skip to main content
10.1145/2744769.2905004acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Invited - Can IoT be secured: emerging challenges in connecting the unconnected

Published:16 October 2018Publication History

ABSTRACT

Embedded, mobile, and cyberphysical systems are becoming ubiquitous and are used in many applications, from consumer electronics, industrial control systems, modern vehicles, to critical infrastructures. Current trends and initiatives, such as Internet of Things (IoT) and smart cities, promise innovative business models and novel user experiences through strong connectivity and effective use of next generation embedded devices. These systems generate, process, and exchange vast amount of security-critical and privacy-sensitive data, which makes them attractive targets of attacks. Cyberattacks on IoT systems are highly critical since they may cause physical damage and threaten human lives. The complexity of these systems, the lack of security and privacy by design for current IoT devices, and potential impact of cyberattacks will bring about new threats. This paper gives an overview on the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for IoT systems.

References

  1. Xbox 360 timing attack. 2007. {Online}. http://beta.ivc.no/wiki/index.php/Xbox_360_Timing_Attack.Google ScholarGoogle Scholar
  2. Critical security aw: glibc stack-based buffer overflow in getaddrinfo() (cve-2015-7547). 2015. {Online}. https://access.redhat.com/articles/2161461.Google ScholarGoogle Scholar
  3. C. Alcaraz, R. Roman, P. Najera, and J. Lopez. Security of industrial sensor network-based remote substations in the context of the internet of things. Ad Hoc Netw., 11(3), 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. O. Arias, J. Wurm, K. Hoang, and Y. Jin. Privacy and security in internet of things and wearable devices. IEEE Transactions on Multi-Scale Computing Systems, 1(2):99--109, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. F. Armknecht, A.-R. Sadeghi, S. Schulz, and C. Wachsmann. A security framework for the analysis and design of software attestation. In ACM Conference on Computer & Communications Security (CCS). ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. N. Asokan, F. Brasser, A. Ibrahim, A.-R. Sadeghi, M. Schunter, G. Tsudik, and C. Wachsmann. Seda: Scalable embedded device attestation. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Blackstock and R. Lea. Toward interoperability in a web of things. In ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication (UbiComp). ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. F. Brasser, P. Koeberl, B. E. Mahjoub, A.-R. Sadeghi, and C. Wachsmann. TyTAN: Tiny trust anchor for tiny devices. In Design Automation Conference (DAC). ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Brumley and D. Boneh. Remote timing attacks are practical. Computer Networks, 48(5):701--716, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. bushing, marcan, segher, and sven. Console hacking 2010: Ps3 epic fail. In 27th Chaos Communication Congress, 2010.Google ScholarGoogle Scholar
  11. S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Conference on Security. USENIX Association, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Costin, J. Zaddach, A. Francillon, and D. Balzarotti. A large-scale analysis of the security of embedded firmwares. In USENIX Conference on Security Symposium. USENIX Association, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Cowan, S. Beattie, J. Johansen, and P. Wagle. Pointguard tm: protecting pointers from buffer overflow vulnerabilities. In Proceedings of the 12th conference on USENIX Security Symposium, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Usenix Security, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Cui, J. Kataria, and S. J. Stofo. From prey to hunter: Transforming legacy embedded devices into exploitation sensor grids. In Proceedings of the 27th Annual Computer Security Applications Conference, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Cui and S. J. Stolfo. A quantitative analysis of the insecurity of embedded network devices: Results of a wide-area scan. In Annual Computer Security Applications Conference (ACSAC). ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. K. Eldefrawy, A. Francillon, D. Perito, and G. Tsudik. SMART: Secure and minimal architecture for (establishing a dynamic) root of trust. In Network and Distributed System Security Symposium (NDSS), 2012.Google ScholarGoogle Scholar
