Realizing a Secure Internet of Things
Realizing a Secure Internet of Things
Disciplines
Electrical Engineering, Electronics, Information Engineering (20%); Computer Sciences (80%)
Keywords
-
Internet nof Things (IoT),
RFID Technology,
Lightwight Cryptogrpahy,
RFID Sensor,
Pervasive Computing
The Internet of Things envisions a world in which every object is able to collect and to store data as well as to communicate with each other over the Internet. A key technology for realizing this vision is Radio Frequency Identification (RFID). This technology consists of small microprocessors connected to an antenna (called tags) which can be easily attached to objects in the field. These tags typically do not require a dedicated power supply since they can draw their power from the electromagnetic field of a reader. In this project, we want to go the last step towards realizing the Internet of Things: Integrating passive RFID devices into the Internet by defining and implementing a protocol that allows accessing specific tags from an arbitrary client. Already in the design phase, it is vital to consider security aspects of the solution. Sensitive data that is collected by these tags has to be protected against unauthorized access from users in the Internet. Since tags have to operate in resource-constrained environments, lightweight network and cryptography solutions are required to provide those Web-based services. Thus, our goal is to develop a lightweight solution to establish a secure Internet layer upon the RFID-communication layer, which allows a secure end-to-end connection between tags and clients. Next to RFID-based objects, special readers are required which act as routers between the Internet and the RFID-based network. As an outcome of this project, we target a proof of concept demonstrator that consists of tag emulators and readers that provide the capability of securely sharing information with other objects and/or clients over the Internet. We plan to disseminate the scientific results on international conferences to discuss design decisions and to contribute to the research community. The demonstrator will be used to present the feasibility of RFID-based objects to enhance the current Internet with all of its advantages such as autonomously gathering information and data out of the field. We are confident that once the potential of this new technology is shown, we can attract industry partners to cooperate on further research and exploitation.
The Internet of Things (IoT), i.e. the wireless communication of electronic devices and machines for the purpose of autonomous data transfer, is one of the fastest growing technologies of our time. The IoT combines many different communication technologies like WLAN, GSM and Bluetooth. It also contains several device classes with diverse abilities like mobile devices (including, for example, mobile phones and hand-held devices), home automation devices (electronic fridges, light sources, washing machines, et cetera), automotive products, and medical devices. With a predicted 21.9 billion Euro gross market share in 2020 (according to Statista4) and a price of just a few Cents, so-called passive (batteryless) radio-frequency identification (RFID) tags are by far the largest group of IoT participants. Despite the countless opportunities and possible applications offered by the IoT, there are also concerns about the safety and the privacy of people. Medical devices like pacemakers, for example, which have a wireless communication interface, or automotive technology which can be controlled remotely pose a direct threat to the safety of their users if no appropriate security mechanisms are in place. Especially RFID tags with a very limited power budget and highly constraint processing capabilities (in contrast to mobile devices, for example), are not able to handle very complex security aware communication protocols. In addition, these tags can hardly be updated once they are deployed in their respective fields. Therefore, this group of IoT devices requires special treatment to guarantee the security of IoT applications. With ReSIT, the secure integration of RFID technology into the Internet of Things has been researched. Despite energy efficient cryptographic primitives and implementations, many possible platforms for secure RFID tags have been evaluated. Furthermore, weaknesses in existing communication protocols have been revealed, and a privacy-aware communication protocol has been developed that allows the seamless integration of RFID tags into the existing Internet infrastructure. The outcome of our research efforts build the fundament of our sensor equipped prototype platform (PIONEER) for a secure RFID based IoT.
