System disruptions
We are currently experiencing disruptions on the search portals due to high traffic. We are working to resolve the issue, you may temporarily encounter an error message.
Change search
Link to record
Permanent link

Direct link
Publications (10 of 13) Show all publications
Höglund, J., Bouget, S., Furuhed, M., Preuß Mattsson, J., Selander, G. & Raza, S. (2024). AutoPKI: public key infrastructure for IoT with automated trust transfer. International Journal of Information Security, 23(3), 1859
Open this publication in new window or tab >>AutoPKI: public key infrastructure for IoT with automated trust transfer
Show others...
2024 (English)In: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270, Vol. 23, no 3, p. 1859-Article in journal (Refereed) Published
Abstract [en]

IoT deployments grow in numbers and size, which makes questions of long-term support and maintainability increasingly important. Without scalable and standard-compliant capabilities to transfer the control of IoT devices between service providers, IoT system owners cannot ensure long-term maintainability, and risk vendor lock-in. The manual overhead must be kept low for large-scale IoT installations to be economically feasible. We propose AutoPKI, a lightweight protocol to update the IoT PKI credentials and shift the trusted domains, enabling the transfer of control between IoT service providers, building upon the latest IoT standards for secure communication and efficient encodings. We show that the overhead for the involved IoT devices is small and that the overall required manual overhead can be minimized. We analyse the fulfilment of the security requirements, and for a subset of them, we demonstrate that the desired security properties hold through formal verification using the Tamarin prover. 

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2024
Keywords
Internet of things; Maintainability; Public key cryptography; Digital certificates; Embedded-system; Enrollment; IoT; Lock-in; Number and size; PKI; Public key infrastructure; Service provider; Trust transfer; Embedded systems
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ri:diva-72880 (URN)10.1007/s10207-024-00825-z (DOI)2-s2.0-85186450576 (Scopus ID)
Funder
Swedish Foundation for Strategic ResearchEU, Horizon 2020, 101020259EU, Horizon 2020, 957197
Note

This research is partially funded by the Swedish SSF Institute PhD grant and by the EU H2020 projects ARCADIAN-IoT (Grant ID. 101020259) and VEDLIoT (Grant ID: 957197)

Available from: 2024-04-26 Created: 2024-04-26 Last updated: 2025-02-21Bibliographically approved
Höglund, J., Furuhed, M. & Raza, S. (2023). Lightweight certificate revocation for low-power IoT with end-to-end security. Journal of Information Security and Applications, 73, Article ID 103424.
Open this publication in new window or tab >>Lightweight certificate revocation for low-power IoT with end-to-end security
2023 (English)In: Journal of Information Security and Applications, ISSN 2214-2134, E-ISSN 2214-2126, Vol. 73, article id 103424Article in journal (Refereed) Published
Abstract [en]

Public key infrastructure (PKI) provides the basis of authentication and access control in most networked systems. In the Internet of Things (IoT), however, security has predominantly been based on pre-shared keys (PSK), which cannot be revoked and do not provide strong authentication. The prevalence of PSK in the IoT is due primarily to a lack of lightweight protocols for accessing PKI services. Principal among these services are digital certificate enrollment and revocation, the former of which is addressed in recent research and is being pushed for standardization in IETF. However, no protocol yet exists for retrieving certificate status information on constrained devices, and revocation is not possible unless such a service is available. In this work, we start with implementing the Online Certificate Status Protocol (OCSP), the de facto standard for certificate validation on the Web, on state-of-the-art constrained hardware. In doing so, we demonstrate that the resource overhead of this protocol is unacceptable for highly constrained environments. We design, implement and evaluate a lightweight alternative to OCSP, TinyOCSP, which leverages recently standardized IoT protocols, such as CoAP and CBOR. In our experiments, validating eight certificates with TinyOCSP required 41% less energy than validating just one with OCSP on an ARM Cortex-M3 SoC. Moreover, validation transactions encoded with TinyOCSP are at least 73% smaller than the OCSP equivalent. We design a protocol for compressed certificate revocation lists (CCRL) using Bloom filters which together with TinyOCSP can further reduce validation overhead. We derive a set of equations for computing the optimal filter parameters, and confirm these results through empirical evaluation. © 2023 The Authors

