An Adaptive Simultaneous Multi-Protocol Extension of CRAFT
Abstract
:1. Introduction
1.1. Contribution
- The simultaneous use of multiple remote attestation protocols in the IoT network, which enables different kinds of devices to interact together.
- The capability for devices to seamlessly switch, in real time, from one remote attestation protocol to another depending on factors such as the environment, context, or neighbouring devices.
- The definition of a real-world scenario and use-cases using a smart city representation.
- An extensive evaluation of CRAFT with and without the ASMP features, as well as a comparison with the combination of standalone attestation protocols SEDA and US-AID. This comprehensive evaluation demonstrates that the ASMP features improve CRAFT flexibility and security with minimal impact on performance.
1.2. Structure
2. Related Work
3. Craft Contextual Adaptation to Multiple Protocols
3.1. An Overview of CRAFT New Features: CRAFT-ASMP
3.2. Switching between Multiple Remote Attestation Protocols
3.2.1. CRAFT Basis
3.2.2. CRAFT ASMP Features in Depth
3.2.3. Featured Remote Attestation Protocols
US-AID [20]
SEDA [18]
4. Evaluation
4.1. Frameworks and Scenarios Description
4.1.1. Frameworks
- CRAFT-ASMP: this is the new CRAFT framework with the ASMP (adaptive simultaneous multi-protocol) features. Some devices can switch between supported attestation protocols depending on the context. All CRAFT features are available to all devices.
- CRAFT: this is the original CRAFT framework without the ASMP features. Contrary to CRAFT-ASMP, all devices only support a single attestation protocol available through the simulation, even though several protocols are supported by CRAFT.
- SEDA+AID: SEDA and AID attestations coexist within the same network but there is no direct connection between them. Devices from the core network can handle both protocols but devices with different protocols cannot interact. As such SEDA+AID is considered as a framework for evaluation purposes.
4.1.2. Environment
Devices
- Antennas, which do not move on the grid and are placed so they cover the whole grid. In CRAFT-ASMP and CRAFT, they are K-devices and form the core network.
- Static devices, randomly placed on the grid. They illustrate connected devices, such as smart lighting and air pollution sensors. In CRAFT-ASMP and CRAFT, they are L-devices and part of the outer network.
- Mobile devices, which follow the lines of the grid. They are placed on random intersections at the beginning of the simulation, move along the lines of the grid, and select a random direction (forward, backward, left or right) when they arrive at the next intersection. These devices mimic vehicles. In CRAFT-ASMP and CRAFT, they are L-devices and part of the outer network.
Scenarios
- The Basic scenario is the smart city only, in which all devices demonstrate how they behave when there is no particular event. It will be used as a point of comparison with other scenarios. The default parameters, in particular, timings and distances, used in this simulation are arbitrarily chosen, such that they are representative of a real-world scenario.
- The Parking scenario is similar to the Basic scenario except that a “parking” phase is added. During this phase, mobile devices stop moving on the grid for a certain time to simulate vehicles that are parked. For practical simulation purposes, all devices stop for the same duration after a common delay.
- The Parking+Out scenario adds an “out time” to the Parking scenario: some mobile and static devices stop communicating in the network and will try to reconnect later. Half of these devices have a short “out time” of 2000 s that simulates genuine disconnection and are expected to successfully rejoin the network. The other half have a long “out time” of 7200 s that simulates an attack; these devices are not supposed to be accepted back into the network by the antennas (i.e., the core network) as this duration exceeds a duration of 3600 s.
4.2. Metrics and Methodology
- Devices exclusion: a good framework must be sensitive and exclude all compromised devices by maximizing the true positive rate. Exclusion must also be specific and non-compromised devices must be maintained in the network by minimizing the false positive rate.
- Attestations count: attestations depend on the attestation protocol and the attestation count should correlate with the frequency defined in the parameters. With SEDA, the attestation count should always be the same (e.g., 23 in a 24 h simulation with attestations every hour). With US-AID, the attestation count depends on the number of neighbour devices, and differences can be explained by the framework definition of a neighbour device or by different contexts. Each device should have at least one attestation per attestation period, regardless of the attestation protocol.
- Heartbeats count: heartbeats help to improve continuous attestation with an increased frequency but lower performance impact than attestation messages. The more heartbeats there are per device, the more secure the network is.
- Average data volume: all frameworks should minimize their impact on the device, and the data volume exchanged by the framework is one point of comparison. Sending and receiving data is a source of power consumption and frameworks should minimize such overheads.
