IoT Security

Overview

Interconnecting embedded devices with the Internet leads to the so-called Internet of things (IoT). The Internet of things is envisioned to realize fascinating applications, such as smart cities, predictive maintenance, and precision agriculture. These applications will involve large numbers of embedded devices that communicate with each other and remote hosts.

The security challenges in this area are diverse. On the one hand, IoT devices can be attacked from the Internet. On the other hand, IoT devices are often deployed outdoors in hostile environments and communicate wirelessly. Consequently, IoT devices require protection from both remote and local attackers.

Our research in this area currently focusses on preventing denial-of-sleep attacks. Such attacks aim at expending the limited energy reserves of battery-powered and energy-harvesting IoT devices.

Deliverables

We provide the following open-souce add-ons for the Contiki operating system:

Publications

  • Secure Self-Seeding with Power-Up SRAM States. Krentz, Konrad-Felix; Meinel, Christoph; Graupner, Hendrik (2017).
     
  • Countering Three Denial-of-Sleep Attacks on ContikiMAC. Krentz, Konrad-Felix; Meinel, Christoph; Graupner, Hendrik (2017).
     
  • POTR: Practical On-the-fly Rejection of Injected and Replayed 802.15.4 Frames. Krentz, Konrad-Felix; Meinel, Christoph; Schnjakin, Maxim (2016).
     
  • Handling Reboots and Mobility in 802.15.4 Security. Krentz, Konrad-Felix; Meinel, Christoph (2015).
     
  • 6LoWPAN Security: Adding Compromise Resilience to the 802.15.4 Security Sublayer. Krentz, Konrad-Felix; Rafiee, Hosnieh; Meinel, Christoph (2013).