SST: Secure Swarm Toolkit - Authorization, Authentication, Security for the IoT
Hokeun Kim, Edward A. Lee

Citation
Hokeun Kim, Edward A. Lee. "SST: Secure Swarm Toolkit - Authorization, Authentication, Security for the IoT". Talk or presentation, 26, October, 2016; Poster presented at the 2016 TerraSwarm Annual Meeting.

Abstract
The challenges posed by the Internet of Things (IoT) render existing security measures ineffective against the emerging IoT. These challenges include heterogeneity, operation in open environments, and scalability. In this paper, we propose SST (Secure Swarm Toolkit), an open-source toolkit for construction of an authorization service infrastructure for the IoT. The infrastructure uses local authorization entities, which provide authorization services to address heterogeneous security requirements and resource constraints in the IoT. The authorization services can be accessed through software interfaces provided by the SST infrastructure, called accessors. The accessors enable IoT developers to integrate their devices with authorization services without needing to manage credentials and cryptographic operations. To demonstrate that SST guarantees necessary security properties, we have performed a formal security analysis using an automated verification tool. Furthermore, we show the scalability of our approach with a mathematical analysis, in addition experiments to evaluate security overhead under different security profiles supported by SST.

Electronic downloads


Internal. This publication has been marked by the author for TerraSwarm-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Hokeun Kim, Edward A. Lee. <a
    href="http://www.terraswarm.org/pubs/866.html"><i>SST:
    Secure Swarm Toolkit - Authorization, Authentication,
    Security for the IoT</i></a>, Talk or
    presentation,  26, October, 2016; Poster presented at the
    <a
    href="http://terraswarm.org/conferences/16/annual"
    >2016 TerraSwarm Annual Meeting</a>.
  • Plain text
    Hokeun Kim, Edward A. Lee. "SST: Secure Swarm Toolkit -
    Authorization, Authentication, Security for the IoT".
    Talk or presentation,  26, October, 2016; Poster presented
    at the <a
    href="http://terraswarm.org/conferences/16/annual"
    >2016 TerraSwarm Annual Meeting</a>.
  • BibTeX
    @presentation{KimLee16_SSTSecureSwarmToolkitAuthorizationAuthentication,
        author = {Hokeun Kim and Edward A. Lee},
        title = {SST: Secure Swarm Toolkit - Authorization,
                  Authentication, Security for the IoT},
        day = {26},
        month = {October},
        year = {2016},
        note = {Poster presented at the <a
                  href="http://terraswarm.org/conferences/16/annual"
                  >2016 TerraSwarm Annual Meeting</a>.},
        abstract = {The challenges posed by the Internet of Things
                  (IoT) render existing security measures
                  ineffective against the emerging IoT. These
                  challenges include heterogeneity, operation in
                  open environments, and scalability. In this paper,
                  we propose SST (Secure Swarm Toolkit), an
                  open-source toolkit for construction of an
                  authorization service infrastructure for the IoT.
                  The infrastructure uses local authorization
                  entities, which provide authorization services to
                  address heterogeneous security requirements and
                  resource constraints in the IoT. The authorization
                  services can be accessed through software
                  interfaces provided by the SST infrastructure,
                  called accessors. The accessors enable IoT
                  developers to integrate their devices with
                  authorization services without needing to manage
                  credentials and cryptographic operations. To
                  demonstrate that SST guarantees necessary security
                  properties, we have performed a formal security
                  analysis using an automated verification tool.
                  Furthermore, we show the scalability of our
                  approach with a mathematical analysis, in addition
                  experiments to evaluate security overhead under
                  different security profiles supported by SST.},
        URL = {http://terraswarm.org/pubs/866.html}
    }
    

Posted by Hokeun Kim on 27 Oct 2016.
Groups: services

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.