IoT security configurability with security-by-contract

A. Giaretta, N. Dragoni, F. Massacci

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

© 2019 by the authors. Licensee MDPI, Basel, Switzerland.Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.
Original languageEnglish
Article number4121
JournalSensors (Switzerland)
Volume19
Issue number19
DOIs
Publication statusPublished - 1 Oct 2019
Externally publishedYes

Fingerprint

Dive into the research topics of 'IoT security configurability with security-by-contract'. Together they form a unique fingerprint.

Cite this