Compliance Evaluation of Cryptographic Security Requirements on IoT Gateways

被引:0
|
作者
Felix, Eduardo F. [1 ]
Lins, Fernando A. A. [1 ]
Nobrega, Obionor O. [1 ]
Gomes, Diego R. [1 ]
Jesus, Bruno A. [2 ]
Vieira, Marco [2 ]
机构
[1] Univ Fed Rural Pernambuco, Recife, PE, Brazil
[2] Univ Coimbra, Coimbra, Portugal
关键词
Security; Internet of Things; Gateway; Cryptography Requirements;
D O I
10.1145/3569902.3569915
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is one of the new trends that has been drawing attention due to its rapid dissemination and acceptance. However, not knowing whether personal data and information are secure can hamper a more widespread acceptance of this technology by users. In this context, the security of one of the main components of the IoT system, the gateway, becomes even more relevant, as it is essential in connecting heterogeneous IoT devices. The IoT gateway ends up centralizing communication and system management, thus becoming a high-value target in terms of security. To improve confidentiality, IoT gateways should use cryptographic services implemented with appropriate configurations based on organizations or technical standards accepted by the scientific community. In this context, the main objective of this paper is to evaluate the security level of IoT gateways considering encryption requirements. For this, a subset of encryption requirements suggested by international technical organizations, such as IoTSF and OWASP, is selected. This evaluation was carried out in the security assessment of four IoT gateways considering cryptographic requirements. None of the gateways achieved more than 80% compliance with the selected requirements, which raises concerns regarding the security of their users' data.
引用
收藏
页码:67 / 72
页数:6
相关论文
共 50 条
  • [21] A PUF-based cryptographic security solution for IoT systems on chip
    Balan, Alexandra
    Balan, Titus
    Cirstea, Marcian
    Sandu, Florin
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [22] An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security
    Youssef, Wajih El Hadj
    Abdelli, Ali
    Dridi, Fethi
    Brahim, Rim
    Machhout, Mohsen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [23] Security Evaluation Over Lightweight Cryptographic Protocols
    Ghoreishi, Seyed-Mohsen
    Razak, Shukor Abd
    Isnin, Ismail Fauzi
    Chizari, Hassan
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 171 - 175
  • [24] SDN-based Predictive Alarm Manager for Security Attacks Detection at the IoT Gateways
    Thorat, Pankaj
    Dubey, Niraj Kumar
    Khetan, Kunal
    Challa, Rajesh
    [J]. 2021 IEEE 18TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2021,
  • [25] A Taxonomy of Security and Privacy Requirements for the Internet of Things (IoT)
    Alqassem, Israa
    Svetinovic, Davor
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 1244 - 1248
  • [26] Security of IoT Application Layer: Requirements, Threats, and Solutions
    Abbasi, Mahmoud
    Plaza-Hernandez, Marta
    Mezquita, Yeray
    [J]. AMBIENT INTELLIGENCE-SOFTWARE AND APPLICATIONS-13TH INTERNATIONAL SYMPOSIUM ON AMBIENT INTELLIGENCE, 2023, 603 : 86 - 100
  • [27] Privacy and Security: Key Requirements for Sustainable IoT Growth
    Assaderaghi, Fari
    Chindalore, Gowri
    Ibrahim, Brima
    de Jong, Hans
    Joye, Marc
    Nassar, Sami
    Steinbauer, Wolfgang
    Wagner, Mathias
    Wille, Thomas
    [J]. 2017 SYMPOSIUM ON VLSI TECHNOLOGY, 2017, : T8 - T13
  • [28] Privacy and Security Requirements Framework for the Internet of Things (IoT)
    Alqassem, Israa
    [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE COMPANION 2014), 2014, : 739 - 741
  • [29] Evaluating existing security and privacy requirements for legal compliance
    Aaron K. Massey
    Paul N. Otto
    Lauren J. Hayward
    Annie I. Antón
    [J]. Requirements Engineering, 2010, 15 : 119 - 137
  • [30] Evaluating existing security and privacy requirements for legal compliance
    Massey, Aaron K.
    Otto, Paul N.
    Hayward, Lauren J.
    Anton, Annie I.
    [J]. REQUIREMENTS ENGINEERING, 2010, 15 (01) : 119 - 137