Browse > Article
http://dx.doi.org/10.30693/SMJ.2019.8.4.17

User Sensitive Data Classification for IoT Gateway Security  

Heo, Mhanwoo (숭실대학교 컴퓨터학과 대학원)
Park, Kicheol (숭실대학교 컴퓨터학과 대학원)
Hong, Jiman (숭실대학교 컴퓨터학부)
Publication Information
Smart Media Journal / v.8, no.4, 2019 , pp. 17-24 More about this Journal
Abstract
As IoT technology is widely used in industrial environments, its environmental security issues are becoming more important. In such a context, studies utilizing hardware security functions are being actively carried out. However, previous studies did not consider the performance degradation that occurs when using hardware security functions in IoT environment. Gateway devices that are mainly used in IoT environments are often resource-limited. Utilizing hardware security in such an environment can cause serious performance degradation as the number of IoT devices connected to the gateway increases. Therefore, in this paper, we propose a data classification scheme to efficiently utilize hardware security functions in resource limited environment. We implement a platform with the proposed technique using ARM Trustzone. Performance degradation due to the hardware security functions is measured through experiments on the implemented platform and compared with the performance as of when the proposed technique is applied.
Keywords
IoT; ARM Trustzone; Data Classification; Platform;
Citations & Related Records
연도 인용수 순위
  • Reference
1 김정녀, "안전한 스마트 단말을 위한 가상화 기반 도메인 분리 보안 플랫폼 구현," 스마트미디어저널, 제5권, 제4호, 116-123쪽, 2016년 12월
2 김진보, 김미선, 서재현, "사물인터넷 서비스 접근제어를 위한 리소스 서비스 관리 모델 구현," 스마트미디어저널, 제5권, 제3호, 9-16쪽, 2016년 9월
3 윤기하, 박성모, "128비트 LEA 암호화 블록 하드웨어 구현 연구," 스마트미디어저널, 제4권, 제4호, 39-46쪽, 2015년 12월
4 Ivanovitch Silva, Rafael Leandro, Daniel Macedo, Guedes,Affonso Luiz, "A dependability evaluation tool for the Internet of Things," Computers and Electrical Engineering, vol. 39, no. 7, pp. 2005-2018, Oct. 2013.   DOI
5 Xiaofeng Lu, Zhaowei Qu, Qi Li, Pan Hui, "Privacy Information Security Classification for Internet of Things Based on Internet Data," International Journal of Distributed Sensor Networks, vol. 11, no. 8, pp. 1-8, Aug. 2015.
6 Arijit Ukil, JaydipSen, Sripad Koilakonda, "Embedded Security for Internet of Things," Proc. of the 2nd National Conference on Emerging Trends and Applications in Computer Science(NCETACS 2011), pp. 50-55, Shillong, Meghalaya, Mar. 2011.
7 Chiara Bodei, Letterio Galletta, "Tracking sensitive and untrustworthy data in IoT," Proc. of the First Italian Conference on Cybersecurity(ITASEC 2017), pp. 38-52, Venice, Italy, Jan. 2017.
8 Christian Lesjak, Daniel Hein, Johanne Winter, "Hardware-Security Technologies for Industrial IoT:TrustZone and Security Controller," Proc. of the 41st Annual Conference of the IEEE Industrial Electronics Society(IECON 2015), pp. 2589-2595, Yokohama, Japan, Nov. 2015.
9 Robert Pettersen, Havard D Johansen, Dag Johansen, "Secure Edge Computing with ARM TrustZone," Proc. of the 2nd International Conference on Internet of Things, Big Data and Security(IoTBDS 2017), pp. 102-109, Porto, Portugal, Apr. 2017.
10 ARM, "ARM Trustzone." https://developer.arm.com/technologies/trustzone (accessed Dec., 24, 2019).
11 CoAP, "CoAP Specifications." https://coap.technology/ (accessed Dec., 24, 2019).
12 GlobalPlatform, "GlobalPlatform Specifications." https://globalplatform.org/ (accessed Dec., 24, 2019).
13 Intel, "Intel SGX." https://software.intel.com/en-us/sgx (accessed Dec., 24, 2019).
14 XMPP, "About XMPP." https://xmpp.org/ (accessed Dec., 24, 2019).
15 Linaro. "About OP-TEE." https://optee.readthedocs.io/general/about.html (accessed Dec., 24, 2019).
16 OASIS, MQTT Version 3.1.1. http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/os/mqtt -v3.1.1-os.html (accessed Dec., 24, 2019).