Secure Gateway for the Internet of Things
Abstract
Internet of Things (IoT) devices includes connected devices such as industrial embedded devices, vehicles, smart home appliance, sensors, and actuators. Even non-internet-enabled physical devices can be part of the IoT system through gateways. IoT platforms are getting the attraction of the attackers because of the security weakness of the constrained devices. They can use the IoT devices for DDOS attacking or directly attack the device to damage the overall system. Since several communication industry standard protocols such as MQTT, AMQP, and COAP can be utilized in an environment, communication between devices can be provided through a broker. Unencrypted communications can be sniffed therefore username and passwords can be stolen, or message can be modified by the attacker. We need to provide secure authentication and encrypted communication in order to make the systems secure. One way is the utilization of TLS based approaches can be utilized, but memory constrained devices cannot handle asymmetric encryption algorithms. In this paper, we propose a new approach for IoT gateways with utilization of a secure element has storage for keys, true random generator and FIPS standard AES 128 bit encryption capability. We utilized the secure element/chip in two different embedded devices to test the approach and measure performances. We developed a new embedded device includes ARM Cortex M0 for this study and also utilize a demo card includes ARM Cortex M3. We also propose a new method utilizes physical I2C property of the ARM Cortex M3 to provide fast and secure communication. The approach includes a new authentication method and encrypted communication based on the secure element’s properties. We also investigate on the message integrity based on the cryptographic hash and cyclic redundancy check algorithms.
Keywords
Kaynakça
- ATAES132A. (n.d.). Retrieved from http://ww1.microchip.com/downloads/en/DeviceDoc/ATAES132A-Data-Sheet-40002023A.pdf
- Banks, A., & Gupta, R. (n.d.). MQTT Version 3.1.1. Retrieved from https://www.oasis-open.org/news/announcements/mqtt-version-3-1-1-becomes-an-oasis-standard
- Bassham, L. E. (2002). The Advanced Encryption Standard Algorithm Validation Suite (AESAVS). Retrieved from http://csrc.nist.gov/groups/STM/cavp/documents/aes/AESAVS.pdf
- Bormann, C., Ersue, M., & Keränen, A. (2014, May). Terminology for Constrained-Node Networks. RFC Editor. http://doi.org/10.17487/RFC7228
- Choi, S. K., Yang, C. H., & Kwak, J. (2018). System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats. KSII Transactions on Internet and Information Systems, 12(2), 906–918. http://doi.org/10.3837/tiis.2018.02.022
- Chowdhury, F. S., Istiaque, A., Mahmud, A., & Miskat, M. (2018). An implementation of a lightweight end-to-end secured communication system for patient monitoring system. In 2018 Emerging Trends in Electronic Devices and Computational Techniques (EDCT) (pp. 1–5). http://doi.org/10.1109/EDCT.2018.8405076
- Digikey. (n.d.). Retrieved December 20, 2018, from https://www.digikey.com
- Dworkin, M. (n.d.). NIST Special Publication 800-38C: Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. Retrieved from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf
Ayrıntılar
Birincil Dil
İngilizce
Konular
Mühendislik
Bölüm
Araştırma Makalesi
Yazarlar
Cengiz Toğay
*
0000-0001-5739-1784
Türkiye
Gökhan Mutlu
Bu kişi benim
0000-0002-0674-2908
Türkiye
Durmuş Kurtuluş
Bu kişi benim
0000-0002-1154-5300
Faik Özgür
Bu kişi benim
0000-0001-5363-5737
Türkiye
Yayımlanma Tarihi
31 Ağustos 2019
Gönderilme Tarihi
10 Şubat 2019
Kabul Tarihi
11 Haziran 2019
Yayımlandığı Sayı
Yıl 2019 Sayı: 16
Cited By
A VIRTUAL ASSISTANT DESIGN AND APPLICATION ON INDUSTRIAL DATABASE
Uluslararası Yönetim Bilişim Sistemleri ve Bilgisayar Bilimleri Dergisi
https://doi.org/10.33461/uybisbbd.952310A Secure IIoT Gateway Architecture based on Trusted Execution Environments
Journal of Network and Systems Management
https://doi.org/10.1007/s10922-023-09723-6