How much Security for Switching a Light Bulb – The SOA Way

34
How much Security for Switching a Light Bulb – The SOA Way Sebastian Unger, Stefan Pfeiffer, Dirk Timmermann University of Rostock, Germany Institute of Applied Microelectronics and Computer Engineering

description

How much Security for Switching a Light Bulb – The SOA Way. Sebastian Unger, Stefan Pfeiffer, Dirk Timmermann University of Rostock, Germany Institute of Applied Microelectronics and Computer Engineering. Motivation. - PowerPoint PPT Presentation

Transcript of How much Security for Switching a Light Bulb – The SOA Way

Page 1: How much Security for Switching a Light Bulb – The SOA Way

How much Security for Switching a Light Bulb –The SOA Way

Sebastian Unger,Stefan Pfeiffer, Dirk Timmermann

University of Rostock, Germany

Institute of Applied Microelectronics and Computer Engineering

Page 2: How much Security for Switching a Light Bulb – The SOA Way

Motivation

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 2

Q: What will you get from this presentation (or from reading the paper)?

Page 3: How much Security for Switching a Light Bulb – The SOA Way

Motivation

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 3

Page 4: How much Security for Switching a Light Bulb – The SOA Way

Motivation

Q: What will you get from this presentation (or from reading the paper)?

A: Introduction to problems with security for distributed embedded devices

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 4

Page 5: How much Security for Switching a Light Bulb – The SOA Way

Agenda

• Introductive scenario and derived key

features

• State of the art and problem statements

• Outlook

• Conclusion

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 5

Page 6: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Light Bulbs – The classical approach

light bulbs

switches

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 6

Page 7: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Security Key Features

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 7

Page 8: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Security Key Features

Authenticity

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 8

Page 9: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Security Key Features

Authenticity

Integrity

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 9

Page 10: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Security Key Features

Authenticity

Integrity

Confidentiality

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 10

Page 11: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Security Key Features

Authenticity

Integrity

Confidentiality

Authorization

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 11

Page 12: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Security Key Features

Authenticity

Integrity

Confidentiality

Authorization

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 12

Page 13: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Light Bulbs – The IoT approach

light bulbs

switches

SOA engine

digitalSTROM-module

SOA engine

PLC-module

Internet /LAN

SOA engine

smart-phone

SOA engine

PC

SOA engine

IoT wall-switch

ZigBEE

digitalSTROMIEEE 802.15.4

PLC

WiFi

Ethernet

6LoWPAN-module

SOA engine

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 13

Page 14: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Security Key Features IoT

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 14

Page 15: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Security Key Features IoT

Seemless integration of new devices, includes negotiation of suitable authentication

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 15

Page 16: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Security Key Features IoT

Seemless integration of new devices, includes negotiation of suitable authentication

Securely remove devices from network

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 16

Page 17: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Security Key Features IoT

Seemless integration of new devices, includes negotiation of suitable authentication

Securely remove devices from network

Let participants gather security information about each other

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 17

Page 18: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Security Key Features IoT

Seemless integration of new devices, includes negotiation of suitable authentication

Securely remove devices from network

Let participants gather security information about each other

Plus: all this across different trust domains

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 18

Page 19: How much Security for Switching a Light Bulb – The SOA Way

Scenario: Security Key Features IoT

Seemless integration of new devices, includes negotiation of suitable authentication

Securely remove devices from network

Let participants gather security information about each other

Plus: all this across different trust domains

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 19

Page 20: How much Security for Switching a Light Bulb – The SOA Way

Problem Statement

Development of (new) security concepts is cumbersome and expensive

Technology designers tend to fall back on existing security techniques (even, if they are not ideal)

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 20

Page 21: How much Security for Switching a Light Bulb – The SOA Way

Terminology

What are those techniques and why are the not ideal?

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 21

Page 22: How much Security for Switching a Light Bulb – The SOA Way

MAC Layer Security

subnet subnet

Same key for everyone

- or -

Different key for everyone

MACLayer

Security ≙router

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 22

Page 23: How much Security for Switching a Light Bulb – The SOA Way

IP Sec

Transport ModeTunnel Mode

subnet subnet

routernode IPSec Gateway

IPSec is complex!

Vendor A Vendor B

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 23

Page 24: How much Security for Switching a Light Bulb – The SOA Way

Transport Layer Security (TLS aka. SSL)

TLS

PHYMAC

Internet

TransportApplication

TCP!

