1. Introduction
With the ever increasing use of the Internet of Things (IoT) paradigm, Wireless Sensor Networks (WSNs), Wireless Sensor and Actuator Networks (WSAN), Body Area Network (BANs), and other kinds of small devices are becoming part of a connected environment, whose overall goal is to enhance our life quality. The possible use-cases span from smart buildings to workplaces and medical centers.
Spacing from small data collection sensors to actuators for door opening and even safety applications, IoT uses IPv6 protocol as a building block to enable device-to-device and device-to-human communications. The pervasive spread of sensors constitutes a valid help to the users’ life, and the Machine-to-Machine (M2M) applications enable effective and powerful intelligent environments. However, if not properly secured, the communications between these devices pose security or safety risks.
IoT devices have strong restrictions in terms of computation capabilities, a widespread distribution, and they are connected to the internet. As a consequence, they make up a whole new class of things that could be attacked by spiteful people. From one side, the IoT suffers from the kind of attacks of the legacy connected devices, i.e., computers, Local Area Networks (LANs), etc. From the other side, it has to cope with new kinds of weaknesses, i.e., privacy related ones. There are some aspects of the latter ones that can be used by an attacker to trace the user behavior and undermine the user’s privacy. This paper focuses on these problems and provides a novel approach to enhance the data security and privacy by using classical cryptography along with state-of-the-art physical network security.
The standards provide some cryptographic methods to protect the IoT traffic, but cryptography is only a technique. Securing a system means understanding and preventing the possible threats without hindering the users’ experience and the system usability. Moreover, the limited devices resources often require some tradeoffs, which must be considered when studying system security.
As an example, the IEEE 802.15.4 standard [
1] foresees ciphering the payload, but the headers containing layer 2 addresses the source and destination of the packets are not encrypted. An eavesdropper can collect this information without having to decrypt the packets. Moreover, the standard does not fully describe many security-related mechanisms, as we will outline in the following. This can severely hinder any effort in securing the network.
In order to effectively provide a comprehensive security and privacy solution, it is necessary to analyze the scenario and its threats. Although similar, a smart building is different from a smart work environment. The solutions, especially the ones involving classical cryptography and physical layer security, must be tailored for the specific threats. The goal is to provide a cost-effective solution, while also taking into account the energy requirement of the various solutions (many devices can be battery-operated).
This paper is structured as follows. In
Section 2, we will present other works about privacy and security in IoT systems, in
Section 3, we will describe our reference scenario and perform its threat analysis. In
Section 4, our method for achieving better privacy is proposed, and, in
Section 5, the security achievements will be evaluated. The implementation efforts are briefly described in
Section 6, while conclusions are drawn in
Section 7.
3. Scenario and Threat Analysis
As we outlined in the Introduction, the IoT paradigm is used in a wide range of applications and scenarios, ranging from professional (e.g., BAN for e-Health) to recreational (e.g., WSN for sport players tracking). These applications are very different, and each one has its own requirements in terms of data confidentiality, data integrity, etc. Despite the differences, about all the devices used in IoT share some common design features: they are small, battery-operated, and lack a proper input system.
The above-mentioned limitations, along with the need to keep the single device cost low, raise a number of problems in securing the system. Assuming that the data channel could be made secure by a proper cryptographic scheme (and also this assumption is not to be taken for granted), there are two major points where IoT devices are subject to attacks that are substantially different from the normal threats to other networked devices.
The first weakness of IoT devices comes from their configuration (see [
26,
27]). Devices have a lifecycle (manufacturing, deployment, maintenance, retirement). During each step, it is possible that the user needs to reconfigure some of the device security properties (e.g., device network association, keys, etc.). This reconfiguration process is, of course, an extremely delicate procedure. It must be performed on a secure channel, or an attacker could acquire priority class information.
The second weakness arises from the lack of a well-defined network topology. Most IoT systems are mesh, ad hoc, multi-hop networks. This has the huge benefit of increasing the system resiliency and network lifetime, but it also enables a number of attacks especially targeted to the routing and multi-hop schemes. These attacks are well-known in literature, and it is possible to apply some countermeasures. Nevertheless, detecting and blocking the attacks is still an open issue. The detection is complex, as the global network knowledge is not possible, and the blocking is difficult as well. As a matter of fact, distributed firewalls could be technically feasible, but they would consume precious resources in the devices.
