IoTSafe - Uma Arquitetura baseada em Fog Computing para Prover Segurança em IoT

  • Fabio Coutinho dos Santos PUC Minas
  • Raquel A. de Freitas Mini PUC Minas

Resumo


A utilização massiva de IoT torna-se problemática na medida em que é empregada em sistemas críticos, pois expõe esses sistemas a ataques diversos. Este artigo propõe uma arquitetura baseada em Fog Computing para prover segurança em sistemas IoT. A arquitetura proposta insere camadas de criptografia e autenticação entre todas as comunicações na rede do sistema, aliando protocolos de criptografia como AES e TLS, a mecanismos como OAuth2, provendo segurança de ponta a ponta. Os resultados obtidos evidenciam a eficácia da proposta que fornece segurança, sendo implementada em um Raspberry Pi 3, obtendo latência até 85 vezes mais rápida, utilizando até 5,5 vezes menos CPU em comparação com uma proposta da literatura.

Referências

Alhazmi, O. H. and Alou, K. S. (2019). Fog-based internet of things: a security scheme. In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pages 1–6. IEEE.

Bideh, P. N., Sönnerup, J., and Hell, M. (2020). Energy consumption for securing lightweight iot protocols. In Proceedings of the 10th International Conference on the Internet of Things, pages 1–8.

Castilho, S. D., Godoy, E. P., and Salmen, F. (2020). Implementing security and trust in iot/m2m using middleware. In 2020 International Conference on Information Networking (ICOIN), pages 726–731. IEEE.

Datta, S. K., Bonnet, C., and Haerri, J. (2015). Fog computing architecture to enable consumer centric internet of things services. pages 1–2.

Doshi, R., Apthorpe, N., and Feamster, N. (2018). Machine learning ddos detection for consumer internet of things devices. In 2018 IEEE Security and Privacy Workshops (SPW), pages 29–35. IEEE.

Frustaci, M., Pace, P., Aloi, G., and Fortino, G. (2017). Evaluating critical security issues of the iot world: Present and future challenges. IEEE Internet of things journal, 5(4):2483–2495.

Garg, H. and Dave, M. (2019). Securing iot devices and securelyconnecting the dots using rest api and middleware. In 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), pages 1–6. IEEE.

Gupta, A. K. and Johari, R. (2019). IOT based Electrical Device Surveillance and Control System. 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), pages 1–5.

Hassan, W. H. et al. (2019). Current research on internet of things (iot) security: A survey. Computer networks, 148:283–294.

Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., and Sikdar, B. (2019). A survey on iot security: application areas, security threats, and solution architectures. IEEE Access, 7:82721–82743.

Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., and Zhao, W. (2017). A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet of Things Journal, 4(5):1125–1142.

Lombardi, M., Pascale, F., and Santaniello, D. (2021). Internet of things: A general overview between architectures, protocols and applications. Information, 12(2):87.

McCormack, M., Vasudevan, A., Liu, G., Echeverría, S., O’Meara, K., Lewis, G., and Sekar, V. (2020). Towards an architecture for trusted edge iot security gateways. In 3rd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 20). USENIX Association.

Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.-R., and Tarkoma, S. (2017). Iot sentinel: Automated device-type identication for security enforcement in iot. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pages 2177–2184. IEEE.

Mukherjee, B., Neupane, R. L., and Calyam, P. (2017). End-to-end iot security middleware for cloud-fog communication. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pages 151–156. IEEE.

Naha, R. K., Garg, S., Georgakopoulos, D., Jayaraman, P. P., Gao, L., Xiang, Y., and Ranjan, R. (2018). Fog computing: Survey of trends, architectures, requirements, and research directions. IEEE access, 6:47980–48009.

O’Donovan, P., Gallagher, C., Leahy, K., and O’Sullivan, D. T. (2019). A comparison of fog and cloud computing cyber-physical interfaces for industry 4.0 real-time embedded machine learning engineering applications. Computers in Industry, 110:12–35.

Razouk, W., Sgandurra, D., and Sakurai, K. (2017). A new security middleware architecture based on fog computing and cloud to support iot constrained devices. In Proceedings of the 1st International Conference on Internet of Things and Machine Learning, pages 1–8.

Sicari, S., Rizzardi, A., and Coen-Porisini, A. (2020). Increasing the pervasiveness of the iot: fog computing coupled with pub&sub and security. In 2020 IEEE International Conference on Smart Internet of Things (SmartIoT), pages 64–71. IEEE.

Sohal, A. S., Sandhu, R., Sood, S. K., and Chang, V. (2018). A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Computers & Security, 74:340–354.

Yang, Y., Wu, L., Yin, G., Li, L., and Zhao, H. (2017). A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal, 4(5):1250–1258.

Zarpelão, B. B., Miani, R. S., Kawakani, C. T., and de Alvarenga, S. C. (2017). A survey of intrusion detection in internet of things. Journal of Network and Computer Applications, 84:25–37.
Publicado
16/08/2021
Como Citar

Selecione um Formato
SANTOS, Fabio Coutinho dos; MINI, Raquel A. de Freitas. IoTSafe - Uma Arquitetura baseada em Fog Computing para Prover Segurança em IoT. In: WORKSHOP EM CLOUDS E APLICAÇÕES (WCGA), 19. , 2021, Uberlândia. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2021 . p. 15-28.