Vous êtes sur la page 1sur 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/329514624

IoTeWay: A Secure Framework Architecture for 6LoWPAN based IoT Applications

Conference Paper · December 2018


DOI: 10.1109/GCIoT.2018.8620137

CITATIONS READS
2 331

2 authors, including:

Mohamed Seliem
University College Cork
9 PUBLICATIONS   34 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Privacy preserving in IoT environments View project

Web of Objects View project

All content following this page was uploaded by Mohamed Seliem on 08 December 2018.

The user has requested enhancement of the downloaded file.


IoTeWay: A Secure Framework Architecture for
6LoWPAN based IoT Applications
Mohamed Seliem, Khalid Elgazzar
Center for Advanced Computer Studies
University of Louisiana at Lafayette, USA
mohamed.seliem1, elgazzar@louisiana.edu

Abstract— Smart devices “things”, connected to the exchanged in such a constrained network. In this Paper, we
Internet, form a huge network to bring the physical systems propose IoTeWay, a novel framework that incorporates
“humans world” to the information systems “digital world”, security measures for all stack tiers in 6LoWPAN based IoT
which we call it the Internet of Things (IoT). These smart applications.
devices exist in many applications such as Smart spaces, cities,
grids, health monitoring, smart Industries, car, TV, Our framework follows a hierarchical structure and
networking and big data. Although several customers have consists of three tiers with distributed security and privacy-
adopted the IoT applications, still its infrastructure faces preserving measures in each tier. (1) The first tier is the
major security and privacy challenges. Those challenges lie in smart devices tier that contains all the resources that collect
the different communication model layers starting from the or control data. The devices in this tier are highly
physical layer, ending up in the running application layer, and heterogeneous and resource constrained, which make them
passing through the network layer. This paper presents subject to several attacks such as node capture, timing attack,
IoTeWay, a secure framework that targets IoT applications replay attack, and mass node authentication problem.
built on top of IPv6 Low Power Networks. IoTeWay divided Therefore, we adapt and modify the security mechanisms in
into three main tiers: smart devices tier, platform and conventional Internet protocols to fit these devices. (2) The
infrastructure tier, and the application tier. Besides, a cloud second tier is the platform and infrastructure tier that is
supporting tier to serve the large-scale IoT networks. Our similar to the traditional network tier, where data is
experimental verification, based on Smart homes application,
preprocessed to reduce the requirements in the application
and our theoretical analysis shows that IoTeWay provides an
excess of security and offers resiliency against famous security
tier. Moreover, it contains the 6LoWPAN adaptation layer
attacks. where IPv6 packets processed to be ready for transmission
over IEEE 802.15.4 unreliable links. This tier suffers from
Keywords—IoT, Security, Privacy, 6LoWPAN, Network general security problems such as unauthorized access,
Architecture. eavesdropping information, confidentiality or integrity
damage, and Man-in-the-Middle attacks, which threaten data
integrity and confidentiality. Therefore, we set up a cohesive
