【24h】

Securing Emergent IoT Applications

机译:保护新兴的物联网应用

获取原文

摘要

Attacks on IoT, Cyber-Physical-Systems (CPS), and other computing systems are evolving rapidly. As a result, IoT devices used in critical infrastructures such as energy, health-care, and water supply systems are vulnerable to attacks. A successful attack on such safety-critical infrastructures may have life-threatening consequences. On the other hand, existing security mechanisms are not enough to protect constrained IoT devices. Therefore, we need better security mechanisms and tools to manage and protect IoT devices from malicious use. In emerging paradigms like Internet-of-Things (IoT) platforms, Industry 4.0, collaborative portals, and many others, we deal with a multi-tenant architecture. In a multi-tenant architecture, the owners want to secure their own integrity, confidentiality, and functionality goals without being concerned about the goals of other entities. In this paper, we present a framework to negotiate, compromise, and inter-operate between different services or platforms to fulfill a purpose. Furthermore, to ensure correct and safe operation of IoT systems, we must assure that the integrity of the underlying systems and processes is properly executed as intended i.e., the processes cannot be changed in an unauthorized way. In this paper, we present our Petri Net based workflow specification and enforcement framework to realize workflow-aware access control and to protect the process integrity of IoT applications. The Petri Net models are amenable to formal verification. The resulting workflows have other properties such as the ability to recover from error conditions. In addition, we present a method to achieve distributed access control and accountability integrated with our framework. We allow practitioner-friendly tools to collect requirements and goals to design secure IoT systems and processes. Finally, we present a guide to implement our framework with existing development environments and validate the methodology using concrete use case scenarios.
机译:对物联网,网络物理系统(CPS)和其他计算系统的攻击正在迅速发展。结果,关键基础设施(如能源,医疗保健和供水系统)中使用的物联网设备容易受到攻击。对此类对安全至关重要的基础架构的成功攻击可能会危及生命。另一方面,现有的安全机制不足以保护受约束的物联网设备。因此,我们需要更好的安全机制和工具来管理和保护IoT设备免受恶意使用。在物联网(IoT)平台,工业4.0,协作门户等新兴范式中,我们处理多租户架构。在多租户体系结构中,所有者希望在确保自己的完整性,机密性和功能性目标的同时,不关心其他实体的目标。在本文中,我们提出了一个框架,用于在不同服务或平台之间协商,折衷和互操作以实现目标。此外,为了确保IoT系统的正确和安全运行,我们必须确保基础系统和流程的完整性按预期正确执行,即,不得以未经授权的方式更改流程。在本文中,我们提出了基于Petri Net的工作流程规范和实施框架,以实现可感知工作流程的访问控制并保护IoT应用程序的流程完整性。 Petri Net模型适合形式验证。产生的工作流程具有其他属性,例如从错误情况中恢复的能力。此外,我们提出了一种与我们的框架集成的实现分布式访问控制和问责制的方法。我们允许从业者友好的工具来收集需求和目标,以设计安全的IoT系统和流程。最后,我们提供了使用现有开发环境实施我们的框架并使用具体用例场景验证方法的指南。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号