Implementação do Secure Smart Home usando infraestrutura existente
DOI:
https://doi.org/10.18046/syt.v15i43.2710Palavras-chave:
DragonBoard, Kerberos, segurança, casa Inteligente.Resumo
O surgimento do IoT abre o caminho da casa inteligente. Uma casa inteligente assimila os hábitos dos moradores para tomar decisões inteligentes, o que exige que o conhecimento seja comunicado e armazenado. A comunicação de dados gerados cria uma lacuna na segurança e privacidade do usuário da casa inteligente. Outro problema desafiador ao projetar uma casa inteligente é que os antigos eletrodomésticos não possuem conectividade inteligente. Este artigo foca-se na concepção de uma arquitetura segura para acessar eletrodomésticos inteligentes, enquanto usa os aparelhos domésticos existentes que não possuem rede e energia de processamento como uma lâmpada ou ventilador. ara garantir uma comunicação segura usando a internet, estamos usando uma ferramenta de autenticação de terceiros implantada na nuvem. Temos instalado um gateway como ponto de entrada para nossa casa inteligente e conectamos todos os aparelhos a ele. O usuário é autenticado pelo servidor de autenticação e obtém acesso aos serviços. Para fins de implementação, usamos Kerberos como ferramenta de autenticação e DragonBoard como gateway.Referências
Agosta, G., Antonini, A., Barenghi, A., Galeri, D., & Pelosi, G. (2015). Cyber-security analysis and evaluation for smart home management solutions. In 2015 International Carnahan Conference on Security Technology (ICCST). http://dx.doi.org/10.1109/ccst.2015.7389663
Bugeja, J., Jacobsson, A., & Davidsson, P. (2016). On privacy and security challenges in smart connected homes. In 2016 European Intelligence And Security Informatics Conference (EISIC). http://dx.doi.org/10.1109/eisic.2016.044
Chen, S., Liu, T., Gao, F., Ji, J., Xu, Z., & Qian, B. et al. (2017). Butler, not servant: A human-centric smart home energy management system. IEEE Communications Magazine, 55(2), 27-33. http://dx.doi.org/10.1109/mcom.2017.1600699cm
Chitnis, S., Deshpande, N., & Shaligram, A. (2016). An investigative study for smart home security: Issues, challenges and countermeasures. Wireless Sensor Network, 8(4), 61-68. http://dx.doi.org/10.4236/wsn.2016.84006
European Union Agency for Network and Information Security [ENISA]. (2015). Security and resilience of smart home environments good practices and recommendations. Heraklion, Greece: ENISA.
Fernandes, E., Jung, J., & Prakash, A. (2016). Security analysis of emerging smart home applications. In 2016 IEEE Symposium on Security And Privacy (SP). http://dx.doi.org/10.1109/sp.2016.44
Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., & Wagner, D. (2016). Smart locks. In Proceedings Of The 11Th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16. http://dx.doi.org/10.1145/2897845.2897886
Holzleitner, M., & Reichl, J. (2017). European provisions for cyber security in the smart grid – an overview of the NIS-directive. E&I, Elektrotechnik und Informationstechnik, 134(1), 14-18. http://dx.doi.org/10.1007/s00502-017-0473-7
Hosek, J., Masek, P., Kovac, D., Ries, M., & Kröpfl, F. (2014). IP home gateway as universal multi-purpose enabler for smart home services. E&I, Elektrotechnik und Informationstechnik, 131(4-5), 123-128. http://dx.doi.org/10.1007/s00502-014-0209-x
hue: Your personal wireless lighting system. (2017). Retrieved 12 July 2017, from http://www2.meethue.com/en-in/about-/
IT Services: Stanford WebAuth. (2017). Webauth.stanford.edu. Retrieved 13 July 2017, from http://webauth.stanford.edu
Jacobsson, A., Boldt, M., & Carlsson, B. (2016). A risk analysis of a smart home automation system. Future Generation Computer Systems, 56, 719-733. http://dx.doi.org/10.1016/j.future.2015.09.003
Kerberos: The network authentication protocol. (2017). Retrieved from https://web.mit.edu/kerberos
Kubitza, T., Voit, A., Weber, D., & Schmidt, A. (2016). An IoT infrastructure for ubiquitous notifications in intelligent living environments. In Proceedings of The 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct - Ubicomp '16. http://dx.doi.org/10.1145/2968219.2968545
SAML Single Sign-On Solutions - SAML SSO Identity Provider, SAML Service Provider. (2017). Retrieved from https://www.onelogin.com/saml
Saurugg, H. & Pichlmayr, J. (2013). “Smart“, vernetzung und komplexität – ein plädoyer für einen kritischeren umgang mit dem thema vernetzung. E&I, Elektrotechnik Und Informationstechnik, 130(4-5), 103-108. http://dx.doi.org/10.1007/s00502-013-0139-z