Place, publisher, year, edition, pages
Elsevier Ltd, 2023
Keywords
IoT security, OCSP, PKI, Revocation, X.509, Authentication, Network security, Networked control systems, Public key cryptography, Certificate revocation, End-to-end security, Internet of thing security, Low Power, Networked systems, Online certificate status protocol, Public key infrastructure, Strong authentication, Internet of things
National Category
Communication Systems
Identifiers
urn:nbn:se:ri:diva-63979 (URN)10.1016/j.jisa.2023.103424 (DOI)2-s2.0-85146599883 (Scopus ID)
Note

Correspondence Address: Höglund, J.; RISE Research Institutes of Sweden; email: joel.hoglund@ri.se;

Funding details: 101020259; Funding details: 830927; Funding details: Stiftelsen för Strategisk Forskning, SSF; Funding text 1: This work was partly supported by the Swedish Foundation for Strategic Research (SSF) institute PhD program, and by the H2020 CONCORDIA (GA No. 830927 ) and ARCADIAN-IoT (GA No. 101020259 ) projects.

Available from: 2023-02-16 Created: 2023-02-16 Last updated: 2023-06-08Bibliographically approved
Höglund, J. & Raza, S. (2022). BLEND: Efficient and blended IoT data storage and communication with application layer security. In: Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience, CSR 2022: . Paper presented at 2nd IEEE International Conference on Cyber Security and Resilience, CSR 2022, 27 July 2022 through 29 July 2022 (pp. 253-260). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>BLEND: Efficient and blended IoT data storage and communication with application layer security
2022 (English)In: Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience, CSR 2022, Institute of Electrical and Electronics Engineers Inc. , 2022, p. 253-260Conference paper, Published paper (Refereed)
Abstract [en]

Many IoT use cases demand both secure storage and secure communication. Resource-constrained devices cannot afford having one set of crypto protocols for storage and another for communication. Lightweight application layer security standards are being developed for IoT communication. Extending these protocols for secure storage can significantly reduce communication latency and local processing.We present BLEND, combining secure storage and communication by storing IoT data as pre-computed encrypted network packets. Unlike local methods, BLEND not only eliminates separate crypto for secure storage needs, but also eliminates a need for real-time crypto operations, reducing the communication latency significantly. Our evaluation shows that compared with a local solution, BLEND reduces send latency from 630 μs to 110 μs per packet. BLEND enables PKI based key management while being sufficiently lightweight for IoT. BLEND doesn't need modifications to communication standards used when extended for secure storage, and can therefore preserve underlying protocols' security guarantees. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2022
Keywords
application layer security, communication security, EDHOC, IoT, OSCORE, Secure storage, Internet of things, Network security, Application layer securities, Communication latency, Communications security, Data storage, Data-communication, Resourceconstrained devices, Digital storage
National Category
Physical Sciences
Identifiers
urn:nbn:se:ri:diva-60158 (URN)10.1109/CSR54599.2022.9850290 (DOI)2-s2.0-85137358442 (Scopus ID)9781665499521 (ISBN)
Conference
2nd IEEE International Conference on Cyber Security and Resilience, CSR 2022, 27 July 2022 through 29 July 2022
Note

Funding details: 101020259, P123800021; Funding details: 830927; Funding text 1: ACKNOWLEDGMENT This research is partially funded by the Swedish SSF Institute PhD grant and partly by the EU H2020 ARCADIAN-IoT (Grant ID. 101020259), the ITEA3 Smart, Attack-resistant IoT Networks (Project ID: P123800021) and the H2020 CON-CORDIA (Grant ID: 830927) projects.

