Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2840819.2840869acmconferencesArticle/Chapter ViewAbstractPublication PagesiccadConference Proceedingsconference-collections
tutorial

Protecting Endpoint Devices in IoT Supply Chain

Published: 02 November 2015 Publication History

Abstract

The Internet of Things (IoT), an emerging global network of uniquely identifiable embedded computing devices within the existing Internet infrastructure, is transforming how we live and work by increasing the connectedness of people and things on a scale that was once unimaginable. In addition to increased communication efficiency between connected objects, the IoT also brings new security and privacy challenges. Comprehensive measures that enable IoT device authentication and secure access control need to be established. Existing hardware, software, and network protection methods, however, are designed against fraction of real security issues and lack the capability to trace the provenance and history information of IoT devices. To mitigate this shortcoming, we propose an RFID-enabled solution that aims at protecting endpoint devices in IoT supply chain. We take advantage of the connection between RFID tag and control chip in an IoT device to enable data transfer from tag memory to centralized database for authentication once deployed. Finally, we evaluate the security of our proposed scheme against various attacks.

References

[1]
Carnegie Mellon University. The "Only" Coke Machine on the Internet, 1982.
[2]
Dave Evans. The Internet of Things: How the Next Evolution of the Internet Is Changing Everything. CISCO white paper, 1, 2011.
[3]
Tobias Zillner and Sebastian Strobl. ZigBee Exploited - The good, the bad and the ugly. In Black Hat USA 2015, 2015.
[4]
Proofpoint. Proofpoint Uncovers Internet of Things (IoT) Cyberattack, Jan 2014.
[5]
Eduard Kovacs. Attackers Use Stolen Credentials to Hack Cisco Networking Devices, August 2015.
[6]
Joan Daemen and Vincent Rijmen. The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, 2013.
[7]
Hugo Krawczyk, Ran Canetti, and Mihir Bellare. HMAC: Keyed-hashing for message authentication. 1997.
[8]
Ling Hu and Cyrus Shahabi. Privacy assurance in mobile sensing networks: go beyond trusted servers. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2010 8th IEEE International Conference on, pages 613--619. IEEE, 2010.
[9]
Steven Shannon. Access control of networked data, May 15 2001. US Patent 6,233,618.
[10]
Mohammad Tehranipoor and Farinaz Koushanfar. A survey of hardware trojan taxonomy and detection. 2010.
[11]
Ujjwal Guin, Xuehui Zhang, Domenic Forte, and Mohammad Tehranipoor. Low-cost On-Chip Structures for Combating Die and IC Recycling. In Proceedings of the 51st Annual Design Automation Conference, pages 1--6. ACM, 2014.
[12]
Kerry Bernstein. Supply Chain Hardware Integrity for Electronics Defense (SHIELD), March 2014.
[13]
Donald G Robinson, Michael W Geatz, and Michael J Corcoran. Retail theft prevention and information device, December 31 1996. US Patent 5,589,820.
[14]
Yuval Ishai, Manoj Prabhakaran, Amit Sahai, and David Wagner. Private circuits II: Keeping secrets in tamperable circuits. In Advances in Cryptology-EUROCRYPT 2006, pages 308--327. Springer, 2006.
[15]
Kun Yang, Domenic Forte, and Mark Tehranipoor. ReSC: RFID-enabled Supply Chain Management and Traceability for Network Devices. In The 11th Workshop on RFID Security, 2015.
[16]
G Edward Suh and Srinivas Devadas. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 44th annual Design Automation Conference, pages 9--14. ACM, 2007.
[17]
Daniel E Holcomb, Wayne P Burleson, and Kevin Fu. Power-up SRAM State as an Identifying Fingerprint and Source of True Random Numbers. Computers, IEEE Transactions on, 58(9):1198--1210, 2009.
[18]
Berk Sunar, William J Martin, and Douglas R Stinson. A provably secure true random number generator with built-in tolerance to active attacks. Computers, IEEE Transactions on, 56(1):109--119, 2007.
[19]
David Zanetti, Leo Fellmann, and Srdjan Capkun. Privacy-preserving clone detection for RFID-enabled supply chains. In RFID, 2010 IEEE International Conference on, pages 37--44. IEEE, 2010.
[20]
Davide Zanetti, Srdjan Capkun, and Ari Juels. Tailing RFID Tags for Clone Detection. In NDSS, 2013.
[21]
ZigBee Alliance. ZigBee Specification, January 2008.
[22]
Ujjwal Guin, Domenic Forte, and Mohammad Tehranipoor. Anti-counterfeit techniques: from design to resign. In Microprocessor Test and Verification (MTV), 2013 14th International Workshop on, pages 89--94. IEEE, 2013.
[23]
Department of Justice. Departments of Justice and Homeland Security Announce 30 Convictions, More Than $143 Million in Seizures from Initiative Targeting Traffickers in Counterfeit Network Hardware, May 2010. http://www.justice.gov/opa/pr/departments-justice-and-homeland-security-announce-30-convictions-more-143-million-seizures.
[24]
FreightWatch International Supply Chain Intelligence Center. 2013 Global Cargo Theft Threat Assessment, 2013.
[25]
John R. Ellement. Three men face charges in $1m computer parts theft ring. The Boston Globe, 2014.
[26]
Ravi S Sandhu and Pierangela Samarati. Access control: principle and practice. Communications Magazine, IEEE, 32(9):40--48, 1994.
[27]
EPCglobal Inc. EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz--960 MHz Version 1.2.0, May 2008.
[28]
Tim Dierks. The Transport Layer Security (TLS) Protocol Version 1.2. 2008.
[29]
Network Working Group. Security Architecture for the Internet Protocol. 2005.
[30]
Jonny Milliken, Valerio Selis, and Alan Marshall. Detection and analysis of the Chameleon WiFi access point virus. EURASIP Journal on Information Security, 2013(1):1--14, 2013.
[31]
Grant Hernandez, Orlando Arias, Daniel Buentello, and Yier Jin. Smart nest thermostat: A smart spy in your home. Black Hat USA, 2014.
[32]
Ravi S Sandhu, Edward J Coyne, Hal L Feinstein, and Charles E Youman. Role-based access control models. Computer, (2):38--47, 1996.
[33]
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers. The SIMON and SPECK Families of Lightweight Block Ciphers. IACR Cryptology ePrint Archive, 2013:404, 2013.
[34]
Kun Yang, Domenic Forte, and Mark Tehranipoor. An RFID-based Technology for Electronic Component and System Counterfeit Detection and Traceability. In Technologies for Homeland Security, 2015 IEEE International Symposium on, 2015.
[35]
NXP Semiconductors. I2C Bus Specification and User Manual, Apr. 2014.
[36]
Christopher Holmes. Designing and Implementing the Factory of the Future at Mahindra Vehicle Manufacturers, April 2015.
[37]
Cisco. How Cisco Transformed Its Supply Chain, May 2014.
[38]
Shafi Goldwasser, Silvio Micali, and Ronald L Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-message Attacks. SIAM Journal on Computing, 17(2):281--308, 1988.

