Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Contributions to Securing Software Updates in IoT

Nikbakht Bideh, Pegah LU orcid (2022)
Abstract
The Internet of Things (IoT) is a large network of connected devices. In IoT, devices can communicate with each other or back-end systems to transfer data or perform assigned tasks. Communication protocols used in IoT depend on target applications but usually require low bandwidth. On the other hand, IoT devices are constrained, having limited resources, including memory, power, and computational resources. Considering these limitations in IoT environments, it is difficult to implement best security practices. Consequently, network attacks can threaten devices or the data they transfer. Thus it is crucial to react quickly to emerging vulnerabilities.
These vulnerabilities should be mitigated by firmware updates or other necessary... (More)
The Internet of Things (IoT) is a large network of connected devices. In IoT, devices can communicate with each other or back-end systems to transfer data or perform assigned tasks. Communication protocols used in IoT depend on target applications but usually require low bandwidth. On the other hand, IoT devices are constrained, having limited resources, including memory, power, and computational resources. Considering these limitations in IoT environments, it is difficult to implement best security practices. Consequently, network attacks can threaten devices or the data they transfer. Thus it is crucial to react quickly to emerging vulnerabilities.
These vulnerabilities should be mitigated by firmware updates or other necessary updates securely. Since IoT devices usually connect to the network wirelessly, such updates can be performed Over-The-Air (OTA). This dissertation presents contributions to enable secure OTA software updates in IoT.

In order to perform secure updates, vulnerabilities must first be identified and assessed. In this dissertation, first, we present our contribution to designing a maturity model for vulnerability handling. Next, we analyze and compare common communication protocols and security practices regarding energy consumption. Finally, we describe our designed lightweight protocol for OTA updates targeting constrained IoT devices.

IoT devices and back-end systems often use incompatible protocols that are unable to interoperate securely. This dissertation also includes our contribution to designing a secure protocol translator for IoT. This translation is performed inside a Trusted Execution Environment (TEE) with TLS interception.

This dissertation also contains our contribution to key management and key distribution in IoT networks. In performing secure software updates, the IoT devices can be grouped since the updates target a large number of devices. Thus, prior to deploying updates, a group key needs to be established among group members.
In this dissertation, we present our designed secure group key establishment scheme.
Symmetric key cryptography can help to save IoT device resources at the cost of increased key management complexity. This trade-off can be improved by integrating IoT networks with cloud computing and Software Defined Networking (SDN).
In this dissertation, we use SDN in cloud networks to provision symmetric keys efficiently and securely.
These pieces together help software developers and maintainers identify vulnerabilities, provision secret keys, and perform lightweight secure OTA updates. Furthermore, they help devices and systems with incompatible protocols to be able to interoperate. (Less)
Please use this url to cite or link to this publication:
author
supervisor
opponent
  • Prof. Niemi, Valtteri, University of Helsinki, Finland.
organization
publishing date
type
Thesis
publication status
published
subject
pages
202 pages
publisher
LTH, Lund University
defense location
Lecture Hall E:A, building E, Ole Römers väg 3, Faculty of Engineering LTH, Lund University, Lund. The dissertation is to be live streamed, but part of the premises will be excluded from the live stream.
defense date
2022-12-16 09:15:00
ISBN
978-91-8039-429-1
978-91-8039-430-7
language
English
LU publication?
yes
id
460decd5-bd43-41ba-944d-b4c963976360
date added to LUP
2022-11-15 13:40:26
date last changed
2023-06-14 08:14:00
@phdthesis{460decd5-bd43-41ba-944d-b4c963976360,
  abstract     = {{The Internet of Things (IoT) is a large network of connected devices. In IoT, devices can communicate with each other or back-end systems to transfer data or perform assigned tasks. Communication protocols used in IoT depend on target applications but usually require low bandwidth. On the other hand, IoT devices are constrained, having limited resources, including memory, power, and computational resources. Considering these limitations in IoT environments, it is difficult to implement best security practices. Consequently, network attacks can threaten devices or the data they transfer. Thus it is crucial to react quickly to emerging vulnerabilities. <br/>These vulnerabilities should be mitigated by firmware updates or other necessary updates securely. Since IoT devices usually connect to the network wirelessly, such updates can be performed Over-The-Air (OTA). This dissertation presents contributions to enable secure OTA software updates in IoT. <br/><br/>In order to perform secure updates, vulnerabilities must first be identified and assessed. In this dissertation, first, we present our contribution to designing a maturity model for vulnerability handling. Next, we analyze and compare common communication protocols and security practices regarding energy consumption. Finally, we describe our designed lightweight protocol for OTA updates targeting constrained IoT devices.        <br/><br/>IoT devices and back-end systems often use incompatible protocols that are unable to interoperate securely. This dissertation also includes our contribution to designing a secure protocol translator for IoT. This translation is performed inside a Trusted Execution Environment (TEE) with TLS interception. <br/><br/>This dissertation also contains our contribution to key management and key distribution in IoT networks. In performing secure software updates, the IoT devices can be grouped since the updates target a large number of devices. Thus, prior to deploying updates, a group key needs to be established among group members.  <br/>In this dissertation, we present our designed secure group key establishment scheme. <br/>Symmetric key cryptography can help to save IoT device resources at the cost of increased key management complexity. This trade-off can be improved by integrating IoT networks with cloud computing and Software Defined Networking (SDN).<br/>In this dissertation, we use SDN in cloud networks to provision symmetric keys efficiently and securely.      <br/>These pieces together help software developers and maintainers identify vulnerabilities, provision secret keys, and perform lightweight secure OTA updates. Furthermore, they help devices and systems with incompatible protocols to be able to interoperate.}},
  author       = {{Nikbakht Bideh, Pegah}},
  isbn         = {{978-91-8039-429-1}},
  language     = {{eng}},
  month        = {{11}},
  publisher    = {{LTH, Lund University}},
  school       = {{Lund University}},
  title        = {{Contributions to Securing Software Updates in IoT}},
  url          = {{https://lup.lub.lu.se/search/files/128537774/Pegah_thesis_last_version.pdf}},
  year         = {{2022}},
}