auth_Key(OTP)
- Hello_Message_HMAC= GenerateHMAC(M-Hub_ID, timestamp, Kauth_m-hub, Package_K_With_HMAC)
- Return Hello_Message_HMAC - Go To Step 6
HASH HMA
C
OTP
![Page 36: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/36.jpg)
36
Hello(M-Hub_ID, timestamp, HelloMessageHMAC,
Package_K_With_HMAC)
Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 6: M-Hub sends a signed Hello Message (HMAC) to S-ObjS-Obj M-Hub SDDL-C GW
OTP
![Page 37: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/37.jpg)
37 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 6.1: S-Obj checks the signature of the Package_K_With_HMACS-Obj M-Hub SDDL-C GW
OTP
- CheckSignForPackage(Package_K_With_HMAC, Kauth_sddl-c)
- If (CheckSign(Package_K_With_HMAC, Kauth_sddl-c)) Then
- Return Go_To_Step_6.2 - Else
- Return Package_K_Signature_Error
HASH HMA
C
= ?
![Page 38: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/38.jpg)
38 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 6.2: S-Obj decrypts Package_K to get Ksession and OTPChallengeS-Obj M-Hub SDDL-C GW
OTP
- DecryptPackage(Package_K, Kcipher_s-obj)
- Package=Decrypt(Package_K, Kcipher_s-obj)
- Return Package - Go To Step 6.3
Decrypt
![Page 39: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/39.jpg)
39 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 6.3: S-Obj generates the OTP value (seed of the key used by HMAC)S-Obj M-Hub SDDL-C GW
OTP
- GenerateOTP(S-Obj_ID, M-Hub_ID, OTPChallenge, Kauth_s-obj)
- OTP=Concat(S-Obj_ID, M-Hub_ID, Kauth_s-obj, OTPChallenge)
- For i=1 To OTPChallenge Do - OTP=HASH(OTP)
- Return OTP - Go To Step 6.4
OTP
![Page 40: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/40.jpg)
40 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 6.4: S-Obj checks the signature of the Hello Message sent by M-HubS-Obj M-Hub SDDL-C GW
OTP
- CheckSignForHelloMessage(M-Hub_ID, OTP, HelloMessage)
- Kauth_m-hub=Generate_M-Hub_Auth_Key(OTP) - Hello_Message_HMAC=
GenerateHMAC(M-Hub_ID, timestamp, Kauth_m-hub, HelloMessage) - If (CheckSignature(HMAC, New_HMAC) Then
- Return Go_To_Step_6.5 - Else Return Hello_Message_Signature_Error
HASH HMAC
OTP = ?
![Page 41: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/41.jpg)
41 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 6.5: S-Obj stores Ksession and OTP for the M-HubS-Obj M-Hub SDDL-C GW
OTP
- StoreKey(M-Hub_ID, Ksession, OTP) - If (DB_Insert_Key(M-Hub_ID, ksession,
OTP)) Then - Return Go_To_Step_6.6
- Else - Return Ksession_OTP_Insert_Error
Insert(M-Hub_ID, Ksession, OTP)
Result(True/False)
OTP
![Page 42: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/42.jpg)
42 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 6.6: S-Obj signs the Hello Accepted Message with HMACS-Obj M-Hub SDDL-C GW
OTP
OTP
- signHelloAcceptedMessage(S-Obj_ID, M-Hub_ID, OTP, timestamp)
- Kauth_m-hub=Generate_M-Hub_Auth_Key(OTP)
- Hello_Accepted_Message_HMAC= GenerateHMAC(S-Obj_ID, M-Hub_ID, timestamp, Kauth_m-hub)
- Return Hello_Accepted_Message_HMAC - Go To Step 7
HASH HMA
C
OTP
![Page 43: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/43.jpg)
43
HelloAccepted(S-Obj_ID, M-Hub_ID, timestamp,
HelloAcceptedMessageHMAC)
Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 7: S-Obj sends the signed Hello Accepted Message (HMAC) to M-HubS-Obj M-Hub SDDL-C GW
OTP
OTP
![Page 44: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/44.jpg)
44 Applying the Security Architecture to the ContextNet Middleware
ContextNet: Securing the Mobile Hub (M-Hub) communication with SDDL Core and Smart Things
• Step 7.1: M-Hub checks the signature of the Hello Accepted MessageS-Obj M-Hub SDDL-C GW
OTP
OTP
- CheckSignForHelloAcceptedMessage(M-Hub_ID, OTP, HelloAcceptedMessage)
- Kauth_m-hub=Generate_M-Hub_Auth_Key(OTP) - Hello_Message_HMAC=GenerateHMAC(M-Hub_ID,
timestamp, Kauth_m-hub, HelloAcceptedMessage)
- If (CheckSignature(HMAC, New_HMAC) Then - Return
Security_Association_Established_With_S-Obj - Else Return
Hello_Accepted_Message_Signature_Error
HASH HMAC
OTP = ?
