curator,+CISSE v06 I01 p07
curator,+CISSE v06 I01 p07
curator,+CISSE v06 I01 p07
Abstract - The ability to understand, predict, secure and exploit the vast array of
heterogeneous network of things is phenomenal. With the ever-increasing threats to cyber
physical systems and Internet of Things, security on those networks of data-gathering sensors
and systems has become a unique challenge to industries as well as to military in the battlefield.
To address those problems, we propose a trusted computing protocol that employs discrete
Trusted Platform Modules and Hardware Security Modules for key management, a
blockchain-based package verification algorithm for over-the-air security, and a secure
authentication mechanism for data communication. The IoT-based Trusted Computing
Protocol implements integrated hardware security, strong cryptographic hash functions, and
peer-based blockchain trust management. We have tested the protocol under various
circumstances where devices have built-in securities while others do not. We apply the new
protocol to a SCADA system that contains more than 3,000 edge devices. The preliminary
results show that proposed protocol establishes trust, improves security, integrity, and privacy.
Keywords
1
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
1 INTRODUCTION
The Internet of Things (IoT) is fed with billions of devices and trillions of sensors.
IoT networks undergird critical infrastructure, such as electric grids, transportation
hubs, and nuclear power plants. They also link to systems containing valuable and
sensitive personal information, such as hospitals, schools, and government
institutions. A failure in of one of these systems or a cascade of such failures across
systems, either in their operations or security, could lead to potentially catastrophic
consequences for the population of that region, city and beyond [15, 29]. Yet many
of the hardware and software elements used to control, monitor, and connect these
systems are not designed with built-in security, while others are outmoded and may
not interface with newer technologies. For this reason, every IoT project must
address the security and trust, and that can be hardened against tempering and
compromise [30]. The ideal IoT, Internet of Battlefield Things (IoBT), and Cyber
Physical Systems (CPS) should be able to continue operating under attacks, and
provide guaranteed performance [25–28]. Therefore, it is critical to secure edge
devices and actuators, and make IoT networks resilient in the face of cybersecurity
threats [1, 2, 10, 30].
2
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
Base (TCB) is still a challenge especially in IoT systems, where various protocols
and legacy systems exist.
This paper first discusses security issues in IoT/CPS systems and then proposes
a novel IoT-based Trusted Computing Protocol (IoTCP) that integrates hardware
security, strong cryptographic hash functions, and blockchain technology to
establish trust among devices and to secure data communications. We apply
machine learning and intelligent services to deliver adaptive cyber-physical
capability and services necessary to enable effective command and control across
IoT/CPS systems. Finally, we illustrate an implementation of a testbed SCADA
system with a dashboard and data analytics features.
2 BACKGROUND
Trusted Platform Modules (TPM) and Hardware Security Modules (HSM) are
cryptographic hardware that improve the overall security of a system. TPM is
usually embedded into a device. For a device that do not come with a TPM, an
HSM can be added.
3
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
packages authenticity for over the air updates. Guin et al. recently proposed to
integrate blockchain technology to authenticate resource-constrained, low-cost
edge devices [38]. SRAM-based physically unclonable functions (PUFs) were used
to generate a unique “digital fingerprints” to identify edge devices.
A TPM is a robust chip that is integrated into the systems providing hardware
security and establishing trust within devices such as computers, weapons, vehicles,
robots, wearables, actuators, and storage [5]. TPM enables server, gateways, and
sensors to extend secure authentication [8, 11] and integrity with a TPM chip on
each device. Mutual authentication of devices is required at session start and signing;
and decipher are performed on the device [4].
TPMs are basic building blocks used in many specifications, for providing an
anchor of trust. They can be used for validating basic boot properties before
allowing network access, or for storing platform measurements, or for providing
self-measurement to provide anchors of trust to hypervisors (in virtualization). The
TPM 2.0 Profile Specification allows subsets of proven security to be implemented
in a variety of devices, from traditional clients to embedded and IoT systems, with
smaller footprints, lower power consumption, and lower cost [16].
Bosch uses TPM in its cameras and other edge devices that act like a
cryptographic coprocessor to the device. The TPM runs its own firmware, which
is continuously maintained to provide optimal protection against possible threats
known to the threat intelligent sensors [18]. Communication between the device
firmware and the TPM chip happens via a secure agent inside the TPM. TPMs
provide application program interfaces and commands for applications. It is
impossible for the firmware or operating systems (OS) to modify anything inside
the TPM directly.
4
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
Chrome OS uses TPMs for a variety of tasks, including software and firmware
rollback prevention, protection of user data encryption keys, and attestation of the
mode of a device [7].
Virtual smart cards use TPM to emulate the functionalities of physical smart
cards, rather than requiring the use of a separate physical smart card and reader.
Virtual smart cards are created in the TPM and offer similar properties to physical
smart cards. Their keys are not exportable from the TPM, and the cryptographic
component is isolated from the rest of the system [7, 14].