Available from: 2022-10-10 Created: 2022-10-10 Last updated: 2023-06-08Bibliographically approved
Höglund, J., Raza, S. & Furuhed, M. (2022). Towards Automated PKI Trust Transfer for IoT. In: 2022 IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022: . Paper presented at 2022 IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022, 9 September 2022 through 10 September 2022. Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Towards Automated PKI Trust Transfer for IoT
2022 (English)In: 2022 IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022, Institute of Electrical and Electronics Engineers Inc. , 2022Conference paper, Published paper (Refereed)
Abstract [en]

IoT deployments grow in numbers and size and questions of long time support and maintainability become increasingly important. To prevent vendor lock-in, standard compliant capabilities to transfer control of IoT devices between service providers must be offered. We propose a lightweight protocol for transfer of control, and we show that the overhead for the involved IoT devices is small and the overall required manual overhead is minimal. We analyse the fulfilment of the security requirements to verify that the stipulated requirements are satisfied. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2022
Keywords
digital certificates, embedded systems, enrollment, IoT, PKI, security, Internet of things, Embedded-system, Lock-in, Number and size, Transfer control, Trust transfer
National Category
Communication Systems
Identifiers
urn:nbn:se:ri:diva-62620 (URN)10.1109/PKIA56009.2022.9952223 (DOI)2-s2.0-85143888632 (Scopus ID)9781665488839 (ISBN)
Conference
2022 IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022, 9 September 2022 through 10 September 2022
Note

 Funding text 1: ACKNOWLEDGMENT This research is partially funded by the Swedish SSF Institute PhD grant and by the EU H2020 projects ARCADIAN-IoT (Grant ID. 101020259) and CONCORDIA (Grant ID: 830927) .

Available from: 2023-01-24 Created: 2023-01-24 Last updated: 2023-06-08Bibliographically approved
Höglund, J., Lindemer, S., Furuhed, M. & Raza, S. (2020). PKI4IoT: Towards public key infrastructure for the Internet of Things. Computers & security (Print), 89, Article ID 101658.
Open this publication in new window or tab >>PKI4IoT: Towards public key infrastructure for the Internet of Things
2020 (English)In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 89, article id 101658Article in journal (Refereed) Published
Abstract [en]

Public Key Infrastructure is the state-of-the-art credential management solution on the Internet. However, the millions of constrained devices that make of the Internet of Things currently lack a centralized, scalable system for managing keys and identities. Modern PKI is built on a set of protocols which were not designed for constrained environments, and as a result many small, battery-powered IoT devices lack the required computing resources. In this paper, we develop an automated certificate enrollment protocol light enough for highly constrained devices, which provides end-to-end security between certificate authorities (CA) and the recipient IoT devices. We also design a lightweight profile for X.509 digital certificates with CBOR encoding, called XIOT. Existing CAs can now issue traditional X.509 to IoT devices. These are converted to and from the XIOT format by edge devices on constrained networks. This procedure preserves the integrity of the original CA signature, so the edge device performing certificate conversion need not be trusted. We implement these protocols within the Contiki embedded operating system and evaluate their performance on an ARM Cortex-M3 platform. Our evaluation demonstrates reductions in energy expenditure and communication latency. The RAM and ROM required to implement these protocols are on par with the other lightweight protocols in Contiki’s network stack.

Keywords
Security, CBOR, IoT, PKI, Digital certificates, Enrollment, Embedded systems, Contiki
National Category
Natural Sciences
Identifiers
urn:nbn:se:ri:diva-42433 (URN)10.1016/j.cose.2019.101658 (DOI)
Available from: 2019-12-20 Created: 2019-12-20 Last updated: 2023-06-08Bibliographically approved
Liu, Y., Voigt, T., Wirstrom, N. & Hoglund, J. (2019). ECOVIBE: On-Demand Sensing for Railway Bridge Structural Health Monitoring. IEEE Internet of Things Journal, 6(1), 1068-1078, Article ID 8445576.
Open this publication in new window or tab >>ECOVIBE: On-Demand Sensing for Railway Bridge Structural Health Monitoring
2019 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 6, no 1, p. 1068-1078, article id 8445576Article in journal (Refereed) Published
Abstract [en]

