SPEED: Secure Provable Erasure for Class-1 IoT Devices

被引:17
作者
Ammar, Mahmoud [1 ]
Daniels, Wilfried [1 ]
Crispo, Bruno [1 ,2 ]
Hughes, Danny [1 ]
机构
[1] Katholieke Univ Leuven, Imec DistriNet, Leuven, Belgium
[2] Univ Trento, Trento, Italy
来源
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18) | 2018年
关键词
D O I
10.1145/3176258.3176337
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) consists of embedded devices that sense and manage our environment in a growing range of applications. Large-scale IoT systems such as smart cities require significant investment in both equipment and personnel. To maximize return on investment, IoT platforms should support multiple third-party applications and adaptation of infrastructure over time. Realizing the vision of shared IoT platforms demands strong security guarantees. That is particularly challenging considering the limited capability and resource constraints of many IoT devices. In this paper, we present SPEED, an approach to secure erasure with verifiability in IoT. Secure erasure is a fundamental property when it comes to share an IoT platform with other users which guarantees the cleanness of a device's memory at the beginning of the application deployment as well as at the time of releasing the underlying IoT device. SPEED relies on two security primitives: memory isolation and distance bounding protocol. We evaluate the performance of SPEED by implementing it on a simple bare-metal IoT device belongs to Class-1. Our evaluation results show a limited overhead in terms of memory footprint, time, and energy consumption.
引用
收藏
页码:111 / 118
页数:8
相关论文
共 21 条
[1]  
Abera Tigist., 2016, P 53 ANN DESIGN AUTO, P121
[2]  
Adler S., 2012, Proceedings of the 2012 9th Workshop on Positioning, Navigation and Communication (WPNC), P114, DOI 10.1109/WPNC.2012.6268749
[3]  
Ahmad M, 2017, IEEE INT CONF COMM, P308, DOI 10.1109/ICCW.2017.7962675
[4]  
[Anonymous], TECHNICAL REPORT
[5]  
[Anonymous], P 14 ACM S OP SYST P
[6]  
Atmel, 2009, AVR ATM 1284P 8 BIT
[7]  
Avoine G, 2017, COMPUT SURVEYS
[8]  
Bormann C., 2014, RFC 7228: Terminology for Constrained-Node Networks
[9]  
Brands S., 1993, LECT NOTES COMPUTER, P344, DOI [DOI 10.1007/3-540-48285-7_30, 10.1007/3-540-48285-7_30]
[10]  
Desmedt Y., 1988, SECURICOM, V88, P15