Skip to main content

2017 | OriginalPaper | Buchkapitel

A Secure, Out-of-Band, Mechanism to Manage Internet of Things Devices

verfasst von : Joseph Rafferty, Jonathan Synnott, Andrew Ennis, Ian Cleland, Chris Nugent, Michael Little

Erschienen in: Ubiquitous Computing and Ambient Intelligence

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Adoption of the pervasive and ubiquitous computing paradigm is increasing. One application of this paradigm is Ambient Assistive Living where ICT-based assistive services are deployed in an environment. In this study, a Smart Home in a Box (SHIB) has been devised as an AAL solution. This SHIB relies upon Internet of Things (IoT) devices, such as thermal vision sensors, within an environment to function. Each SHIB deployment consists of IoT devices taken from a common pool of devices. The exact device manifest of each SHIB deployment will change as dictated by end-user requirements. Additionally, this pool will grow and expand when devices are removed or added from previous SHIB deployments. To efficiently manage this pool of devices, and SHIB deployments, a remote management solution is required. Current remote management solutions have a range of deficiencies that render them unsuitable for use with the current SHIB platform. To address these deficiencies, a secure mechanism to manage the IoT devices has been devised. This paper presents this mechanism and evaluates its applicability to SHIB deployments. The evaluation focused on assessing the security of the mechanism and the viability of its Low-Power Wireless Wide-Area Network-based communications. This evaluation showed that the proposed solution was reliable and suitable for the intended deployment scenario. An extended evaluation and system improvements have been identified and proposed within future work.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Weiser, M.: The computer for the 21st century. Sci. Am. 265, 94–104 (1991)CrossRef Weiser, M.: The computer for the 21st century. Sci. Am. 265, 94–104 (1991)CrossRef
2.
Zurück zum Zitat Satyanarayanan, M.: Pervasive computing: vision and challenges. IEEE Pers. Commun. 8, 10–17 (2001)CrossRef Satyanarayanan, M.: Pervasive computing: vision and challenges. IEEE Pers. Commun. 8, 10–17 (2001)CrossRef
3.
Zurück zum Zitat Lee, I.: An exploratory study of the impact of the internet of things (IoT) on business model innovation: building smart enterprises at fortune 500 companies. Int. J. Inf. Syst. Soc. Change 7, 1–15 (2016)CrossRef Lee, I.: An exploratory study of the impact of the internet of things (IoT) on business model innovation: building smart enterprises at fortune 500 companies. Int. J. Inf. Syst. Soc. Change 7, 1–15 (2016)CrossRef
4.
Zurück zum Zitat Riggins, F.J., Wamba, S.F.: Research directions on the adoption, usage, and impact of the internet of things through the use of big data analytics. In: 2015 48th Hawaii International Conference on System Sciences (HICSS), pp. 1531–1540 (2015) Riggins, F.J., Wamba, S.F.: Research directions on the adoption, usage, and impact of the internet of things through the use of big data analytics. In: 2015 48th Hawaii International Conference on System Sciences (HICSS), pp. 1531–1540 (2015)
5.
Zurück zum Zitat Bradley, J., Reberger, C., Dixit, A., Gupta, V.: Internet of everything: a $4.6 trillion public-sector opportunity. Cisco White Paper (2013) Bradley, J., Reberger, C., Dixit, A., Gupta, V.: Internet of everything: a $4.6 trillion public-sector opportunity. Cisco White Paper (2013)
6.
Zurück zum Zitat Rafferty, J., Nugent, C.D., Liu, J.: From Activity Recognition to Intention Recognition for Assisted Living Within Smart Homes, pp. 1–12 (2017) Rafferty, J., Nugent, C.D., Liu, J.: From Activity Recognition to Intention Recognition for Assisted Living Within Smart Homes, pp. 1–12 (2017)
7.
Zurück zum Zitat Roy, N., Misra, A., Cook, D.: Ambient and smartphone sensor assisted ADL recognition in multi-inhabitant smart environments. J. Ambient Intell. Humanized Comput. 7(1), 1–19 (2015)CrossRef Roy, N., Misra, A., Cook, D.: Ambient and smartphone sensor assisted ADL recognition in multi-inhabitant smart environments. J. Ambient Intell. Humanized Comput. 7(1), 1–19 (2015)CrossRef
9.
Zurück zum Zitat Tozlu, S., Senel, M., Mao, W., Keshavarzian, A.: Wi-Fi enabled sensors for internet of things: a practical approach. IEEE Commun. Mag. 50, 134–143 (2012)CrossRef Tozlu, S., Senel, M., Mao, W., Keshavarzian, A.: Wi-Fi enabled sensors for internet of things: a practical approach. IEEE Commun. Mag. 50, 134–143 (2012)CrossRef