Data encryption can enhance the network security and privacy. However, key management is always an open issue [
28]. It must be stressed that key agreement (or key dissemination) is a common problem to all the network layers, from MAC to IP to Application.
Finally, as we mentioned before, the MAC headers are usually not encrypted, allowing attacks to the user’s privacy thanks to correlation attacks.
3.1. Scenario
In order to evaluate the IoT threats and possible countermeasures, we will focus on the professional environment, and, in particular, on e-Health applications.
One of the most promising use-cases of BANs is their application to rehabilitation and continuous patient condition monitoring. Without loss of generality, we will focus on the following use-case: a patient enters a rehabilitation room, where a doctor places some health monitoring devices. During the rehabilitation session, the sensors gather some data and transmit them to a monitor station through a gateway. When the session ends, the doctor removes the sensors from the patient.
The doctor must be able to “install” a device (i.e., activate it on a particular patient) and “decommission” the device (i.e., remove it from the patient). These operations must be secure, fast, and foolproof.
In order to preserve the patient’s privacy, his/her personal data must be encrypted. Moreover, only the professional responsible for the device management (doctor, nurse, etc.) must be able to manage the devices, and he/she must be identifiable by the system, in order to prevent mistakes.
As mentioned before, these requirements could be fulfilled by using appropriate cryptographic schemes. The problem is how to manage the cryptographic material. The solution can be to renew all the cryptographic keys each time a doctor has to use the devices. However, this should be an easy to perform and secure procedure, able to be performed also by unskilled personnel.
Another scenario could be one of goods tracking and delivery: a shipment could be equipped with a tracking sensor (possibly measuring also other data, like vibrations, temperature, etc.). The shipping personnel should be able to access a group of devices to read and/or store data (e.g., the arrival time to a location), possibly with different access rights to the stored data according to the role in the organization (simple driver, manager, etc.).
3.3. Threat Analysis
Usually, the threat analysis is based on the network levels, i.e., MAC/PHY (Physical Layer), Data link, etc., or the attack types. On the contrary, we want to highlight how different device lifetime events can be used by an attacker.
4. Proposed Framework
As outlined in the previous sections, the most critical elements are the initial configuration and devices that are stolen and/or compromised. The solution to the first issue is the focus of the present work. The second issue must be addressed through a combination of management procedures (e.g., to track lost devices) and protocols (e.g., key renew, internal memory reset, etc.).
As stated in
Section 3.1, we want to configure a device’s cryptographic keys in a secure and error proof way. This can be accomplished by using a master configurator. This device (similar to One Time Password (OTP) devices that are used in online banking) has to provide secure, fresh keys to the devices requesting them.
In our selected scenario, the configurator should be a small form factor device that the doctor keeps in his pocket, e.g., a credit card or a key chain. Furthermore, it has not to be connected to any network. It must operate as a stand alone module, whose only goal is to generate a key and to securely transmit to the intended device.
Our idea is that the configurator generates and signs ECC certificates. When the doctor has to configure some devices, for example a group of BAN sensors, he activates his configurator, gets in range of the device to configure, and presses a button (or similar input) on the configurator in order to transfer the generated certificates to the device.
The system configuration is performed in three steps: (1) the creation of a secure channel; (2) the creation and transmission of the keys; and (3) the switch to a secure higher-bandwidth protocol.
Many methods could be used to create a secure channel. However, we can not rely on cryptography due to the lack (in this phase) of a shared secret or inherently secure channels (e.g., a cable) because they are impractical. As discussed in
Section 2, the physical layer techniques can provide some useful approaches to solve the dilemma. Some further requirements are that the system should not require complex hardware (i.e., keep the form factor as small as possible), and that the energy consumption should be as small as possible (i.e., have a long device lifetime). In order to meet these requirements, we chose to use the
property of secret capacity and transmission rate (specifically, the security over reliability condition). We define a boundary for the coding ratio and the context (i.e., distance of the parties) in order to allow the communication of the two legitimate entities, while not disclosing any information to the attacker. The actual coding scheme depends to the specific technology used and will not be analyzed because we want to remain as general as possible.