Wendzel, S. (2016). How to increase the security of smart buildings? Communications of the ACM, 59(5), 47-49. http://dx.doi.org/10.1145/2828636
Your home may be smart, but is it intelligent? It can be with IBM Watson IoT and cognitive computing. (2017). Retrieved from https://www.ibm.com/internet-of-things/iot-zones/iot-home/
Zhang, X., Adhikari, R., Pipattanasomporn, M., Kuzlu, M., & Rahman, S. (2016). Deploying IoT devices to make buildings smart: Performance evaluation and deployment experience. In 2016 IEEE 3Rd World Forum on Internet of Things (WF-IoT). http://dx.doi.org/10.1109/wf-iot.2016.7845464
Bugeja, J., Jacobsson, A., & Davidsson, P. (2016). On privacy and security challenges in smart connected homes. In 2016 European Intelligence And Security Informatics Conference (EISIC). http://dx.doi.org/10.1109/eisic.2016.044
Chen, S., Liu, T., Gao, F., Ji, J., Xu, Z., & Qian, B. et al. (2017). Butler, not servant: A human-centric smart home energy management system. IEEE Communications Magazine, 55(2), 27-33. http://dx.doi.org/10.1109/mcom.2017.1600699cm
Chitnis, S., Deshpande, N., & Shaligram, A. (2016). An investigative study for smart home security: Issues, challenges and countermeasures. Wireless Sensor Network, 8(4), 61-68. http://dx.doi.org/10.4236/wsn.2016.84006
European Union Agency for Network and Information Security [ENISA]. (2015). Security and resilience of smart home environments good practices and recommendations. Heraklion, Greece: ENISA.
Fernandes, E., Jung, J., & Prakash, A. (2016). Security analysis of emerging smart home applications. In 2016 IEEE Symposium on Security And Privacy (SP). http://dx.doi.org/10.1109/sp.2016.44
Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., & Wagner, D. (2016). Smart locks. In Proceedings Of The 11Th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16. http://dx.doi.org/10.1145/2897845.2897886
Holzleitner, M., & Reichl, J. (2017). European provisions for cyber security in the smart grid – an overview of the NIS-directive. E&I, Elektrotechnik und Informationstechnik, 134(1), 14-18. http://dx.doi.org/10.1007/s00502-017-0473-7
Hosek, J., Masek, P., Kovac, D., Ries, M., & Kröpfl, F. (2014). IP home gateway as universal multi-purpose enabler for smart home services. E&I, Elektrotechnik und Informationstechnik, 131(4-5), 123-128. http://dx.doi.org/10.1007/s00502-014-0209-x
hue: Your personal wireless lighting system. (2017). Retrieved 12 July 2017, from http://www2.meethue.com/en-in/about-/
IT Services: Stanford WebAuth. (2017). Webauth.stanford.edu. Retrieved 13 July 2017, from http://webauth.stanford.edu
Jacobsson, A., Boldt, M., & Carlsson, B. (2016). A risk analysis of a smart home automation system. Future Generation Computer Systems, 56, 719-733. http://dx.doi.org/10.1016/j.future.2015.09.003
Kerberos: The network authentication protocol. (2017). Retrieved from https://web.mit.edu/kerberos
Kubitza, T., Voit, A., Weber, D., & Schmidt, A. (2016). An IoT infrastructure for ubiquitous notifications in intelligent living environments. In Proceedings of The 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct - Ubicomp '16. http://dx.doi.org/10.1145/2968219.2968545
SAML Single Sign-On Solutions - SAML SSO Identity Provider, SAML Service Provider. (2017). Retrieved from https://www.onelogin.com/saml
Saurugg, H. & Pichlmayr, J. (2013). “Smart“, vernetzung und komplexität – ein plädoyer für einen kritischeren umgang mit dem thema vernetzung. E&I, Elektrotechnik Und Informationstechnik, 130(4-5), 103-108. http://dx.doi.org/10.1007/s00502-013-0139-z
Wendzel, S. (2016). How to increase the security of smart buildings? Communications of the ACM, 59(5), 47-49. http://dx.doi.org/10.1145/2828636
Your home may be smart, but is it intelligent? It can be with IBM Watson IoT and cognitive computing. (2017). Retrieved from https://www.ibm.com/internet-of-things/iot-zones/iot-home/
Zhang, X., Adhikari, R., Pipattanasomporn, M., Kuzlu, M., & Rahman, S. (2016). Deploying IoT devices to make buildings smart: Performance evaluation and deployment experience. In 2016 IEEE 3Rd World Forum on Internet of Things (WF-IoT). http://dx.doi.org/10.1109/wf-iot.2016.7845464
Downloads
Publicado
2017-12-06
Edição
Seção
Original Research
Licença
Esta publicação está licenciada sob os termos da licença CC BY 4.0 (https://creativecommons.org/licenses/by/4.0/deed.pt_BR).