Skip to main content

Security Requirements for Managing Smart Objects in Home Automation

  • Conference paper
Mobile Networks and Management (MONAMI 2012)

Abstract

Enabling technologies for the Internet of Things are well understood, and open standards exist that define how to use the Internet Protocol, Version 6, (IPv6) to interconnect smart objects with each other and to the public Internet. As these devices typically are quite limited in their hardware resources, security is often considered too expensive and is sacrificed for a marginal extension of battery lifetime. Missing security not only exposes the application logic to evildoers but also affects management functions. In this paper, we discuss potential threats to machine-to-machine communication and provide a detailed example how protection requirements can be inferred from a given application scenario.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey. Computer Networks 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  2. Mulligan, G.: The 6LoWPAN architecture. In: 4th Workshop on Embedded Networked Sensors (EmNets 2007), pp. 78–82. ACM, New York (2007)

    Chapter  Google Scholar 

  3. Deering, S., Hinden, R.: Internet Protocol, Version 6 (IPv6) Specification. RFC 2460 (1998)

    Google Scholar 

  4. Pandey, S., Kim, M.-S., Choi, M.-J., Hong, J.W.: Towards management of machine to machine networks. In: 13th Network Operations and Management Symposium (APNOMS), pp. 1–7 (2011)

    Google Scholar 

  5. Bormann, C., Castellani, A.P., Shelby, Z.: CoAP: An Application Protocol for Billions of Tiny Internet Nodes. IEEE Internet Computing 16(2), 62–67 (2012)

    Article  Google Scholar 

  6. Stallings, W.: SNMP and SNMPv2: the infrastructure for network management. IEEE Communications Magazine 36(3), 37–43 (1998)

    Article  Google Scholar 

  7. Shelby, Z., Hartke, K., Bormann, C., Frank, B.: Constrained Application Protocol (CoAP). Internet-draft (2012), http://tools.ietf.org/html/draft-ietf-core-coap (work in progress)

  8. Kovatsch, M., Weiss, M., Guinard, D.: Embedding Internet Technology for Home Automation. In: 15th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2010), Bilbao, Spain (2012)

    Google Scholar 

  9. Harrington, D., Schoenwaelder, J.: Transport Subsystem for the Simple Network Management Protocol (SNMP). RFC 5590 (2009)

    Google Scholar 

  10. Rescorla, E., Modadugu, N.: Datagram Transport Layer Security Version 1.2. RFC 6347 (2012)

    Google Scholar 

  11. Garcia-Morchon, O., Keoh, S., Hummen, R., Struik, R.: Security Considerations in the IP-based Internet of Things. http://tools.ietf.org/html/draft-garcia-core-security . Internet-Draft (2012) (work in progress)

  12. Padmavathi, G., Shanmugapriya, D.: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security (IJCSIS) 4(1 & 2) (2009)

    Google Scholar 

  13. Arkko, J., Keranen, A.: CoAP Security Architecture. http://tools.ietf.org/html/draft-arkko-core-security-arch . Internet-Draft (2011) (work in progress)

  14. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47, 53–57 (2004)

    Article  Google Scholar 

  15. Bundesamt für Sicherheit in der Informationstechnik: BSI-Standard 100-2. Version 2.0. IT-Grundschutz Methodology (2008), https://www.bsi.bund.de/cae/servlet/contentblob/471430/publicationFile/28223/standard_100-2_e_pdf.pdf

  16. Stoneburner, G., Goguen, A., Feringa, A.: Risk Management Guide for Information Technology Systems. NIST Special Publication 800-30 (2012)

    Google Scholar 

  17. Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: Analyzing the energy consumption of security protocols. In: 2003 International Symposium on Low Power Electronics and Design (ISLPED 2003), Seoul, Korea, pp. 30–35 (2003)

    Google Scholar 

  18. Bergstrom, P., Driscoll, K., Kimball, J.: Making home automation communications secure. Computer 34(10), 50–56 (2001)

    Article  Google Scholar 

  19. Rogaway, P.: Authenticated encryption with Associated-Data. In: Ninth ACM Conference on Computer and Communication Security (CCS-9), pp. 98–107 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Gerdes, S., Bergmann, O. (2013). Security Requirements for Managing Smart Objects in Home Automation. In: Timm-Giel, A., Strassner, J., Agüero, R., Sargento, S., Pentikousis, K. (eds) Mobile Networks and Management. MONAMI 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37935-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37935-2_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37934-5

  • Online ISBN: 978-3-642-37935-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics