40 research outputs found
Security for the Industrial IoT: The Case for Information-Centric Networking
Industrial production plants traditionally include sensors for monitoring or
documenting processes, and actuators for enabling corrective actions in cases
of misconfigurations, failures, or dangerous events. With the advent of the
IoT, embedded controllers link these `things' to local networks that often are
of low power wireless kind, and are interconnected via gateways to some cloud
from the global Internet. Inter-networked sensors and actuators in the
industrial IoT form a critical subsystem while frequently operating under harsh
conditions. It is currently under debate how to approach inter-networking of
critical industrial components in a safe and secure manner.
In this paper, we analyze the potentials of ICN for providing a secure and
robust networking solution for constrained controllers in industrial safety
systems. We showcase hazardous gas sensing in widespread industrial
environments, such as refineries, and compare with IP-based approaches such as
CoAP and MQTT. Our findings indicate that the content-centric security model,
as well as enhanced DoS resistance are important arguments for deploying
Information Centric Networking in a safety-critical industrial IoT. Evaluation
of the crypto efforts on the RIOT operating system for content security reveal
its feasibility for common deployment scenarios.Comment: To be published at IEEE WF-IoT 201
CoAP over ICN
The Constrained Application Protocol (CoAP) is a specialized Web transfer
protocol for resource-oriented applications intended to run on constrained
devices, typically part of the Internet of Things. In this paper we leverage
Information-Centric Networking (ICN), deployed within the domain of a network
provider that interconnects, in addition to other terminals, CoAP endpoints in
order to provide enhanced CoAP services. We present various CoAP-specific
communication scenarios and discuss how ICN can provide benefits to both
network providers and CoAP applications, even though the latter are not aware
of the existence of ICN. In particular, the use of ICN results in smaller state
management complexity at CoAP endpoints, simpler implementation at CoAP
endpoints, and less communication overhead in the network.Comment: Proc. of the 8th IFIP International Conference on New Technologies,
Mobility and Security (NTMS), Larnaca, Cyprus, November, 201
NDN, CoAP, and MQTT: A Comparative Measurement Study in the IoT
This paper takes a comprehensive view on the protocol stacks that are under
debate for a future Internet of Things (IoT). It addresses the holistic
question of which solution is beneficial for common IoT use cases. We deploy
NDN and the two popular IP-based application protocols, CoAP and MQTT, in its
different variants on a large-scale IoT testbed in single- and multi-hop
scenarios. We analyze the use cases of scheduled periodic and unscheduled
traffic under varying loads. Our findings indicate that (a) NDN admits the most
resource-friendly deployment on nodes, and (b) shows superior robustness and
resilience in multi-hop scenarios, while (c) the IP protocols operate at less
overhead and higher speed in single-hop deployments. Most strikingly we find
that NDN-based protocols are in significantly better flow balance than the
UDP-based IP protocols and require less corrective actions
Incrementando as redes centradas à informaçãopara uma internet das coisas baseada em nomes
The way we use the Internet has been evolving since its origins. Nowadays,
users are more interested in accessing contents and services with high demands
in terms of bandwidth, security and mobility. This evolution has triggered
the emergence of novel networking architectures targeting current, as
well as future, utilisation demands. Information-Centric Networking (ICN) is a
prominent example of these novel architectures that moves away from the current
host-centric communications and centres its networking functions around
content.
Parallel to this, new utilisation scenarios in which smart devices interact with
one another, as well as with other networked elements, have emerged to constitute
what we know as the Internet of Things (IoT). IoT is expected to have
a significant impact on both the economy and society. However, fostering the
widespread adoption of IoT requires many challenges to be overcome. Despite
recent developments, several issues concerning the deployment of IPbased
IoT solutions on a large scale are still open.
The fact that IoT is focused on data and information rather than on point-topoint
communications suggests the adoption of solutions relying on ICN architectures.
In this context, this work explores the ground concepts of ICN
to develop a comprehensive vision of the principal requirements that should
be met by an IoT-oriented ICN architecture. This vision is complemented with
solutions to fundamental issues for the adoption of an ICN-based IoT. First,
to ensure the freshness of the information while retaining the advantages of
ICN’s in-network caching mechanisms. Second, to enable discovery functionalities
in both local and large-scale domains. The proposed mechanisms are
evaluated through both simulation and prototyping approaches, with results
showcasing the feasibility of their adoption. Moreover, the outcomes of this
work contribute to the development of new compelling concepts towards a
full-fledged Named Network of Things.A forma como usamos a Internet tem vindo a evoluir desde a sua criação.
