ABSTRACT
The exponential growth in the number of Internet of Things (IoT) devices and applications in recent years can be attributed partly to the emergence of several new IoT startup companies and potential applications. While many of these startups offer significant innovations in the IoT, some of them lack security expertise, resulting in the development of ill-equipped IoT devices and applications in terms of security. For example, one of the fundamental problems faced by non-security experts in the IoT space is how to select the right Lightweight Cryptographic Algorithm (LWCA) for a given security requirement. To address this specific problem, an IoT Hardware Platform Security Advisor (IoT-HarPSecA) framework is proposed in this paper. The security framework is aimed at facilitating the choice of specific security algorithms given a set of security goals, hardware specifications, message payload size, application area, and energy requirement. Within the scope of this framework, we develop an easy-to-use tool in C++ that allows users to interact with the IoT-HarPSecA framework. The tool can potentially help non-security experts, such as electronics and computer engineers as well as application developers make informed decisions on selecting the appropriate security algorithms for their various applications. Finally, the paper presents some preliminary results and discussion.
References
- Mahmoud Ammar, Giovanni Russello, and Bruno Crispo. 2018. Internet of Things: A Survey on the Security of IoT Fameworks. Journal of Information Security and Applications 38 (2018), 8--27.Google Scholar
Cross Ref
- Zhenzhen Bao, Peng Luo, and Dongdai Lin. 2016. Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit Microcontrollers. In Information and Communications Security, Sihan Qing, Eiji Okamoto, Kwangjo Kim, and Dongmei Liu (Eds.). Springer International Publishing, Cham, 18--36.Google Scholar
- Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers. 2015. The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers. In Lightweight Cryptography for Security and Privacy, Thomas Eisenbarth and Erdinç Öztürk (Eds.). Springer International Publishing, Cham, 3--20.Google Scholar
- K. R. Choo, S. Gritzalis, and J. H. Park. 2018. Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities. IEEE Transactions on Industrial Informatics 14, 8 (Aug 2018), 3567--3569.Google Scholar
Cross Ref
- CRYPTREC. 2017. Cryptographic Technology Guideline (Lightweight Cryptography). CRYPTREC Lightweight Cryptography Working Group 1 (2017).Google Scholar
- F. Farahmand, W. Diehl, A. Abdulgadir, J. Kaps, and K. Gaj. 2018. Improved Lightweight Implementations of CAESAR Authenticated Ciphers. In 2018 IEEE 26th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM). 29--36.Google Scholar
- V. Nagamalla and A. Varanasi. 2017. A Review of Security Frameworks for Internet of Things. In 2017 International Conference on Information Communication and Embedded Systems (ICICES). 1--7.Google Scholar
- I. Nakagawa and S. Shimojo. 2017. IoT Agent Platform Mechanism with Transparent Cloud Computing Framework for Improving IoT Security. In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Vol. 2. 684--689.Google Scholar
- K. Routh and T. Pal. 2018. A Survey on Technological, Business and Societal Aspects of Internet of Things by Q3, 2017. In 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU). 1--4.Google Scholar
- Musa G. Samaila, Miguel Neto, Diogo A. B. Fernandes, Mario M. Freire, and Pedro R. M. Inacio. 2017. Security Challenges of the Internet of Things. In Beyond the Internet of Things: Everything Interconnected, Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis, and Evangelos Pallis (Eds.). Springer International Publishing, 53--82.Google Scholar
- M. G. Samaila, M. Neto, D. A. B. Fernandes, M. M. Freire, and P. R. M. Inácio. 2018. Challenges of securing Internet of Things Devices: A Survey. Security and Privacy (2018).Google Scholar
- Musa G. Samaila, João B. F. Sequeiros, Mário M. Freire, and Pedro R. M. Inácio. 2018. Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM, New York, NY, USA, Article 16, 9 pages. Google Scholar
Digital Library
- Musa G. Samaila, J. B. F Sequeiros, Acacio F. P. P. Correia, Mario M. Freire, and Pedro R. M. Inacio. 2018. IoT Hardware Development Platforms: Past, Present, and Future. In Internet of Things: Challenges, Advances, and Applications, Qusay F. Hassan, Atta ur Rehman Khan, and Sajjad A. Madani (Eds.). CRC Press, 107--139.Google Scholar
- S. Sathwara, N. Dutta, and E. Pricop. 2018. IoT Forensic A Digital Investigation Framework for IoT Systems. In 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). 1--4.Google Scholar
- R. Williams, E. McMahon, S. Samtani, M. Patton, and H. Chen. 2017. Identifying Vulnerabilities of Consumer Internet of Things (IoT) Devices: A Scalable Approach. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). 179--181.Google Scholar

Mário M. Freire


Comments