Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model...

21
Smart Cameras with onboard Signcryption for securing IoT Applications β„Ž β„Ž β„Ž Institute of Networked and Embedded Systems, Alpen-Adria-UniversitΓ€t Klagenfurt, Klagenfurt Austria { subhan.ullah, bernhard.rinner}@aau.at Department of Electrical, Electronic, Telecommunications Engineering and Naval Architecture, University of Genova, Genova Italy [email protected]

Transcript of Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model...

Page 1: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Smart Cameras with onboard Signcryption for securing IoT Applications

π‘†π‘’π‘β„Žπ‘Žπ‘› π‘ˆπ‘™π‘™π‘Žβ„Ž π΅π‘’π‘Ÿπ‘›β„Žπ‘Žπ‘Ÿπ‘‘ π‘…π‘–π‘›π‘›π‘’π‘Ÿ πΏπ‘’π‘π‘–π‘œ π‘€π‘Žπ‘Ÿπ‘π‘’π‘›π‘Žπ‘Ÿπ‘œ

I n s t i t u te o f N e t wo r ke d a n d E m be dde d Sy st e ms ,

A l p e n - A d r i a - U n i ve rs i tΓ€t K l a ge nf ur t , K l a ge nf u r t A u st r i a

{ s u b ha n . u l l a h , b e r nh a rd . r i nn e r } @ a a u . at

D e p a rtme nt o f E l e c t r i ca l , E l e c t ro n i c , Te l eco mmu ni cat i o ns E n g i n eer i ng a n d

N ava l A rc h i te c t u re , U n i ve rs i t y o f G e n ova , G e n ova I t a l y

l u c i o . Ma rc e na ro @ u ni ge . i t

Page 2: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Smart cameras in IoT applications Sensing, processing,

communication on a single platform

Event-triggered monitoring

Smart cameras captures personal data

Security mechanisms to ensure confidentiality, authenticity, integrity and freshness of data

Challenges Real-time performance

Resource limitations

High volume of data

Open infrastructure

Introduction

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 2

Page 3: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

System architecture

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 3

ROI: Region of Interest

Page 4: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Security approach

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 4

ROI: Region of Interest

Add encryption and digital

signature to protect data

Page 5: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Threats model

Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image data Encryption of images on sensing unit ensure confidentiality

Attackers needed decryption key to eavesdropped encrypted data during transmission

Data modification Attackers can change, inject or delete images on camera host or during the

transmission Digital signatures of images on sensing unit ensure integrity Attackers required private key for modification of signed images/video frames

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 5

Page 6: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Threats model

Impersonation Attackers using the identity of a sensing unit to transmit its own images Digital signatures applying to images on sensing unit ensure authentication Attackers required private key of sensing unit to impersonate the data

Replay attack Correct timestamping provides freshness Attackers can transmit the same valid information repeatedly Or delivers outdated information as fresh one

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 6

Page 7: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

State-of-the-art (protection of images/videos)

Image or video security and protection Digital Watermarking approach [V. M. Potdar_2005] [P. W. Wong_1998]

Integrity verification

Detection of changes in size or pixel values

Watermarking computationally expensive for IoT devices

Watermarking then AES encryption [S. P. Mohanty_2009]

Integrity and confidentiality

Computationally expensive for IoT devices

Digital signature [P. K. Atrey_2007]

Provides authentication and integrity but no confidentiality

RSA based digital signature and AES encryption [T. Winkler_2014], [T. Winkler_2015]

Less efficiency due to sign-then-encryption way of implementation

Large key size required for RSA based signatures

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 7

Page 8: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

State-of-the-art (security close to sensing unit)

Security close to visual sensing unit CMOS active pixel sensor (APS) imager [G. R.Nelson_2005]

On chip watermarking

Pervasive image authentication

Authentication and integrity only

On-chip cryptographic unit [P. Stifter_2006]

Image sensor with EEPROM to uniquely identify the imager

Authentication and integrity of image data only

Trust EYE.M4 platform [T. Winkler_2015]

Hardware based trusted platform module (TPM)

Provides onboard security and privacy

CMOS image sensor based on PUFs [Y. Cao_2015]

Exploiting the dark signal noise uniformity of fixed pattern noise

On-chip authentication and identification

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 8

Page 9: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Signcryption based on Elliptic Curve Discrete Logarithm Problem (ECDLP) [E. Mohamed_2009]

𝑃𝑒= π‘ƒπ‘Ÿ . 𝐺

Digital signature (ECDSA)

Encryption (AES)

Signcrypted packet (C, R, S)