- HMAC computations: like data volume, cryptography has an impact on device performances and power consumption. It should be minimized, but not at the expense of security.
4.3. Results
4.3.1. Devices Exclusion
- True positives can only happen for excluded devices in the Parking+Out scenario as devices do not simulate exclusion in other scenarios. The results indicate that, using CRAFT with or without the ASMP features, 100% of attacked devices are excluded. However, as SEDA+AID uses standalone protocols, SEDA does not perform compromised static devices exclusions (which is depicted by a exclusion value in Table 3), so only US-AID mobile devices are excluded.
- False positives can happen for mobile devices when they move outside the network and are not able to reconnect to it quickly enough (i.e., before the scenario-specific threshold). Results shown both in Table 3 and in Figure 7 demonstrate that both CRAFT implementations behave in a similar manner, whereas SEDA+AID wrongfully excludes far more devices.
4.3.2. Attestations and Heartbeats
- In the Basic scenario, the SEDA+AID framework has more attestations per device than CRAFT and CRAFT-ASMP because the US-AID protocol usually has more neighbours at a given time than CRAFT. Indeed, it is more permissive from this perspective than CRAFT, and attestations are sent to all neighbours with the US-AID protocol.
- In the Parking and Parking+Out scenarios, CRAFT-ASMP mobile devices switch to SEDA when parked, which represents of the scenario duration, so they have fewer US-AID attestations. This explains why the amount of attestations for CRAFT-ASMP in the Parking scenario is about less than the amount of attestations for CRAFT-ASMP in the Basic scenario (from to ). This does not happen in other frameworks as they do not switch attestation protocols.
- Across all three scenarios, CRAFT and SEDA+AID stay at similar attestation levels.However, the Parking scenario has respectively a (from to ) and (from to ) attestations count difference compared to the Basic scenario. This difference is explained by the reduced mobility of parked devices.Similarly, the Parking+Out has (from to ) for the CRAFT and (from to ) for the SEDA+AID attestations count difference. This difference is explained by the combination of parked and excluded devices.
- For SEDA attestations, all static devices in the Basic and Parking scenarios showed 23 attestations. As these results are more straightforward, they are not represented in a figure. CRAFT-ASMP in Parking and Parking+Out scenarios have only and attestations on average as they use US-AID when not parked.
- In the Parking+Out scenario, there are also fewer SEDA attestations per device on average, because of the device exclusions at some point in the network lifetime. That number is higher without CRAFT ( without versus with) because excluded static devices in SEDA+AID do not stay out of the network and, thus, perform more attestations.
- CRAFT-ASMP performs as well as CRAFT, because it provides the same heartbeat mechanism to all devices. Providing heartbeats is an essential security feature that completes full attestations with a lightweight but more frequent device check.
- Across all three scenarios, the heartbeats count difference between CRAFT-ASMP and CRAFT is less than . This demonstrates that CRAFT-ASMP’s additional features have no impact on the performance of the heartbeat mechanism.
- In comparison to SEDA+AID, CRAFT-ASMP always shows more than a increase in the heartbeats count. This is explained by the fact that only US-AID devices (i.e., of devices) are able to perform PONAs, which are similar to CRAFT’s heartbeats. This clearly shows the benefits of CRAFT-ASMP, as maintaining continuous attestation through heartbeats helps to keep the network secure.
4.3.3. Average Data Volume and HMAC Computations
- In all scenarios, CRAFT-ASMP exchanges less data than SEDA+AID, as the messages used are smaller. In the Basic scenario, the difference between CRAFT-ASMP and SEDA+AID is (from to bytes).
- In both the Parking and the Parking+Out scenarios, the SEDA+AID framework has over a data volume overhead compared to CRAFT-ASMP (respectively, 381,245 compared to 236,929 bytes and 380,323 compared to 231,053 bytes). This is explained by CRAFT-ASMP taking advantage of the reduced mobility, which makes devices exchange far fewer lost packets and, thus, reduces the data volume sent.
- In the Parking scenario, CRAFT-ASMP exchanges more data than CRAFT (from to bytes), which is explained by mobile devices switching to the parked state and using the SEDA attestation. This is a bit less lightweight than US-AID attestation, but this does not show a significant performance impact in the simulations. Moreover, this result demonstrates that, while CRAFT-ASMP can switch to SEDA attestation, which is more efficient for static devices, this does not come at the cost of efficiency.
- The balance between antenna and non-antenna devices leans more towards the non-antenna devices when using CRAFT-ASMP and CRAFT than using SEDA+AID (e.g., from for SEDA+AID to for CRAFT-ASMP and for CRAFT in the Parking scenario). This is explained by the use of beat and lost packets for all devices, which increase communication from static and mobile devices to the benefit of increased security.
- In the Parking and Parking+Out scenarios compared to the Basic scenario, there are fewer lost packets and, thus, antennas are less solicited, which explains the reduced weight of antennas in the total data volume sent (e.g., for CRAFT-ASMP, from in the Basic scenario to in the Parking scenario).
- CRAFT-ASMP shows similar performance to CRAFT in all scenarios, even with its additional features. CRAFT-ASMP is also more efficient the less mobility there is (and, thus, fewer lost packets): the average number of computed HMACs is reduced by more than (from 11,693 to 7448) between the Basic and Parking scenarios.
- The SEDA+AID values show little variation in terms of the average HMAC computations across scenarios. The difference with the Basic scenario is less than (from 5990 to 5798 for the Parking scenario and to 5761 for the Parking+Out scenario), which is due to the reduced mobility. This variation is not greater because the framework does not react to the evolving context.
- The SEDA+AID framework always uses fewer HMACs than CRAFT-ASMP. There is an overhead of (from 5990 to 11,693) for CRAFT-ASMP compared to SEDA+AID in the Basic scenario, and an overhead of (from 5798 to 7448) for CRAFT-ASMP compared to SEDA+AID in the Parking scenario. This overhead is explained by CRAFT-ASMP implementing the additional security of the beat packet in all devices, whereas it is only available to US-AID supporting devices ( of devices, i.e., the mobile devices) in the SEDA+AID framework.
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Cisco, U. Cisco Annual Internet Report (2018–2023) White Paper; Cisco: San Jose, CA, USA, 2020. [Google Scholar]
- Kalinin, M.; Krundyshev, V.; Zegzhda, P. Cybersecurity risk assessment in smart city infrastructures. Machines 2021, 9, 78. [Google Scholar] [CrossRef]
- Andrade, R.O.; Yoo, S.G.; Tello-Oquendo, L.; Ortiz-Garcés, I. A comprehensive study of the IoT cybersecurity in smart cities. IEEE Access 2020, 8, 228922–228941. [Google Scholar] [CrossRef]
- Moreau, L.; Conchon, E.; Sauveron, D. CRAFT: A Continuous Remote Attestation Framework for IoT. IEEE Access 2021, 9, 46430–46447. [Google Scholar] [CrossRef]
- Seshadri, A.; Perrig, A.; Van Doorn, L.; Khosla, P. SWATT: Software-based attestation for embedded devices. In Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 12 May 2004; pp. 272–282. [Google Scholar]
- Yang, X.; He, X.; Yu, W.; Lin, J.; Li, R.; Yang, Q.; Song, H. Towards a low-cost remote memory attestation for the smart grid. Sensors 2015, 15, 20799–20824. [Google Scholar] [CrossRef] [PubMed]
- Conti, M.; Kaliyar, P.; Rabbani, M.M.; Ranise, S. SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things. In Proceedings of the 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Limassol, Cyprus, 15–17 October 2018. [Google Scholar]
- Steiner, R.V.; Lupu, E. Towards more practical software-based attestation. Comput. Netw. 2019, 149, 43–55. [Google Scholar] [CrossRef]
- Kil, C.; Sezer, E.C.; Azab, A.M.; Ning, P.; Zhang, X. Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. In Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, Lisbon, Portugal, 29 June–2 July 2009; pp. 115–124. [Google Scholar]
- Sun, Z.; Feng, B.; Lu, L.; Jha, S. OEI: Operation execution integrity for embedded devices. arXiv 2018, arXiv:1802.03462. [Google Scholar]
- Kobayashi, T.; Sasaki, T.; Jada, A.; Asoni, D.E.; Perrig, A. SAFES: Sand-boxed Architecture for Frequent Environment Self-measurement. In Proceedings of the 3rd Workshop on System Software for Trusted Execution, SysTEX ’18, Toronto, ON, Canada, 15 October 2018; pp. 37–41. [Google Scholar] [CrossRef]
- Gómez-Marín, E.; Parrilla, L.; Mauro, G.; Escobar-Molero, A.; Morales, D.P.; Castillo, E. RESEKRA: Remote Enrollment Using SEaled Keys for Remote Attestation. Sensors 2022, 22, 5060. [Google Scholar] [CrossRef] [PubMed]
- Group, T.C. Trusted Platform Module (TPM) Summary. 2008. Available online: https://trustedcomputinggroup.org/resource/trusted-platform-module-tpm-summary/ (accessed on 5 December 2019).
