A Recipe for Cost-Effective Secure IoT: the Safe Place Project Case Study | IEEE Conference Publication | IEEE Xplore

A Recipe for Cost-Effective Secure IoT: the Safe Place Project Case Study


Abstract:

IoT systems are complex and heterogeneous, and consequently difficult to control and secure. This problem is compounded by the fact that the devices are often inexpensive...Show More

Abstract:

IoT systems are complex and heterogeneous, and consequently difficult to control and secure. This problem is compounded by the fact that the devices are often inexpensive with little computing power. In this paper, we present our experience within the Safe Place project which aimed to create an IoT system for healthier living environments, motivated by the SARS-Cov-2 emergency. The implemented IoT system can monitor people's movements, check the healthiness of the air, sanitize spaces and objects, and provide support to isolated people. Our recipe for a cost-effective secure IoT system trades-off security, usability, and cost, and is easily repeatable and implementable for other similar IoT systems.
Date of Conference: 31 July 2023 - 02 August 2023
Date Added to IEEE Xplore: 28 August 2023
ISBN Information:
Conference Location: Venice, Italy

Funding Agency:

References is not available for this document.

I. Introduction

Now more than ever, we rely on information technology for our daily activities. Among many, the Internet of Things (IoT) has been one of the technologies with the greatest impact: with a predicted number of 29.4 billion connected “things” by 2030 [1], it is expected to become increasingly pervasive in our daily environments. In fact, the IoT has proven useful for building automation, facilitating accessibility, reducing energy consumption and carbon footprint, and fostering safety and health of citizens and workers [2–9]. One of the main reasons for the success of this technology comes from its wide range of applications and its low cost. Consider, for example, the widespread voice assistants: they can be purchased at a relatively low price, integrate perfectly with many smart devices we have in our homes and make our lives easier by simplifying interaction with technology.

