Visible to the public A Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale

TitleA Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale
Publication TypeConference Paper
Year of Publication2019
AuthorsKandah, Farah, Cancelleri, Joseph, Reising, Donald, Altarawneh, Amani, Skjellum, Anthony
Conference Name2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
Keywordsauthentication, blockchain, Blockchain protocols, Byzantine actor, citizen welfare, communication reliability, Communication system security, communication technologies, computer network security, cps privacy, cryptocurrencies, cryptographic protocols, cyber physical systems, Cyber-physical systems, data privacy, distribution framework, enhanced device identity, entity trust, hardware-software codesign, hardware-software codesign approach, Human Behavior, human factors, Internet, Internet of Things, IoT, IoT-CPS, multitier methodology, operational efficiency, privacy, pubcrawl, quality of service, quality of services, radio frequency-distinct native attributes, RF-DNA, RF-DNA Fingerprinting, smart cities, Support vector machines, system trustworthiness, Transmitters, Trust management, trust-building, Trusted Computing, Wireless communication
AbstractAdvancement in communication technologies and the Internet of Things (IoT) is driving adoption in smart cities that aims to increase operational efficiency and improve the quality of services and citizen welfare, among other potential benefits. The privacy, reliability, and integrity of communications must be ensured so that actions can be appropriate, safe, accurate, and implemented promptly after receiving actionable information. In this work, we present a multi-tier methodology consisting of an authentication and trust-building/distribution framework designed to ensure the safety and validity of the information exchanged in the system. Blockchain protocols and Radio Frequency-Distinct Native Attributes (RF-DNA) combine to provide a hardware-software codesigned system for enhanced device identity and overall system trustworthiness. Our threat model accounts for counterfeiting, breakout fraud, and bad mouthing of one entity by others. Entity trust (e.g., IoT devices) depends on quality and level of participation, quality of messages, lifetime of a given entity in the system, and the number of known "bad" (non-consensus) messages sent by that entity. Based on this approach to trust, we are able to adjust trust upward and downward as a function of real-time and past behavior, providing other participants with a trust value upon which to judge information from and interactions with the given entity. This approach thereby reduces the potential for manipulation of an IoT system by a bad or byzantine actor.
DOI10.1109/iThings/GreenCom/CPSCom/SmartData.2019.00191
Citation Keykandah_hardware-software_2019