After creating a secure communication channel, the configurator generates two asymmetric key pairs and signs them with its own Certification Authority (CA). This CA signature identifies the configurator and, as a consequence, the doctor. The association between keys, CA and patient information is administratively made in an anonymous way to preserve the patient privacy. It is sufficient to record only the time, the doctor and the patient. From the signature of the keys, it is possible to match the doctor who installed them.
We use two pairs of keys because one is used to authorize the device toward the network and vice versa, while the other key pair is used in the routing algorithm. It is important that, after use, the installed keys will be deleted from the devices. The gateway must be configured as well because it must have a key pair signed by the doctor CA. This ensures that the devices will only communicate with the authorized gateway. The gateway could be either in the hospital or in the patient house, i.e., for home monitoring, but it has to be properly secured (doctor-installed keys, Virtual Private Network (VPN) for the backhaul, trusted firmware) to preserve the patient privacy. Eventually, other parameters like the channel number, addresses or other parameters can also be sent.
All the above-mentioned parameters and keys are sent over the secure channel. In the last step, the devices and the gateway use the keys and configurations to setup a BAN, e.g., by using IEEE 802.15.4, IEEE 802.15.6 or similar.
Secure Channel Analysis
We consider the case where the configurator, A, and the device to be configured, B, want to exchange some secret informations (e.g., cryptographic keys, configuration parameters, etc.). There is also an eavesdropper E that wants to sniff the informations for illicit purposes.
According to [
5] (Chapter 5, Remark 5.1), the secrecy capacity
of a circularly-symmetric Gaussian wiretap channel is the difference between the channel capacity between
A and
B,
, and the one between
A and
E,
:
The secrecy capacity is the maximum secrecy rate that can be achieved by the legitimate users given the presence/position of an eavesdropper.
In order to obtain a secrecy capacity strictly positive, the quality of the channel between A and B should be better than the channel between A and E. A secure communication is possible if and only if the legitimate receiver has a better Signal to Noise Ratio (SNR) than the eavesdropper. As will be analyzed further in the paper, this means that if the channel capacity (strictly dependent on the SNR) for B is better than the channel capacity of E, it is possible to create a modulation and coding scheme not exposing any information to E because the signal that E can observe from the channel is not enough to recover any information about the message.
In practice, this is likely to happen if the eavesdropper is located farther away from the transmitter than the legitimate receiver and receives attenuated signals. However, also the receiving device quality must be taken into account, as we will see later.
Using this property has some advantages over the other possible physical security methods. It does not require additional hardware, no specific modem, and it can be applied to a variety of existing systems. The main drawback is the low throughput, although this is a common characteristic of the physical layer security techniques, and is the bill to pay for the security of the channel. Due to the low obtainable data rate, this method is employed to send only the keys to be used in the other communication protocols, i.e., IEEE 802.15.4.
In our scenario, the configurator has to send two ECC key pairs to the device, as explained before. In this way, the data to exchange during the setup are relatively low. We assume a maximum of about 2 s for the configuration exchange. Afterwards, the successive communications can be encrypted with the “native” protocol encryption techniques, thus allowing a higher throughput.
From Equation (1), we have that with a rate
R that satisfies
, the security over reliability condition, the communication from
A to
B is secured from an eavesdropper
E. Security over reliability means that the rate
R must satisfy at the same time the security condition Equation (2) and the quality of service condition, i.e., must be higher than the minimum rate to provide the service. The rate lower bound Equation (3) is given by the amount of information to transmit, about 32 kb, divided by a reasonable amount of time to complete the configuration procedure, about 2 s. This
consists of at least two pairs of ECC public/private keys but can include other configuration parameters as the flag to reset the memory or patient informations. The upper bound is
, leading to Equation (4):
The generic channel capacity between two entities
x and
y is given in Equation (5).
is a function of the bandwidth of the signal
W and the logarithm of the SNR:
The formula expansion is easy to demonstrate, considering that:
In Equations (5)–(9), the noise N is Additive White Gaussian Noise (AWGN) and is a function of the bandwidth W, the Boltzmann constant k and the temperature T. Moreover, we assumed that all the losses due to components other than the transmission and reception (e.g., cables, etc.) are negligible.