10.
Zurück zum Zitat Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17, 2347–2376 (2015)CrossRef Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17, 2347–2376 (2015)CrossRef
11.
Zurück zum Zitat Bertino, E., Islam, N.: Botnets and internet of things security. Computer 50, 76–79 (2017)CrossRef Bertino, E., Islam, N.: Botnets and internet of things security. Computer 50, 76–79 (2017)CrossRef
12.
Zurück zum Zitat Shah, M., Soni, V., Shah, H., Desai, M.: TCP/IP network protocols—security threats, flaws and defense methods. In: 2016 3rd International Conference On Computing for Sustainable Global Development, pp. 2693–2699 (2016) Shah, M., Soni, V., Shah, H., Desai, M.: TCP/IP network protocols—security threats, flaws and defense methods. In: 2016 3rd International Conference On Computing for Sustainable Global Development, pp. 2693–2699 (2016)
13.
Zurück zum Zitat Bruno, L., Graziano, M., Balzarotti, D., Francillon, A.: Through the looking-glass, and what eve found there. In: WOOT (2014) Bruno, L., Graziano, M., Balzarotti, D., Francillon, A.: Through the looking-glass, and what eve found there. In: WOOT (2014)
15.
Zurück zum Zitat Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 18, 2027–2051 (2016)CrossRef Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 18, 2027–2051 (2016)CrossRef
17.
Zurück zum Zitat Zhang, Z.-K., Cho, M.C.Y., Shieh, S.: Emerging security threats and countermeasures in IoT. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS 2015, pp. 1–6. ACM Press, New York, USA (2015) Zhang, Z.-K., Cho, M.C.Y., Shieh, S.: Emerging security threats and countermeasures in IoT. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS 2015, pp. 1–6. ACM Press, New York, USA (2015)
19.
Zurück zum Zitat Dubeuf, J., Hely, D., Beroulle, V.: ECDSA passive attacks, leakage sources, and common design mistakes. ACM Trans. Des. Autom. Electron. Syst. 21, 1–24 (2016)CrossRef Dubeuf, J., Hely, D., Beroulle, V.: ECDSA passive attacks, leakage sources, and common design mistakes. ACM Trans. Des. Autom. Electron. Syst. 21, 1–24 (2016)CrossRef
20.
Zurück zum Zitat Schneier, B., Fredrikson, M., Kohno, T., Ristenpart, T.: Surreptitiously weakening cryptographic systems. IACR Cryptol. ePrint Arch. (2015) Schneier, B., Fredrikson, M., Kohno, T., Ristenpart, T.: Surreptitiously weakening cryptographic systems. IACR Cryptol. ePrint Arch. (2015)
21.
Zurück zum Zitat Centenaro, M., Vangelista, L., Zanella, A., Zorzi, M.: Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios. IEEE Wirel. Commun. 23, 60–67 (2016)CrossRef Centenaro, M., Vangelista, L., Zanella, A., Zorzi, M.: Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios. IEEE Wirel. Commun. 23, 60–67 (2016)CrossRef
22.
Zurück zum Zitat Andreev, S., Galinina, O., Pyattaev, A., Gerasimenko, M., Tirronen, T., Torsner, J., Sachs, J., Dohler, M., Koucheryavy, Y.: Understanding the IoT connectivity landscape: a contemporary M2 M radio technology roadmap. IEEE Commun. Mag. 53, 32–40 (2015)CrossRef Andreev, S., Galinina, O., Pyattaev, A., Gerasimenko, M., Tirronen, T., Torsner, J., Sachs, J., Dohler, M., Koucheryavy, Y.: Understanding the IoT connectivity landscape: a contemporary M2 M radio technology roadmap. IEEE Commun. Mag. 53, 32–40 (2015)CrossRef
23.
Zurück zum Zitat Khan, Z., Lehtomaki, J.J., Iellamo, S.I., Vuohtoniemi, R., Hossain, E., Han, Z.: IoT Connectivity in radar bands: a shared access model based on spectrum measurements. IEEE Commun. Mag. 55, 88–96 (2017)CrossRef Khan, Z., Lehtomaki, J.J., Iellamo, S.I., Vuohtoniemi, R., Hossain, E., Han, Z.: IoT Connectivity in radar bands: a shared access model based on spectrum measurements. IEEE Commun. Mag. 55, 88–96 (2017)CrossRef
24.
Zurück zum Zitat Ijaz, A., Zhang, L., Grau, M., Mohamed, A., Vural, S., Quddus, A.U., Imran, M.A., Foh, C.H., Tafazolli, R.: Enabling massive IoT in 5G and beyond systems: PHY radio frame design considerations. IEEE Access 4, 3322–3339 (2016)CrossRef Ijaz, A., Zhang, L., Grau, M., Mohamed, A., Vural, S., Quddus, A.U., Imran, M.A., Foh, C.H., Tafazolli, R.: Enabling massive IoT in 5G and beyond systems: PHY radio frame design considerations. IEEE Access 4, 3322–3339 (2016)CrossRef
25.
Zurück zum Zitat Welch, B.: Exploiting the weaknesses of SS7. Netw. Secur. 2017, 17–19 (2017)CrossRef Welch, B.: Exploiting the weaknesses of SS7. Netw. Secur. 2017, 17–19 (2017)CrossRef
