DOI QR코드

DOI QR Code

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements

IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석

  • Received : 2018.02.26
  • Accepted : 2018.04.15
  • Published : 2018.07.31

Abstract

With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

IoT 기술의 급격한 발전으로 스마트홈이나 스마트 시티와 같은 다양한 편리한 서비스들이 실현되었다. 그러나 무인 환경에서의 IoT 기기는 도청 및 데이터 위조, 무단 액세스로 인한 정보 누출 등 다양한 보안 위협에 노출되어 있다. 안전한 IoT 환경을 구축하려면 IoT 기기에 적절한 암호화 기술을 사용해야 한다. 그러나 IoT 기기의 제한된 자원으로 인해 기존 IT 환경에 적용된 암호화 기술을 그대로 적용하는 것은 불가능하다. 본 논문에서는 성능에 따라 IoT 디바이스의 분류를 조사하고 IoT 디바이스의 보안 요구 사항을 분석한다. 또한 AllJoyn, oneM2M, IoTivity와 같은 IoT 개방형 표준 플랫폼의 현재 암호화 기술의 사용 현황을 조사하고 분석한다. 암호화 기술 사용 현황에 대한 연구를 기반으로 각 플랫폼이 보안 요구사항을 만족하는지 확인한다. 각 IoT 개방형 플랫폼은 기밀성, 무결성, 인증 및 인증과 같은 보안 서비스를 지원하기위한 암호화 기술을 제공한다. 하지만 혈압 모니터링 센서와 같은 자원이 제한된 IoT 장치는 기존의 암호화 기법을 적용하기가 어렵다. 따라서 무인 환경에서 전력 제한 및 자원 제약을 받는 IoT 장치에 대한 암호화 기술을 연구 할 필요가 있다.

Keywords

References

  1. Machina research report, https://machinaresearch.com/
  2. IoT Small Smart Home Appliance Security Guide, The Korea Internet & Security Agency(KISA), 2016.12.
  3. Jeong-Yong Eom, "Security technology for Home IoT / connected appliances," The Journal of The Korean Institute of Communication Sciences, Vol.34, No.10, pp.10-16, 2017.
  4. Gartner, "Predicts 2016: Security for the Internet of Things."
  5. IoT Security Survey Results (SANS Institute data).
  6. Telecommunications Technology Association Standardization Committe, "TTAK.KO-12.0298 IoT device class classification and security requirement," Telecommunications Technology Association(TTA), 2016.12.27.
  7. The Korea Internet & Security Agency (KISA), "Guide to Using Cryptography Authentication Technology in Internet of Things(IoT) Environment," KISA, 2016.04.11.
  8. Internet of Things Forum, "IoT device class classification and security requirement," Internet of Things Forum, 2015.12.01.
  9. Allseen Alliance [Internet], https://allseenalliance.org/, Linux Foundation.
  10. O. Tomanek and L. Kencl, "Security and privacy of using AllJoyn IoT framework at home and beyond," Intelligent Green Building and Smart Grid (IGBSG), 2016 2nd International Conference on. IEEE, 2016.
  11. A. Alliance, "Alljoyn framework. Linux Foundation Collaborative Projects," https://allseenalliance.org/framework, 2016.
  12. M. Villari, A. Celesti, M. Fazio, and A. Puliafito, "Alljoyn lambda: An architecture for the management of smart environments in iot," In Smart Computing Workshops (SMARTCOMP Workshops), 2014 International Conference on (pp. 9-14). IEEE, 2014.11.
  13. AllSeen Alliance Security [Internet], https://allseenalliance.org/framework/documentation/learn/core/system-description/alljoyn-security.
  14. AllJoyn Security 2.0 Feature: High-level Design [Internet], https://identity.allseenalliance.org/developers/learn/core/system-description, 2016.
  15. oneM2M [Internet], http://www.oneM2M.org.
  16. J. Swetina, G. Lu, P. Jacobs, F. Ennesser, and J. Song, "Toward a standardized common M2M service layer platform: Introduction to oneM2M," IEEE Wireless Communications, Vol.21, No.3, pp,20-26, 2014. https://doi.org/10.1109/MWC.2014.6845045
  17. M. B. Alaya, S. Medjiah, T. Monteil, and K. Drira, "Toward semantic interoperability in oneM2M architecture," IEEE Communications Magazine, Vol.53, No.12, pp.35-41, 2015. https://doi.org/10.1109/MCOM.2015.7355582
  18. oneM2M Function Architecture, "TTAT.MM-TS.0001 v2.10.0 oneM2M - Functional Architecture", oneM2M, 2016.08.
  19. oneM2M Security, "TTAT.MM-TS.0003 v. 2.4.1 oneM2M - Security Solutions," oneM2M, 2016.08.
  20. oneM2M Service Layer Core Protocol Specification, "TTAT.MM-TS.0004 v. 2.7.1 oneM2M - Service Layer Core Protocol Specification," oneM2M, 2016.08.
  21. oneM2M Authorization Architecture and Access Control Policy, "TTAT.MM-TR.0016 v. 2.0.0 oneM2M-Authorization Architecture and Access Control Policy," oneM2M, 2016.08.
  22. oneM2M Security, "TTAT.MM-TR.0008 v. 2.0.0 oneM2M -Security," oneM2M, 2016.08.
  23. Open Conectivity Foundation, [Internet], https://openconnectivity.org/
  24. A. Subash, "IoTivity-Connecting Things in IoT," TIZEN Development Summit, 2015.
  25. OCF Security, "OCF Security Specification, v.1," OCF, 2017.6.
  26. Iotivity Security, [Internet], https://wiki.iotivity.org/iotivity_security.
  27. K. Ashwini, L. Chul, S. Randeep, S. Sandeep, and S. WooChul, "IoTivity Provisioning Manager Design Specification v0.1d," The Open Interconnect Consortium (OIC), 2015.
  28. Threadgroup, [Internet], Threadgroup.org
  29. Dave Smith, "Just Android Things," realm, 2017.07.03.
  30. Android Things SDK overview [Internet], https://developer.android.com/things/sdk/index.html
  31. SmartThings Developer Documentation [Internet], http://docs.smartthings.com/en/latest/architecture/