5
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
extract a number of bits from a secret key and use the short key to launch a brute
force attack (CVE-2015-5464). Hash Message Authentication Code (HMAC)
obfuscates private keys makes it hard to steal. However incidents such as replay
attacks may still occur, due to the fact that the hash value is a constant over time.
More cryptographic features must be added to avoid such attacks.
IoT devices such as IP cameras are the most exposed devices facing the most
threats. Besides cyber threats, data can be hacked and stolen. Such might happen as
the ultimate attempt by an attacker to retrieve certificates and keys to later-on
simulate an edge device by his own equipment, trying to hack deeper into the IoT
systems [3].
A discrete TPM is an isolated, separate feature chip that all necessary computing
resources are contained within the discrete chip package. A discrete TPM has full
control of dedicated internal resource including RAM, non-volatile memory, and
cryptographic logic. Due to the architecture, vulnerabilities exist.
A device without a TPM must store private keys in its file system, where it
might reside in an especially encrypted file but the key to this must also be stored
somewhere in the file system. If hacking into a device’s certificate store does not
reveal what is being looked for, a side-channel attack may do, such an attack uses
analytic hardware equipment to listen to the data of the system while performing
its tasks. When triggering the authentication process, at some point, the key will
appear unencrypted. This leaves vulnerabilities to attackers.
6
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
IoT systems consist of a network of devices, gateways, and sensors. Many are
not security-enabled, which run on a variety of old protocols. Since dTPMs are
only integrated into some devices, those do not have built-in dTPMs are not able
to use the security protocol. To solve this problem, we use HSM to provide
hardware security.
Private keys, if loaded with a certificate, are stored inside the TPM and then are
no longer retrievable. They can then only be used through cryptographic operations
provided by the TPM, specifically its secure agents. The private key is password
protected and is secret until safe storage within the TPM. The encryption engine
provides key handling support for symmetrical encryption such as AES with up to
256-bit key length. Once the key is delivered, the AES encryption or decryption
for communication or over payload is then done by the hardware accelerated
encryption engine in the main CPU.
7
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
Step 4. With both a correct hash value and the confirmation from peers in
the blockchain, the edge device starts the OTA update.
For secure communication between edge devices and actuators, we use MQTT,
a dTPM and a device SDK - client libraries to connect, authenticate, and exchange
message between devices and an actuator. MQTT enables low power usage,
minimized data packets, small code footprint, and, most importantly, low network
bandwidth. Its advantages make it a perfect candidate for sensor communication
and mobile applications. As MQTT supports TLS, mutual authentication can be
8
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
We also use device shadows to replicate all connected devices such that each
edge device has an identical shadow stored in the cloud. The device and its
corresponding shadow are constantly compared making sure the integrity of data
and interactions. In the event of a security breach, the monitoring agent will issue
an alarm indicating there is a conflict of states between the edge device and the
corresponding shadow. An action must be taken to resume communication. Adding
a device shadow can assure that a device can still interact with applications even
when they are offline. The combination of MQTT and device shadow not only
secures authentication and communication but also improves fault tolerance.
9
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
10
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
IoTCP integrates dTPM and HSM to provide hardware level security, uses
blockchain to improve OTA security, and uses MQTT with HMAT key scheme
to secure authentication and communications.
5 CONCLUSION
IoT, IoBT, and CPS networks connect home appliances, sensors, traffic, vehicles,
medical aids, weapons, smart grids, and industrial automation. The heterogeneous
collection of microcontrollers, sensors, data interfaces and networks makes it
difficult to establish trust and secure the data communication. IoTCP combines
dTPM and HSM to secure key management, uses blockchain for package
verification and OTA update security, and uses a low bandwidth and lightweight
protocol - MQTT to ensure authentication and communication security.
Preliminary tests show that IoTCP is especially useful for connecting heterogeneous
edge devices including legacy protocols. The device shadows add another level of
security, enhance integrity and improve privacy. We are in the process of applying
machine learning in modeling device behaviors based on the vast amount of xAPI
data we gathered. Once the model is trained with acceptable accuracy, we will use
it to predict whether a device can be trusted or actions have to be taken.
11
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
6 ACKNOWLEDGEMENT
12
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
REFERENCES
[5] Will Arthur, David Challener, and Kenneth Goldman. 2015. History of the TPM.
Apress, Berkeley, CA. 1–5 pages. https://doi.org/10. 1007/978-1-4302-6584-9_1
[6] Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, and Antonino Nocera. 2017.
Overcoming Limits of Blockchain for IoT Applications. In Proceedings of the 12th
International Conference on Availability, Reliability and Security (ARES ’17). ACM,
New York, NY, USA, Article 26, 6 pages.
https://doi.org/10.1145/3098954.3098983
[7] Lisa J. K. Durbeck, Peter M. Athanas, and Nicholas J. Macias. 2014. Secure-by-
construction Composable Componentry for Network Processing. In Proceedings of
the 2014 Symposium and Bootcamp on the Science of Security (HotSoS ’14). ACM,
New York, NY, USA, Article 27, 2 pages.
https://doi.org/10.1145/2600176.2600203
[8] Trusted Computing Group. 2016. Secure the Internet of Things. (2016). Retrieved
3/11/2017 from https://trustedcomputinggroup.org/trusted-computing/
[9] Kylene Hall, Tom Lendacky, and Emily Ratliff. 2005. Trusted Computing and
Linux. TCG, 91–110.
