Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API

@inproceedings{Boeckmann2022UsableSF,
  title={Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API},
  author={Lena Boeckmann and Peter Kietzmann and Leandro Lanzieri and Thomas C. Schmidt and Matthias W{\"a}hlisch},
  booktitle={European Conference/Workshop on Wireless Sensor Networks},
  year={2022}
}
IoT devices differ widely in crypto-supporting hardware, ranging from no hardware support to powerful accelerators supporting numerous of operations including protected key storage. An operating system should provide uniform access to these heterogeneous hardware features, which is a particular challenge in the resource constrained IoT. Effective security is tied to the usability of cryptographic interfaces. A thoughtful API design is challenging, and it is beneficial to re-use such an interface… 

PUF for the Commons: Enhancing Embedded Security on the OS Level

A generic integration of physically unclonable functions (PUFs) into the IoT operating system RIOT that supports about 250 platforms is designed and analyzed, which shows that SRAM PUFs resist moderate attack scenarios, which greatly improves the security of low-end IoT devices.

References

SHOWING 1-10 OF 35 REFERENCES

Security on IoT devices with secure elements

The purpose of this paper is to introduce the concept of secure elements and provide a generic overview of their features, serving as starting point to work with secure elements.

Performance Analysis of Secure Elements for IoT

The concept of secure elements is introduced and a measurement setup for selected individual cryptographic primitives and a DTLS handshake over CoAPs in a realistic use case is provided and quantitative results for the performance of five secure elements are presented.

A Performance Study of Crypto-Hardware in the Low-end IoT

Comprehensive resource analysis for widely used cryptographic primitives across different off-the-shelf IoT platforms, and evaluations show that hardware-based crypto outperforms software by considerably over 100 %, which is crucial for nodal lifetime.

TLS-Level Security for Low Power Industrial IoT Network Infrastructures

An IIoT network system that enables a secure end-to-end IP communication between ultra-low-power sensor nodes and cloud servers is proposed that provides full TLS support to ensure perfect forward secrecy by using hardware accelerators to reduce the energy demand of the security algorithms.

Analyzing the Resource Utilization of AES Encryption on IoT Devices

This paper explores the duration and energy consumption of the Advanced Encryption Standard (AES), implemented through both software and hardware with various key and buffer size settings on two resource-constrained IoT edge devices to advance the understanding of the trade-off between IoT devices' security needs and resource consumption.

On Misconception of Hardware and Cost in IoT Security and Privacy

The first to perform a comprehensive measurement and comparison of cryptographic and networking performance of these modern IoT MCUs and modules and demonstrate that hardware and cost may not be the bottleneck of IoT security and privacy in various application domains.

Content Object Security in the Internet of Things: Challenges, Prospects, and Emerging Solutions

This paper revisits the current IoT protocol architectures and presents a comparative analysis of protocol stacks that protect request-response transactions and measures the protocol performances of CoAP over Datagram Transport Layer Security (DTLS), OSCORE, and the information-centric Named Data Networking (NDN) protocol on a large-scale IoT testbed in single- and multi-hop scenarios.

RIOT: An Open Source Operating System for Low-End Embedded Devices in the IoT

This paper provides the first comprehensive overview of RIOT, covering the key components of interest to potential developers and users: the kernel, hardware abstraction, and software modularity, both conceptually and in practice for various example configurations.

A Guideline on Pseudorandom Number Generation (PRNG) in the IoT

The generation of randomness from the perspective of an IoT operating system that needs to support general purpose or crypto-secure random numbers is revisited and a set of clear recommendations on how to build such a random subsystem and which generators to use are given.

Energy and Processing Demand Analysis of TLS Protocol in Internet of Things Applications

This paper focuses on the performance of TLS using three of the most popular and robust cipher suites, and shows that ciphers using Elliptic Curve Diffie Hellman (ECDHE) key exchange are considerably more efficient than cipher using DiffieHellman (DHE).