Logo: to the web site of Uppsala University

uu.sePublications from Uppsala University
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
BLEND: Efficient and blended IoT data storage and communication with application layer security
RISE Research Institutes of Sweden,Kista,Stockholm,16440.ORCID iD: 0000-0002-9491-8183
RISE Research Institutes of Sweden,Kista,Stockholm,16440.
2022 (English)In: 2022 IEEE International Conference on Cyber Security and Resilience (CSR), p. 253-260Article in journal (Refereed) Published
Abstract [en]

Many IoT use cases demand both secure storage and secure communication. Resource-constrained devices cannot afford having one set of crypto protocols for storage and another for communication. Lightweight application layer security standards are being developed for IoT communication. Extending these protocols for secure storage can significantly reduce communication latency and local processing.We present BLEND, combining secure storage and communication by storing IoT data as pre-computed encrypted network packets. Unlike local methods, BLEND not only eliminates separate crypto for secure storage needs, but also eliminates a need for real-time crypto operations, reducing the communication latency significantly. Our evaluation shows that compared with a local solution, BLEND reduces send latency from 630 µs to 110 µs per packet. BLEND enables PKI based key management while being sufficiently lightweight for IoT. BLEND doesn’t need modifications to communication standards used when extended for secure storage, and can therefore preserve underlying protocols’ security guarantees.

Place, publisher, year, edition, pages
IEEE, 2022. p. 253-260
Keywords [en]
secure storage, communication security, application layer security, OSCORE, EDHOC, IoT
National Category
Computer and Information Sciences
Research subject
Computer Science with specialization in Computer Communication
Identifiers
URN: urn:nbn:se:uu:diva-495062DOI: 10.1109/csr54599.2022.9850290ISI: 000857435100038OAI: oai:DiVA.org:uu-495062DiVA, id: diva2:1730140
Conference
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
Funder
Swedish Foundation for Strategic ResearchVinnova, P123800021EU, Horizon 2020, 101020259EU, Horizon 2020, 830927Available from: 2023-01-23 Created: 2023-01-23 Last updated: 2023-04-28Bibliographically approved
In thesis
1. Public Key Infrastructure and its applications for resource-constrained IoT
Open this publication in new window or tab >>Public Key Infrastructure and its applications for resource-constrained IoT
2023 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The Internet of Things (IoT) is rapidly expanding and IoT devices are being deployed in security-critical scenarios, such as in critical infrastructure monitoring and within e-health, and privacy-sensitive applications in hospitals and homes. With this, questions of security and safety become paramount. The overall theme of the research presented here is to bridge some of the identified gaps in IoT security, with a particular focus on enabling Public Key Infrastructure (PKI) functionality for constrained IoT devices. The contributions of this dissertation are made through six research papers that address identified shortcomings and challenges. The focus is on protocols, mechanisms, and efficient encodings rather than specific cryptographic solutions. The work to improve the state-of-art regarding PKI for IoT includes enrollment, revocation and trust transfer. We design and implement integrated lightweight certificate enrollment solutions for IoT devices and new compact certificate formats. This brings the total communication costs of session establishment and enrollment operations down to feasible levels for constrained IoT devices. An improved design is made to benefit from application layer security, enabling end-to-end communication capable of proxy traversal. To handle revocation of trust, we propose and design lightweight certificate revocation. We show how significant performance improvements compared with existing solutions can be made without sacrificing functionality or compromising security. To address the long-time maintainability of IoT systems, we design a lightweight schema for trust transfer, which allows control of IoT deployments to shift between service providers in a highly automated manner.

In addition to improving PKI functionality, we propose mechanisms for secure storage and updates, which complement and strengthen the overall IoT security landscape. We show that standard-based application-layer security mechanisms can be extended to enable secure storage and communication, reducing the memory required for cryptographic solutions and the latency when sending sensor data onto the network. In our last contribution, we propose a design for secure software updates. Based on the existing ACE framework, we use token-based access control to fulfil the need for both authentication and authorisation security services.

We have been working with industry partners to share our work in the shape of new standards for a better potential for industrial impact. In summary, several new building blocks required to create, maintain and support secure PKIs capable of including constrained IoT devices are proposed, forming important steps towards making IoT devices first-class Internet citizens.

Place, publisher, year, edition, pages
Uppsala: Acta Universitatis Upsaliensis, 2023. p. 49
Series
Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology, ISSN 1651-6214 ; 2230
Keywords
IoT, PKI, cybersecurity, security, asymmetric cryptography, Contiki-NG
National Category
Computer and Information Sciences
Research subject
Computer Science with specialization in Computer Communication
Identifiers
urn:nbn:se:uu:diva-495320 (URN)978-91-513-1696-3 (ISBN)
Public defence
2023-03-15, Häggsalen, Ångströmlaboratoriet, Lägerhyddsvägen 1, 13:15 (English)
Opponent
Supervisors
Funder
Swedish Foundation for Strategic ResearchEU, Horizon 2020Vinnova
Available from: 2023-02-20 Created: 2023-01-25 Last updated: 2023-04-28

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records

Höglund, JoelRaza, Shahid

Search in DiVA

By author/editor
Höglund, JoelRaza, Shahid
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 39 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf