Internet of Things Architecture

(Elliott) #1

Communication FC. For wireless communication security the implementation of
an end-to-end security protocol which ensures confidentiality, integrity and
authentication of subjects can also be considered [Perrig 2004].


Secure peripheral networks (link layer security, secure routing)


To secure peripheral networks a link-layer encryption and authentication
combined with a multipath routing can be considered. This requires the
integration of secure routing protocols in the Network Communication
component [Karlof 2003].


For most of the tactics a design choice proposal is given, however for different
reasons it is not possible to provide appropriate design choices for all tactics.
The tactics not considered are presented in Table 25 with reasons for the
omission.


Tactic Reason


Harden infrastructural
functional components


Infrastructural functional components are critical components that
can compromise the whole system if compromised.

Avoid wherever possible
wireless communication


Wireless communication generally uses a shared medium for
communication, which in turn, allows easy interception of link layer
communication.

Physically protect
peripheral devices


Pervasive deployment of IoT devices makes such devices
accessible to malicious users. While how to protect these devices
is outside the scope of the IoT Reference Architecture (devices not
covered!), this vulnerability must be taken into account in secure
designs.

Avoid OTA device
management


No DC proposal possible as most of the devices connected in IoT
must be managed over the air if at all possible.
Table 25 : Omitted tactics for the Security Perspective.

5.2.10.6 Design Choices addressing Privacy


In Section 4.3.3.3 the Security Perspective together with a set of tactics is
presented. The Design Choices addressing Privacy are presented in Table 26
showing the impact on architectural views by applying tactics relevant for
Privacy concerns.


Tactic

Impact on Views

Functional Information Deployment and Operation

Pseudonymisation

Creation of a fictional
identity (root identity,
secondary identity,
pseudonym or group
identity) (DC P.1)

No impact

Integration of IoT-A
Identity Management
FC (DC P.2)
Free download pdf