![Page 45: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/45.jpg)
45 Conclusion
Requirements to apply our security architecture to IoT Systems:
• Smart Things shall provide the necessary processing capability to execute, at least, basic cryptographic algorithms, such as, HMAC and RC4.
• Smart Things shall provide minimum amount of memory to store the session cipher key (Ksession) and the M-Hub authentication key (OTP).
• M-Hub shall support some kind of VPN protocol based on IPsec or TLS.
• M-Hub shall provide the necessary processing capability to execute the smart thing control service (ex: SNMP-based) and the access control service (Ex: local or remote, such as LDAP or Radius).
![Page 46: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/46.jpg)
46 Conclusion
Advantages of the ContextNet and our security architecture to IoT Systems:
• The Smart Object may be stationary or mobile (IoMT).
• The IoT gateway (M-Hub) may also be stationary or mobile and may communicate to any Smart Object within wireless range.
• The Smart Object handover between gateways is also possible.
• A Smart Object can be handled by more than one M-Hub at the same time.
• The SSDL Core generates different cryptographic and authentication session keys on the fly for each pair of Smart Object and M-Hub.
![Page 47: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/47.jpg)
47
Thank you!
Markus Endler, Anderson O. da Silva and Rafael A.M.S. Cruz{endler, anderson}@inf.puc-rio.br and [email protected]
Laboratory for Advanced Collaboration
Departament of InformaticsPUC-Rio
![Page 48: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/48.jpg)
48 Related Work
Discussed in the paper:
• M. Nawir, A. Amir, N. Yaakob, and O.B. Lyn. Internet of Things: Taxonomy of Security Attacks. In 3rd International Conference on Electronic Design (ICED 2016), Phuket, Thailand, 2016.• Focus on smart things and study the IoT network security issues in the
smart home, health care and transportation domain, and then present a taxonomy of security attacks.
• S. Kulkarni et al. Internet of Things (IoT) Security. In 3rd IEEE Conference on Computing for Sustainable Global Development (INDIACom), March 2016.• Also addresses security of smart things but focuses on how data
about/from smart things can be made secure using cryptography.
![Page 49: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/49.jpg)
49 Related Work
Discussed in the paper:
• J. Pacheco and S. Hariri. IoT Security Framework for Smart Cyber Infrastructures. In 1st IEEE International Workshops on Foundations and Applications of Self* Systems (FAS*W), 2016.• The paper presents a general threat model that can be used to develop
a security protection methodology for IoT services against cyber-attacks and shows that an Anomaly Behavior Analysis (ABA) Intrusion Detection System (ABA-IDS) can detect and classify a wide range of attacks against IoT sensors.
![Page 50: An Approach for Secure Edge Computing in the …endler//talks/CSNet2017-slides.pdf1 An Approach for Secure Edge Computing in the Internet of Things Markus Endler, Anderson O. da Silva](https://reader034.vdocuments.mx/reader034/viewer/2022050521/5fa430e08c5aa372f6767691/html5/thumbnails/50.jpg)
50 Related Work
Discussed in the paper:
• R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan. Internet of things (IoT) security: Current status, challenges and prospective measures. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pages 336–341, Dec 2015.• The paper presents an analysis on the current status and concerns of
IoT security, and proposes some countermeasures such as authentication measure, trust establishment, federated architecture and security awareness to reinforce security.
• K. Holbrook. IoT Security in the Real World Part 1: Securing the Edge, April 2016. (Last access: January 14th, 2017).• The vulnerabilities of Gateways and Edge networks are presented, and
in this scope the author discusses three specific security threats: Network exposure of the Smart Objects, Man-in-the-Middle (MitM) and Impostor Attacks.