{"title":"Access Control for Apps Running on Constrained Devices in the Internet of Things","authors":"Andrei Mituca, Amir H. Moin, C. Prehofer","doi":"10.1109/SIoT.2014.11","DOIUrl":"https://doi.org/10.1109/SIoT.2014.11","url":null,"abstract":"The increasing interest in applications for the Internet of Things (IoT) has led to the widespread use of efficient but limited operating systems like Contiki OS. Applications running on constrained devices in the IoT should only be able to access those resources which are specified by the user. While on mobile platforms such as the Google Android and the Apple iOS various access control mechanisms are in use, on IoT platforms such as Contiki OS this is not yet provided. In this paper, we explain a number of existing approaches in the mobile ecosystem and mention the research challenges for applying those approaches to one of the well-known operating systems in the IoT ecosystem, i.e., Contiki OS. The main problem is that operating systems for constrained devices in the IoT are quite limited and do not provide any memory protection or virtualization support. As the main contribution, we propose our novel approach for providing fine-grained access controls in Contiki OS under these constraints.","PeriodicalId":301460,"journal":{"name":"2014 International Workshop on Secure Internet of Things","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127128277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat-Based Security Analysis for the Internet of Things","authors":"Ahmad Atamli-Reineh, Andrew P. Martin","doi":"10.1109/SIOT.2014.10","DOIUrl":"https://doi.org/10.1109/SIOT.2014.10","url":null,"abstract":"The Internet of Things (IoT) is an emerging paradigm focusing on the inter-connection of things or devices to each other and to the users. This technology is anticipated to become an integral milestone in the development of smart homes and smart cities. For any technology to be successful and achieve widespread use, it needs to gain the trust of users by providing adequate security and privacy assurance. Despite the growing interest of the research community in IoT, and the emergence of several surveys and papers addressing its architecture and its elements, we are still lacking a thorough analysis of the security and privacy properties that are required for a system where the constituent devices vary in their capabilities. In this paper we provide a threat model based on use-cases of IoT, which can be used to determine where efforts should be invested in order to secure these systems. We conclude by recommending measures that will help in providing security and assuring privacy when using IoT.","PeriodicalId":301460,"journal":{"name":"2014 International Workshop on Secure Internet of Things","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126115472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian T. Zenger, Markus-Julian Chur, Jan-Felix Posielek, C. Paar, G. Wunder
{"title":"A Novel Key Generating Architecture for Wireless Low-Resource Devices","authors":"Christian T. Zenger, Markus-Julian Chur, Jan-Felix Posielek, C. Paar, G. Wunder","doi":"10.1109/siot.2014.7","DOIUrl":"https://doi.org/10.1109/siot.2014.7","url":null,"abstract":"Secret key establishment based on parameters of the communication channel is a highly attractive option for many applications that operate in a dynamic mobile environment with peer-to-peer association. On the other hand, high usability and dynamic key management are still very difficult to achieve for wireless devices which have to operate under strict resource constraints. In fact, most previously reported key generation methods cannot operate in such environment.In this work, we present a new system architecture which is suitable also for resource-constrained platforms. Our design strongly focuses on security, rather than a robust key generation rate, as well as on low complexity and efficiency. Our approach has the potential to dramatically reduce the cost of securing small embedded devices for the Internet of Things, and hence make mass production and deployment viable.","PeriodicalId":301460,"journal":{"name":"2014 International Workshop on Secure Internet of Things","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115732976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Rosner, R. Tataroiu, L. Gheorghe, Razvan Tilimpea
{"title":"UNCHAIN - Ubiquitous Wireless Network Communication Architecture for Ambient Intelligence and Health Scenarios","authors":"D. Rosner, R. Tataroiu, L. Gheorghe, Razvan Tilimpea","doi":"10.1109/SIoT.2014.12","DOIUrl":"https://doi.org/10.1109/SIoT.2014.12","url":null,"abstract":"Ambient intelligence techniques and smart Internet of Things objects are empowering healthcare professionals to provide better services based on improved vital signs data enriched with contextual information. In this paper, we provide an overview of current solutions and propose a new taxonomy for ambient and health sensor data, based on three selected metrics. The proposed UNCHAIN architecture provides a ubiquitous communication system designed to grant seamless integration of current sensor solutions, and to maximize two identified limitations: range and autonomy. Finally, the proposed architecture is validated through a hardware implementation, with impressive results in terms of energy efficiency.","PeriodicalId":301460,"journal":{"name":"2014 International Workshop on Secure Internet of Things","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121213887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Cărăbaş, Lucian Mogosanu, Răzvan Deaconescu, L. Gheorghe, N. Tapus
{"title":"Lightweight Display Virtualization For Mobile Devices","authors":"M. Cărăbaş, Lucian Mogosanu, Răzvan Deaconescu, L. Gheorghe, N. Tapus","doi":"10.1109/SIoT.2014.9","DOIUrl":"https://doi.org/10.1109/SIoT.2014.9","url":null,"abstract":"Recent years have witnessed a constant evolution of mobile systems, from hardware improvements such as multi-core CPUs and virtualization extensions, to a rise in software complexity, including application stores that are the home for millions of mobile applications. This enables and encourages the rising trend of mobile virtualization. In this paper we present an approach for providing lightweight and fast display virtualization for mobile devices, allowing multiple operating systems to share the same physical display screen. We describe a design that provides the means to perform efficient display virtualization, making use of the concept of overlays implemented in recent underlying mobile display subsystems. We demonstrate our approach on a dual Android setup: two operating systems running simultaneously on the same mobile device, using our display virtualization framework.","PeriodicalId":301460,"journal":{"name":"2014 International Workshop on Secure Internet of Things","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125171243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Federated Identity and Access Management for the Internet of Things","authors":"Paul Fremantle, B. Aziz, J. Kopecký, P. Scott","doi":"10.1109/SIoT.2014.8","DOIUrl":"https://doi.org/10.1109/SIoT.2014.8","url":null,"abstract":"We examine the use of Federated Identity and Access Management (FIAM) approaches for the Internet of Things (IoT). We look at specific challenges that devices, sensors and actuators have, and look for approaches to address them. OAuth is a widely deployed protocol -- built on top of HTTP -- for applying FIAM to Web systems. We explore the use of OAuth for IoT systems that instead use the lightweight MQTT 3.1 protocol. In order to evaluate this area, we built a prototype that uses OAuth 2.0 to enable access control to information distributed via MQTT. We evaluate the results of this prototyping activity, and assess the strengths and weaknesses of this approach, and the benefits of using the FIAM approaches with IoT and Machine to Machine (M2M) scenarios. Finally we outline areas for further research.","PeriodicalId":301460,"journal":{"name":"2014 International Workshop on Secure Internet of Things","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116547926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}