Securing Embedded Networks Through Secure Collective Attestation

Networks of embedded devices are becoming increasingly popular. Examples of such networks range from small ecosystems, such as home and building automation, to very large infrastructure, e.g., industrial control systems. Devices in these networks usually collect private information and perform safet...

Full description

Bibliographic Details
Main Author: Ibrahim, Ahmad
Format: Others
Language:en
Published: 2019
Online Access:https://tuprints.ulb.tu-darmstadt.de/8588/1/AI_Dissertation.pdf
Ibrahim, Ahmad <http://tuprints.ulb.tu-darmstadt.de/view/person/Ibrahim=3AAhmad=3A=3A.html> (2019): Securing Embedded Networks Through Secure Collective Attestation.Darmstadt, Technische Universität, [Ph.D. Thesis]
id ndltd-tu-darmstadt.de-oai-tuprints.ulb.tu-darmstadt.de-8588
record_format oai_dc
spelling ndltd-tu-darmstadt.de-oai-tuprints.ulb.tu-darmstadt.de-85882020-07-15T07:09:31Z http://tuprints.ulb.tu-darmstadt.de/8588/ Securing Embedded Networks Through Secure Collective Attestation Ibrahim, Ahmad Networks of embedded devices are becoming increasingly popular. Examples of such networks range from small ecosystems, such as home and building automation, to very large infrastructure, e.g., industrial control systems. Devices in these networks usually collect private information and perform safety- and security-critical operations. Therefore, attacks targeting them are critical as they threaten both privacy and safety of humans, and are capable of causing extreme physical damage. A prominent example of such attacks is characterized by the Stuxnet worm which targets industrial control systems and is suspected to have caused substantial damage to Iran's nuclear program. In fact, three classes of attacks are relevant in the context of large embedded networks. These are malware infestation, physical, and runtime attacks. In this dissertation, we investigate the security of large embedded networks in different deployment scenarios and provide security solutions that allow to scalably secure and manage these networks. In particular, we identify the adversarial assumptions and security requirements for every scenario and provide security protocols, based on remote attestation, that allow the detection of attacks belonging to the three aforementioned classes. In order to secure large embedded networks, this dissertation presents the design and implementation of several scalable attestation protocols for centralized and autonomous networks. First, we present three scalable attestation protocols for centralized embedded networks that allows the detection of malware infestation attacks. These are accompanied with a systematic treatment of the problem that allows identifying and fulfilling all security requirements. Second, we investigate the problem of physical attacks on large embedded networks defining the capabilities of a physical attacker, and design two scalable attestation protocols that efficiently detect physical attacks in both centralized and autonomous settings. Third, we design a scalable attestation protocol that is capable of efficiently detecting runtime attacks on autonomous systems without disrupting the functionality or safety requirements of these systems. Finally, since management and software updates represent a critical requirement for securing a device as well as an important entry point for attackers, we also present a scalable management protocol for large networks that allows to securely and efficiently broadcast management commands and collect statistics regarding all devices in an embedded network. 2019-03-28 Ph.D. Thesis NonPeerReviewed text CC-BY-SA 4.0 International - Creative Commons, Attribution Share-alike https://tuprints.ulb.tu-darmstadt.de/8588/1/AI_Dissertation.pdf Ibrahim, Ahmad <http://tuprints.ulb.tu-darmstadt.de/view/person/Ibrahim=3AAhmad=3A=3A.html> (2019): Securing Embedded Networks Through Secure Collective Attestation.Darmstadt, Technische Universität, [Ph.D. Thesis] en info:eu-repo/semantics/doctoralThesis info:eu-repo/semantics/openAccess
collection NDLTD
language en
format Others
sources NDLTD
description Networks of embedded devices are becoming increasingly popular. Examples of such networks range from small ecosystems, such as home and building automation, to very large infrastructure, e.g., industrial control systems. Devices in these networks usually collect private information and perform safety- and security-critical operations. Therefore, attacks targeting them are critical as they threaten both privacy and safety of humans, and are capable of causing extreme physical damage. A prominent example of such attacks is characterized by the Stuxnet worm which targets industrial control systems and is suspected to have caused substantial damage to Iran's nuclear program. In fact, three classes of attacks are relevant in the context of large embedded networks. These are malware infestation, physical, and runtime attacks. In this dissertation, we investigate the security of large embedded networks in different deployment scenarios and provide security solutions that allow to scalably secure and manage these networks. In particular, we identify the adversarial assumptions and security requirements for every scenario and provide security protocols, based on remote attestation, that allow the detection of attacks belonging to the three aforementioned classes. In order to secure large embedded networks, this dissertation presents the design and implementation of several scalable attestation protocols for centralized and autonomous networks. First, we present three scalable attestation protocols for centralized embedded networks that allows the detection of malware infestation attacks. These are accompanied with a systematic treatment of the problem that allows identifying and fulfilling all security requirements. Second, we investigate the problem of physical attacks on large embedded networks defining the capabilities of a physical attacker, and design two scalable attestation protocols that efficiently detect physical attacks in both centralized and autonomous settings. Third, we design a scalable attestation protocol that is capable of efficiently detecting runtime attacks on autonomous systems without disrupting the functionality or safety requirements of these systems. Finally, since management and software updates represent a critical requirement for securing a device as well as an important entry point for attackers, we also present a scalable management protocol for large networks that allows to securely and efficiently broadcast management commands and collect statistics regarding all devices in an embedded network.
author Ibrahim, Ahmad
spellingShingle Ibrahim, Ahmad
Securing Embedded Networks Through Secure Collective Attestation
author_facet Ibrahim, Ahmad
author_sort Ibrahim, Ahmad
title Securing Embedded Networks Through Secure Collective Attestation
title_short Securing Embedded Networks Through Secure Collective Attestation
title_full Securing Embedded Networks Through Secure Collective Attestation
title_fullStr Securing Embedded Networks Through Secure Collective Attestation
title_full_unstemmed Securing Embedded Networks Through Secure Collective Attestation
title_sort securing embedded networks through secure collective attestation
publishDate 2019
url https://tuprints.ulb.tu-darmstadt.de/8588/1/AI_Dissertation.pdf
Ibrahim, Ahmad <http://tuprints.ulb.tu-darmstadt.de/view/person/Ibrahim=3AAhmad=3A=3A.html> (2019): Securing Embedded Networks Through Secure Collective Attestation.Darmstadt, Technische Universität, [Ph.D. Thesis]
work_keys_str_mv AT ibrahimahmad securingembeddednetworksthroughsecurecollectiveattestation
_version_ 1719327693574504448