these devices are known as “class 0” devices as they fall short of · pdf...

2
Omid Rajaee Pennsylvania State University [email protected] [email protected] In the past 20 years, all we had just a pc with antivirus to keep us safe but now everything we bring home from smart TV to fridge and even bulb, all are connected to the internet. Those devices are clueless about the internet security and these devices are easy to hack.Constrained IoT devices have limited resources and so are limited to the protocols and standards they can support. These devices are known as “Class-0” devices as they fall short of the minimum threshold (100Kb ROM, 10Kb RAM) to support secure communication using recommended TLS ( Transport Layer Security) based solutions. Today's IoT systems are largely based on the use of the TCP/IPv6. However, the observations so far suggest that the TCP/IP protocol stack, as originally designed, is not a good fit to IoT environment. Over the last several years the IETTF (The Internet Engineering Task Force) as spent significant amount of effort in modifying the protocol stack to IoT deployment scenarios. These efforts have resulted in extensions to existing protocols in the TCP/IP protocol suite as well as development of multiple new protocols. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resource constrained in terms of secure communication. The proposed solution will take the form of a method involving symmetric and asymmetric encryption and a security gateway which serves as an intermediary among devices and the internet. Security processes which are too resource intensive for Class-0 devices are delegated to the gateway where data is processed into a secure form before it is being transmitted across the internet. This solution will provide confidentiality, integrity, and authenticity of data being transported across the internet and confidentiality of data as it passes between device and gateway. IoT Sensor Device Plaintext Data Object Plaintext Data Object Encrypt Decrypt Pre - shared Secret Key . Located only on Device and Server Cipher text Security Gateway Server

Upload: nguyenkhanh

Post on 15-Mar-2018

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: These devices are known as “Class 0” devices as they fall short of · PDF file · 2017-01-19authenticity of data being transported across the internet and confidentiality of data

Omid Rajaee Pennsylvania State University [email protected] [email protected]

In the past 20 years, all we had just a pc with antivirus to keep us safe but now

everything we bring home from smart TV to fridge and even bulb, all are connected to the

internet. Those devices are clueless about the internet security and these devices are easy to

hack.Constrained IoT devices have limited resources and so are limited to the protocols and

standards they can support. These devices are known as “Class-0” devices as they fall short of

the minimum threshold (100Kb ROM, 10Kb RAM) to support secure communication using

recommended TLS (Transport Layer Security) based solutions.

Today's IoT systems are largely based on the use of the TCP/IPv6. However, the

observations so far suggest that the TCP/IP protocol stack, as originally designed, is not a good

fit to IoT environment. Over the last several years the IETTF (The Internet Engineering Task

Force) as spent significant amount of effort in modifying the protocol stack to IoT deployment

scenarios. These efforts have resulted in extensions to existing protocols in the TCP/IP protocol

suite as well as development of multiple new protocols. Although solutions to secure IoT

systems exist, Class-0 IoT devices with insufficient resources to support such solutions are

considered a resource constrained in terms of secure communication.

The proposed solution will take the form of a method involving symmetric and

asymmetric encryption and a security gateway which serves as an intermediary among devices

and the internet. Security processes which are too resource intensive for Class-0 devices are

delegated to the gateway where data is processed into a secure form before it is being

transmitted across the internet. This solution will provide confidentiality, integrity, and

authenticity of data being transported across the internet and confidentiality of data as it passes

between device and gateway.

IoT Sensor Device

Plaintext Data Object Plaintext Data

Object Encrypt Decrypt

Pre - shared Secret Key . Located only on

Device and Server

Cipher text

Security Gateway Server

Page 2: These devices are known as “Class 0” devices as they fall short of · PDF file · 2017-01-19authenticity of data being transported across the internet and confidentiality of data

Highly  Constrained  IoT Devices The  majority  devices  that  will  constitute  the  IoT are  

Constrained  Devices  (also  known  as  sensors,  smart  objects,  or  

smart  devices)  with  limited  CPU,  memory,  and  power  

resources.  These  devices  have  no  idea  about  the  security  and  

they  don’t  have  enough  resources  to  handle  extra  

functionalities  and  protocols.

Security  protocols  which  are  too  heavy  to  run  directly  from  the  

Class-­‐0  device  are  delegated  to  the  gateway.  The  gateway  acts  

as  an  intermediary  with  ample  resources  to  support  these  

security  measures  and  secure  data  before  sending   it  over  the  

internet.  Data  sent  from  the  IoT device  will  be  sent  to  the  

gateway  using  protocols  such  as  CoAP and  HTTP  and  sent  

across  the  internet  using  HTTPS  (HTTP  over  TLS)  to  the  web  

server.

In  This  solution  I’ve  focused  on  the  security  of  data  being  communicated  between  highly  constrained  IoT devices  and  the  internet.  A  Class-­‐0  device  does  not  have  

sufficient  resources  to  support  the  transport  layer  security  mechanism  needed  to  securely  transport  data  directly  to  across  the  internet.  This  solution  attempts  to  

build  on  existing  research  by  addressing  gaps  in  existing  solutions.  Using  data  object  encryption  and  a  security  gateway  between  the  device  and  the  internet  a  

more  layered  security  solution  has  been  developed.  The  security  gateway  provides  a  means  for  sending  data  from  the  device  across  the  internet  using  HTTPS  

(TLS).  An  extra  layer  of  protection  is  applied   to  data  by  encrypting   its  using  AES  before  it  leaves  the  IoT device.  Using  symmetric  encryption  confidentiality  of  data  

can  be  secured  between  device  and  the  intended  server  destination.

Sensitive  data  being  passed  to  the  gateway  cannot  be  read  by  the  gateway  and  is  forwarded  securely  using  TLS  to  the  final  destination  in  its  encrypted  state.  

Using  data  link  layer  security  (WPA2  AES  265-­‐bit)  the  connection  between  the  device  and  gateway  is  further  secured  against  any  unauthorized  entities  try  to  

intercept  a  transmission.  These  additional  layers  of  security  have  an  acceptable  level  of  impact  on  device  resources.

Problem  Statement and  Goals

Approach

Results

IoT,  Resource  Constrained  Devices,  SecurityOmid  Rajaee

Pennsylvania  State  University

IoT Sensor  Device

Plaintext  Data  Object

Plaintext  Data  Object

Encrypt Decrypt

Pre-­‐shared  Secret  Key.  Located  only  on  Device  and  Server

Cipher  text

Security  Gateway Server

Name RAM ROM

Class 0,  (C0) <<10Kb <<100Kb

Class  1,  (C1) ~  10  Kb  ~   100  Kb

Class  2,  (C2) ~  50  Kb  ~   250  Kb