CST - 433 - PSI - Controls - Built - intoIOTand - IoT Node Authentication - 01
CST - 433 - PSI - Controls - Built - intoIOTand - IoT Node Authentication - 01
AIT-CSE
Privacy and Security in IoT - CSD- 433
Unit 2-CRYPTOGRAPHIC FUNDAMENTALS FOR IOT
Topic- KDC_Continued
Cryptographic controls for IoT protocols, IoT Node Authentication
Lecture - 19
Delivered by
Er. Gaurav Soni (E9610)
Assistant Professor, AIT-CSE
2
Privacy and
Security in
IoT
Course Outcome This will be covered in this
lecture
CO Title Level
Number
3
Key Hierarchy
• typically have a hierarchy of keys
• session key
• temporary key
• used for encryption of data between users
• for one logical session then discarded
• master key
• used to encrypt session keys
• shared by user & key distribution center
Cryptographic controls for IoT
Protocols
• To integrate cryptographic controls as integrated into various IoT protocols.
• Lacking these controls, IoT point-to-point and end-to-end communications
would be impossible to secure.
• There are many options for establishing communication capabilities for IoT
devices and often these communication protocols provide a layer of
authentication and encryption that should be applied at the link layer.
• IoT communication protocols such as ZigBee, ZWave, and Bluetooth-LE all
have configuration options for applying authentication, data integrity, and
confidentiality protections.
Cryptographic controls for IoT
Protocol-Zigbee
• ZigBee relies upon three types of keys for security features:
• Master keys, which are pre-installed by the vendor and used to protect a key
exchange transaction between two ZigBee nodes
• Link keys, which are unique keys per node, allowing secure node-to-node
communications
• Network keys, which are shared across all ZigBee nodes in a network and
provisioned by the ZigBee trust center; these support secure broadcast
communications
Cryptographic controls for IoT protocol-
BLUETOOTH-LE
• BLUETOOTH-LE
• Bluetooth-LE is based on the Bluetooth Core Specification Version (4.2) and
specifies a number of modes that provide options for authenticated or
unauthenticated pairing, data integrity protections, and link encryption.
Specifically, Bluetooth-LE supports the following security-
• Pairing: Devices create one or more shared secret keys
• Bonding: The act of storing the keys created during pairing for use in
subsequent connections; this forms a trusted device pair
• Device authentication: Verification that the paired devices have trusted keys
• Encryption: Scrambling of plaintext message data into ciphertext data
• Message integrity: Protects against tampering with data
Cryptographic controls for IoT protocol-
BLUETOOTH-LE
Secure boot: It is a process involving cryptography that allows an electronic device to start executing
authenticated and trusted software to operate.
Access control: The access control should be well designed to mandatory different forms of resources
and roles in IoT.
Existing PKC schemes verify the integrity and authenticity of digital contents.
The digital signature provides the two fundamental characteristics to make sure the digital content is
trusted by other entity.
1. Integrity of digital content is guaranteed by message digest, that is, a secure hash algorithm (SHA-1,
SHA-256, SHA-3, etc.).
2. The authenticity of digital content is guaranteed by the public-key-based signature scheme itself.
3. Hash. Hashing the digital content and producing a hash value with the properties.
IoT Node Authentication
• The basic goals of an authenticated authorization protocol in IoT include:
• Secure exchange of authorization information
• Use only symmetric key cryptography on constrained nodes
• Support of class-1 devices
• RESTful architectural style
• Relieve constrained nodes from managing authentication and authorization
• Authentication: Verify that an entity has certain attributes (cf. RFC4949).
• Authorization: Grant permission to an entity to access an item of interest.
• Authenticated Authorization: Use the verified attributes to determine if an
entity is authorized.
IoT Node Authentication
• Protocols in IoT.
• Communication in IoT-constrained environment
• CoAP (RFC 7252), which is designed for special requirements of constrained
environments like IoT and similar to HTTP with RESTful architecture style
• DTLS binding
• User controls the device and data through authorization
Protocols in IoT
• Protocols that have been developed at different layers of IoT, including messaging
protocols at application layer, such as CoAP, routing protocols (such as the routing
protocol for low power and lossy network, RPL).
• In this protocol, the IPv6 is one of the most important enablers in the IoT environment
that supports the possibility to connect billions of smart objectives together.
Datagram Transport Layer Security
•In the Internet, the TLS is a prominent IP-based security protocol
which is widely used
•It provides protection over transparent connection-orient channel
against security attacks, such as eavesdropping, tampering, or
message forgery.
• In web applications, the TLS is widely used for web protocols,
such as HTTP and TCP.
structure of DTLS
Further Reading
For queries
Email: [email protected]