  18. K. Eldefrawy, G. Tsudik, A. Francillon, and D. Perito. SMART: Secure and minimal architecture for (establishing a dynamic) root of trust. In Network and Distributed System Security Symposium (NDSS). Internet Society, 2012.Google ScholarGoogle Scholar
  19. B. Fowler. Some top baby monitors lack basic security features, report finds. 2015. {Online}. http://www.nbcnewyork.com/news/local/Baby-Monitor-Security-Research-324169831.html.Google ScholarGoogle Scholar
  20. E. Grosse and M. Upadhyay. Authentication at scale. IEEE Security Privacy, 11(1), 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. G. Hernandez, O. Arias, D. Buentello, and Y. Jin. Smart nest thermostat: A smart spy in your home. In Black Hat USA, 2014.Google ScholarGoogle Scholar
  22. A. G. Illera and J. V. Vidal. Lights off! The darkness of the smart meters. In BlackHat Europe, 2014.Google ScholarGoogle Scholar
  23. M. Kabay. Attacks on power systems: Hackers, malware, 2010.Google ScholarGoogle Scholar
  24. H. Kagermann, W. Wahlster, and J. Helbig. Securing the future of German manufacturing industry --- Recommendations for implementing the strategic initiative Industrie 4.0, 2013.Google ScholarGoogle Scholar
  25. P. Koeberl, S. Schulz, A.-R. Sadeghi, and V. Varadharajan. TrustLite: A security architecture for tiny embedded devices. In European Conference on Computer Systems (EuroSys). ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. Kong, F. Koushanfar, P. K. Pendyala, A.-R. Sadeghi, and C. Wachsmann. PUFatt: Embedded platform attestation based on novel processor-based PUFs. In Design Automation Conference (DAC). ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. Experimental security analysis of a modern automobile. In IEEE Symposium on Security and Privacy (S&P), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. F. Koushanfar, A.-R. Sadeghi, and H. Seudie. Eda for secure and dependable cybercars: Challenges and opportunities. In Proceedings of the 49th Annual Design Automation Conference. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. X. Kovah, C. Kallenberg, C. Weathers, A. Herzog, M. Albin, and J. Butterworth. New results for timing-based attestation. In IEEE Symposium on Security and Privacy (S&P), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. J. S. Kumar and D. R. Patel. A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 90(11), 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. R. Lemos. Sony left passwords, code-signing keys virtually unprotected. eWeek, 2014. {Online}. http://www.eweek.com/security/sony-left-passwords-code-signing-keys-virtually-unprotected.html.Google ScholarGoogle Scholar
  32. J. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB reduction and attestation. In IEEE Symposium on Security and Privacy (S&P), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In Hardware and Architectural Support for Security and Privacy (HASP). ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. M. Miettinen, N. Asokan, T. D. Nguyen, A.-R. Sadeghi, and M. Sobhani. Context-based zero-interaction pairing and key evolution for advanced personal devices. In Conference on Computer and Communications Security (CCS). ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. B. Miller and D. Rowe. A survey SCADA of and critical infrastructure incidents. In Research in Information Technology (RIIT). ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac. Survey internet of things: Vision, applications and research challenges. Ad Hoc Netw., 10(7), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Nest Labs. Open source compliance. {online}. https://nest.com/legal/compliance.Google ScholarGoogle Scholar
  38. J. Noorman, P. Agten, W. Daniels, R. Strackx, A. Van Herrewege, C. Huygens, B. Preneel, I. Verbauwhede, and F. Piessens. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In USENIX Conference on Security. USENIX Association, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. E. Owusu, J. Guajardo, J. McCune, J. Newsome, A. Perrig, and A. Vasudevan. OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms. In ACM Conference on Computer & Communications Security (CCS). ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. H. Park, D. Seo, H. Lee, and A. Perrig. SMATT: Smart meter attestation using multiple target selection and copy-proof memory. In Computer Science and its Applications. Springer, 2012.Google ScholarGoogle Scholar
  41. B. Parno, J. M. McCune, and A. Perrig. Bootstrapping trust in commodity computers. In Security and privacy (SP), 2010 IEEE symposium on, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. K. Poulsen. Slammer worm crashed Ohio nuke plant network, 2003.Google ScholarGoogle Scholar
