Cargando…
Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems
Despite the advantages that the Internet of Things (IoT) will bring to our daily life, the increasing interconnectivity, as well as the amount and sensitivity of data, make IoT devices an attractive target for attackers. To address this issue, the recent Manufacturer Usage Description (MUD) standard...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7180465/ https://www.ncbi.nlm.nih.gov/pubmed/32231142 http://dx.doi.org/10.3390/s20071882 |
_version_ | 1783525825680769024 |
---|---|
author | Matheu, Sara N. Robles Enciso, Alberto Molina Zarca, Alejandro Garcia-Carrillo, Dan Hernández-Ramos, José Luis Bernal Bernabe, Jorge Skarmeta, Antonio F. |
author_facet | Matheu, Sara N. Robles Enciso, Alberto Molina Zarca, Alejandro Garcia-Carrillo, Dan Hernández-Ramos, José Luis Bernal Bernabe, Jorge Skarmeta, Antonio F. |
author_sort | Matheu, Sara N. |
collection | PubMed |
description | Despite the advantages that the Internet of Things (IoT) will bring to our daily life, the increasing interconnectivity, as well as the amount and sensitivity of data, make IoT devices an attractive target for attackers. To address this issue, the recent Manufacturer Usage Description (MUD) standard has been proposed to describe network access control policies in the manufacturing phase to protect the device during its operation by restricting its communications. In this paper, we define an architecture and process to obtain and enforce the MUD restrictions during the bootstrapping of a device. Furthermore, we extend the MUD model with a flexible policy language to express additional aspects, such as data privacy, channel protection, and resource authorization. For the enforcement of such enriched behavioral profiles, we make use of Software Defined Networking (SDN) techniques, as well as an attribute-based access control approach by using authorization credentials and encryption techniques. These techniques are used to protect devices’ data, which are shared through a blockchain platform. The resulting approach was implemented and evaluated in a real scenario, and is intended to reduce the attack surface of IoT deployments by restricting devices’ communication before they join a certain network. |
format | Online Article Text |
id | pubmed-7180465 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-71804652020-05-01 Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems Matheu, Sara N. Robles Enciso, Alberto Molina Zarca, Alejandro Garcia-Carrillo, Dan Hernández-Ramos, José Luis Bernal Bernabe, Jorge Skarmeta, Antonio F. Sensors (Basel) Article Despite the advantages that the Internet of Things (IoT) will bring to our daily life, the increasing interconnectivity, as well as the amount and sensitivity of data, make IoT devices an attractive target for attackers. To address this issue, the recent Manufacturer Usage Description (MUD) standard has been proposed to describe network access control policies in the manufacturing phase to protect the device during its operation by restricting its communications. In this paper, we define an architecture and process to obtain and enforce the MUD restrictions during the bootstrapping of a device. Furthermore, we extend the MUD model with a flexible policy language to express additional aspects, such as data privacy, channel protection, and resource authorization. For the enforcement of such enriched behavioral profiles, we make use of Software Defined Networking (SDN) techniques, as well as an attribute-based access control approach by using authorization credentials and encryption techniques. These techniques are used to protect devices’ data, which are shared through a blockchain platform. The resulting approach was implemented and evaluated in a real scenario, and is intended to reduce the attack surface of IoT deployments by restricting devices’ communication before they join a certain network. MDPI 2020-03-28 /pmc/articles/PMC7180465/ /pubmed/32231142 http://dx.doi.org/10.3390/s20071882 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Matheu, Sara N. Robles Enciso, Alberto Molina Zarca, Alejandro Garcia-Carrillo, Dan Hernández-Ramos, José Luis Bernal Bernabe, Jorge Skarmeta, Antonio F. Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems |
title | Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems |
title_full | Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems |
title_fullStr | Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems |
title_full_unstemmed | Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems |
title_short | Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems |
title_sort | security architecture for defining and enforcing security profiles in dlt/sdn-based iot systems |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7180465/ https://www.ncbi.nlm.nih.gov/pubmed/32231142 http://dx.doi.org/10.3390/s20071882 |
work_keys_str_mv | AT matheusaran securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems AT roblesencisoalberto securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems AT molinazarcaalejandro securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems AT garciacarrillodan securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems AT hernandezramosjoseluis securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems AT bernalbernabejorge securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems AT skarmetaantoniof securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems |