Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API

08/19/2022
by   Lena Boeckmann, et al.
0

IoT devices differ widely in crypto-supporting hardware, ranging from no hardware support to powerful accelerators supporting numerous of operations including protected key storage. An operating system should provide uniform access to these heterogeneous hardware features, which is a particular challenge in the resource constrained IoT. Effective security is tied to the usability of cryptographic interfaces. A thoughtful API design is challenging, and it is beneficial to re-use such an interface and to share the knowledge of programming embedded security widely. In this paper, we integrate an emerging cryptographic interface into usable system-level calls for the IoT operating system RIOT, which runs on more than 240 platforms. This interface supports ID-based key handling to access key material in protected storage without exposing it to anyone. Our design foresees hardware acceleration on all available variants; our implementation integrates diverse cryptographic hardware and software backends via the uniform interface. Our performance measurements show that the overhead of the uniform API with integrated key management is negligible compared to the individual crypto operation. Our approach enhances the usability, portability, and flexibility of cryptographic support in the IoT.

READ FULL TEXT

page 1

page 5

page 7

page 9

research
01/17/2023

PUF for the Commons: Enhancing Embedded Security on the OS Level

Security is essential for the Internet of Things (IoT). Cryptographic op...
research
05/24/2018

Why Johnny Can't Store Passwords Securely? A Usability Evaluation of Bouncycastle Password Hashing

Lack of usability of security Application Programming In- terfaces (APIs...
research
10/03/2018

Towards Low-level Cryptographic Primitives for JavaCards

JavaCard is a multi-application security platform deployed to over twent...
research
06/30/2023

Lightweight usable cryptography: a usability evaluation of the Ascon 1.2 family

We present a usability study of the Ascon 1.2 family of cryptographic al...
research
01/02/2022

Towards a secure API client generator for IoT devices

Given the success of IoT platforms, more developers and companies want t...
research
07/23/2020

A Guideline on Pseudorandom Number Generation (PRNG) in the IoT

Security and trust are essential building blocks for the emerging Intern...
research
11/07/2020

EHAP-ORAM: Efficient Hardware-Assisted Persistent ORAM System for Non-volatile Memory

Oblivious RAM (ORAM) protected access pattern is essential for secure NV...

Please sign up or login with your details

Forgot password? Click here to reset