27.
Zurück zum Zitat Regulation of Investigatory Powers Act, UK (2000) Regulation of Investigatory Powers Act, UK (2000)
28.
Zurück zum Zitat Alliance, L.: A technical overview of LoRa and LoRaWAN. White Paper, November (2015) Alliance, L.: A technical overview of LoRa and LoRaWAN. White Paper, November (2015)
30.
Zurück zum Zitat Daemen, J., Rijmen, V.: The Rijndael Block Cipher: AES Proposal (2003) Daemen, J., Rijmen, V.: The Rijndael Block Cipher: AES Proposal (2003)
31.
Zurück zum Zitat Kumar, P., Rawat, S., Choudhury, T., Pradhan, S.: A performance based comparison of various symmetric cryptographic algorithms in run-time scenario. In: International Conference on System Modeling & Advancement in Research Trends (SMART), pp. 37–41 (2016) Kumar, P., Rawat, S., Choudhury, T., Pradhan, S.: A performance based comparison of various symmetric cryptographic algorithms in run-time scenario. In: International Conference on System Modeling & Advancement in Research Trends (SMART), pp. 37–41 (2016)
32.
Zurück zum Zitat Ågren, M.: On some symmetric lightweight cryptographic designs (2012) Ågren, M.: On some symmetric lightweight cryptographic designs (2012)
33.
Zurück zum Zitat Bajaj, R.D., Gokhale, M., Tech Vlsi, M.: Design and simulation of AES algorithm for cryptography. Int. J. Eng. Sci. Comput. (2016) Bajaj, R.D., Gokhale, M., Tech Vlsi, M.: Design and simulation of AES algorithm for cryptography. Int. J. Eng. Sci. Comput. (2016)
34.
Zurück zum Zitat Ertaul, L., Sravya, K.L., Sanka, N.: Implementation of authenticated encryption algorithm offset code book (OCB). In: Proceedings of the International Conference on Wireless Networks (ICWN), p. 78 (2016) Ertaul, L., Sravya, K.L., Sanka, N.: Implementation of authenticated encryption algorithm offset code book (OCB). In: Proceedings of the International Conference on Wireless Networks (ICWN), p. 78 (2016)
35.
Zurück zum Zitat Vaidehi, M., Rabi, B.J.: Design and analysis of AES-CBC mode for high security applications. In: 2014 2nd International Conference on Current Trends in Engineering and Technology (ICCTET), pp. 499–502 (2014) Vaidehi, M., Rabi, B.J.: Design and analysis of AES-CBC mode for high security applications. In: 2014 2nd International Conference on Current Trends in Engineering and Technology (ICCTET), pp. 499–502 (2014)
36.
Zurück zum Zitat Paterson, K., Foley, J., McGrew, D.: Authenticated Encryption with AES-CBC and HMAC-SHA (2014) Paterson, K., Foley, J., McGrew, D.: Authenticated Encryption with AES-CBC and HMAC-SHA (2014)
37.
Zurück zum Zitat System, method, and computer program product for optimizing data encryption and decryption by implementing asymmetric AES-CBC channels (2013) System, method, and computer program product for optimizing data encryption and decryption by implementing asymmetric AES-CBC channels (2013)
38.
Zurück zum Zitat Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES implementation on a grain of sand. IEE Proc. Inf. Secur. 152, 13 (2005)CrossRef Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES implementation on a grain of sand. IEE Proc. Inf. Secur. 152, 13 (2005)CrossRef
39.
Zurück zum Zitat Saito, T., Yasuda, K., Ishikawa, T., Hosoi, R., Takahashi, K., Chen, Y., Zalasinski, M.: Estimating CPU features by browser fingerprinting. In: 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 587–592. IEEE (2016) Saito, T., Yasuda, K., Ishikawa, T., Hosoi, R., Takahashi, K., Chen, Y., Zalasinski, M.: Estimating CPU features by browser fingerprinting. In: 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 587–592. IEEE (2016)
40.
41.
Zurück zum Zitat Krawczyk, H., Canetti, R., Bellare, M.: HMAC: Keyed-hashing for message authentication. Krawczyk, H., Canetti, R., Bellare, M.: HMAC: Keyed-hashing for message authentication.
42.
Zurück zum Zitat Bharati, P.V., Mahalakshmi, T.S.: A Combinational Approach for securing the data in cloud storage using HMAC-SHA512 and Information Secured Algorithm (ISA). Int. J. Appl. Eng. Res. 11, 973–4562 (2016) Bharati, P.V., Mahalakshmi, T.S.: A Combinational Approach for securing the data in cloud storage using HMAC-SHA512 and Information Secured Algorithm (ISA). Int. J. Appl. Eng. Res. 11, 973–4562 (2016)
Metadaten
Titel
A Secure, Out-of-Band, Mechanism to Manage Internet of Things Devices
verfasst von
Joseph Rafferty
Jonathan Synnott
Andrew Ennis
Ian Cleland
Chris Nugent
Michael Little
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-67585-5_9