Home // CLOUD COMPUTING 2021, The Twelfth International Conference on Cloud Computing, GRIDs, and Virtualization // View article
How to Prevent Misuse of IoTAG?
Authors:
Bernhard Weber
Lukas Hinterberger
Sebastian Fischer
Rudolf Hackenberg
Keywords: Internet of Things; IoTAG; device pairing; device authentication; trusted connection
Abstract:
Since IoT devices are potentially insecure and offer great attack potential, in our past research we presented IoTAG, a solution where devices communicate security-related information about themselves. However, since this information can also be exploited by attackers, we present in this paper a solution against the misuse of IoTAG. In doing so, we address the two biggest problems: authentication and pairing with a trusted device. This is solved by introducing a pairing process, which uses the simul- taneous authentication of equals algorithm to securely exchange and verify each others signature, and by using the server and client authentication provided by HTTP over TLS. We provide the minimum requirements and evaluate the methods used. The emphasis is on known and already proven methods. Additionally, we analyze the potential consequences of an attacker tapping the IoTAG information. Finally, we conclude that the solution successfully prevents access to IoTAG by unauthorized clients on the same network.
Pages: 18 to 23
Copyright: Copyright (c) IARIA, 2021
Publication date: April 18, 2021
Published in: conference
ISSN: 2308-4294
ISBN: 978-1-61208-845-7
Location: Porto, Portugal
Dates: from April 18, 2021 to April 22, 2021