- Technische Universität Graz - 100%
Research Output
- 571 Citations
- 23 Publications
-
2015
Title Privacy-Aware Authentication in the Internet of Things DOI 10.1007/978-3-319-26823-1_3 Type Book Chapter Author Gross H Publisher Springer Nature Pages 32-39 -
2013
Title Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl DOI 10.1007/978-3-642-36095-4_10 Type Book Chapter Author Holzer-Graf S Publisher Springer Nature Pages 145-161 -
2013
Title Cache-Access Pattern Attack on Disaligned AES T-Tables DOI 10.1007/978-3-642-40026-1_13 Type Book Chapter Author Spreitzer R Publisher Springer Nature Pages 200-214 -
2013
Title Improving Local Collisions: New Attacks on Reduced SHA-256 DOI 10.1007/978-3-642-38348-9_16 Type Book Chapter Author Mendel F Publisher Springer Nature Pages 262-278 -
2014
Title The Temperature Side Channel and Heating Fault Attacks DOI 10.1007/978-3-319-08302-5_15 Type Book Chapter Author Hutter M Publisher Springer Nature Pages 219-235 -
2014
Title ALE: AES-Based Lightweight Authenticated Encryption DOI 10.1007/978-3-662-43933-3_23 Type Book Chapter Author Bogdanov A Publisher Springer Nature Pages 447-466 -
2013
Title Linear Propagation in Efficient Guess-and-Determine Attacks. Type Conference Proceeding Abstract Author Eichlseder M Conference International Workshop on Coding and Cryptography (WCC) -
2015
Title Sharing is Caring—On the Protection of Arithmetic Logic Units against Passive Physical Attacks DOI 10.1007/978-3-319-24837-0_5 Type Book Chapter Author Gross H Publisher Springer Nature Pages 68-84 -
2014
Title PIONEER—a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag DOI 10.1007/978-3-319-13066-8_4 Type Book Chapter Author Gross H Publisher Springer Nature Pages 54-73 -
2014
Title Curved Tags – A Low-Resource ECDSA Implementation Tailored for RFID DOI 10.1007/978-3-319-13066-8_10 Type Book Chapter Author Pessl P Publisher Springer Nature Pages 156-172 -
2014
Title Efficient Multiplication on Low-Resource Devices DOI 10.1109/dsd.2014.52 Type Conference Proceeding Abstract Author Wieser W Pages 175-182 -
2015
Title Full-Size High-Security ECC Implementation on MSP430 Microcontrollers DOI 10.1007/978-3-319-16295-9_2 Type Book Chapter Author Hinterwälder G Publisher Springer Nature Pages 31-47 -
2012
Title JAAVR: Introducing the Next Generation of Security-enabled RFID Tags. Type Conference Proceeding Abstract Author Feichtner J Et Al Conference 15th Euromicro Conference on Digital System Design (DSD). -
2012
Title JAAVR: Introducing the Next Generation of Security-enabled RFID Tags DOI 10.1109/dsd.2012.81 Type Conference Proceeding Abstract Author Wenger E Pages 640-647 -
2012
Title Handling the NDEF Signature Record Type in a Secure Manner DOI 10.1109/rfid-ta.2012.6404492 Type Conference Proceeding Abstract Author Korak T Pages 107-112 -
2013
Title Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID DOI 10.1007/978-3-642-40349-1_8 Type Book Chapter Author Pessl P Publisher Springer Nature Pages 126-141 Link Publication -
2013
Title Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware DOI 10.1007/978-3-642-40349-1_9 Type Book Chapter Author Bilgin B Publisher Springer Nature Pages 142-158 Link Publication -
2013
Title NaCl on 8-Bit AVR Microcontrollers DOI 10.1007/978-3-642-38553-7_9 Type Book Chapter Author Hutter M Publisher Springer Nature Pages 156-172 -
2013
Title Differential Cryptanalysis of Keccak Variants DOI 10.1007/978-3-642-45239-0_9 Type Book Chapter Author Kölbl S Publisher Springer Nature Pages 141-157 -
2013
Title Access Without Permission: A Practical RFID Relay Attack. Type Conference Proceeding Abstract Author Hutter M Et Al Conference 21st Austrian Workshop on Microelectronics (Austrochip). -
2013
Title Fast Software Encryption Attacks on AES DOI 10.1007/978-3-642-38553-7_21 Type Book Chapter Author Gstir D Publisher Springer Nature Pages 359-374 -
2013
Title On the Applicability of Time-Driven Cache Attacks on Mobile Devices DOI 10.1007/978-3-642-38631-2_53 Type Book Chapter Author Spreitzer R Publisher Springer Nature Pages 656-662 -
2013
Title A Lightweight ATmega-Based Application-Specific Instruction-Set Processor for Elliptic Curve Cryptography DOI 10.1007/978-3-642-40392-7_1 Type Book Chapter Author Wenger E Publisher Springer Nature Pages 1-15