IoTSafe - Uma Arquitetura baseada em Fog Computing para Prover Segurança em IoT
Abstract
The massive use of IoT becomes problematic as it is used in critical systems, as it exposes these systems to various attacks. This paper proposes an architecture based on Fog Computing to provide security in IoT systems. The proposed architecture inserts layers of encryption and authentication between all communications in the system's network, combining encryption protocols such as AES and TLS, with mechanisms such as OAuth2, providing end-to-end security. The results obtained show the effectiveness of the proposal that provides security, being implemented in a Raspberry Pi 3, obtaining latency up to 85 times faster, using up to 5.5 times less CPU compared to a proposal in the literature.
References
Bideh, P. N., Sönnerup, J., and Hell, M. (2020). Energy consumption for securing lightweight iot protocols. In Proceedings of the 10th International Conference on the Internet of Things, pages 1–8.
Castilho, S. D., Godoy, E. P., and Salmen, F. (2020). Implementing security and trust in iot/m2m using middleware. In 2020 International Conference on Information Networking (ICOIN), pages 726–731. IEEE.
Datta, S. K., Bonnet, C., and Haerri, J. (2015). Fog computing architecture to enable consumer centric internet of things services. pages 1–2.
Doshi, R., Apthorpe, N., and Feamster, N. (2018). Machine learning ddos detection for consumer internet of things devices. In 2018 IEEE Security and Privacy Workshops (SPW), pages 29–35. IEEE.
Frustaci, M., Pace, P., Aloi, G., and Fortino, G. (2017). Evaluating critical security issues of the iot world: Present and future challenges. IEEE Internet of things journal, 5(4):2483–2495.
Garg, H. and Dave, M. (2019). Securing iot devices and securelyconnecting the dots using rest api and middleware. In 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), pages 1–6. IEEE.
Gupta, A. K. and Johari, R. (2019). IOT based Electrical Device Surveillance and Control System. 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), pages 1–5.
Hassan, W. H. et al. (2019). Current research on internet of things (iot) security: A survey. Computer networks, 148:283–294.
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., and Sikdar, B. (2019). A survey on iot security: application areas, security threats, and solution architectures. IEEE Access, 7:82721–82743.
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., and Zhao, W. (2017). A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet of Things Journal, 4(5):1125–1142.
Lombardi, M., Pascale, F., and Santaniello, D. (2021). Internet of things: A general overview between architectures, protocols and applications. Information, 12(2):87.
McCormack, M., Vasudevan, A., Liu, G., Echeverría, S., O’Meara, K., Lewis, G., and Sekar, V. (2020). Towards an architecture for trusted edge iot security gateways. In 3rd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 20). USENIX Association.
Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.-R., and Tarkoma, S. (2017). Iot sentinel: Automated device-type identification for security enforcement in iot. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pages 2177–2184. IEEE.
Mukherjee, B., Neupane, R. L., and Calyam, P. (2017). End-to-end iot security middleware for cloud-fog communication. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pages 151–156. IEEE.
Naha, R. K., Garg, S., Georgakopoulos, D., Jayaraman, P. P., Gao, L., Xiang, Y., and Ranjan, R. (2018). Fog computing: Survey of trends, architectures, requirements, and research directions. IEEE access, 6:47980–48009.
O’Donovan, P., Gallagher, C., Leahy, K., and O’Sullivan, D. T. (2019). A comparison of fog and cloud computing cyber-physical interfaces for industry 4.0 real-time embedded machine learning engineering applications. Computers in Industry, 110:12–35.
Razouk, W., Sgandurra, D., and Sakurai, K. (2017). A new security middleware architecture based on fog computing and cloud to support iot constrained devices. In Proceedings of the 1st International Conference on Internet of Things and Machine Learning, pages 1–8.
Sicari, S., Rizzardi, A., and Coen-Porisini, A. (2020). Increasing the pervasiveness of the iot: fog computing coupled with pub&sub and security. In 2020 IEEE International Conference on Smart Internet of Things (SmartIoT), pages 64–71. IEEE.
Sohal, A. S., Sandhu, R., Sood, S. K., and Chang, V. (2018). A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Computers & Security, 74:340–354.
Yang, Y., Wu, L., Yin, G., Li, L., and Zhao, H. (2017). A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal, 4(5):1250–1258.
Zarpelão, B. B., Miani, R. S., Kawakani, C. T., and de Alvarenga, S. C. (2017). A survey of intrusion detection in internet of things. Journal of Network and Computer Applications, 84:25–37.
