To Örebro University

oru.seÖrebro University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Protecting the Internet of Things with Security-by-Contract and Fog Computing
Örebro University, School of Science and Technology. (Centre for Applied Autonomous Sensor Systems (AASS))ORCID iD: 0000-0001-9293-7711
Örebro University, School of Science and Technology. DTU Compute Technical University of Denmark, Denmark, Lyngby, Denmark. (Centre for Applied Autonomous Sensor Systems (AASS))ORCID iD: 0000-0001-9575-2990
Department of Information Sciences and Engineering, University of Trento, Trento, Italy.
2019 (English)In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), IEEE , 2019Conference paper, Published paper (Refereed)
Abstract [en]

Nowadays, the Internet of Things (IoT) is a consolidated reality. Smart homes are equipped with a growing number of IoT devices that capture more and more information about human beings lives. However, manufacturers paid little or no attention to security, so that various challenges are still in place. In this paper, we propose a novel approach to secure IoT systems that combines the concept of Security-by-Contract (SxC) with the Fog computing distributed paradigm. We define the pillars of our approach, namely the notions of IoT device contract, Fog node policy and contract-policy matching, the respective life-cycles, and the resulting SxC workflow. To better understand all the concepts of the SxC framework, and highlight its practical feasibility, we use a running case study based on a context-aware system deployed in a real smart home.

Place, publisher, year, edition, pages
IEEE , 2019.
Keywords [en]
security-by-contract, Fog computing, IoT
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:oru:diva-78009DOI: 10.1109/WF-IoT.2019.8767243ISI: 000492865800001Scopus ID: 2-s2.0-85073699472ISBN: 978-1-5386-4980-0 (electronic)OAI: oai:DiVA.org:oru-78009DiVA, id: diva2:1372186
Conference
5th IEEE World Forum on Internet of Things (WF-IoT 2019), Limerick, Ireland, April 15-18, 2019
Available from: 2019-11-22 Created: 2019-11-22 Last updated: 2021-01-07Bibliographically approved
In thesis
1. Securing the Internet of Things with Security-by-Contract
Open this publication in new window or tab >>Securing the Internet of Things with Security-by-Contract
2021 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Smart homes, industry, healthcare, robotics; virtually every market has seen the uprising of Internet of Things (IoT) devices with different degrees and nuances. IoT devices embody different desirable characteristics, such as mobility, ubiquity, variety, and affordability. All combined, these features made so that IoT devices reached 35 billion units in the world. However, the sudden uprising of market demand put enormous pressure on manufacturers. The necessity of delivering to customers as many devices as possible, in the shortest time possible, leads manufacturers to overlook features that are not perceived critical by the users, such as resiliency to cyberattacks. This led to severe security issues. The prime example is Mirai, a malware that infected hundreds of thousands of IoT devices in 2016 and used them to strike lethal Distributed Denial of Service (DDoS) attacks.

In the first part of this thesis, we present the state of the art regarding IoT devices security resilience. In particular, we provide relevant examples of breaches, an analysis of the relationship between IoT and Cloud from a security point of view, and an example of an IoT device penetration test. Then, we focus on the usage of IoT devices in DDoS-enabled botnets and we provide an extensive study of DDoS-enabling malwares, discussing their evolution and their capabilities.

In the second part, we contextualise the gathered knowledge and we show that the highlighted problems stem from two main causes: insecure configurations and insufficient secure configurability.We also show that, to address these two issues, it is necessary to equip IoT devices with precise and formal descriptions of their behaviour. Therefore, we propose SC4IoT, a security framework for IoT devices that combines Security-by-Contract (SC) paradigm and Fog Computing paradigm. First, we provide a thorough breakdown of our proposal. We start from high-level lifecycles that describe how devices participate to SC4IoT. Then, we discuss the pillars that compose the framework (e.g., security contracts and security policies), together with their formal descriptions. Last, we provide precise algorithms for achieving security-policy matching capabilities, as well as routines for allowing the framework to deal with dynamic changes while maintaining consistency.

Place, publisher, year, edition, pages
Örebro: Örebro University, 2021. p. 55
Series
Örebro Studies in Technology, ISSN 1650-8580 ; 90
National Category
Computer Sciences
Identifiers
urn:nbn:se:oru:diva-88151 (URN)978-91-7529-364-6 (ISBN)
Public defence
2021-01-29, Örebro universitet, Långhuset, Hörsal L2 (and online (zoom)), Fakultetsgatan 1, Örebro, 13:00 (English)
Opponent
Supervisors
Available from: 2020-12-18 Created: 2020-12-18 Last updated: 2021-01-08Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Giaretta, AlbertoDragoni, Nicola

Search in DiVA

By author/editor
Giaretta, AlbertoDragoni, Nicola
By organisation
School of Science and Technology
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 289 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf