Araştırma Makalesi

Secure Gateway for the Internet of Things

Sayı: 16 31 Ağustos 2019
PDF İndir
EN TR

Secure Gateway for the Internet of Things

Abstract

Internet of Things (IoT) devices includes connected devices such as industrial embedded devices, vehicles, smart home appliance, sensors, and actuators. Even non-internet-enabled physical devices can be part of the IoT system through gateways. IoT platforms are getting the attraction of the attackers because of the security weakness of the constrained devices. They can use the IoT devices for DDOS attacking or directly attack the device to damage the overall system. Since several communication industry standard protocols such as MQTT, AMQP, and COAP can be utilized in an environment, communication between devices can be provided through a broker. Unencrypted communications can be sniffed therefore username and passwords can be stolen, or message can be modified by the attacker. We need to provide secure authentication and encrypted communication in order to make the systems secure. One way is the utilization of TLS based approaches can be utilized, but memory constrained devices cannot handle asymmetric encryption algorithms. In this paper, we propose a new approach for IoT gateways with utilization of a secure element has storage for keys, true random generator and FIPS standard AES 128 bit encryption capability. We utilized the secure element/chip in two different embedded devices to test the approach and measure performances. We developed a new embedded device includes ARM Cortex M0 for this study and also utilize a demo card includes ARM Cortex M3. We also propose a new method utilizes physical I2C property of the ARM Cortex M3 to provide fast and secure communication. The approach includes a new authentication method and encrypted communication based on the secure element’s properties. We also investigate on the message integrity based on the cryptographic hash and cyclic redundancy check algorithms.

Keywords

Kaynakça

  1. ATAES132A. (n.d.). Retrieved from http://ww1.microchip.com/downloads/en/DeviceDoc/ATAES132A-Data-Sheet-40002023A.pdf
  2. Banks, A., & Gupta, R. (n.d.). MQTT Version 3.1.1. Retrieved from https://www.oasis-open.org/news/announcements/mqtt-version-3-1-1-becomes-an-oasis-standard
  3. Bassham, L. E. (2002). The Advanced Encryption Standard Algorithm Validation Suite (AESAVS). Retrieved from http://csrc.nist.gov/groups/STM/cavp/documents/aes/AESAVS.pdf
  4. Bormann, C., Ersue, M., & Keränen, A. (2014, May). Terminology for Constrained-Node Networks. RFC Editor. http://doi.org/10.17487/RFC7228
  5. Choi, S. K., Yang, C. H., & Kwak, J. (2018). System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats. KSII Transactions on Internet and Information Systems, 12(2), 906–918. http://doi.org/10.3837/tiis.2018.02.022
  6. Chowdhury, F. S., Istiaque, A., Mahmud, A., & Miskat, M. (2018). An implementation of a lightweight end-to-end secured communication system for patient monitoring system. In 2018 Emerging Trends in Electronic Devices and Computational Techniques (EDCT) (pp. 1–5). http://doi.org/10.1109/EDCT.2018.8405076
  7. Digikey. (n.d.). Retrieved December 20, 2018, from https://www.digikey.com
  8. Dworkin, M. (n.d.). NIST Special Publication 800-38C: Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. Retrieved from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf

Ayrıntılar

Birincil Dil

İngilizce

Konular

Mühendislik

Bölüm

Araştırma Makalesi

Yayımlanma Tarihi

31 Ağustos 2019

Gönderilme Tarihi

10 Şubat 2019

Kabul Tarihi

11 Haziran 2019

Yayımlandığı Sayı

Yıl 2019 Sayı: 16

Kaynak Göster

APA
Toğay, C., Mutlu, G., Kurtuluş, D., & Özgür, F. (2019). Secure Gateway for the Internet of Things. Avrupa Bilim ve Teknoloji Dergisi, 16, 414-426. https://doi.org/10.31590/ejosat.524783

Cited By