Cited By

View all
  • (2018)UCRACM Transactions on Design Automation of Electronic Systems10.1145/326465823:6(1-24)Online publication date: 28-Nov-2018
  • (2018)Programmable Gates Using Hybrid CMOS-STT Design to Prevent IC Reverse EngineeringACM Transactions on Design Automation of Electronic Systems10.1145/323662223:6(1-21)Online publication date: 21-Dec-2018
  • (2018)Automation Testing and Monitoring Lab on the Cloud for IOT Smart Fleet System (ATML & SFS)Proceedings of the Fourth International Conference on Engineering & MIS 201810.1145/3234698.3234740(1-7)Online publication date: 19-Jun-2018

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICCAD '15: Proceedings of the IEEE/ACM International Conference on Computer-Aided Design
November 2015
955 pages
ISBN:9781467383899
  • General Chair:
  • Diana Marculescu,
  • Program Chair:
  • Frank Liu

Sponsors

Publisher

IEEE Press

Publication History

Published: 02 November 2015

Check for updates

Author Tags

  1. Authentication
  2. Endpoint Device
  3. Internet of Things (IoT)
  4. Supply Chain Security
  5. Traceability

Qualifiers

  • Tutorial
  • Research
  • Refereed limited

Conference

ICCAD '15
Sponsor:

Acceptance Rates

Overall Acceptance Rate 457 of 1,762 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 14 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)UCRACM Transactions on Design Automation of Electronic Systems10.1145/326465823:6(1-24)Online publication date: 28-Nov-2018
  • (2018)Programmable Gates Using Hybrid CMOS-STT Design to Prevent IC Reverse EngineeringACM Transactions on Design Automation of Electronic Systems10.1145/323662223:6(1-21)Online publication date: 21-Dec-2018
  • (2018)Automation Testing and Monitoring Lab on the Cloud for IOT Smart Fleet System (ATML & SFS)Proceedings of the Fourth International Conference on Engineering & MIS 201810.1145/3234698.3234740(1-7)Online publication date: 19-Jun-2018

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media