I. INTRODUCTION
authentication mechanism with a lightweight public key
The Internet of Things has been grown and extended to infrastructure to secure the end-to-end communication. (3)
different domains and applications [1] such as healthcare, Final Tier is the Application Tier that provides necessary
energy, smart cities, Industry, Environment, and support for the IoT infrastructure such as smart homes,
Entertainment. According to the 2017 report of the Internet of Medical devices (IoMT), and intelligent
International Data Corporation [2], forecasts that in the near transportation. IoT applications are versatile and
future, billions of smart devices will be capable to speak to heterogeneous with varying needs, which oppose a challenge
each other, exchange data, and make a decision to actuate the in providing a standard support. Therefore, in our application
surrounding environment to provide custom services. A huge tier, we tackle such a problem by providing non-technical
market opportunity with over $19 trillion market share value. and technical security measures to preserve users’ privacy.
However, as a new evolving technology, IoT faces many
challenges and drawbacks especially in terms of security and The contributions of this paper can be summarized as
privacy. The reason is that IoT devices collect and exchange follows: (1) A lightweight, private, and secure framework
very sensitive and private data about its customers. Further, architecture to secure 6LoWPAN based IoT applications. (2)
many IoT devices are resource constrained for low cost, We build a smart home use case based on our framework for
which aggravates the security challenge, as they cannot reliability testing. (3) We provide quantitative arguments to
afford the high resource requirements of complex and prove that our framework meets meeting security and
heavyweight traditional security algorithms. privacy goals such as confidentiality, authenticity,
availability and integrity. The rest of the paper is organized
IPv6 Lossy and Low Power Wireless Personal Area as follows. Section II provides an overview of the proposed
Networks (6LoWPAN) [3] is used to connect such low framework architecture. Section III we develop a smart home
power, IPv6 driven nodes and large mesh network to the use case based on IoTeWay, explain its components and their
internet, which makes this technology a great choice to build functionality. In section IV, we discuss the security measures
IoT applications. The Internet engineering task force (IETF) incorporated in the smart home use case. In section V, we
formed a 6LoWPAN working group to define certain analyze and evaluate the performance of the proposed
mechanisms (Header compression, fragmentation, and 16-bit framework based on state-of-the-art security measures.
mesh addressing) that allow the transmission of IPv6 packets Section VI highlights some of the related work and Section
over IEEE 802.15.4 (MTU=127 bytes). Over 50 companies VII concludes the work presented in this paper.
made an effort in trying to standardize a protocol, to run over
6LoWPAN layer, called Thread [4] that optimally connect
II. IOTEWAY FRAMEWORK ARCHITECTURE
and control smart home devices. However, the nature of
6LoWPAN networks requires a special, lightweight, and Figure 1 shows the abstract architecture of the proposed
distributed security measures to secure and preserve the IoTeWay framework for 6LoWPAN based IoT applications,

XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE


which encompasses multiple tiers that interact and exchange Information Management Physical
Security Security Security
data with each other. Information, management, and physical
security measures are considered for each tier. Therefore, Application Service Data Security
exchanged data confidentiality and integrity is preserved. (smart homes, smart cities…etc.)
Application tier
The hierarchical framework structure consists of three tiers Application Support tier
as follows. (Cloud, Edge, ….etc.)
Platform and
A. Smart Devices Tier Infrastructure Network transmissions and information
(TCP/IP, UDP, mobile communication,
This tier consists of all the smart devices in the domain, tier 6LoWPAN)
which vary according to the application context. For
Smart Devices Device Layer Local Security
example, in smart houses (temperature, humidity, and smoke tier (Sensor, Actuators, BLE, ZigBee, IEEE 802.15.4)
sensors…etc.). However, in IoMT (heartbeat monitoring,
blood pressure, and pacemakers). In general, these devices Secure Secure data Secure data
are limited in memory (~Kbytes), processing capabilities (8- information in transmissions in
network
streams in the
upper stack layers physical layer
bit Microcontroller units), and energy (battery operated). management layers
Therefore, such resources barely operate a lightweight
operating system and the running application on top of these Figure 1. IoTeWay 3-tiers framework architecture.
devices. Thus, IoTeWay tends to optimize all the operating
systems protocols to allow enough room for implementing Therefore, we utilize network virtualization to reduce the
the following security measures: (a) Physical security, we management complexity. Moreover, adopting IPv6 as the
use IPsec/6LoWPAN extension [5] to secure the main network layer protocol makes use and inherits its well-
communication channel and protect the data exchanged designed security mechanism. This tier deals with the
between the devices. (b) Management Security: we use transmitted information as chunks or packets. Therefore,
Identity Based Credentials (IBC) for device authentication, information security is part of the aforementioned
which is only based on the device identity. Besides, applying management security measures. However, IoTeWay uses a
lightweight access control to prevent open and unauthorized cohesive end-to-end authentication to distribute the network-
access. (c) Information Security: the data collected by these wide key securely.
devices are very sensitive and part of it is personal.
Therefore, data encryption and cryptography techniques are C. Application Tier
essential to preserve users’ privacy. The non-linear key based This tier encompasses two sub-tiers: the supporting tier
on displaced calculations, digital signatures, and simplified where the framework depends on the cloud resources to run
hash functions require low computational power compared to the analytical services, apply the complex security
the high level of security and the good data transmission rate, algorithms, and store the huge amount of the collected data.
they provide. In addition, we assume that each smart device Cloud servers and data centers host this sub-tier; the security
exposes a single credential, which a more capable device of the cloud is out of the paper scoop but [6] contains a
issues, this device operates in the infrastructure layer (e.g. decent guide for securing cloud entities. The other sub-tier is
gateway, or cloudlet). Thus, it can move part of the the application services tier where the support from the
encryption overhead to the network edge. infrastructure tier is used to provide IoT customers with
certain services such as Smart homes, IoMT, Industrial IoT,
B. Platform and Infrastructure Tier Smart cities…etc. the importance of securing this tier is that
This tier consists of all the supporting and managing it interacts with the customers directly, so any breach or
platforms and infrastructure. The operating devices in this failure will lead to customers’ dissatisfaction. Although,
tier, such as routers, switches, and gateways, have more different IoT applications target different domains, which
processing capability. Therefore, it provides intelligent data makes it challenging to provide standard security measures
preprocessing to reduce resource requirements at the but we provide different security aspects that differ from the
application layer. However, due to the heterogeneity and the previous tiers. (a) Technical security aspects: we use the
huge scale of IoT and its applications, poses some general password-authenticated key agreement with asymmetric
security problems related to data integrity and elliptic curve technique to create a strong-shared secret
confidentiality. Although the traditional network protocols between the application, running in top of application tier
implement highly secured measures, such measures designed device (commissioner), and the new added smart devices tier
for the traditional internet of people, do not necessarily apply device (joiner). (b) Non-technical security aspects: we
to the new internet of machines. As such, IoT-oriented provide security awareness embedded in the user interface
security mechanisms must be considered to fit IoT application, which highlights the information regarding
applications with the following security measures: (a) private data collection, potential risks, how to use IoT
Physical security: we use a Public key infrastructure (PKI) to services safely, and to avoid private information leakage.
encrypt the data exchanged between the operating platforms III. IOTEWAY-BASED SMART HOME USE CASE
in this tier. (b) Management Security: is the most important
measure in this tier, as the function of such an intermediate The smart home is one of many IoT applications that is
tier is to support and manage the data exchanged between the widely spread in today’s market. Users install a group of IoT
smart devices in the devices tier. Besides, it manages and devices in the surrounding environment to monitor physical
preprocesses the data transmission for the running quantities (e.g., temperature, humidity, air pollution), to
application in the application tier. enhance their quality of life. In this section, we use our
IoTeWay framework to build a smart home scenario.
Figure 2: IoTeWay based Smart home Architecture

