Cargando…

A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments

IoT systems differ from traditional Internet systems in that they are different in scale, footprint, power requirements, cost and security concerns that are often overlooked. IoT systems inherently present different fail-safe capabilities than traditional computing environments while their threat la...

Descripción completa

Detalles Bibliográficos
Autores principales: Ramalingam, Soodamani, Gan, Hock, Epiphaniou, Gregory, Mistretta, Emilio
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7571198/
https://www.ncbi.nlm.nih.gov/pubmed/32937974
http://dx.doi.org/10.3390/s20185252
_version_ 1783597122047705088
author Ramalingam, Soodamani
Gan, Hock
Epiphaniou, Gregory
Mistretta, Emilio
author_facet Ramalingam, Soodamani
Gan, Hock
Epiphaniou, Gregory
Mistretta, Emilio
author_sort Ramalingam, Soodamani
collection PubMed
description IoT systems differ from traditional Internet systems in that they are different in scale, footprint, power requirements, cost and security concerns that are often overlooked. IoT systems inherently present different fail-safe capabilities than traditional computing environments while their threat landscapes constantly evolve. Further, IoT devices have limited collective security measures in place. Therefore, there is a need for different approaches in threat assessments to incorporate the interdependencies between different IoT devices. In this paper, we run through the design cycle to provide a security-focused approach to the design of IoT systems using a use case, namely, an intelligent solar-panel project called Daedalus. We utilise STRIDE/DREAD approaches to identify vulnerabilities using a thin secure element that is an embedded, tamper proof microprocessor chip that allows the storage and processing of sensitive data. It benefits from low power demand and small footprint as a crypto processor as well as is compatible with IoT requirements. Subsequently, a key agreement based on an asymmetric cryptographic scheme, namely B-SPEKE was used to validate and authenticate the source. We find that end-to-end and independent stand-alone procedures used for validation and encryption of the source data originating from the solar panel are cost-effective in that the validation is carried out once and not several times in the chain as is often the case. The threat model proved useful not so much as a panacea for all threats but provided the framework for the consideration of known threats, and therefore appropriate mitigation plans to be deployed.
format Online
Article
Text
id pubmed-7571198
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75711982020-10-28 A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments Ramalingam, Soodamani Gan, Hock Epiphaniou, Gregory Mistretta, Emilio Sensors (Basel) Article IoT systems differ from traditional Internet systems in that they are different in scale, footprint, power requirements, cost and security concerns that are often overlooked. IoT systems inherently present different fail-safe capabilities than traditional computing environments while their threat landscapes constantly evolve. Further, IoT devices have limited collective security measures in place. Therefore, there is a need for different approaches in threat assessments to incorporate the interdependencies between different IoT devices. In this paper, we run through the design cycle to provide a security-focused approach to the design of IoT systems using a use case, namely, an intelligent solar-panel project called Daedalus. We utilise STRIDE/DREAD approaches to identify vulnerabilities using a thin secure element that is an embedded, tamper proof microprocessor chip that allows the storage and processing of sensitive data. It benefits from low power demand and small footprint as a crypto processor as well as is compatible with IoT requirements. Subsequently, a key agreement based on an asymmetric cryptographic scheme, namely B-SPEKE was used to validate and authenticate the source. We find that end-to-end and independent stand-alone procedures used for validation and encryption of the source data originating from the solar panel are cost-effective in that the validation is carried out once and not several times in the chain as is often the case. The threat model proved useful not so much as a panacea for all threats but provided the framework for the consideration of known threats, and therefore appropriate mitigation plans to be deployed. MDPI 2020-09-14 /pmc/articles/PMC7571198/ /pubmed/32937974 http://dx.doi.org/10.3390/s20185252 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ramalingam, Soodamani
Gan, Hock
Epiphaniou, Gregory
Mistretta, Emilio
A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments
title A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments
title_full A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments
title_fullStr A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments
title_full_unstemmed A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments
title_short A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments
title_sort holistic systems security approach featuring thin secure elements for resilient iot deployments
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7571198/
https://www.ncbi.nlm.nih.gov/pubmed/32937974
http://dx.doi.org/10.3390/s20185252
work_keys_str_mv AT ramalingamsoodamani aholisticsystemssecurityapproachfeaturingthinsecureelementsforresilientiotdeployments
AT ganhock aholisticsystemssecurityapproachfeaturingthinsecureelementsforresilientiotdeployments
AT epiphaniougregory aholisticsystemssecurityapproachfeaturingthinsecureelementsforresilientiotdeployments
AT mistrettaemilio aholisticsystemssecurityapproachfeaturingthinsecureelementsforresilientiotdeployments
AT ramalingamsoodamani holisticsystemssecurityapproachfeaturingthinsecureelementsforresilientiotdeployments
AT ganhock holisticsystemssecurityapproachfeaturingthinsecureelementsforresilientiotdeployments
AT epiphaniougregory holisticsystemssecurityapproachfeaturingthinsecureelementsforresilientiotdeployments
AT mistrettaemilio holisticsystemssecurityapproachfeaturingthinsecureelementsforresilientiotdeployments