- Platform, G. The Trusted Execution Environment: Delivering Enhanced Security at a Lower Cost to the Mobile Market. 2015. Available online: https://globalplatform.org/wp-content/uploads/2018/04/GlobalPlatform_TEE_Whitepaper_2015.pdf (accessed on 5 December 2019).
- Kong, J.; Koushanfar, F.; Pendyala, P.K.; Sadeghi, A.R.; Wachsmann, C. PUFatt: Embedded platform attestation based on novel processor-based PUFs. In Proceedings of the 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, USA, 1–5 June 2014; pp. 1–6. [Google Scholar]
- Defrawy, K.E.; Francillon, A.; Perito, D.; Tsudik, G. SMART: Secure and Minimal Architecture for (establishing a dynamic) Root of Trust. In Proceedings of the Network and Distributed SystemSecurity Symposium (NDSS), San Diego, CA, USA, 5–8 February 2012. [Google Scholar]
- Koeberl, P.; Schulz, S.; Sadeghi, A.R.; Varadharajan, V. TrustLite: A Security Architecture for Tiny Embedded Devices. In Proceedings of the Ninth European Conference on Computer Systems, EuroSys ’14, Amsterdam, The Netherlands, 14–16 April 2014; pp. 10:1–10:14. [Google Scholar] [CrossRef]
- Asokan, N.; Brasser, F.; Ibrahim, A.; Sadeghi, A.R.; Schunter, M.; Tsudik, G.; Wachsmann, C. SEDA: Scalable Embedded Device Attestation. In Proceedings of the Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS ’15, Denver, CO, USA, 12–16 October 2015; pp. 964–975. [Google Scholar] [CrossRef]
- Ibrahim, A.; Sadeghi, A.R.; Tsudik, G.; Zeitouni, S. DARPA: Device Attestation Resilient to Physical Attacks. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec ’16, Darmstadt, Germany, 18–20 July 2016; pp. 171–182. [Google Scholar] [CrossRef]
- Ibrahim, A.; Sadeghi, A.R.; Tsudik, G. US-AID: Unattended Scalable Attestation of IoT Devices. In Proceedings of the 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), Salvador, Brazil, 2–5 October 2018; pp. 21–30. [Google Scholar]
- Ammar, M.; Crispo, B.; Tsudik, G. SIMPLE: A Remote Attestation Approach for Resource-constrained IoT devices. In Proceedings of the 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), Sydney, NSW, Australia, 21–25 April 2020; pp. 247–258. [Google Scholar]
- Helble, S.C.; Kretz, I.D.; Loscocco, P.A.; Ramsdell, J.D.; Rowe, P.D.; Alexander, P. Flexible mechanisms for remote attestation. ACM Trans. Priv. Secur. (TOPS) 2021, 24, 1–23. [Google Scholar] [CrossRef]
- Ramsdell, J.D.; Rowe, P.D.; Alexander, P.; Helble, S.C.; Loscocco, P.; Pendergrass, J.A.; Petz, A. Orchestrating layered attestations. In Proceedings of the International Conference on Principles of Security and Trust, Prague, Czech Republic, 6–11 April 2019; Springer: Cham, Switzerland, 2019; pp. 197–221. [Google Scholar]
- Li, Y.; Zhou, Q.; Li, B.; Zhuang, Y. CFRV: A Decentralized Control-Flow Attestation Schema Using Mutual Secret Sharing. Sensors 2022, 22, 6044. [Google Scholar] [CrossRef] [PubMed]
- Petzi, L.; Yahya, A.E.B.; Dmitrienko, A.; Tsudik, G.; Prantl, T.; Kounev, S. SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, 10–12 August 2022; pp. 3485–3501. [Google Scholar]
- OMNeT++. OMNeT++ Discrete Event Simulator. 2022. Available online: http://omnetpp.org/ (accessed on 23 March 2022).
- National Institute of Standards and Technology. Critical Values of the Student’s t Distribution. Available online: https://www.itl.nist.gov/div898/handbook/eda/section3/eda3672.htm (accessed on 3 April 2023).
