Arnaud Durand, Pascal Gremaud, J. Pasquier-Rocha, Urs Gerber
{"title":"Trusted Lightweight Communication for IoT Systems Using Hardware Security","authors":"Arnaud Durand, Pascal Gremaud, J. Pasquier-Rocha, Urs Gerber","doi":"10.1145/3365871.3365876","DOIUrl":null,"url":null,"abstract":"This paper explores cutting-edge techniques for protecting cryptographic keys in Internet of Things (IoT) systems based on web protocols. In this context, we evaluated the use of security hardware with application-layer encryption on top of the Constrained Application Protocol (CoAP) for communication between constrained devices and cloud middleware. More precisely, we propose to protect keys against tampering on devices with the help of a secure element and to use memory isolation techniques, such as those provided by Intel CPUs using Software Guard Extension (SGX), on middleware. If properly implemented, this enables privacy-preserving services where even the service provider is unable to decipher exchanged data. Finally, we validated this solution on constrained nodes by measuring performance and energy requirements on an ultra-low-power microcontroller connected to a commercial secure element.","PeriodicalId":350460,"journal":{"name":"Proceedings of the 9th International Conference on the Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 9th International Conference on the Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3365871.3365876","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
This paper explores cutting-edge techniques for protecting cryptographic keys in Internet of Things (IoT) systems based on web protocols. In this context, we evaluated the use of security hardware with application-layer encryption on top of the Constrained Application Protocol (CoAP) for communication between constrained devices and cloud middleware. More precisely, we propose to protect keys against tampering on devices with the help of a secure element and to use memory isolation techniques, such as those provided by Intel CPUs using Software Guard Extension (SGX), on middleware. If properly implemented, this enables privacy-preserving services where even the service provider is unable to decipher exchanged data. Finally, we validated this solution on constrained nodes by measuring performance and energy requirements on an ultra-low-power microcontroller connected to a commercial secure element.