Figure 2 depicts the architecture for the smart home protection, and support large-scale IoT deployment.
application. It primarily relies on three main components Additionally, enable remote users to have control over
to cover the previously mentioned tiers. their resources and services. The cloud infrastructure
encompasses the different type of servers to (a) connect
A. Smart mesh devices for constructing the smart home users with their devices by establishing a persistent and
network secure connection with the server throughout the
communication session. (b) Register users to perform the
Smart devices (sensing and actuating IoT nodes) that
authentication and authorization processes. Additionally
construct mesh IPv6 Low-Rate Wireless Personal Area
create, maintain, validate and refresh access tokens for
Network (6LoWPAN). Each device implements the
registered users. (c) Provide a large storage space to handle
6LoWPAN protocol stack with 6LoWPAN ND, RPL, and
the big collected and exchanged data. The final
CoAP incorporated. These smart devices marked as a
component of the architecture is to allow human
6LoWPAN node (6LN) and classified into two types:
interaction with the system, through providing a simple
either a router (6LR) when it supports full functional
and yet exciting user interface and experience. IoTeWay
capabilities (e.g. routing packets to and from other nodes),
supports different types of interactions such as close by
or a host (6LH) when it has reduced functionalities.
interaction where users can reach the 6LoWPAN gateway
Generally, a 6LN has the following capabilities: (1) CoAP
without need any internet access, or remote interaction
server to submit readings to the gateway. (2) Gateway
where users are out of reach and in need to have internet
client process to construct the network tree. (3) Clients
access to benefit from their desired service. The variations
directory to detect the abnormal events (e.g., the unpaired
of interactions depend on the application type, therefore in
client tries to obtain data from the node).
the smart home application, user choose the way to interact
with the systems provided that he has the privileges and
B. Smart home gatway and border router authority to do so. A web application and mobile
While smart home border router (6LBR) connects to application are provided, which encapsulates the security
peer devices over IEEE 802.15.4, the smart home gateway measures aforementioned for the application tier.
connects to the Internet through IEEE 802.11 (WIFI), or
IEEE 802.3 (Ethernet). Both of them operates together to IV. IOTEWAY-BASED SMART HOME SECURITY
manage the smart home network and provide the following
MEASURES
capabilities: (1) local managing entity to constructing the
network tree and route the communication packets In this section, we provide a closer look at the security
between the devices and each other. (2) A gateway to the measures, which are incorporated in the IoTeWay smart
cloud interface to support remote users. Furthermore, the home application.
presence of a 6LBR and the gateway at the border of LLN Secure stack protocols: IoTeWay uses well-established
is essential for several reasons: 1) network isolation to standardized protocols to secure the devices and the
protect constrained devices from unauthorized access. 2) communications in each tier. Those protocols are similar
Web integration support with secure HTTP access. 3) to traditional protocols but optimized to meet the IoT
Resource caching to provide high availability of resources. requirements. For example, Datagram transport layer
4) Load reduction through data preprocessing (e.g., security (DTLS) [7], based on internet TLS, which
filtering and summarization) for data collected from provides private and secure communication between
constrained devices. 5) Various data formats support, devices and prevents snooping, interfering, or message
which are suitable for constrained applications (e.g., XML, falsification. In addition, 6LoWPAN IPsec [5], based on
JSON). 6) Privacy policy execution in case of control or IPsec, which provides end-to-end security rather than hop
data traffic exchange. by hop. Besides, it secures all IPv6 communication
(ICMP, UDP and TCP) using the same mechanisms.
C. Supporting cloud servers and human interaction
interface Network-wide key: IoTeWay uses both asymmetric and
symmetric key cryptography. First, it uses the public key
IoTeWay leverages a cloud infrastructure to deploy algorithm (PKA), which underlies the DTLS protocol, to
strict security measures on the cloud for better data
transfer the symmetric encryption key (session key) as safely. In addition, the user will be aware of the purpose of
PKA does not require a secure channel initially to collecting this data, what is used for, why, and who use it.
exchange the secret session keys between parties. Then, As well, in case of a data breach, user be notified to ensure
the same cryptographic key is used for both collected data that this breach is revealed and addressed..
encryption and the ciphertext decryption on the receiver
side as symmetric encryption/decryption is simpler and V. IOTEWAY FRAMEWORK ANALYSIS
much faster. Additionally, symmetric key cryptography
provides (a) Integrity protection through the integrity We analyze the security performance of our IoTeWay
check tag embedded in each message, which can be framework from two perspectives: prone to security
verified at the recipient side. (b) Payload encryption attacks and the application functionalities. Initially, we
through scrambling its content to prevent the attacker from provide a brief theoretical discussion to show the
