10.1145/3339252.3340514acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicpsprocConference Proceedings
research-article
Free Access

IoT-HarPSecA: A Framework for Facilitating the Design and Development of Secure IoT Devices

ABSTRACT

The exponential growth in the number of Internet of Things (IoT) devices and applications in recent years can be attributed partly to the emergence of several new IoT startup companies and potential applications. While many of these startups offer significant innovations in the IoT, some of them lack security expertise, resulting in the development of ill-equipped IoT devices and applications in terms of security. For example, one of the fundamental problems faced by non-security experts in the IoT space is how to select the right Lightweight Cryptographic Algorithm (LWCA) for a given security requirement. To address this specific problem, an IoT Hardware Platform Security Advisor (IoT-HarPSecA) framework is proposed in this paper. The security framework is aimed at facilitating the choice of specific security algorithms given a set of security goals, hardware specifications, message payload size, application area, and energy requirement. Within the scope of this framework, we develop an easy-to-use tool in C++ that allows users to interact with the IoT-HarPSecA framework. The tool can potentially help non-security experts, such as electronics and computer engineers as well as application developers make informed decisions on selecting the appropriate security algorithms for their various applications. Finally, the paper presents some preliminary results and discussion.

References

  1. Mahmoud Ammar, Giovanni Russello, and Bruno Crispo. 2018. Internet of Things: A Survey on the Security of IoT Fameworks. Journal of Information Security and Applications 38 (2018), 8--27.Google ScholarGoogle ScholarCross RefCross Ref
  2. Zhenzhen Bao, Peng Luo, and Dongdai Lin. 2016. Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit Microcontrollers. In Information and Communications Security, Sihan Qing, Eiji Okamoto, Kwangjo Kim, and Dongmei Liu (Eds.). Springer International Publishing, Cham, 18--36.Google ScholarGoogle Scholar
  3. Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers. 2015. The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers. In Lightweight Cryptography for Security and Privacy, Thomas Eisenbarth and Erdinç Öztürk (Eds.). Springer International Publishing, Cham, 3--20.Google ScholarGoogle Scholar
  4. K. R. Choo, S. Gritzalis, and J. H. Park. 2018. Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities. IEEE Transactions on Industrial Informatics 14, 8 (Aug 2018), 3567--3569.Google ScholarGoogle ScholarCross RefCross Ref
  5. CRYPTREC. 2017. Cryptographic Technology Guideline (Lightweight Cryptography). CRYPTREC Lightweight Cryptography Working Group 1 (2017).Google ScholarGoogle Scholar
  6. F. Farahmand, W. Diehl, A. Abdulgadir, J. Kaps, and K. Gaj. 2018. Improved Lightweight Implementations of CAESAR Authenticated Ciphers. In 2018 IEEE 26th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM). 29--36.Google ScholarGoogle Scholar
  7. V. Nagamalla and A. Varanasi. 2017. A Review of Security Frameworks for Internet of Things. In 2017 International Conference on Information Communication and Embedded Systems (ICICES). 1--7.Google ScholarGoogle Scholar
  8. I. Nakagawa and S. Shimojo. 2017. IoT Agent Platform Mechanism with Transparent Cloud Computing Framework for Improving IoT Security. In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Vol. 2. 684--689.Google ScholarGoogle Scholar
  9. K. Routh and T. Pal. 2018. A Survey on Technological, Business and Societal Aspects of Internet of Things by Q3, 2017. In 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU). 1--4.Google ScholarGoogle Scholar
  10. Musa G. Samaila, Miguel Neto, Diogo A. B. Fernandes, Mario M. Freire, and Pedro R. M. Inacio. 2017. Security Challenges of the Internet of Things. In Beyond the Internet of Things: Everything Interconnected, Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis, and Evangelos Pallis (Eds.). Springer International Publishing, 53--82.Google ScholarGoogle Scholar
  11. M. G. Samaila, M. Neto, D. A. B. Fernandes, M. M. Freire, and P. R. M. Inácio. 2018. Challenges of securing Internet of Things Devices: A Survey. Security and Privacy (2018).Google ScholarGoogle Scholar
  12. Musa G. Samaila, João B. F. Sequeiros, Mário M. Freire, and Pedro R. M. Inácio. 2018. Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM, New York, NY, USA, Article 16, 9 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Musa G. Samaila, J. B. F Sequeiros, Acacio F. P. P. Correia, Mario M. Freire, and Pedro R. M. Inacio. 2018. IoT Hardware Development Platforms: Past, Present, and Future. In Internet of Things: Challenges, Advances, and Applications, Qusay F. Hassan, Atta ur Rehman Khan, and Sajjad A. Madani (Eds.). CRC Press, 107--139.Google ScholarGoogle Scholar
  14. S. Sathwara, N. Dutta, and E. Pricop. 2018. IoT Forensic A Digital Investigation Framework for IoT Systems. In 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). 1--4.Google ScholarGoogle Scholar
  15. R. Williams, E. McMahon, S. Samtani, M. Patton, and H. Chen. 2017. Identifying Vulnerabilities of Consumer Internet of Things (IoT) Devices: A Scalable Approach. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). 179--181.Google ScholarGoogle Scholar

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Article Metrics

    • Downloads (Last 12 months)98
    • Downloads (Last 6 weeks)20

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader
About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!

To help support our community working remotely during COVID-19, we are making all work published by ACM in our Digital Library freely accessible through June 30, 2020. Learn more