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 24

Page 25: How much Security for Switching a Light Bulb – The SOA Way

Conclusion Network Stack Security

• Existing basic security mechanisms not ideal for embedded

devices

• Solve single aspects only and are not suitable for embedded

devices

Security should be covered on application layer

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 25

Page 26: How much Security for Switching a Light Bulb – The SOA Way

Cooltown[1] Amigo[2]

Hydra/Linksmart[3]

PEIS[4]

SM4ALL[5]

ubiSOAP(PLASTIC)[6]

PECES[7]

MundoCore[9]

GREEN[8]

Gaia[10]

MobiPADS[11]

iCOCOA[12]PACE[13]

Cooltown[1]

PEIS[4]

SM4ALL[5]MundoCore[9]

GREEN[8]MobiPADS[11]

iCOCOA[12]PACE[13]

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 26

Application Layer Security: Academic Reserach Projects

Page 27: How much Security for Switching a Light Bulb – The SOA Way

Conclusion Application Layer Security

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 27

• Security often not considered at all

• If considered, then…

… employed technologies not suitable for embedded devices

… only single issues solved

No interoperability between approaches

Page 28: How much Security for Switching a Light Bulb – The SOA Way

Web Services

WS-Security Suite

Do not reinvent the wheel

Instead:

• Find existing solution from different domain

• isolate core concepts

• develop methodology to transport core

concepts to domain of embedded devices

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 28

Outlook: Future Work

Page 29: How much Security for Switching a Light Bulb – The SOA Way

Web ServicesDevices Profile for

WS-Security SuiteDevices Profile for

Do not reinvent the wheel

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 29

Outlook: Future Work

Page 30: How much Security for Switching a Light Bulb – The SOA Way

• Communication technology for distributed systems

• Base technology (Web Services) already adapted to embedded

devices (DPWS)

• WS Security suite offers all requested core features (message and

connection level security, trust and authorization brokering, …)

• Abstract Web Services to create security concept for any service-

oriented communication technology

• Open technology fosters interoperability

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 30

Future Work in Detail

Page 31: How much Security for Switching a Light Bulb – The SOA Way

• Although often employed, existing basic technologies

(IPSec, TLS, …) not ideal

• Many approaches on application layer security exist but

• they often solve single aspects only

• are not interoperable

Future WS Compact Security has the potential to form a basis for an

interoperable security concept for distributed embedded devices

(disregarding the base technology)

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 31

Conclusion

Page 32: How much Security for Switching a Light Bulb – The SOA Way

Bibliography (1)

[1] Barton, John; Kindberg, Tim: The Cooltown User Experience / Hewlett Packard Laboratories Palo Alto. 2001. Technical

Report

[2] IST Amigo Project: Ambient Intelligence for the networked home environment (Project Description). September 2004

[3] Eisenhauer, M.; Rosengren, P.; Antolin, P.: A Development Platform for Integrating Wireless Devices and Sensors into

Ambient Intelligence Systems. SECON Workshops 2009

[4] Saffiotti, A. et al.: The PEIS-Ecology Project: vision and results. In: IEEE/RSJ Int. Conf. on Intelligent Robots and

Systems (IROS). 2008

[5] Baldoni, R.: An Embedded Middleware Platform for Pervasive and Immersive Environments for-All. SECON

Workshops 2009

[6] PLASTIC Consortium: A B3G Service Platform: The IST PLASTIC Projects. Technical Report

[7] Handte, M. et al.: D4.1 Secure Middleware Specification - Version 1.4 / Peces - Pervasive computing in embedded

systems. 2010. Technical Report

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 32

Page 33: How much Security for Switching a Light Bulb – The SOA Way

Bibliography (2)

[8] Sivaharan, T et al.: GREEN: A Configurable and Re-Configurable Publish-Subscribe Middleware for Pervasive

Computing. In: Building 3760 LNCS (2005)

[9] Aitenbichler, M. et al.: MundoCore: A Light-weight Infrastructure for Pervasive Computing. In: Pervasive and Mobile

Computing (2007)

[10] Román, M. et al.: Gaia: a middleware platform for active spaces. In: SIG-MOBILE Mob. Comput. Commun. Rev. 6

(2002)

[11] Chan, A.; Chuang, S.-N.: MobiPADS: A Reflective Middleware for Context-Aware Mobile Computing. In: IEEE Trans.

Softw. Eng. 29 (2003)

[12] Ben Mokhtar, S et al.: COCOA: COnversation-based service COmposition in pervAsive computing environments with

QoS support. In: Journal of Systems and Software 80 (2007)

[13] Henricksen, K. et al.: Middleware for Distributed Context-Aware Systems. In: On the Move to Meaningful Internet

Systems 2005: CoopIS, DOA, and ODBASE

[14] Ellison, C.: UPnP Security Ceremonies Design Document.

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 33

Page 34: How much Security for Switching a Light Bulb – The SOA Way

Thank you!

Any questions?

Thank you very much for your attention!

08/30/2012 Sebastian Unger – University of Rostock – [email protected] 34