interpreting this content. resistivity of the framework and the explained smart home
use case to security attacks. Further, we study the
Key agreement: when a new device joins the smart home computational and communication cost to evaluate the
network, it requires the network-wide key to encrypt its system performance.
collected data. However, exchanging the key on the air
without any protection compromises the whole network. A. Security Analysis
Therefore, we use the password-authenticated Key (PAK)
Diffie-Hellman, a public key algorithm, to distribute the In the following, we describe how IoTeWay based
network key securely. PAK requires both parties the joiner smart home use case meets the fundamental security
(new device) and the commissioner (recipient, gateway, or requirements including confidentiality, integrity,
smartphone) to create their own secret, random numbers availability, authentication, and customer control.
and exchange the exponentiation of their respective Confidentiality: only authorized user or device, with a
numbers. Then, it creates a high strength shared secret network-wide key, can decrypt the received encrypted
between both parties that is used to encrypt the messages. Our network wide-key and the key agreement
communication of the network-wide key, which makes it assure such requirement. Additionally, the (PAK) Diffie-
secured against what is called offline dictionary analysis. Hellman and the system counter assure the secure
Authorization: the newly added device is authorized to distribution and maintenance of the network key.
join the smart home network when receiving the network- Integrity: All system messages are encrypted, and only
wide key from the network gateway or border router. authorized data owners can hold the high strength shared
Initially, the network gateway runs neighbor discovery secret. This provides high-security measures even if
protocol [8] and in case of finding new nodes, it consults communication channels are compromised, which is
the network administrator to decide whether to add or unlikely to happen with the secure incorporated protocols.
ignore these nodes. Then, the PAK key is created for the
new node to be able to decrypt the received encrypted key Availability: IoTeWay considers energy saving and
from the gateway and be authorized. IoTeWay also allows reducing the communications overhead. 6LoWPAN
authorization through allowing the network admin to scan protocol stack can set the network devices to communicate
QR codes from the newly installed device, establish the their measurements only when the threshold is reached,
public key, and then share this information with the otherwise remain standby, keep monitoring, or sleep. This
network gateway. Therefore, the gateway can authorize increases the device lifetime and improves availability.
this device by sending the network-wide key. Other security requirements such as authentication and
Authentication: IoTeWay implements the authentication authorization were discussed in the previous section.
process in each tier. (a) Authentication between the newly Therefore, we will proceed with our theoretical analysis
added device and the network border router or gateway for the effectiveness of our proposed framework against
through completing the authorization process. famous attacks such as (a) Distributed denial of service
(b) Authorizing customers to access and control the smart attack (DDOS), in which the invader manages to infect
home services. Users in the network gateway range, who several smart home devices and exploit them to
own a network-wide key, get access through the gateway. overwhelm a targeted network device until it fails. The
However, users, far from home, have to log in with their IoTeWay-based smart home consists of hierarchical tiers,
cloud account to verify their credentials and authority in each tier equipped with several security measures, which
accessing and controlling the smart home network. makes it hard to gain authority offer any network device
without being compromised. For example, the invader has
Maintenance: IoTeWay periodically changes the actual to crack the network gateway, crack the network key
key that secures the network messages. The change agreement before being able to communicate with any
happens through maintaining a system counter that is network device, and then try to install malware, which is
combined with the network-wide key to derive this actual very hard considering the final security measures deployed
key. Therefore, even if the attackers managed to obtain the in the device itself. Therefore, we proclaim that the
key through brute force, it will be for a limited period. IoTeWay framework is resilient to DDOS attack. (b)
Privacy and security preserving: In compliance with Linking attack, in which the invader manages to create a
GDPR [9] requirements, IoTeWay based smart home link between the data exchanged through the network to
application provides users with the consent of subjects for infer personal information or interests related to
data processing. The application that runs on the user technology users. In IoTeWay, all the communication
platform (pc or smartphone) implements the privacy between devices through the network is encrypted.
regulations to handle the transfer of the personal data Messages only are decrypted at the application tier to
provide the users with a high-quality service. Therefore,
invaders only can obtain information through the brute Base IoTeWay based Smart home
force, in this case, the system has the intelligence to 50
identify the security breach and lock the communication
45
flow until the network gets maintained. 42.25
36 39.75

