Internet of Things Architecture

(Elliott) #1

212


Element to protect Risk D/R/E/A/D rating Examples of Causes Mitigation and relevant Design Choices (for the latter see
Section 5.2.10)
dealing with this threat (identification of compromised devices).
DC S.10: end-to-end encryption
DC A.16- 17 : autonomous security
Intermediary devices
behave maliciously and
clients are not able to
report the fact.

M/M/L/M/H
enforce weak security

Remote monitoring of intermediary devices.
Depending on the malicious action performed by intermediary devices,
client nodes may mitigate it by applying end-to-end security schemes (Key
Exchange and Management Functional Component + protocol security).
DC A.16- 17 : autonomous security
Information re-routing by
intermediary device.

M/H/M/M/M
enforce medium
security

End-to-end security scheme put in place by the Key Exchange and
Management Functional Component (see Section 4.2.2.7), and enforced
by the relevant protocol security function.
DC S.10: end-to-end encryption
Assisting intermediary
devices are no longer
usable.

L/M/H/H/L
enforce medium
security


  • Exhaustion attacks

  • Various specific attacks
    against the involved
    assistance mechanisms
    (e.g. no packet forwarding
    toward a routing service,
    replacing a received key
    fragment with garbage
    against a collaborative
    keying service...)


Denial-of-service detection / reaction scheme.
DC A.16- 17 : autonomous security

Backend services Administrator-role
usurpation

H/M/L/H/L
enforce medium
security

Administrator credentials
disclosed / hacked / brute-
forced

Not specifically targeted. Addressable through security management and
credentials management policies.
Free download pdf