Cargando…

Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems

Despite the advantages that the Internet of Things (IoT) will bring to our daily life, the increasing interconnectivity, as well as the amount and sensitivity of data, make IoT devices an attractive target for attackers. To address this issue, the recent Manufacturer Usage Description (MUD) standard...

Descripción completa

Detalles Bibliográficos
Autores principales: Matheu, Sara N., Robles Enciso, Alberto, Molina Zarca, Alejandro, Garcia-Carrillo, Dan, Hernández-Ramos, José Luis, Bernal Bernabe, Jorge, Skarmeta, Antonio F.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7180465/
https://www.ncbi.nlm.nih.gov/pubmed/32231142
http://dx.doi.org/10.3390/s20071882
_version_ 1783525825680769024
author Matheu, Sara N.
Robles Enciso, Alberto
Molina Zarca, Alejandro
Garcia-Carrillo, Dan
Hernández-Ramos, José Luis
Bernal Bernabe, Jorge
Skarmeta, Antonio F.
author_facet Matheu, Sara N.
Robles Enciso, Alberto
Molina Zarca, Alejandro
Garcia-Carrillo, Dan
Hernández-Ramos, José Luis
Bernal Bernabe, Jorge
Skarmeta, Antonio F.
author_sort Matheu, Sara N.
collection PubMed
description Despite the advantages that the Internet of Things (IoT) will bring to our daily life, the increasing interconnectivity, as well as the amount and sensitivity of data, make IoT devices an attractive target for attackers. To address this issue, the recent Manufacturer Usage Description (MUD) standard has been proposed to describe network access control policies in the manufacturing phase to protect the device during its operation by restricting its communications. In this paper, we define an architecture and process to obtain and enforce the MUD restrictions during the bootstrapping of a device. Furthermore, we extend the MUD model with a flexible policy language to express additional aspects, such as data privacy, channel protection, and resource authorization. For the enforcement of such enriched behavioral profiles, we make use of Software Defined Networking (SDN) techniques, as well as an attribute-based access control approach by using authorization credentials and encryption techniques. These techniques are used to protect devices’ data, which are shared through a blockchain platform. The resulting approach was implemented and evaluated in a real scenario, and is intended to reduce the attack surface of IoT deployments by restricting devices’ communication before they join a certain network.
format Online
Article
Text
id pubmed-7180465
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-71804652020-05-01 Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems Matheu, Sara N. Robles Enciso, Alberto Molina Zarca, Alejandro Garcia-Carrillo, Dan Hernández-Ramos, José Luis Bernal Bernabe, Jorge Skarmeta, Antonio F. Sensors (Basel) Article Despite the advantages that the Internet of Things (IoT) will bring to our daily life, the increasing interconnectivity, as well as the amount and sensitivity of data, make IoT devices an attractive target for attackers. To address this issue, the recent Manufacturer Usage Description (MUD) standard has been proposed to describe network access control policies in the manufacturing phase to protect the device during its operation by restricting its communications. In this paper, we define an architecture and process to obtain and enforce the MUD restrictions during the bootstrapping of a device. Furthermore, we extend the MUD model with a flexible policy language to express additional aspects, such as data privacy, channel protection, and resource authorization. For the enforcement of such enriched behavioral profiles, we make use of Software Defined Networking (SDN) techniques, as well as an attribute-based access control approach by using authorization credentials and encryption techniques. These techniques are used to protect devices’ data, which are shared through a blockchain platform. The resulting approach was implemented and evaluated in a real scenario, and is intended to reduce the attack surface of IoT deployments by restricting devices’ communication before they join a certain network. MDPI 2020-03-28 /pmc/articles/PMC7180465/ /pubmed/32231142 http://dx.doi.org/10.3390/s20071882 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Matheu, Sara N.
Robles Enciso, Alberto
Molina Zarca, Alejandro
Garcia-Carrillo, Dan
Hernández-Ramos, José Luis
Bernal Bernabe, Jorge
Skarmeta, Antonio F.
Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems
title Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems
title_full Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems
title_fullStr Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems
title_full_unstemmed Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems
title_short Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems
title_sort security architecture for defining and enforcing security profiles in dlt/sdn-based iot systems
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7180465/
https://www.ncbi.nlm.nih.gov/pubmed/32231142
http://dx.doi.org/10.3390/s20071882
work_keys_str_mv AT matheusaran securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems
AT roblesencisoalberto securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems
AT molinazarcaalejandro securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems
AT garciacarrillodan securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems
AT hernandezramosjoseluis securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems
AT bernalbernabejorge securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems
AT skarmetaantoniof securityarchitecturefordefiningandenforcingsecurityprofilesindltsdnbasediotsystems