【24h】

Securing Emergent IoT Applications

机译:保护紧急IOT应用程序

获取原文

摘要

Attacks on IoT, Cyber-Physical-Systems (CPS), and other computing systems are evolving rapidly. As a result, IoT devices used in critical infrastructures such as energy, health-care, and water supply systems are vulnerable to attacks. A successful attack on such safety-critical infrastructures may have life-threatening consequences. On the other hand, existing security mechanisms are not enough to protect constrained IoT devices. Therefore, we need better security mechanisms and tools to manage and protect IoT devices from malicious use. In emerging paradigms like Internet-of-Things (IoT) platforms, Industry 4.0, collaborative portals, and many others, we deal with a multi-tenant architecture. In a multi-tenant architecture, the owners want to secure their own integrity, confidentiality, and functionality goals without being concerned about the goals of other entities. In this paper, we present a framework to negotiate, compromise, and inter-operate between different services or platforms to fulfill a purpose. Furthermore, to ensure correct and safe operation of IoT systems, we must assure that the integrity of the underlying systems and processes is properly executed as intended i.e., the processes cannot be changed in an unauthorized way. In this paper, we present our Petri Net based workflow specification and enforcement framework to realize workflow-aware access control and to protect the process integrity of IoT applications. The Petri Net models are amenable to formal verification. The resulting workflows have other properties such as the ability to recover from error conditions. In addition, we present a method to achieve distributed access control and accountability integrated with our framework. We allow practitioner-friendly tools to collect requirements and goals to design secure IoT systems and processes. Finally, we present a guide to implement our framework with existing development environments and validate the methodology using concrete use case scenarios.
机译:对物联网,网络物理系统(CPS)和其他计算系统的攻击正在快速发展。因此,在能源,保健和供水系统等关键基础设施中使用的物联网设备容易攻击。对这种安全关键基础设施的成功攻击可能具有危及生命的后果。另一方面,现有的安全机制不足以保护受限的物联网设备。因此,我们需要更好的安全机制和工具来管理和保护IOT设备免于恶意使用。在新兴的范式中,如互联网(IOT)平台,行业4.0,协作门户和许多其他人,我们处理多租户架构。在多租户架构中,业主希望确保自己的完整性,机密性和功能目标,而不关注其他实体的目标。在本文中,我们介绍了一个框架,以协商,妥协和在不同的服务或平台之间进行互动以实现目的。此外,为了确保IOT系统的正确和安全操作,我们必须确保底层系统和进程的完整性正当执行,即,无法以未经授权的方式更改进程。在本文中,我们展示了我们的Petri网络的工作流程规范和执法框架来实现工作流程感知访问控制,并保护IoT应用程序的过程完整性。 Petri网状模型适用于正式验证。生成的工作流具有其他属性,例如从错误条件恢复的能力。此外,我们提出了一种实现与我们框架集成的分布式访问控制和问责制的方法。我们允许从业者友好的工具收集设计安全物联网系统和流程的要求和目标。最后,我们提出了一个导轨,用于使用现有开发环境实现我们的框架,并使用具体用例方案验证方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号