2

Click here to load reader

Two Perspectives on IoT Security - · PDF fileTitle: Two Perspectives on IoT Security Author: Grace Lewis Subject: Poster on a project called Authentication and Authorization for IoT

Embed Size (px)

Citation preview

Page 1: Two Perspectives on IoT Security - · PDF fileTitle: Two Perspectives on IoT Security Author: Grace Lewis Subject: Poster on a project called Authentication and Authorization for IoT

Alternative technologies that use less resourcesHTTP CoAPJSON CBORJOSE COSE

(1) Token Request

(3) Token Request

(4) Protected Resource

(2) Access Token+ Client Information

AuthorizationServer (AS)

Client (C)

IoT Device(ResourceServer (RS))

Eliminates need for consistent online access to an authorization server through self-contained, proof-of-possession tokens associated to cryptographic keys

Tokens have expiration times

Evaluation, adaptation, and implementation of an IETF proposal for authentication and authorization in constrained environments (ACE) to enable future integration of ACE-compliant IoT devices into DoD systems

Goal:

Develop a solution for authorization and authentication of IoT devices that• addresses high-priority threats of tactical

edge environments,• operates in DIL environments, and• considers resource constraints

of IoT devices

Tactical Edge System

ACE Extensions to OAuth 2.0

ACE (Authentication and Authorization in Constrained Environments)

• IETF proposal in Working Group Status—next step is Proposed Standard• Extends OAuth 2.0 to IoT devices• Addresses some of the challenges of tactical environments

Threat modeling identified the following gaps in ACE.

Gaps Solution

Two Perspectives on IoT Security“IoT Security Standards” and “Software-Defined Networking for IoT Security”

Grace Lewis | [email protected]

FY17: Authentication and Authorization for IoT Devices in Edge Environments FY18: High-Assurance Software-Defined IoT Security

Dynamic deployment of network defenses based on composite state analysis of all controlled IoT devices

Enterprise Cloud

Edge Servers

Mobile Devices

IoT Devices

IoT Controller

Gateway

Data Node

Control Node

{EV1} {EV2} ... {EVn}

SS1 SS2 ... SSn

μmboximages

Policies

SS=(Normal, Suspicious, Attack) Alert

Deploy μmbox

Router

4

State 1:D1 μmbox = FirewallD1 μmbox = IPS, ...

2

{EV1}

D1

{EV2}

D2

{EVn}

Dn

μmbox [State1]

μmbox [State1]

μmbox [State1]

3

Each IoT Device D senses/controls a set of environmental variables EV

Dev

ice

Nod

e

1

...

...

Changes in the shared statespace are evaluated by policies and may result in the deployment of new μmbox(es)

IoT Controller maintains a shared statespace composed of {EV} and security state (SS) for each device

Network traffic to/from each device is tunneled through μmboxes that implement the desired network defense for the current system state

Bootstrapping of credentials is considered out-of-scope

Assumption of short periods of disconnection

On-demand token revocation

Pairing mechanism for IoT devices that involves the use of QR codes as an out-of-band channel for exchanging initial encryption keys between IoT devices and the Authorization Server (AS)

Integration with delay-tolerant mechanisms and opportunistic routing for clients and IoT devices to reach AS

Periodic introspection between IoT devices and the AS, and clients and the AS

Periodic Introspection

if (introspection interval reached) for each token t in token list

r = send_introspection_message(t) if (r == “Invalid”) delete_token(t)

end for reset introspection intervalend if

ClientAuthorization

Server

Research Review 2017

Page 2: Two Perspectives on IoT Security - · PDF fileTitle: Two Perspectives on IoT Security Author: Grace Lewis Subject: Poster on a project called Authentication and Authorization for IoT

Copyright 2017 Carnegie Mellon University. All Rights Reserved.

This material is based upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center.

The view, opinions, and/or findings contained in this material are those of the author(s) and should not be construed as an official Government position, policy, or decision, unless designated by other documentation.

NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution.

Internal use:* Permission to reproduce this material and to prepare derivative works from this material for internal use is granted, provided the copyright and “No Warranty” statements are included with all reproductions and derivative works.External use:* This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other external and/or commercial use. Requests for permission should be directed to the Software Engineering Institute at [email protected].

* These restrictions do not apply to U.S. government entities.

Carnegie Mellon® is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.

DM17-0735Two Perspectives on IoT Security