You are on page 1of 2

2016 IEEE 5th Global Conference on Consumer Electronics

An ARM-Compliant IoT Platform: Security by


Design for the Smart Home
Victoria Beltran, Juan A. Martinez, Antonio Skarmeta Pedro Martinez-Julia
Department of Info. and Communications Engineering Network Science and Convergence Device Technology Lab.
Computer Science Faculty, University of Murcia Network System Research Institute
Murcia, Spain National Institute of Info. and Comm. Technology (NICT)
{vbm5, juanantonio, skarmeta}@um.es Tokyo, Japan
pedro@nict.go.jp

AbstractIoT heterogeneity and diversity have single vendors side by acquiring prepackaged kits that
promoted the creation of different and isolated IoT interconnects the vendors devices with its cloud service.
systems. The EU has funded several research projects in For the sake of interoperability in IoT, the European
order to promote interoperability and quality aspects for Union (EU) has invested efforts on several FP7-programme-
IoT platforms. More significantly, the IoT-ARM was funded projects in the last few years [3]. Notably, in 2010 the
conceived as a reference architecture to derive concrete IoT-Architecture (IoT-A) project started with the aim of
IoT platforms and establish a common understanding on developing a reference architecture which was finally
quality requirements between different platforms. This released in 2012 with the name IoT Architectural Reference
paper describes SMARTIE, an IoT platform that is Model (IoT-ARM) [3]. Nevertheless, works that show the
compliant with the IoT-ARM and promotes the most application of the IoT-ARM are almost non-existent. To the
important quality aspects for the Smart Home, that is, best of our knowledge, only the authors of [5] show to a
security and interoperability. limited extent their ARM-compliant architecture.

KeywordsInternet of things; IoT; ARM; Security


Security and interoperability are two key quality aspects
whose absence in IoT solutions can seriously hold back the
adoption and success of the IoT in any application domain,
I. INTRODUCTION including smart homes. Indeed, the Internet Society has
The Internet of Things (IoT) is intrinsically adhered to recently brought the IoT perils on interoperability and
heterogeneity. There is a plethora of IoT application domains security into the open [6].
and for any of them, each specific application needs to
This short paper introduces SMARTIE, an IoT platform
handle with its own diversity in device characteristics,
that promotes security and interoperability in IoT scenarios.
communication technologies, required functionalities, and so
In particular, we highlight the use case of SMARTIE for
on. Vertical solutions are designed to accomplish their own smart homes.
goals and many times renounce quality aspects such as
security and interoperability to minimize costs.
II. THE IOT-ARM AND SMARTIE
A recent report [1] demonstrates that several home smart
locks present weaknesses that allow attackers unlock doors. The IoT-ARM provides a reference framework that
Another report [2] has found security issues in different permits to guarantee the quality of IoT platforms, compare
smart home products such as smart switches, LEDs and platforms and measure their level of interoperability. The
audio receivers. Video cameras (including security cameras IoT-ARM addresses the different phases of the architecting
and baby cameras) have been left open to online viewing1. process by providing inputs (e.g., guidance, examples,
Although IoT security is being developed at all the protocol common semantics, etc.) that can greatly help architects to
stack levels through IETF Working Groups such as ROLL, design their IoT systems. It was conceived as an abstract and
CoRE, and ACE, the security features of real IoT products application-independent reference framework in order to
are in most cases very limited. support the generation process of IoT architectures in any
IoT domain. Thus, the IoT-ARM defines high-level
The lack of interoperability between IoT providers in smart concepts, semantics, and functions that are common to any
homes makes Do-It-Yourself painful and not compensatory platform through two main blocks [3]: the IoT Reference
since different providers devices cannot interoperate and Model and the IoT Reference Architecture. Another essential
hence offer advanced services. Thus, to enjoy fancier and contribution of the IoT-ARM is its guidance and supporting
smarter functionality, smart home users need to keep on a material for the derivation of concrete architectural views.
The SMARTIE architecture [7] has been derived from
This paper has been also possible partially by the EU FP7 Smartie Project
and the Spanish National Project EDISON (TIN2014-52099-R).
the IoT-ARM by paying special attention to the ARMs
1
https://www.ftc.gov/news-events/press-releases/2013/09/marketer- Trust, Security and Privacy perspective. It is organized
internet-connected-home-security-video-cameras-settles through the ARM functional groups (FG) and Functional