Parameter | Value |
---|---|
Grid height and width (m) | 600 |
Grid block height and width (m) | 100 |
Device density (devices per km) | 278 |
Number of antennas | 18 |
Number of static devices | 42 |
Number of mobile devices | 40 |
Antennas’ communication range (m) | 300 |
Other devices’ communication range (m) | 200 |
Antennas’ positioning | Chosen |
Fixed devices’ positioning | Random |
Mobile devices’ initial positioning | Random, at grid intersections |
Mobile devices’ mobility model | Customized MovingMobilityBase |
Simulation duration (s) | 86,400 |
Radio model | UnitDiskRadio |
Wireless interface model | WirelessInterface |
Parameter | Value | Scenario | |||
---|---|---|---|---|---|
Basic | Parking | Parking+Out | |||
Attestation frequency— (s) | 3600 | ✓ | ✓ | ✓ | |
Heartbeat frequency— (s) | 1100 | ✓ | ✓ | ✓ | |
Delay between two parking phases (s) | 14,400 | ✓ | ✓ | ||
Parking phase duration (s) | 10,800 | ✓ | ✓ | ||
Excluded devicesthat should reconnect | Exclusion duration (s) | 2000 | ✓ | ||
Number of excluded static devices | 10 | ✓ | |||
Number of excluded mobile devices | 10 | ✓ | |||
Excluded devices that should NOT reconnect | Exclusion duration (s) | 7200 | ✓ | ||
Number of excluded static devices | 10 | ✓ | |||
Number of excluded mobile devices | 10 | ✓ |
Scenario | Framework | Mobile Devices Exclusions Rate | Static Devices Exclusions Rate | ||
---|---|---|---|---|---|
True Positive | False Positive | True Positive | False Positive | ||
Basic | CRAFT-ASMP | - | - | - | |
CRAFT | - | - | - | ||
SEDA+AID | - | - | - | ||
Parking | CRAFT-ASMP | - | - | - | |
CRAFT | - | - | - | ||
SEDA+AID | - | - | - | ||
Parking+Out | CRAFT-ASMP | ||||
CRAFT | |||||
SEDA+AID |
Scenario | Framework | SEDA Attestation Count | |
---|---|---|---|
Static Devices | Mobile Devices | ||
Basic | CRAFT-ASMP | ||
CRAFT | - | ||
SEDA+AID | - | ||
Parking | CRAFT-ASMP | ||
CRAFT | - | ||
SEDA+AID | - | ||
Parking+Out | CRAFT-ASMP | ||
CRAFT | - | ||
SEDA+AID | - |
Scenario | Framework | Ratio of Data Sent by Type of Devices | ||
---|---|---|---|---|
Antenna | Static | Mobile | ||
Basic | CRAFT-ASMP | 92.46% | 3.66% | 3.88% |
CRAFT | 92.46% | 3.66% | 3.88% | |
SEDA+AID | 96.31% | 1.75% | 1.94% | |
Parking | CRAFT-ASMP | 87.81% | 5.72% | 6.47% |
CRAFT | 88.40% | 5.79% | 5.81% | |
SEDA+AID | 96.04% | 1.81% | 2.15% | |
Parking+Out | CRAFT-ASMP | 87.94% | 5.46% | 6.60% |
CRAFT | 88.51% | 5.52% | 5.97% | |
SEDA+AID | 96.22% | 1.72% | 2.06% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Moreau, L.; Conchon, E.; Sauveron, D. An Adaptive Simultaneous Multi-Protocol Extension of CRAFT. Sensors 2023, 23, 4074. https://doi.org/10.3390/s23084074
Moreau L, Conchon E, Sauveron D. An Adaptive Simultaneous Multi-Protocol Extension of CRAFT. Sensors. 2023; 23(8):4074. https://doi.org/10.3390/s23084074
Chicago/Turabian StyleMoreau, Louis, Emmanuel Conchon, and Damien Sauveron. 2023. "An Adaptive Simultaneous Multi-Protocol Extension of CRAFT" Sensors 23, no. 8: 4074. https://doi.org/10.3390/s23084074
APA StyleMoreau, L., Conchon, E., & Sauveron, D. (2023). An Adaptive Simultaneous Multi-Protocol Extension of CRAFT. Sensors, 23(8), 4074. https://doi.org/10.3390/s23084074