Advantages of Signcryption

Lightweight and provides equal

security as β€œsign-then-encryption”

Public verifiability

Signcryption process

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 9

Page 10: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Key pairs

Sensor: π‘ƒπ‘Ÿπ‘ π‘’π‘›π‘ π‘œπ‘Ÿ , π‘ƒπ‘’π‘ π‘’π‘›π‘ π‘œπ‘Ÿ

Mobile: π‘ƒπ‘Ÿπ‘šπ‘œbile , π‘ƒπ‘’π‘šπ‘œbile

Signcryption algorithm𝑣 ∈ 1, 2,… , π‘ž βˆ’ 1

π‘˜1 = β„Žπ‘Žπ‘ β„Ž(𝑣𝐺)

π‘˜2 = β„Žπ‘Žπ‘ β„Ž(π‘£π‘ƒπ‘’π‘šπ‘œbile )

𝑐 = πΈπ‘˜2(π‘“π‘Ÿπ‘Žπ‘šπ‘’π‘ π’•)

π‘Ÿ = β„Žπ‘Žπ‘ β„Ž(𝑐, π‘˜1)

𝑠 =𝑣

π‘Ÿ + π‘ƒπ‘Ÿπ‘ π‘’π‘›π‘ π‘œπ‘Ÿπ‘šπ‘œπ‘‘ π‘ž

𝑅 = π‘Ÿ 𝐺

Signcryption output = (𝑐, 𝑅, 𝑠)

Signcryption algorithm

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 10

Page 11: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Un-signcryption of the

image/video frames Visual sensor (Public key)

Mobile device (Private key)

Public parameters

Proof of security Authentication

Integrity

Confidentiality

Freshness

Unsigncryption process

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 11

Page 12: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Verification by camera host

π‘˜1 = β„Žπ‘Žπ‘ β„Ž 𝑠 𝑅 + π‘ƒπ‘’π‘ π‘’π‘›π‘ π‘œπ‘Ÿ

π‘Ÿ = β„Žπ‘Žπ‘ β„Ž 𝑐, π‘˜1

π‘ŸπΊ = 𝑅 (Public verifiability)

Un-signcryption by mobile device

π‘˜1 = β„Žπ‘Žπ‘ β„Ž(s(R+π‘ƒπ‘’π‘ π‘’π‘›π‘ π‘œπ‘Ÿ ))

π‘Ÿ = β„Žπ‘Žπ‘ β„Ž (𝑐, π‘˜1 )

π‘˜2 = β„Žπ‘Žπ‘ β„Ž(π‘ƒπ‘Ÿπ‘šπ‘œbile 𝑠(𝑅 + π‘ƒπ‘’π‘ π‘’π‘›π‘ π‘œπ‘Ÿ ))

π‘“π‘Ÿπ‘Žπ‘šπ‘’π‘ π‘‘ = 𝐷𝑒𝑐 π‘˜2 𝑐

π‘ŸπΊ = 𝑅 (Validated)

Unsigncryption algorithm

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 12

Page 13: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Security analysis and countermeasures

Security analysis of signcryption with respect to system architecture

Security of the signcryption technique is based on the computational hardness of ECDLP

Countermeasures Confidentiality

Confidentiality provides by AES encryption in signcryption model

Attackers need private key (π‘ƒπ‘Ÿπ‘šπ‘œbile ) of the mobile device to derive AES key (π‘˜2) in the proposed security model

Private key of mobile device is secured under the assumption of computational hardness of ECDLP

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 13

Page 14: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Security analysis and countermeasures

Countermeasures Authenticity and Integrity

Private key (π‘ƒπ‘Ÿπ‘ π‘’π‘›π‘ π‘œπ‘Ÿ ) of sensing unit provides authentication and integrity by generating digital signature

Public key (π‘ƒπ‘’π‘ π‘’π‘›π‘ π‘œπ‘Ÿ) of sensing unit is used to verify signed images

Attackers need private key (π‘ƒπ‘Ÿπ‘ π‘’π‘›π‘ π‘œπ‘Ÿ ) of sensing unit to modify the signed images

Private key of sensing unit is also secured on the assumption of computational hardness of ECDLP

Freshness Timestamping of data before signcryption provides freshness to the images

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 14

Page 15: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Raspberry Pi-3 platform

Pi camera captures images

Java package of EC-based signcryption is used for security

Implementation performed on Raspberry Pi-3 platform

Experiments

Two different experiments has performed by varying image and key sizes

Measured the efficiency of EC-signcryption and unsigncryption

Experimental setup

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 15

1.2 GHz ARMv6 Processor1 GB RAM

Page 16: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Different EC-keys of 192,

256, 384 bits are used

Apply to same image size

105 kB

AES session key size of 256

bits are used for encryption

Efficiency of the

signcryption and

unsigncryption

Results (experiment-1)

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications

Running time of signcryption and unsigncryption with different EC keys for an 480 x 320 image with a size of 105 kB.