The choice of the path loss model has a strong impact on the formula. Without loss of generality, we assume the free space path loss
as stated in Equation (9). For this model to hold, the receiver must be in the
far field condition. Given the small dimensions of the antenna, the radiation is far field approximately after 2
λ from the transmitter, where
λ is the wave length.
λ is obtained from the central frequency
. For a generic 2.4 GHz system, the
cm. This means that the formula of the path loss does not have to take into account the reactive part of the electromagnetic signal irradiated from the antenna, the parts that decrease as
and successive orders (see [
30]). It is worth noticing that, for Near Field Communication (NFC), the
, thus the
far field is ≈ at 44 m.
We want to remark that the results that we obtained can be extended to more complex propagation models and to near field cases.
The actual channel capacity
and
are represented in Equations (10) and (11), respectively. The differences between these formulas are the antenna gains and the distance of the receiver from the transmitter
A. The secret capacity
is given by Equation (12). The parameters are summarized in
Table 1.
As stated in
Section 3.2, the attacker knows the communication system used by
A and
B. In particular, we assume that the frequency, bandwidth, modulation, etc. are known. The two different elements in Equation (12) are the distance
and the antenna gain
.
The advantage of B over E is the shorter distance from the transmitter A. However, the attacker can have a better antenna, i.e., the device E could be equipped with a directional antenna, thus having an higher gain with respect to B. As a consequence, even if the attacker is not in close proximity of the system to attack, it can compensate with a better equipment.
The base idea of this paper is to investigate the possibility of practically applying the information-theoretical secrecy technique, which basically comes from a theoretical approach of the information theory topic.
To ensure that Bob’s channel is better than Eve’s one, the most proposed technique in literature is jamming, i.e., injecting noise into the eavesdropper channel. Anyway, these jamming-type techniques are hardly applicable to the real world, because they assume that:
There are some jamming techniques that blindly inject noise into the subspace not occupied by the information signal, but this still means more interference for other legitimate nodes and more energy consumption (not for sending information but only for jamming a potential eavesdropper). Furthermore, it is hard to envision that a standardization body (e.g., FCC) will allow jamming the channel, even by legitimate users. There are more limitations to the real-world application of Physical Layer Security. Due to space constraints, we will not discuss further this point. The interested reader can, for example, refer to [
25].
The above conditions can not be satisfied in a real system. We propose here a method that given a specific system, in terms of frequency, bandwidth, distance of the legitimate users, etc., gives back the conditions that lead to define a security area. These conditions are the maximum rate of transmission and the minimum distance of Eve to the legitimate parties. In other words, in our approach, we basically use the results of information-theoretical secrecy to derive, in a real practical application, which is the minimum distance that an eavesdropper should stay from legitimate nodes in order to have a minimum secrecy rate. In practice, this results in a warning zone, i.e., the legitimate nodes have to check that an eavesdropper is not present within that minimum distance, if they want to communicate securely with a minimum target rate.
5. Results
In order to evaluate the system secret capacity, we used MATLAB simulations. The simulation parameters are shown in
Table 1. In a real use-case, we will not have any information of both the distance and the antenna gain of the attacker; therefore, we fixed the parameter
to a reasonable high value of 10 dB, while
is 1 dB. The 10 dB value corresponds to a good antenna still relatively small to be hidden in some way (e.g., in a suitcase).
5.1. Proposed Framework Results
Equation (12) depends on many parameters, and some of them are unknown as the distance of the eavesdropper and his antenna gain . As noted before, we fixed to a value that we consider a good approximation of what could be the real case. The antennas currently available, and with a relatively small form factor, have approximately this value.
We consider a 2.4GHz communication system, which is often used in IoT systems. About the free space loss model, we acknowledge that it is a questionable choice for indoor cases. However, as we will see in the following, the general results hold. As a matter of fact, the important element is to find a minimum distance for which the Equation (4) is satisfied.
Given that the secret capacity can be also expressed in terms of Signal to Noise Ratios (SNRs) of the legitimate user and the eavesdropper, and we are looking for the points where , the path loss model will slightly modify the slope of the curves, but it will not subvert the results.
Moreover, in the real environment, the eavesdropper is likely to be in Non Line Of Sight (NLOS) condition, so its SNR will be lower than what we here estimated. As a consequence, by using an optimistic model for the eavesdropper, we find a conservative value that satisfies the secrecy of the communication with an additional margin.
Given the particular scenario, we varied the distances of both
B and
E, ranging from 1 m to 3 m and from 1 m to 10 m, respectively. We consider that the configurator and the devices to be configured are in the same room, while the attacker is in the next one, with a distance of some meters from the transmitter, as in
Figure 1. The secret capacity
is shown in
Figure 2, where the distance
is on the
x-axis,
is on the
y-axis and the
z-axis represents
. For the sake of readability,
Figure 3 shows the same information in 2D with different colors for different values of
.
The surface of
Figure 2 represents the upper bound of the rate
R. The surface is plotted for the values that are bigger than the minimum rate
. In
Figure 3, the
is projected over the 2D plane of the distances
and
. From the figures, it is clear, for example, that if the distance between the legitimate transmitter (A) and receiver (B) is about 2 m, and they are using the minimum rate, and the eavesdropper should not be closer than about 6 m. A higher rate would require the attacker to be farther away.
The SNR values for
B and
E as a function of the distance is shown in
Figure 4. Of course, given that the parameters are the same with the exception of the antenna gain, the two curves are shifted by 10 dB.
In order to satisfy the secrecy condition, the SNR of E must be lower than the SNR of B. However, this condition is necessary, but not sufficient. What is evident from this figure is that there is a large region where the secrecy condition is not met by definition, i.e., it is not possible to create a modulation and coding scheme that permits to transmit to B, without E being able to listen to the communication.
5.2. Discussion on the Results
From these results, it is possible to extrapolate two important things. The first is that, for a given distance,
there is a
minimum distance of E where the minimum rate
can be satisfied and the communication is secure. This implies that
A must be sure that
E is not close than
. For example, with the parameters in
Table 1, if
B is 2 m from A, then
E have to be at least 6.36 m far away to allow a secure transmission using a rate of 16 kb/s.
The second result is that, given a couple of distance (
,
), the acceptable rates are the values between the surface
and
. This gives a range of values of
R for which the communication is still secure. In other words, the surface in
Figure 2 divides the space in a secure region, i.e., the points under the surface, and an insecure region, i.e., the points above the surface.
The parameters that define if the communication is in the secure region are the distance that is known, the rate R that can be chosen, the distance that is unknown, and , which can be guessed according to the technology. For example, if is 2 m and is 10 m, the rate R can be as high as 1.3 Mb/s.
In a real use-case scenario, the outlined findings can be used during the system design and operation phases. During the system design, the developers will have to choose the minimum rate system, and according to the maximum distance allowed between the configurator and the device, choose a suitable modulation and coding scheme fulfilling the previously discussed equations, eventually using a more accurate propagation model. Afterwards, it is possible to evaluate the ‘unsafe’ area according to the eavesdropper’s antenna gain. Every room that is in the unsafe area must be secured by other means, e.g., by limiting the access to the public.
These results can be useful for both the device design and for the building layout. As an example, if we allow only a short distance between the configurator and the device (e.g., 1.5 m), the unsafe zone is limited to about 4.5 m. Of course, it is important to not forget the floors above and below, but this is unavoidable.
All of the results presented so far are based on the assumption that the legitimate configurator A is transmitting and the legitimate device node B is receiving (or is transmitting non-sensitive information). If a secure bidirectional connection is needed, then the safe area is the intersection between the two separate safe areas. Moreover, if the A and B antenna gains are different, one zone could be larger or smaller than the other.