978-1-5090-2333-2/16/$31.00 2016 IEEE


2016 IEEE 5th Global Conference on Consumer Electronics

Components (FCs), as shown in Figure 1. The rightmost homeowners authorization through the PDP, it replies the
column is the Security FG, which contains different security- visitor with a capability token (CT) that contains the access
related components such as XACML for security policies, control rules set by the homeowner.
DCapBAC [8] for decentralized, self-contained authorization
tokens, and CP-ABE for encryption-based authorization [9]. When the visitor goes to the host house, he uses his
mobile application to sign the CT with his private key and
Thus, the resulting SMARTIE platform is compliant with
many of the ARM requirements on security and privacy. present it to the houses smart lock. The lock validated the
token by verifying both the CMs and the visitors signatures
on the token. Thus, the smart lock can locally guarantee that
the CM has authorized the client that is trying to use the
token. If both authentication and authorization are right, the
visitor will be able to enter the house enjoying his authorized
areas during that specific period of time.
Different members of the homeowners family have
subscribed to the smart lock through the IoT broker. Thus,
they have obtained the attributes that are necessary to
decrypt notifications from the smart lock. When the visitor
presents its token to the smart lock, the latter notifies the IoT
which will automatically notify all the subscribers.
Authorization is implicit by the capability of the subscribers
to decrypt the content of notifications through CP-ABE
based on their attributes.

III. USE CASES IV. CONCLUSION


The IETF has recently released the RFC 7744 [8] to In this short paper, we have presented SMARTIE
booster the discussion on uses cases for authorization in IoT. architecture, an IoT-ARM complaint architecture aimed to
Home automation is one of the seven application domains provide security and privacy in the information provided by
addressed by this document. In particular, the use case whose sensors integrated in it. As an example we have described the
goal is to let homeowners to allow visitors to come into his interaction of different components of this architecture for a
house through smart locks has been paid special attention. representative use case of the Smart Home domain.

Let us begin with the description of the main SMARTIE REFERENCES


architecture components and their interaction involved in this
[1] Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., & Wagner, D.
use case. A smart house is equipped with the public key of (2016). Smart Locks: Lessons for Securing Commodity Internet of
its security authority, what we call Capability Manager (CM) Things Devices.
in SMARTIE terminology. This CM relies on a Policy [2] BitDefender Research Paper The internet of things: Risks in the
Decision Point (PDP) that handles the systems security Connected Home, February 2006. Online at:
policies, which in turn are handled through XACML. Smart http://download.bitdefender.com/resources/files/News/CaseStudies/st
locks provide information about the access requests (i.e., udy/87/Bitdefender-2016-IoT-A4-en-EN-web.pdf
access log) to the IoT Broker. Based on CP-ABE, the IoT [3] Krco, S., Pokric, B., & Carrez, F. (2014, March). Designing IoT
broker can inform subscribers about smart locks events (e.g. architecture (s): A European perspective. In Internet of Things (WF-
IoT), 2014 IEEE World Forum on (pp. 79-84). IEEE.
suspicious access event) in an efficient and confidential way
[4] Bassi, A., Bauer, M., Fiedler, M., Kramp, T., Van Kranenburg, R.,
by applying encryption-based authorization. Lange, S., & Meissner, S. (2013). Enabling things to talk. Designing
IoT Solutions With the IoT Architectural Reference Model, 163-211.
SMARTIE promotes interoperability in the smart house
since IETF communication protocols are used (i.e. [5] Fernandes, J., Nati, M., Loumis, N. S., Nikoletseas, S., Raptis, T. P.,
Krco, S., ... & Ziegler, S. (2015, April). IoT Lab: Towards co-design
CoAP/DTLS or MQTT) and any sensor deployed into the and IoT solution testing using the crowd. In Recent Advances in
house can been registered into the Resource Directory Internet of Things (RIoT), 2015 International Conference on (pp. 1-
component that offers a CoAP-compliant discovery method. 6). IEEE.
[6] The Internet Society, The Internet of Things: An Overview.
When the homeowner wishes to delegate authorization to Understanding the issues and challenges of a more connected world,
a visitor, he uses his mobile application to access the system October 2015. Online at: http://www.internetsociety.org/doc/iot-
and generates a new security policy through the PDP overview
component for allowing the visitor to enter his house (by [7] SMARTIE Initial Architecture Specification, SMARTIE project
specifying the period of time for such permission and Deliverable 2.3, http://www.smartie-project.eu/download/D2.3-
possibly the authorized areas within the house). Note that Initial%20Architecture%20Specification.pdf.
SMARTIE is an integrating infrastructure and hence is [8] Gerdes, S., Seitz, L., Selander, G., Mani, M., & Kumar, S. (2016).
Use Cases for Authentication and Authorization in Constrained
independent from any front-end GUI such as mobile apps. Environments (No. RFC 7744).
Later on, the visitor logs into the system and (after
authentication) requests the CM authorization to get into the
homeowners house. When the CM verifies the

You might also like