Atualmente, os utilizadores estão mais interessados em aceder a conteúdos
e serviços, com elevados requisitos em termos de largura de banda, segurança
e mobilidade. Esta evolução desencadeou o desenvolvimento de novas
arquiteturas de rede, visando os atuais, bem como os futuros, requisitos de
utilização. As Redes Centradas à Informação (Information-Centric Networking
- ICN) são um exemplo proeminente destas novas arquiteturas que, em vez
de seguirem um modelo de comunicação centrado nos dispositivos terminais,
centram as suas funções de rede em torno do próprio conteúdo.
Paralelamente, novos cenários de utilização onde dispositivos inteligentes interagem
entre si, e com outros elementos de rede, têm vindo a aparecer e
constituem o que hoje conhecemos como a Internet das Coisas (Internet of
Things - IoT ). É esperado que a IoT tenha um impacto significativo na economia
e na sociedade. No entanto, promover a adoção em massa da IoT ainda
requer que muitos desafios sejam superados. Apesar dos desenvolvimentos
recentes, vários problemas relacionados com a adoção em larga escala de
soluções de IoT baseadas no protocolo IP estão em aberto.
O facto da IoT estar focada em dados e informação, em vez de comunicações
ponto-a-ponto, sugere a adoção de soluções baseadas em arquiteturas
ICN. Neste sentido, este trabalho explora os conceitos base destas soluções
para desenvolver uma visão completa dos principais requisitos que devem ser
satisfeitos por uma solução IoT baseada na arquitetura de rede ICN. Esta visão
é complementada com soluções para problemas cruciais para a adoção
de uma IoT baseada em ICN. Em primeiro lugar, assegurar que a informação
seja atualizada e, ao mesmo tempo, manter as vantagens do armazenamento
intrínseco em elementos de rede das arquiteturas ICN. Em segundo lugar,
permitir as funcionalidades de descoberta não só em domínios locais, mas
também em domínios de larga-escala. Os mecanismos propostos são avaliados
através de simulações e prototipagem, com os resultados a demonstrarem
a viabilidade da sua adoção. Para além disso, os resultados deste
trabalho contribuem para o desenvolvimento de conceitos sólidos em direção
a uma verdadeira Internet das Coisas baseada em Nomes.Programa Doutoral em Telecomunicaçõe
Information Centric Networking in the IoT: Experiments with NDN in the Wild
This paper explores the feasibility, advantages, and challenges of an
ICN-based approach in the Internet of Things. We report on the first NDN
experiments in a life-size IoT deployment, spread over tens of rooms on several
floors of a building. Based on the insights gained with these experiments, the
paper analyses the shortcomings of CCN applied to IoT. Several interoperable
CCN enhancements are then proposed and evaluated. We significantly decreased
control traffic (i.e., interest messages) and leverage data path and caching to
match IoT requirements in terms of energy and bandwidth constraints. Our
optimizations increase content availability in case of IoT nodes with
intermittent activity. This paper also provides the first experimental
comparison of CCN with the common IoT standards 6LoWPAN/RPL/UDP.Comment: 10 pages, 10 figures and tables, ACM ICN-2014 conferenc
Low-power Internet of Things with NDN & Cooperative Caching
International audienceEnergy efficiency is a major driving factor in the Internet of Things (IoT). In this context, an IoT approach based on Information-Centric Networking (ICN) offers prospects for low energy consumption.Indeed, ICN can provide local in-network content caching so that relevant IoT content remains available at any time while devices are in deep-sleep mode most of the time.In this paper, we evaluate NDN enhanced with CoCa, a simple side protocol we designed to exploit content names together with smart interplay between cooperative caching and power-save sleep capabilities on IoT devices.We perform extensive, large scale experiments on real hardware with IoT networks comprising of up to 240 nodes, and on an emulator with up to 1000 nodes.We show in practice that, with NDN+CoCa, devices can reduce energy consumption by an order of magnitude while maintaining recent IoT content availability above 90%.We furthermore provide auto-configuration mechanisms enabling practical ICN deployments on IoT networks of arbitrary size with NDN+CoCa. With such mechanisms, each device can autonomously configure names and auto-tune parameters to reduce energy consumption as demonstrated in this paper
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms
A survey of secure middleware for the Internet of Things
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area