A Systemic Approach For Iot Security
A Systemic Approach For Iot Security
Arbia Riahi∗ , Yacine Challal † , Enrico Natalizio† , Zied Chtourou∗ , Abdelmadjid Bouabdallah†
∗ VRIT Lab - Military Academy of Tunisia, Nabeul, Tunisia. e-mail: [email protected], [email protected]
† Heudiasyc - Université de Technologie de Compiègne, Compiègne, France. e-mail: <firstname.lastname>@hds.utc.fr
I. I NTRODUCTION
The Internet of Things (IoT) paradigm is one of the most
thrilling innovations of the recent years. The exploitation of Figure 1. A systemic approach for IoT security
the IPv6 addressing space, along with the miniaturization of
electronic and transceiver devices opened the way to provide
each object on Earth with an Internet address and the tech- II. N ODES
nological support to transform it in a communicating object.
Once each object possesses communication capabilities, the In this Section we will present the main actors of the
number of possible applications becomes potentially infinite. systemic approach to security in IoT, introduced in [1]. It is
This good news is counterbalanced by the consideration that worth to note that the real novelty of the scheme in Figure
also the number of possible attacks to persons’ and objects’ 1 is the introduction of the “Intelligent Object” at the center
security will grow exponentially. Therefore, a new paradigm of of the interactions among Person, Process and Technological
trust, security and privacy is required to face these future issues Ecosystem. In the following we will introduce each of the
in the IoT. In [1] authors describe a systemic and cognitive mentioned actors and their functions in the scheme.
approach for IoT security. In their work, they consider three
main axes: effective security for tiny embedded networks, A. Person
context-aware and user-centric privacy, and the systemic and The first node plays a fundamental role in the IoT security
cognitive approach for IoT security. In this paper, we will framework. The human resources are responsible for security
focus on the third axis. Actually, authors affirm that the rules management, which includes:
IoT is a complex system in which people interact with
the technological ecosystem based on smart objects through • Defining security practices and rules.
complex processes [1] as shown in figure 1. In this approach,
connections between different nodes have a specific character • Auditing practices and rules efficiency.
depending on complex environment of the IoT. By taking into • Applying practices and rules when into operational
consideration the dynamic and complex nature of this model, mode.
in this work, we will present our perspective in respect of the
main elements illustrated in Figure 1 and that we will call Due to the complex environment of the IoT, this node is a vital
“nodes” and “tensions”. component in security management and enhancement. To this
purpose, the human component should be able to analyse the
In order to explain this model, we will describe each node context of IoT, individuate its advantages and limitations, and
and its functions in Section II. Then, we believe that the exploit the technology evolution to bring adequate solutions.
tensions between the different nodes need a special study and
discussion, which will be our goal in Section III. In Section
B. Process
IV we will provide the reader with the logical connections
between some classical domain of applications for the IoT and The second node refers to a means to accomplishing
the presented scheme. Finally, we will provide our conclusions tasks in the IoT environment according to some security
in Section V. requirements. The process is required to be compliant with
the security policies in order to keep the environment secure III. T ENSIONS
at different levels. Furthermore, due to the complexity of the
model and the presence of different interactions originating In the systemic and cognitive approach for IoT security of
from this node, security processes are difficult to implement. Figure 1, the nodes are the originating and destination actors
of a tension that represents their interaction, and takes into
The Federal Financial Institutions Examination Council’s consideration the complexity of the environment. Specifically,
(FFIEC) presented a first classification of standard areas to the tensions that we are going to consider are: identifica-
deal with when considering security processes: tion/authentication, trust, reliability, auto-immunity, privacy,
responsibility and safety. To better explain our systemic ap-
• Information Security Risk Assessment. proach, these tensions need to be deeply analyzed, measured
and discussed.
• Information Security Strategy.
• Security Controls Implementation. A. Identification and authentication
• Security Monitoring. “Identification and authentication” is the tension that ties
the intelligent object with the person. In the IoT context,
• Security Process Monitoring and Updating [3]. objects are spread globally. An efficient resolution scheme
needs to be set to identify different entities. Privacy and other
In practices, security process need to meet requirements of security issues must be taken into consideration as well as the
standards, strategies, policies, procedures and other afferent specific function of the object, which can change over the time.
documents. Thus, an adequate compromise must be found Furthermore, an object can have one core identity and several
between complexity of security process practices and the temporary identities; an hospital can become a meeting place
needed security level. for a health conference or a shelter after a fire [4].
A lot of research has already been proposed on this axis.
C. Intelligent Object We will limit our analysis to the presentation of some impor-
tant projects of this domain. First, we cite SENSEI (Integrating
This node is the heart of the new approach. It refers the Physical with the Digital World of the Network of the
to an “object” augmented by the electronic features needed Future) which proposes an architecture that integrates Wireless
to let it communicate with other objects in the surrounding Sensors and Actuators networks to ensure their cooperation [5].
environment. These objects will become active participants in The second project is BRIDGE (Building Radio Frequency
business, information and social processes [2]. In fact, objects IDentification for the Global Environment) which aims to
in the IoT framework will be able to cooperate, share and find and invent tools permitting the deployment of RFID
exchange information about the environment, and respond and EPCglobal Network applications [6]. Other projects can
to events happened in the environment by accomplishing be listed here, such as SmartProduct [7], SWIFT (Secure
adequate operations. Due to their expected pervasivity, the Widespread Identities for Federated Telecommunications) [8],
correct design and development of security practices within the QR-Code [9] and Digital Object Identifier [10].
conception of intelligent objects is fundamental to ensure the
right level of security to the whole environment surrounding Open research issues: In [2], many research issued have
them. been illustrated. For example, global ID schemes need to
be considered when intelligent objects and humans interact.