Network overhead(ms)
40

B. Performance evaluation 35 33.5


30
We evaluate our IoTeWay smart home use case and 30 26 25.5
27
compare its performance to the traditional deployment of 25
6LoWPAN smart home network. We use both simulation 19 22

and actual implementation to evaluate the proposed 20

framework over Contiki 3.0. We use the Cooja simulator 15


[10] to define a variable number of randomly deployed 10
nodes to construct the 6LoWPAN, which ranges from 10
5
to 50 nodes per gateway. We run 10 experiments at a 5-
minutes interval and the average is calculated with a 95% 0
confidence interval. Therefore, we can assess the network 10 20 30 40 50

overhead due to the extra packets exchanged between the Network Size
devices such as key distribution, authentication, and other
security-related traffic. Such overhead adds time delay to Figure 3: Network overhead due to the added security requirements
for variable network size
the packets transmitted through the network.
Figure 3 shows the end-to-end delay due to network
overhead for varying network size. Due to the additional REFERENCES
network management traffic, encryption, and other hashing [1] Lee, In, and Kyoochun Lee. "The Internet of Things (IoT):
operations, our framework adds extra processing time Applications, investments, and challenges for enterprises."
compared the base 6LoWPAN. However, the extra delay Business Horizons 58, no. 4 (2015): 431-440..
is in terms of milliseconds (~ 10 to 40 ms). We argue that [2] Worldwide Internet of Things Forecast, 2017–2021, Sep 2017 |
Doc #US43087717 | Market Forecast. [Online]. Available:
with such a non-significant overhead, our framework
https://www.idc.com/getdoc.jsp?containerId=IDC_P24793
provides high security and privacy preserving in
6LoWPAN based IoT applications. [3] Kushalnagar, Nandakishore, Gabriel Montenegro, and Christian
Schumacher. IPv6 over low-power wireless personal area networks
(6LoWPANs): overview, assumptions, problem statement, and
VI. RELATED WORK goals. No. RFC 4919. 2007.
[4] Thread. https://www.threadgroup.org/
Several efforts have been targeted the security
[5] Raza, Shahid, Simon Duquennoy, Joel Höglund, Utz Roedig, and
challenges in IoT applications. Authors in [11] bring Thiemo Voigt. "Secure communication for the Internet of Things—
together a classification for computing threats and its a comparison of link‐layer security and IPsec for 6LoWPAN."
countermeasures with respect to reliability and security. In Security and Communication Networks 7, no. 12 (2014): 2654-
[12], the ENISA study proposes an end-to-end resilient 2668.
security method by providing an ontology that [6] Krutz, Ronald L., and Russell Dean Vines. Cloud security: A
incorporates different network domains and assists in comprehensive guide to secure cloud computing. Wiley Publishing,
2010.
hiding the heterogeneity of the underlying infrastructure.
[7] Rescorla, Eric, and Nagendra Modadugu. "RFC 6347." Datagram
In [13], a secure framework is offered that includes tools transport layer security version 1 (2012).
to detect and react to intrusion and security breaches.
[8] Seliem, Mohamed AM, Khaled MF Elsayed, and Ahmed Khattab.
However, these efforts are mainly concerned about "Optimized neighbor discovery for 6LoWPANs: Implementation
separate application domains and rely on human and performance evaluation." Computer Communications 112
intervention in order to resolve problems, which cannot be (2017): 73-92.
applicable in huge and dynamic IoT environments. [9] Team, ITGP Privacy. EU general data protection regulation
(GDPR): an implementation and compliance guide. IT Governance
VII. CONCLUSION Ltd, 2017.
Security of IoT application is a key challenge for the [10] Osterlind, Fredrik, Adam Dunkels, Joakim Eriksson, Niclas Finne,
and Thiemo Voigt. "Cross-level sensor network simulation with
adoption of the technology, especially in constrained cooja." In Local computer networks, proceedings 2006 31st IEEE
environments such as 6LoWPAN. In this paper, we conference on, pp. 641-648. IEEE, 2006.
present IoTeWay a secure framework for 6LoWPAN- [11] A. Aviienis et al., “Basic Concepts and Taxonomy of Dependable
based IoT Applications. We present the security measures and Secure Computing,” IEEE Trans. Dependable and Secure
for each tier of the framework, and we use a smart home Computing, vol. 1, no. 1, Jan.–Mar. 2004, pp. 11–33.
application built on top of our framework to assess the [12] ENISA, 2011, Ontology and Taxonomies of Resilience,
reliability and analyze these suggested security measures. http://www.enisa.europa.eu/activities/identity-andtrust/technology-
for-resilience/ontology/ontology_taxonomies/
Our analysis and performance evaluation demonstrates that at_download/fullReport.
our framework provides a secure environment with no
[13] M. Chora et al., “Ontology-Based Decision Support for Security
Significant overhead on end-to-end delay or energy Management in Heterogeneous Networks,” LNCS, vol. 5755/2009,
consumption. To the best of our knowledge, our 2009, pp. 920–27.
framework is well established to fit in any 6LoWPAN-
based application, even though in this paper we introduced
the smart home use cases, it might be extended to fit other
applications.

View publication stats

Vous aimerez peut-être aussi