[10] Privacy Rights Clearing House. 2017. Data Breaches. (2017). Retrieved 3/7/2017
from https://www.privacyrights.org/data-breaches breaches.
[11] W. Hufstetler, M. Ramos, and P. Wang. 2017. NFC Unlock: Secure Two-Factor
Computer Authentication Using NFC. IEEE 14th International Conference on
Mobile Ad Hoc and Sensor Systems (MASS 2017) (2017), 507 – 510.
13
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
[14] Himanshu Raj and et. al. 2016. fTPM: A Firmware-based TPM 2.0 Implementation.
(2016), 1–22.
[15] Devarshi Shah, Anthony Skjellum, Jin Wang, and Peter He. 2017. Challenges and
Opportunities for IoT-Enabled Cybermanufacturing: Some Initial Findings from an
Iot-enabled Manufacturing Technology Testbed. (2017).
https://pdfs.semanticscholar.org/9319/
fb10f1f3154f982d5baed6ab5919ed63ef18.pdf?_ga=1.6028727.52173338.1488642784
Paper 66.
[16] Jianxiong Shao, Yu Qin, Dengguo Feng, and Weijin Wang. 2015. Formal Analysis of
Enhanced Authorization in the TPM 2.0. In Proceedings of the 10th ACM
Symposium on Information, Computer and Communications Security (ASIA
CCS ’15). ACM, New York, NY, USA, 273–284.
https://doi.org/10.1145/2714576.2714610
[17] Mark Stamp. 2005. Information security - principles and practice. Wiley.
[18] Bosch Security Systems. 2016. Trusted Platform Module explained. (2016).
[19] Apostol Vassilev. 2016. Approved Security Functions for FIPS PUB 140-2, Security
Requirements for Cryptographic Modules. (2016). Retrieved 3/7/2017 from
http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexa.pdf NIST.
[20] Paul Wang and William Kelly. 2015. A Novel Threat Analysis and Risk Mitigation
Approach to Prevent Cyber Intrusions. Colloquium for Information System Security
Education (CISSE) 3 (2015), 157–174. Issue 1.
[21] Shuangbao Wang. 2016. Dual-Data Defense in Depth Improves SCADA Security.
Signal (2016), 42–44. Issue 10.
[22] Shuangbao Wang, Amjad Ali, and William Kelly. 2015. Data Security and Threat
Modeling for Smart City Infrastructure. IEEE Cyber Security of Smart Cities,
Industrial Control System and Communications (2015), 1–6.
[23] Shuangbao Wang and William Kelly. 2014. inVideo - A Novel Big Data Analytics
Tool for Video Data Analytics. IEEE/NIST IT Pro Conference, 1–19.
https://doi.org/0.1109/ITPRO.2014.7029303
14
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
[24] Shuangbao Wang and William Kelly. 2017. Smart Cities Architecture and Security in
Cybersecurity Education. The Colloquium of Information Systems Security
Education (CISSE) (2017). Issue 2.
[25] Shuangbao Wang and Robert Ledley. 2007. Modified Neumann Architecture with
Micro-OS for Security. CIICT, 303–310.
[29] Zhi-Kai Zhang, Michael Cheng Yi Cho, and Shiuhpyng Shieh. 2015. Emerging
Security Threats and Countermeasures in IoT. In Proceedings of the 10th ACM
Symposium on Information, Computer and Communications Security (ASIA
CCS ’15). ACM, New York, NY, USA, 1–6.
https://doi.org/10.1145/2714576.2737091
[30] U. Guin, A. Singh, M. Alam, J. Canedo, and A. Skjellum, “A Secure Low-Cost Edge
Device Authentication Scheme for the Internet of Things”, in International
Conference on VLSI Design, 2018.
[31] M. M. Tehranipoor, U. Guin, and S. Bhunia, “Invasion of the hardware snatchers,”
IEEE Spectrum, vol. 54, no. 5, pp. 36–41, 2017.
15
Journal of The Colloquium for Information System Security Education (CISSE)
Edition 6, Issue 1 - September 2018
[37] H. He, C. Maple, T. Watson, A. Tiwari, J. Mehnen, Y. Jin, and B. Gabrys, “The
security challenges in the IoT enabled cyber-physical systems and opportunities for
evolutionary computing & other computational intelligence,” in Evolutionary
Computation (CEC), 2016 IEEE Congress on. IEEE, 2016, pp. 1015–1021.
[38] U. Guin, P. Cui, and A. Skjellum, “Ensuring Proof-of-Authenticity of IoT Edge
Devices using Blockchain Technology”, IEEE International Conference on
Blockchain, 2018.
16