16

Page 17: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Different image sizes 68,

105, 180 kB are used

Apply same EC-key of P-384

bits

AES session key size of 256

bits are used for encryption

Efficiency results of

signcryption and

unsigncryption

Results (experiment-2)

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications

Running time of signcryption and unsigncryption with different image sizes using an EC P-384 bits key

17

Page 18: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Conclusion

Protection of (image/video) data for event triggered monitoring

EC-based signcryption on a sensing unit

Identified potential threats and presented countermeasures

Results shows that EC-based signcryption is resource efficient for implementing on sensing unit

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 18

Page 19: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Future directions

Future directions Physical Unclonable Function (PUFs)

Generation of secure and temper proof private keys

Extension of the security techniques Safety and security of public premises (city, train-station, airport)

Proactive monitoring and the collection of identities and tracking of individuals

Challenges of future work Privacy of observed people

Substantial computation for detection of unusual activities on resource constraint devices

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 19

Page 20: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

ReferencesRef. Full Reference

[V. M. Potdar] V. M. Potdar, S. Han, and E. Chang, β€œA survey of digital image watermarking techniques,” in Proc. IEEE International Conference on Industrial Informatics, Aug. 2005,

pp. 709–716.

[P. W. Wong] P. W. Wong, β€œA public key watermark for image verification and authentication,” in Proc. International Conference on Image Processing, vol. 1, Oct. 1998, pp. 455–

459.

[P. K. Atrey] P. K. Atrey, W.-Q. Yan, and M. S. Kankanhalli, β€œA scalable signature scheme for video authentication,” Multimedia Tools and Applications, vol. 34, no. 1, pp. 107–135,

2007.

[S. P. Mohanty] S. P. Mohanty, β€œA secure digital camera architecture for integrated real-time digital rights management,” Journal of Systems Architecture, vol. 55, no. 10–12, pp. 468 –

480, 2009.

[T. Winkler_2014] T. Winkler and B. Rinner, β€œSecurity and privacy protection in visual sensor networks: A survey,” ACM Comput. Surv., vol. 47, no. 1, pp. 2:1–2:42, May 2014.

[T. Winkler_2015] T. Winkler and B. Rinner, β€œSecure embedded visual sensing in end-user applications with TrustEYE.M4,” in Proc. IEEE International Conference on Intelligent Sensors,

Sensor Networks and Information Processing (ISSNIP), Apr. 2015, pp. 1–6.

[P. Stifter_2006] P. Stifter, K. Eberhardt, A. Erni, and K. Hofmann, β€œImage sensor for security applications with on-chip data authentication,” in Proc. of the Society of Photo-Optical

Instrumentation Engineers, vol. 6241, pp. 8, Apr. 2006

[S. P. Mohanty – 2009] S. P. Mohanty. A Secure Digital Camera Architecture for Integrated Real-Time Digital Rights Management. Journal of Systems Architecture, pages 468–480, Oct. 2009

[Y. Cao_2015] Y. Cao, L. Zhang, S. S. Zalivaka, C. H. Chang, and S. Chen, β€œCmos image sensor based physical unclonable function for coherent sensor-level authentication,” IEEE

Transactions on Circuits and Systems I: Regular Papers, vol. 62, no. 11, pp. 2629–2640, Nov. 2015.

[E. Mohamed_2009] E. Mohamed and H. Elkamchouchi, β€œElliptic curve signcryption with encrypted message authentication and forward secrecy,” International Journal of Computer

Science and Network Security, vol. 9, no. 1, pp. 395–398, 2009.

[G. R.Nelson_2005] G. R. Nelson, G. A. Jullien, and O. Yadid-Pecht, β€œCmos image sensor with watermarking capabilities,” in Proc. IEEE International Symposium on Circuits and Systems, May. 2005, pp. 5326–5329 Vol. 5.

7/3/2017 Smart Cameras with onboard Signcryption for securing IoT Applications 20

Page 21: Smart Cameras with onboard Signcryption for securing IoT ... Paper...Β Β· Threats model Eavesdropping Eavesdropping is a passive attack Can compromises the confidentiality of image

Thank you!

Questions & Answers

7/3/2017

Smart Cameras with onboard Signcryption for securing IoT Applications 21