Module 5
Module 5
• Protect sensitive information. Install unique default passwords for each product
or require immediate password updates on the first use of a device.
• Apply robust authentication to ensure that only valid users have access to data.
To go the extra mile for better privacy protection,
• Implement a reset mechanism to allow the deletion of sensitive data and
clearing of configuration settings if the user decides to return or resell the
product.
• Collect only necessary data. Ensure that your IoT product collects only data
necessary for its operation. This will reduce the risk of data leakage, protect
consumers’ privacy, and eliminate risks of non-compliance with various data
protection regulations, standards, and laws.
• Moreover, use encryption methods optimized to the needs of IoT systems, such
as the Advanced Encryption Standard, Triple DES, RSA, and Digital Signature
Algorithm.
Access control
IoT Access control System
• Access control is a system that allows an authority to control access to zones and resources of a given
installation.
• It ensures confidentiality in such a way as to ensure that information is only accessible to those authorized
Mandatory Access Control (MAC) model the administrator of the system give permissions for subject to
access object. The model assigns security labels to subjects and objects, and it is independent of the user
operations, only the administrator can modify object security labels. MAC models are difficult and
expensive to implement and maintain, its usage is usually limited to military applications, and this is why
MAC models are not used as access control system.
In the Discretionary Access Control (DAC) models :the access to resources is maintained by users, which
can
grant permissions to their resources by being included in Access Control Lists (ACL). Each entry in the
access
control list gives users (or group of subjects) permissions to access resources. The permissions are usually
stored by objects. Unlike in MAC, where permissions are given in predefined policies by the
administrator, in DAC,
permissions are given by users which decide the access rights to the resources they belong. DAC is adopted by
current operation systems based on UNIX, FreeBSD, and Windows.
Role-Based Access Control (RBAC) model3 : users are
assigned to roles, and the security policies
grant rights to roles rather than to users. Since the users are
associated to roles. RBAC allows creating hierarchies of
permissions and inheritance. Nonetheless, RBAC has some
problems since the administrative issues of large
systems where memberships make administration potentially
cumbersome.
Centralized approach
❖ In a centralized approach6,7 , all access control logic is externalized into a central entity responsible for filtering access requests based
on their authorization policies. The end devices (sensors …) play a limited role as information providers.
❖ This centralized approach does not take into consideration constraints of resources, because the access control logic is located in an
entity without constraints of resources.
❖ This approach is expressed by a scenario where a server receives a request from the mobile user who wants to access the end-device,
so it generates a token containing the authorization or the refusal and sends it to the mobile user.
❖ However, this approach has major problems. Firstly, the end-device is not taken into consideration in access control decisions.
Secondly, the access control logic is located in one entity, so any vulnerability might compromise all the system because it becomes
a single point of failure.
Distributed approach
In the distributed architectures6 , the end-device is a smart thing that is enable to obtain
process and send information to other services and devices.
The devices are able to take authorizations decisions without the need of central entities.
Light weight cryptography
Light weight cryptography
Reference: Towards Light Weight Cryptography Schemes for Resource Constraint Devices in IoT
Symmetric encryption
❖ Symmetric encryption uses the same key for both encryption and decryption of data. This
method of encryption is secure and relatively faster.
❖ The major drawback of symmetric key encryption is the sharing of the key between the two
communicating parties. An attacker can decrypt the data if he has access to the key.
❖ Symmetric key algorithms assure the confidentiality and integrity of data but do not guarantee
authentication.
❖ This type of encryption uses three types of algorithms based on hashing, stream and block
ciphers.
Asymmetric encryption
❖ Asymmetric cryptography is a cryptographic system that utilizes two types of keys; public keys that may be distributed widely
and private keys which are known only to the owner.
❖ The generation of the public keys depends on cryptographic algorithms based on one way mathematical functions.
❖ Thus the public key can be openly distributed without compromising security as for achieving effective of security the
requirement is keeping the private key private [35].
❖ In such this type of systems, any person can encrypt a message using the receiver’s public key, but the encrypted message can
only be decrypted with the receiver’s private key.
❖ Asymmetric lightweight cryptography algorithms are highly recommended for devices with resource limitations.
Reference: Towards Light Weight Cryptography Schemes for Resource Constraint Devices in IoT
Thank you