  43. PR Newswire. Computer virus strikes CSX transportation computers, 2003.Google ScholarGoogle Scholar
  44. M. Rostami, A. Juels, and F. Koushanfar. Heart-to-heart (h2h): authentication for implanted medical devices. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. M. Rostami, F. Koushanfar, and R. Karri. A primer on hardware security: Models, methods, and metrics. Proceedings of the IEEE, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  46. B. Schneier. Cryptographic design vulnerabilities. Computer, 31(9):29--33, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla. SCUBA: Secure code update by attestation in sensor networks. In ACM Workshop on Wireless Security (WiSe). ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In ACM Symposium on Operating Systems Principles (SOSP). ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. D. Shahrjerdi, J. Rajendran, S. Garg, F. Koushanfar, and R. Karri. Shielding and securing integrated circuits with sensors. In Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference on. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. S. Skorobogatov. Fault attacks on secure chips: from glitch to ash. In Design and Security of Cryptographic Algorithms and Devices (ECRYPT II), 2011.Google ScholarGoogle Scholar
  51. M. Smith. Security holes in the 3 most popular smart home hubs and honeywell tuxedo touch. 2015. {Online}. http://www.networkworld.com/article/2952718/microsoft-subnet/security-holes-in-the-3-most-popular-smart-home-hubs-and-honeywell-tuxedo-touch.html.Google ScholarGoogle Scholar
  52. R. Strackx, F. Piessens, and B. Preneel. Efficient isolation of trusted subsystems in embedded systems. In Security and Privacy in Communication Networks. Springer, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  53. G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In Annual International Conference on Supercomputing (CIS). ACM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. H. Suo, J. Wan, C. Zou, and J. Liu. Security in the internet of things: A review. In International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. L. Szekeres, M. Payer, T. Wei, and D. Song. Sok: Eternal war in memory. In 2013 IEEE Symposium on Security and Privacy (SP), 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. H. T. T. Truong, X. Gao, B. Shresthab, N. Saxena, N. Asokan, and P. Nurmi. Using contextual co-presence to strengthen zero-interaction authentication: Design, integration and usability. Pervasive and Mobile Computing, 2014.Google ScholarGoogle Scholar
  57. Trusted Computing Group (TCG). Website, 2011.Google ScholarGoogle Scholar
  58. S. Tuecke, V. Welch, D. Engert, L. Pearlman, and M. Thompson. Internet x. 509 public key infrastructure (pki) proxy certificate profile. Technical report, 2004.Google ScholarGoogle Scholar
  59. O. Vermesan and P. Friess. Internet of Things --- From Research and Innovation to Market Deployment. River Publishers, 2014.Google ScholarGoogle Scholar
  60. J. Vijayan. Stuxnet renews power grid security concerns, 2010.Google ScholarGoogle Scholar
  61. J. Winter. Trusted computing building blocks for embedded linux-based ARM Trustzone platforms. In ACM Workshop on Scalable Trusted Computing (STC). ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. J. Wurm, O. Arias, K. Hoang, A.-R. Sadeght, and Y. Jin. Security analysis on consumer and industrial iot devices. In 21st Asia and South Pacific Design Automation Conference (ASP-DAC), 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. K. Zhao and L. Ge. A survey on the internet of things security. In Computational Intelligence and Security (CIS), 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. S. Zonouz, J. Rrushi, and S. McLaughlin. Detecting industrial control malware using automated PLC code analytics. IEEE Security and Privacy, 12(6), 2014.Google ScholarGoogle Scholar
  65. D. Zuehlke. Smartfactory --- towards a factory of things. Annual Reviews in Control, 34(1), 2010.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Invited - Can IoT be secured: emerging challenges in connecting the unconnected
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            DAC '16: Proceedings of the 53rd Annual Design Automation Conference
            June 2016
            1048 pages
            ISBN:9781450342360
            DOI:10.1145/2897937

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 16 October 2018

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate1,770of5,499submissions,32%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader