SIOT: Secure Gateway for Internet of Things

  • Published : 2017.02.28

Abstract

오늘날 사물 인터넷(Internet of Things)은 급속도로 발전하며 인간 생활 곳곳에 다양한 형태로 존재하고 있다. 이들은 대부분 개인 정보 등의 민감한 데이터들을 다루기 때문에 사물 인터넷 환경에 대한 강력한 보안을 필요로 하지만, 현재 사물 인터넷 환경은 비정상적 접근을 허용하거나 업데이트를 통한 펌웨어 변조 등의 많은 보안 취약점들을 가지고 있다. 본 논문에서는 현재 사물 인터넷 환경이 가지는 보안 문제점들을 살펴보고, 이들을 해결하기 위해 딥 러닝 기반의 이상 탐지, 로그 위/변조 탐지, 기기 무결성 검증 등의 다양한 보안 기법들이 집약된 보안 게이트웨이인 SIOT를 제안한다. SIOT는 저성능의 사물 인터넷 기기들이 충분한 보안 기능들을 탑재할 수 없음에 주목하여 다수의 보안 기능들을 효율적으로 통합하여 제공하는 새로운 사물 인터넷 보안 프레임워크로써, 지속되는 사물 인터넷 보안 연구에 큰 기여를 할 것으로 기대한다.

Keywords

References

  1. M2M.World.News, "IDATE forecasts 80 Billion things connected in 2020", M2M World News, 2013, http://m2mworldnews.com/2013/09/18/27009-idateforecasts-80-billion-things-connected-in-2020/
  2. J. Rivera, R. Meulen, "Gartner's 2013 Hype Cycle for Emerging Technologies Maps Out Evolving Relationship Between Humans and Machines", Gartner Newsroom , 2013, http://www.gartner.com/newsroom/id/2575515
  3. Technical Report, "Security in the Internet of Things", Wind River Systems (2015)
  4. Barcena, Mario Ballano, and Candid Wueest. "Insecurity in the Internet of Things." Security Response, Symantec (2015).
  5. Viewpoint Paper, "Securing the Internet of Things -Explore Security and Privacy in an Interconnected World", Hewlett Packard Enterprise (2015)
  6. White Paper, "Bootstrapping Security", Ericsson (2016)
  7. ONF, "Software-Defined Networking: The New Norm for Networks", Open Networking Foundation, 2012
  8. ETSI,"Network Function Virtualisation", Introductory White Paper, 2013
  9. Mirai. https://www.incapsula.com/blog/malwareanalysis-mirai-ddos-botnet.html
  10. Docker. https://www.docker.com/
  11. Tensorflow. https://www.tensorflow.org/
  12. D. Ma, and G. Tsudik. "A new approach to secure logging", In ACM Transactions on Storage (TOS), 5(1), pp. 1-21, 2009.
  13. S. A. Crosby, and D. S. Wallach. "Efficient Data Structures for Tamper-Evident Logging", In Proceedings of the USENIX Security Symposium, 2009.
  14. ARM Trusted Firmware, https://github.com/ARMsoftware/arm-trusted-firmware
  15. ARM TrustZone, https://www.arm.com/products/security-on-arm/trustzone
  16. Hikey Board, http://www.96boards.org/product/hikey/
  17. S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad. Proposed security model and threat taxonomy for the internet of things (iot). In Recent Trends in Network Security and Applications, pages 420-429. Springer, 2010.
  18. A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah. A systemic approach for iot security. In Distributed Computing in Sensor Systems (DCOSS), 2013 IEEE International Conference on, pages 351- 355. IEEE, 2013.
  19. Cisco Systems Inc. Cisco 910 Industrial Router. http://www.cisco.com/c/en/us/support/routers/910-industrial-router/model.html
  20. J. Maguire. Internet of Things (IoT) Service Delivery using NFV/SDN. Freescale Technology Forum 2014. FTF-NET-F0160.
  21. T. Yu, V. Sekar, S. Seshan, Y. Agarwal, and C. Xu. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks, HotNets-XIV, 2015
  22. Asokan, N and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos V and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian. "Mobile Trusted Computing", 2014. Proceedings of the IEEE, pp. 1189-1206.
  23. J.-E. Ekberg, K. Kostiainen, and N. Asokan. "The untapped potential of trusted execution environments on mobile devices", 2014. IEEE Security Privacy Mag., DOI: 10.1109/MSP.2014.38.
  24. ChaCha20, https://tools.ietf.org/html/rfc7539