Select All
1.
Transforma Insights, “Global IoT connections to hit 29.4 billion in 2030,” accessed on March 2, 2023. [Online]. Available: https://transformainsights.com/news/global-iot-connections-294
2.
H.-P. Halvorsen, A. Jonsaas, S. Mylvaganam, J. Timmerberg, and J. M. Thiriet, “Case Studies in IoT - Smart-Home Solutions: Pedagogical Perspective with Industrial Applications and some latest Developments,” in 27th EAEEIE Annual Conference (EAEEIE), 2017, pp. 1–8.
3.
G. Delnevo, L. Monti, F. Foschini, and L. Santonastasi, “On enhancing accessible smart buildings using IoT,” in 15th IEEE Annual Consumer Communications & Networking Conference, CCNC 2018, Las Vegas, NV, USA. IEEE, January 12–15 2018, pp. 1–6. [Online]. Available: https://doi.orgI10.1109/CCNC.2018.8319275
4.
R. P. Singh, M. Javaid, A. Haleem, and R. Suman, “Internet of things (IoT) applications to fight against COVID-19 pandemic,” Diabetes & Metabolic Syndrome: Clinical Research & Reviews, vol. 14, no. 4, pp. 521–524, 2020.
5.
P. Asopa, P. Purohit, R. R. Nadikattu, and P. Whig, “Reducing Carbon Footprint for Sustainable development of Smart Cities using IoT,” in Third International Conference on Intelligent Communication Technolo-gies and Virtual Mobile Networks (ICICV), 2021, pp. 361–367.
6.
C. Stolojescu-Crisan, C. Crisan, and B. Butunoi, “An IoT-Based Smart Home Automation System,” Sensors, vol. 21, no. 11, p. 3784, 2021. [Online]. Available: https://doi.org/10.3390/s21113784
7.
M. Yousif, C. Hewage, and L. Nawaf, “IoT technologies during and beyond COVID-19: A comprehensive review,” Future Internet, vol. 13, no. 5, p. 105, 2021.
8.
M. Capuzzo, A. Zanella, M. Zuccotto, F. Cunico, M. Cristani, A. Castellini, A. Farinelli, and L. Gamberini, “IoT Systems for Healthy and Safe Life Environments,” in 7th IEEE Forum on Research and Technologies for Society and Industry Innovation, RTSI 2022, Paris, France. IEEE, August 24–26 2022, pp. 31–37.
9.
L. Gamberini, D. Bacchin, P. Pluchino, A. Z. Grippaldi, G. Dainese, V. Camp Agnaro, A. Zanella, D. Mapelli, S. Mondini, G. Campana, S. Cipolletta, A. Spagnolli, and A. Sozza, “DOMHO: Internet of Things for Ambient Assisted Co-housing,” in 11 th Italian Forum on Active and Assisted Living, (ForItAAL), ser. Lecture Notes in Electrical Engineering, A. Bettelli, A. Monteriu, and L. Gamberini, Eds., vol. 884. Springer, 2020, pp. 117–128. [Online]. Available: https://doi.orgI10.1007/978/3-031-08838-4-8
10.
S. Cheshire, “Multicast DNS,” accessed on March 2, 2023. [Online]. Available: http://www.multicastdns.org/
11.
A. Stanford-Clark and A. Nipper, “MQTT: The Standard for IoT Messaging,” Accessed on March 2, 2023. [Online]. Available: https://mqtt.org/
12.
S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Comput. Networks, vol. 76, pp. 146–164, 2015. [Online]. Available: https://doi.orgI10.1016/j.comnet.2014.11.008
13.
M. Hypponen and L. Nyman, “The Internet of (Vulnerable) Things: On Hypponen's Law, Security Engineering, and IoT Legislation,” Technology Innovation Management Review, vol. 7, no. 4, pp. 5–11, 2017. [Online]. Available: http://doi.orgI10.22215/timreviewI1066
14.
R. R. Castro, J. Lopez, and S. Gritzalis, “Evolution and Trends in IoT Security,” Computer, vol. 51, no. 7, pp. 16–25, 2018. [Online]. Available: https://doi.org/10.1109IMC.2018.3011051
15.
F. Meneghello, M. Calore, D. Zucchetto, M. Polese, and A. Zanella, “IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices,” IEEE Internet Things J., vol. 6, no. 5, pp. 8182–8201, 2019. [Online]. Available: https://doi.orgI10.1109/JIOT.2019.2935189
16.
The OWASP IoT Security Team, “OWASP Internet of Things (IoT) Top 10,” OWASP, Tech. Rep., 2018.
17.
L. Gu and J. A. Stankovic, “t-kernel: providing reliable OS support to wireless sensor networks,” in Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, SenSys 2006, Boulder, Colorado, USA, October 31 - November 3, 2006, A. T. Campbell, P. Bonnet, and J. S. Heidemann, Eds. ACM, 2006, pp. 1–14. [Online]. Available: https://doi.orgI10.114511182807.1182809
18.
R. Kumar, E. Kohler, and M. B. Srivastava, “Harbor: software-based memory protection for sensor nodes,” in Proceedings of the 6th International Conference on Information Processing in Sensor Networks, IPSN 2007, Cambridge, Massachusetts, USA, April 25–27, 2007, T. F. Abdelzaher, L. J. Guibas, and M. Welsh, Eds. ACM, 2007, pp. 340–349. [Online]. Available: https://doi.orgI10.114511236360.1236404
19.
P. Koeberl, S. Schulz, A. Sadeghi, and V. Varadharajan, “TrustLite: a security architecture for tiny embedded devices,” in Ninth Eurosys Conference 2014, EuroSys 2014, Amsterdam, The Netherlands, April 13–16, 2014, D. C. A. Bulterman, H. Bos, A. I. T. Rowstron, and P. Druschel, Eds. ACM, 2014, pp. 10 : 1–10 :14.
20.
J. Noorman, J. V. BuIck, J. T. Muhlberg, F. Piessens, P. Maene, B. Preneel, I. Verbauwhede, J. Gotzfried, T. Muller, and F. C. Freiling, “Sancus 2.0: A low-cost security architecture for iot devices,” ACM Trans. Priv. Secur., vol. 20, no. 3, pp. 7: 1–7 :33, 2017.
21.
F. Brasser, B. E. Mahjoub, A. Sadeghi, C. Wachsmann, and P. Koeberl, “TyTAN: tiny trust anchor for tiny devices,” in Proceedings of the 52nd Annual Design Automation Conference, San Francisco, CA, USA, June 7–11, 2015. ACM, 2015, pp. 34 : 1–34 :6. [Online]. Available: https://doi.orgI10.1145/2744769.2744922
22.
D. Oliveira, T. Gomes, and S. Pinto, “utango: An open-source TEE for iot devices,” IEEE Access, vol. 10, pp. 23913–23930, 2022. [Online]. Available: https://doi.orgI10.1109/ACCESS.2022.3152781
23.
Apple, “HomeKit,” accessed on April 11, 2023. [Online]. Avail-able: https://developer.apple.com/design/human-interface-guidelines/technologies/homekit/introductionl.
24.
Let's Encrypt, “Let's Encrypt: A nonprofit Certificate Authority providing TLS certificates to 300 million websites,” accessed on March 2, 2023. [Online]. Available: https://letsencrypt.org/
25.
Grafana,” accessed on March 2, 2023. [Online]. Available: https://grafana.com/

Contact IEEE to Subscribe

References

References is not available for this document.