Energy efficient sensing is one of the main objectives in the design of networked embedded monitoring systems. However, existing approaches such as duty cycling and ambient energy harvesting face challenges in railway bridge health monitoring applications due to the unpredictability of train passages and insufficient ambient energy around bridges. This paper presents ECOVIBE (Eco-friendly Vibration), an on-demand sensing system that automatically turns on itself when a train passes on the bridge and adaptively powers itself off after finishing all tasks. After that, it goes into an inactive state with near-zero power dissipation. ECOVIBE achieves these by: Firstly, a novel, fully passive event detection circuit to continuously detect passing trains without consuming any energy. Secondly, combining train-induced vibration energy harvesting with a transistor-based load switch, a tiny amount of energy is sufficient to keep ECOVIBE active for a long time. Thirdly, a passive adaptive off control circuit is introduced to quickly switch off ECOVIBE. Also this circuit does not consume any energy during inactivity periods. We present the prototype implementation of the proposed system using commercially available components and evaluate its performance in real-world scenarios. Our results show that ECOVIBE is effective in railway bridge health monitoring applications.

Keywords
Bridge circuits, Event detection, Internet of Things, Monitoring, on-demand sensing, Sensors, smart transportation., structural health monitoring, Structural panels, vibration energy harvesting, Vibrations, Embedded systems, Energy efficiency, Energy harvesting, Railroad bridges, Railroads, On demands, Smart transportations
National Category
Natural Sciences
Identifiers
urn:nbn:se:ri:diva-35159 (URN)10.1109/JIOT.2018.2867086 (DOI)2-s2.0-85052713646 (Scopus ID)
Available from: 2018-09-11 Created: 2018-09-11 Last updated: 2023-06-08Bibliographically approved
Boo, E., Raza, S., Höglund, J. & Ko, J. (2019). Towards supporting IoT device storage and network security using DTLs. In: MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services: . Paper presented at 17th ACM International Conference on Mobile Systems, Applications, and Services, MobiSys 2019, 17 June 2019 through 21 June 2019 (pp. 570-571). Association for Computing Machinery, Inc
Open this publication in new window or tab >>Towards supporting IoT device storage and network security using DTLs
2019 (English)In: MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, Association for Computing Machinery, Inc , 2019, p. 570-571Conference paper, Published paper (Refereed)
Abstract [en]

This work presents FDTLS, a security framework that combines storage and network/communication-level security for resource limited Internet of Things (IoT) devices using Datagram Transport Layer Security (DTLS). While coalescing storage and networking security scheme can reduce redundent and unnecessary operations, we identify security- and system-level challenges that can occur when applying DTLS. FDTLS addresses these challenges by employing asymmetric key generation, a virtual peer, and header reduction-based storage optimization. Our results obtained using a Contiki-based implementation on OpenMote platforms show that compared to using storage and networking security separately, FDTLS can reduce the latency of packet transmission responses and also contribute to saving energy. © 2019 Copyright held by the owner/author(s).

Place, publisher, year, edition, pages
Association for Computing Machinery, Inc, 2019
Keywords
DTLS, Secure Internet of Things, Self-key Generation, Flocculation, Internet of things, Virtual addresses, Internet of Things (IOT), Key generation, Networking security, Packet transmissions, Security frameworks, Storage optimization, Transport layer security, Network security
National Category
Natural Sciences
Identifiers
urn:nbn:se:ri:diva-39656 (URN)10.1145/3307334.3328630 (DOI)2-s2.0-85069204631 (Scopus ID)9781450366618 (ISBN)
Conference
17th ACM International Conference on Mobile Systems, Applications, and Services, MobiSys 2019, 17 June 2019 through 21 June 2019
Available from: 2019-08-08 Created: 2019-08-08 Last updated: 2023-06-08Bibliographically approved
Misra, P., Mottola, L., Raza, S., Duquennoy, S., Tsiftes, N., Höglund, J. & Voigt, T. (2013). Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services (10ed.). Journal of the Indian Institute of Science, 93(3), 463-486
Open this publication in new window or tab >>Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services
Show others...
2013 (English)In: Journal of the Indian Institute of Science, ISSN 0970-4140, Vol. 93, no 3, p. 463-486Article in journal (Refereed) Published
Abstract [en]

Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication and computation at a low premium of cost and power. In this article, we explore the fundamental concepts guiding the design and implementation of WSNs. We report the latest developments in WSN software and services for meeting existing requirements and newer demands; particularly in the areas of: operating system, simulator and emulator, programming abstraction, virtualization, IP-based communication and security, time and location, and network monitoring and management. We also reflect on the ongoing efforts in providing dependable assurances for WSN-driven CPS. Finally, we report on its applicability with a case-study on smart buildings.

