Embedded policing and policy enforcement approach for future secure IoT technologies
Title | Embedded policing and policy enforcement approach for future secure IoT technologies |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Siddiqui, F., Hagan, M., Sezer, S. |
Conference Name | Living in the Internet of Things: Cybersecurity of the IoT - 2018 |
Date Published | mar |
Keywords | additional threats, ARM TrustZone, attack vectors, authentication mechanisms, authorisation, business operations, chain-of-trust, commercial building management, composability, computer network security, embedded applications, embedded hardware, Embedded systems, end users, FPGA, hardware security policy engine, Internet of Things, IoT applications, malicious application, MPSoC, platform module, policy violation, potential technical vulnerabilities, pro-active policy, pubcrawl, Quality Control, Resiliency, Root-of-trust, secure IoT technologies, software security technologies, SPE approach, supply chain efficiencies, system communication bus, system resources, Trusted Platfrom Modules, Zero-day attacks |
Abstract | The Internet of Things (IoT) holds great potential for productivity, quality control, supply chain efficiencies and overall business operations. However, with this broader connectivity, new vulnerabilities and attack vectors are being introduced, increasing opportunities for systems to be compromised by hackers and targeted attacks. These vulnerabilities pose severe threats to a myriad of IoT applications within areas such as manufacturing, healthcare, power and energy grids, transportation and commercial building management. While embedded OEMs offer technologies, such as hardware Trusted Platform Module (TPM), that deploy strong chain-of-trust and authentication mechanisms, still they struggle to protect against vulnerabilities introduced by vendors and end users, as well as additional threats posed by potential technical vulnerabilities and zero-day attacks. This paper proposes a pro-active policy-based approach, enforcing the principle of least privilege, through hardware Security Policy Engine (SPE) that actively monitors communication of applications and system resources on the system communication bus (ARM AMBA-AXI4). Upon detecting a policy violation, for example, a malicious application accessing protected storage, it counteracts with predefined mitigations to limit the attack. The proposed SPE approach widely complements existing embedded hardware and software security technologies, targeting the mitigation of risks imposed by unknown vulnerabilities of embedded applications and protocols. |
URL | https://ieeexplore.ieee.org/document/8379697 |
DOI | 10.1049/cp.2018.0010 |
Citation Key | siddiqui_embedded_2018 |
- Root-of-trust
- MPSoC
- platform module
- policy violation
- potential technical vulnerabilities
- pro-active policy
- pubcrawl
- Quality Control
- Resiliency
- malicious application
- secure IoT technologies
- software security technologies
- SPE approach
- supply chain efficiencies
- system communication bus
- system resources
- Trusted Platfrom Modules
- Zero-day attacks
- computer network security
- ARM TrustZone
- Attack vectors
- authentication mechanisms
- authorisation
- business operations
- chain-of-trust
- commercial building management
- composability
- additional threats
- embedded applications
- embedded hardware
- embedded systems
- end users
- FPGA
- hardware security policy engine
- Internet of Things
- IoT applications