Visible to the public Protecting endpoint devices in IoT supply chain

TitleProtecting endpoint devices in IoT supply chain
Publication TypeConference Paper
Year of Publication2015
AuthorsYang, K., Forte, D., Tehranipoor, M. M.
Conference Name2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
Date PublishedNov. 2015
PublisherIEEE
ISBN Number978-1-4673-8388-2
Keywordsauthentication, authorisation, centralized database, communication efficiency, control chip, data privacy, data transfer, Endpoint Device, endpoint device protection, Hardware, Internet, Internet infrastructure, Internet of Things, Internet of Things (IoT), IoT device authentication, IoT supply chain, privacy, privacy challenges, production engineering computing, pubcrawl170112, radiofrequency identification, RFID tag, RFID-enabled solution, secure access control, security challenges, security issues, supply chain management, supply chain security, Supply chains, Traceability, uniquely identifiable embedded computing devices
Abstract

The Internet of Things (IoT), an emerging global network of uniquely identifiable embedded computing devices within the existing Internet infrastructure, is transforming how we live and work by increasing the connectedness of people and things on a scale that was once unimaginable. In addition to increased communication efficiency between connected objects, the IoT also brings new security and privacy challenges. Comprehensive measures that enable IoT device authentication and secure access control need to be established. Existing hardware, software, and network protection methods, however, are designed against fraction of real security issues and lack the capability to trace the provenance and history information of IoT devices. To mitigate this shortcoming, we propose an RFID-enabled solution that aims at protecting endpoint devices in IoT supply chain. We take advantage of the connection between RFID tag and control chip in an IoT device to enable data transfer from tag memory to centralized database for authentication once deployed. Finally, we evaluate the security of our proposed scheme against various attacks.

URLhttps://ieeexplore.ieee.org/document/7372591
DOI10.1109/ICCAD.2015.7372591
Citation Keyyang_protecting_2015