Mitigating IoT security threats with a trusted Network element

Jarkko Kuusijarvi, Reijo Savola, Pekka Savolainen, Antti Evesti

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    12 Citations (Scopus)

    Abstract

    Securing the growing amount of IoT devices is a challenge for both the end-users bringing IoT devices into their homes, as well as the corporates and industries exposing these devices into the Internet as part of their service or operations. The exposure of these devices, often poorly configured and secured, offers malicious actors an easy access to the private information of their users, or potential to utilize the devices in further activities, e.g., attacks on other devices via Distributed Denial of Service. This paper discusses the current security challenges of IoT devices and proposes a solution to secure these devices via a trusted Network Edge Device. NED offloads the security countermeasures of the individual devices into the trusted network elements. The major benefit of this approach is that the system can protect the IoT devices with user-defined policies, which can be applied to all devices regardless of the constraints of computing resources in the IoT tags. Additional benefit is the possibility to manage the countermeasures of multiple IoT devices/gateways at once, via a shared interface, thus largely avoiding the per-device maintenance operations.
    Original languageEnglish
    Title of host publicationInternet Technology and Secured Transactions (ICITST), 2016 11th International Conference for
    PublisherIEEE Institute of Electrical and Electronic Engineers
    Pages260-265
    ISBN (Electronic)978-1-908320-73-5
    ISBN (Print)978-1-908320-73-5
    DOIs
    Publication statusPublished - 16 Feb 2016
    MoE publication typeA4 Article in a conference publication
    Event11th International Conference for Internet Technology and Secured Transactions - Catalonia Barcelona Plaza Hotel, Barcelona, Spain
    Duration: 5 Dec 20167 Dec 2016
    Conference number: 11

    Conference

    Conference11th International Conference for Internet Technology and Secured Transactions
    Abbreviated titleICITST 2016
    CountrySpain
    CityBarcelona
    Period5/12/167/12/16

    Fingerprint

    Gateways (computer networks)
    Interfaces (computer)
    Internet of things
    Internet
    Industry

    Keywords

    • IoT-gateway
    • security offloading
    • trusted network element

    Cite this

    Kuusijarvi, J., Savola, R., Savolainen, P., & Evesti, A. (2016). Mitigating IoT security threats with a trusted Network element. In Internet Technology and Secured Transactions (ICITST), 2016 11th International Conference for (pp. 260-265). IEEE Institute of Electrical and Electronic Engineers . https://doi.org/10.1109/ICITST.2016.7856708
    Kuusijarvi, Jarkko ; Savola, Reijo ; Savolainen, Pekka ; Evesti, Antti. / Mitigating IoT security threats with a trusted Network element. Internet Technology and Secured Transactions (ICITST), 2016 11th International Conference for . IEEE Institute of Electrical and Electronic Engineers , 2016. pp. 260-265
    @inproceedings{ad48807636e4459182d0dea6371b06ae,
    title = "Mitigating IoT security threats with a trusted Network element",
    abstract = "Securing the growing amount of IoT devices is a challenge for both the end-users bringing IoT devices into their homes, as well as the corporates and industries exposing these devices into the Internet as part of their service or operations. The exposure of these devices, often poorly configured and secured, offers malicious actors an easy access to the private information of their users, or potential to utilize the devices in further activities, e.g., attacks on other devices via Distributed Denial of Service. This paper discusses the current security challenges of IoT devices and proposes a solution to secure these devices via a trusted Network Edge Device. NED offloads the security countermeasures of the individual devices into the trusted network elements. The major benefit of this approach is that the system can protect the IoT devices with user-defined policies, which can be applied to all devices regardless of the constraints of computing resources in the IoT tags. Additional benefit is the possibility to manage the countermeasures of multiple IoT devices/gateways at once, via a shared interface, thus largely avoiding the per-device maintenance operations.",
    keywords = "IoT-gateway, security offloading, trusted network element",
    author = "Jarkko Kuusijarvi and Reijo Savola and Pekka Savolainen and Antti Evesti",
    year = "2016",
    month = "2",
    day = "16",
    doi = "10.1109/ICITST.2016.7856708",
    language = "English",
    isbn = "978-1-908320-73-5",
    pages = "260--265",
    booktitle = "Internet Technology and Secured Transactions (ICITST), 2016 11th International Conference for",
    publisher = "IEEE Institute of Electrical and Electronic Engineers",
    address = "United States",