Also, an efficient identity management approach should be
D. Technological ecosystem defined. Mobility, privacy, pseudonimity, anonymity aspects
This node refers to technological choices made to ensure need deeper analysis and research. For example, when we limit
IoT security. According to [26], information security technol- our scope to to the RFID framework, we can easily individuate
ogy falls into several broad categories: partially studied research topics related to the definition of
distributed logical readers or the study of a RFID networks
• Security Design and Configuration where both tags and readers are mobile.
Open research issues: The main objectives of trust research In literature, two main access control models have been
in IoT framework are the following. First, the conception of developed: Role-based access control (RBAC) and Attribute-
new models for decentralized trust. Second, the implementa- based access control (ABAC). In practice, main implemen-
tion of trust mechanisms for the cloud computing. Third, the tations include XACML (Policy decision language based on
development of applications based on node trust (ex. routing, XML) and its extension known as Distributed Access Control
data aggregation, etc.). [22]. Recently a new model was proposed in [32]. The IACAC
(Identity Authentication and Capability based Access Control)
According to [12], an interesting issue is to develop a presents a new scheme for authentication and access control
theory for computational trust. In turn, this means to deal in IoT and aims at replacing the existing approaches.
with relationships between computational trust and behavioral
trust, in order to create new protocol areas, and to maintain Open research issues: The main objective of responsibility
stability trust properties. In practice, authors propose a network for IoT is to make access control rules easy to create, under-
infrastructure to manage trust concepts [12]. stand and manipulate. In this sense, a possible research issue is
the integration of the IACAC model in an identity management
On the another hand, when managing trust, aspects such as component of a RFID middleware [32]. Another direction can
topology of the objects, coverage deployment, target tracking, focus on access control rules propagation and revocation [32].
localization and IoT applications should be considered [27].
C. Privacy E. Autoimmunity
“Privacy” is the tension that ties the person with the “Autoimmunity” ties the intelligent object in self-loop. The
technological ecosystem. Privacy is an important tension in objective of this tension is to propose an artificial immune
the systemic model for IoT security because of the ubiquitous system solution for IoT. In this trend, two main research
character of the environment. Despite the existence of adequate activities can be evoked here. First, authors in [24] describe a
research activities in privacy management mechanisms in simulation and immunity test of a wireless sensor in order
general, there is still a list of objectives to be fulfilled. To to avoid electromagnetic disturbance in substation. Second,
make things clearer, in [16], authors divide privacy into three immunity-based schemes can be used to detect intrusions in
main axes: 1) Privacy in data collection, 2) Privacy in Data the IoT. For example, the authors of [23] simulate self and non-
Sharing and Management and 3) Data security issues. In the self antigen in IoT, as well as immature, mature and memory
following we will cite the most important research activities detector, to detect attacks in the IoT.
for each of these directions.
Open research issues: As a relevant open research issue
With reference to the first research axis, “privacy in data related to the autoimmunity, we propose the conception of
collection”, we can mention the cryptographic solutions and a new autoimmunity technique, where intelligent objects can
the blocking approaches detailed in [15] and [19]. For the distinguish if special access or privileges are permitted to the
second axis, we can enumerate aggregation of data collected by all or a part of the system content data, and react according to
sensors [16], the Platform for Privacy Preferences (P3P) [17], the context constraints.
semantic web [18] and other privacy-preservation mechanisms,
such as: k-anonymity, l-diversity, and t-closeness. Finally, in
the data security issues, we can name password protection F. Safety
[19] and [20], cryptographic solutions and web entities with a
semantic policy language [21]. “Safety” is the tension that ties the person with the process.
An environment permeated with intelligent objects is supposed
Open research issues: Even though a lot of research has to cope with many security challenges. One of these is ensuring
already been proposed for this tension, still many topics need safety when a sudden failure occurs for one or many system
to be further investigated. Here we can propose a list of components. Then, safety must be considered as a mean to
interesting topics. First of all, the automated key management reduce the possibility of damage.
scheme. This operation is very sensitive in the case of IoT.
It may include key provisioning, updating, revocation, trans- When considered as a research axis for the IoT, safety
porting and key agreement. Also non-cryptographic operations purposes have been widely investigated. We can list as ex-
like enrollment, backup and recovery should be addressed to amples: the CuteLoop project [28], EURIDICE (European
guarantee a high level of security. Another issue is to develop Inter-Disciplinary Research on Intelligent Cargo for Efficient,
a new scheme for asymmetric key management including safe and environment-friendly logistics)[29] and SToP (Stop
generation, validation and distribution. Tampering of Products) [30].
Table I. I OT A PPLICATION D OMAINS -T ENSION EXAMPLES
Tension / Ap-
Identification Privacy Trust Safety Responsibility Reliability Auto-immunity
plication
At the
RFID-based subscription Objects that
identification moment, a perfectly Detection, Stop techniques
Transportation Vehicles and Traffic
management of customer can accomplished analysis and in case of
and logistics consumers monitoring and
consumers, provide private their previous avoidance of intrusion
domain safety services control devices
providers and data in order to tasks in a supply anomalies detection
products benefit from chain
some advantages
Patients should Medical
Data, including institutions must
trust medical Parameters
Identification of clinical ensure the Reliability of the An object that
Health-care institutions in setting of
staff and diagnosis and patient safety link in case of provides alert in
domain terms of health-care
patients treatment, must during remote diagnosis case of accident
reliability and objects
be kept private health-care
privacy
activities
A trainer that For the
Financial details continuity of
assign the
Identification of of a given services
Newly bought adequate Disaster
Smart the employees project Control devices assurance, an
objects exercise prediction and
environment in the same (domestic or for personal electric power
belonging to the according to the alerting
domain enterprise professional) environment supply reliability
same owner health
should be should be
parameters of
confidential guaranteed
the trainee