Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API

Lena Boeckmann, Peter Kietzmann, Leandro Lanzieri, T. Schmidt, Matthias Wählisch
{"title":"Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API","authors":"Lena Boeckmann, Peter Kietzmann, Leandro Lanzieri, T. Schmidt, Matthias Wählisch","doi":"10.48550/arXiv.2208.09281","DOIUrl":null,"url":null,"abstract":"IoT devices differ widely in crypto-supporting hardware, ranging from no hardware support to powerful accelerators supporting numerous of operations including protected key storage. An operating system should provide uniform access to these heterogeneous hardware features, which is a particular challenge in the resource constrained IoT. Effective security is tied to the usability of cryptographic interfaces. A thoughtful API design is challenging, and it is beneficial to re-use such an interface and to share the knowledge of programming embedded security widely. In this paper, we integrate an emerging cryptographic interface into usable system-level calls for the IoT operating system RIOT, which runs on more than 240 platforms. This interface supports ID-based key handling to access key material in protected storage without exposing it to anyone. Our design foresees hardware acceleration on all available variants; our implementation integrates diverse cryptographic hardware and software backends via the uniform interface. Our performance measurements show that the overhead of the uniform API with integrated key management is negligible compared to the individual crypto operation. Our approach enhances the usability, portability, and flexibility of cryptographic support in the IoT.","PeriodicalId":443547,"journal":{"name":"European Conference/Workshop on Wireless Sensor Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Conference/Workshop on Wireless Sensor Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.48550/arXiv.2208.09281","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

IoT devices differ widely in crypto-supporting hardware, ranging from no hardware support to powerful accelerators supporting numerous of operations including protected key storage. An operating system should provide uniform access to these heterogeneous hardware features, which is a particular challenge in the resource constrained IoT. Effective security is tied to the usability of cryptographic interfaces. A thoughtful API design is challenging, and it is beneficial to re-use such an interface and to share the knowledge of programming embedded security widely. In this paper, we integrate an emerging cryptographic interface into usable system-level calls for the IoT operating system RIOT, which runs on more than 240 platforms. This interface supports ID-based key handling to access key material in protected storage without exposing it to anyone. Our design foresees hardware acceleration on all available variants; our implementation integrates diverse cryptographic hardware and software backends via the uniform interface. Our performance measurements show that the overhead of the uniform API with integrated key management is negligible compared to the individual crypto operation. Our approach enhances the usability, portability, and flexibility of cryptographic support in the IoT.
物联网操作系统的可用安全性:在通用API下集成大量嵌入式加密组件
物联网设备在支持加密的硬件方面存在很大差异,从没有硬件支持到支持包括受保护密钥存储在内的众多操作的强大加速器。操作系统应该提供对这些异构硬件功能的统一访问,这在资源受限的物联网中是一个特别的挑战。有效的安全性与加密接口的可用性有关。一个深思熟虑的API设计是具有挑战性的,重用这样的接口和广泛分享编程嵌入式安全的知识是有益的。在本文中,我们将一个新兴的加密接口集成到物联网操作系统RIOT的可用系统级调用中,该系统运行在240多个平台上。该接口支持基于id的密钥处理,以访问受保护存储中的密钥材料,而不会将其暴露给任何人。我们的设计预见硬件加速所有可用的变体;我们的实现通过统一接口集成了不同的加密硬件和软件后端。我们的性能测量表明,与单独的加密操作相比,集成密钥管理的统一API的开销可以忽略不计。我们的方法增强了物联网中加密支持的可用性、可移植性和灵活性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信