    }

    Kuusijarvi, J, Savola, R, Savolainen, P & Evesti, A 2016, Mitigating IoT security threats with a trusted Network element. in Internet Technology and Secured Transactions (ICITST), 2016 11th International Conference for . IEEE Institute of Electrical and Electronic Engineers , pp. 260-265, 11th International Conference for Internet Technology and Secured Transactions, Barcelona, Spain, 5/12/16. https://doi.org/10.1109/ICITST.2016.7856708

    Mitigating IoT security threats with a trusted Network element. / Kuusijarvi, Jarkko; Savola, Reijo; Savolainen, Pekka; Evesti, Antti.

    Internet Technology and Secured Transactions (ICITST), 2016 11th International Conference for . IEEE Institute of Electrical and Electronic Engineers , 2016. p. 260-265.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    TY - GEN

    T1 - Mitigating IoT security threats with a trusted Network element

    AU - Kuusijarvi, Jarkko

    AU - Savola, Reijo

    AU - Savolainen, Pekka

    AU - Evesti, Antti

    PY - 2016/2/16

    Y1 - 2016/2/16

    N2 - Securing the growing amount of IoT devices is a challenge for both the end-users bringing IoT devices into their homes, as well as the corporates and industries exposing these devices into the Internet as part of their service or operations. The exposure of these devices, often poorly configured and secured, offers malicious actors an easy access to the private information of their users, or potential to utilize the devices in further activities, e.g., attacks on other devices via Distributed Denial of Service. This paper discusses the current security challenges of IoT devices and proposes a solution to secure these devices via a trusted Network Edge Device. NED offloads the security countermeasures of the individual devices into the trusted network elements. The major benefit of this approach is that the system can protect the IoT devices with user-defined policies, which can be applied to all devices regardless of the constraints of computing resources in the IoT tags. Additional benefit is the possibility to manage the countermeasures of multiple IoT devices/gateways at once, via a shared interface, thus largely avoiding the per-device maintenance operations.

    AB - Securing the growing amount of IoT devices is a challenge for both the end-users bringing IoT devices into their homes, as well as the corporates and industries exposing these devices into the Internet as part of their service or operations. The exposure of these devices, often poorly configured and secured, offers malicious actors an easy access to the private information of their users, or potential to utilize the devices in further activities, e.g., attacks on other devices via Distributed Denial of Service. This paper discusses the current security challenges of IoT devices and proposes a solution to secure these devices via a trusted Network Edge Device. NED offloads the security countermeasures of the individual devices into the trusted network elements. The major benefit of this approach is that the system can protect the IoT devices with user-defined policies, which can be applied to all devices regardless of the constraints of computing resources in the IoT tags. Additional benefit is the possibility to manage the countermeasures of multiple IoT devices/gateways at once, via a shared interface, thus largely avoiding the per-device maintenance operations.

    KW - IoT-gateway

    KW - security offloading

    KW - trusted network element

    U2 - 10.1109/ICITST.2016.7856708

    DO - 10.1109/ICITST.2016.7856708

    M3 - Conference article in proceedings

    SN - 978-1-908320-73-5

    SP - 260

    EP - 265

    BT - Internet Technology and Secured Transactions (ICITST), 2016 11th International Conference for

    PB - IEEE Institute of Electrical and Electronic Engineers

    ER -

    Kuusijarvi J, Savola R, Savolainen P, Evesti A. Mitigating IoT security threats with a trusted Network element. In Internet Technology and Secured Transactions (ICITST), 2016 11th International Conference for . IEEE Institute of Electrical and Electronic Engineers . 2016. p. 260-265 https://doi.org/10.1109/ICITST.2016.7856708