Protecting endpoint devices in IoT supply chain
Title | Protecting endpoint devices in IoT supply chain |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Yang, K., Forte, D., Tehranipoor, M. M. |
Conference Name | 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) |
Date Published | Nov. 2015 |
Publisher | IEEE |
ISBN Number | 978-1-4673-8388-2 |
Keywords | authentication, authorisation, centralized database, communication efficiency, control chip, data privacy, data transfer, Endpoint Device, endpoint device protection, Hardware, Internet, Internet infrastructure, Internet of Things, Internet of Things (IoT), IoT device authentication, IoT supply chain, privacy, privacy challenges, production engineering computing, pubcrawl170112, radiofrequency identification, RFID tag, RFID-enabled solution, secure access control, security challenges, security issues, supply chain management, supply chain security, Supply chains, Traceability, uniquely identifiable embedded computing devices |
Abstract | The Internet of Things (IoT), an emerging global network of uniquely identifiable embedded computing devices within the existing Internet infrastructure, is transforming how we live and work by increasing the connectedness of people and things on a scale that was once unimaginable. In addition to increased communication efficiency between connected objects, the IoT also brings new security and privacy challenges. Comprehensive measures that enable IoT device authentication and secure access control need to be established. Existing hardware, software, and network protection methods, however, are designed against fraction of real security issues and lack the capability to trace the provenance and history information of IoT devices. To mitigate this shortcoming, we propose an RFID-enabled solution that aims at protecting endpoint devices in IoT supply chain. We take advantage of the connection between RFID tag and control chip in an IoT device to enable data transfer from tag memory to centralized database for authentication once deployed. Finally, we evaluate the security of our proposed scheme against various attacks. |
URL | https://ieeexplore.ieee.org/document/7372591 |
DOI | 10.1109/ICCAD.2015.7372591 |
Citation Key | yang_protecting_2015 |
- IoT supply chain
- uniquely identifiable embedded computing devices
- Traceability
- supply chains
- supply chain security
- supply chain management
- security issues
- security challenges
- secure access control
- RFID-enabled solution
- RFID tag
- radiofrequency identification
- pubcrawl170112
- production engineering computing
- privacy challenges
- privacy
- authentication
- IoT device authentication
- Internet of Things (IoT)
- Internet of Things
- Internet infrastructure
- internet
- Hardware
- endpoint device protection
- Endpoint Device
- data transfer
- data privacy
- control chip
- communication efficiency
- centralized database
- authorisation