Place, publisher, year, edition, pages
Indian Institute of Science, 2013 Edition: 10
Keywords
Communication, Computer programming, Computer software, Embedded systems, Location based services
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-24243 (URN)2-s2.0-84886711852 (Scopus ID)
Projects
Promos
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2023-06-08Bibliographically approved
Raza, S., Duquennoy, S., Höglund, J., Roedig, U. & Voigt, T. (2012). Secure Communication for the Internet of Things: A Comparison of Link-Layer Security and IPsec for 6LoWPAN (15ed.). Security and Communication Networks
Open this publication in new window or tab >>Secure Communication for the Internet of Things: A Comparison of Link-Layer Security and IPsec for 6LoWPAN
Show others...
2012 (English)In: Security and Communication Networks, ISSN 1939-0114, E-ISSN 1939-0122Article in journal (Refereed) Published
Abstract [en]

The future Internet is an IPv6 network interconnecting traditional computers and a large number of smart objects. This Internet of Things (IoT) will be the foundation of many services and our daily life will depend on its availability and reliable operation. Therefore, among many other issues, the challenge of implementing secure communication in the IoT must be addressed. In the traditional Internet, IPsec is the established and tested way of securing networks. It is therefore reasonable to explore the option of using IPsec as a security mechanism for the IoT. Smart objects are generally added to the Internet using IPv6 over Low-power Wireless Personal Area Networks (6LoWPAN), which defines IP communication for resource-constrained networks. Thus, to provide security for the IoT based on the trusted and tested IPsec mechanism, it is necessary to define an IPsec extension of 6LoWPAN. In this paper, we present such a 6LoWPAN/IPsec extension and show the viability of this approach. We describe our 6LoWPAN/IPsec implementation, which we evaluate and compare with our implementation of IEEE 802.15.4 link-layer security. We also show that it is possible to reuse crypto hardware within existing IEEE 802.15.4 transceivers for 6LoWPAN/IPsec. The evaluation results show that IPsec is a feasible option for securing the IoT in terms of packet size, energy consumption, memory usage, and processing time. Furthermore, we demonstrate that in contrast to common belief, IPsec scales better than link-layer security as the data size and the number of hops grow, resulting in time and energy savings. Copyright © 2012 John Wiley & Sons, Ltd.

Place, publisher, year, edition, pages
Wiley, 2012 Edition: 15
Keywords
6LoWPAN, IPsec, Security, Internet of Things, 802.15.4
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-24139 (URN)10.1002/sec.406 (DOI)
Projects
CNS
Funder
Vinnova
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2023-06-08Bibliographically approved
Höglund, J., Ilic, D., Karnouskos, S., Sauter, R. & Goncalves Da Silva, P. (2012). Using a 6LoWPAN smart meter mesh network for event-driven monitoring of power quality. In: 2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012: . Paper presented at 2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012, 5 November 2012 through 8 November 2012, Tainan (pp. 448-453). , Article ID 6486025.
Open this publication in new window or tab >>Using a 6LoWPAN smart meter mesh network for event-driven monitoring of power quality
Show others...
2012 (English)In: 2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012, 2012, p. 448-453, article id 6486025Conference paper, Published paper (Refereed)
Abstract [en]

Power quality monitoring is one of the key issues of managing an electrical grid, which is becoming even more important with more distributed and more variable generation. Today expensive equipment allows monitoring of the power network at key points, but for cost reasons this can not reach the residential end-user. To prevent an excessive need for specialized monitoring hardware, e.g. network analysers, it is proposed to engage the capabilities of modern smart meters which can monitor and report power quality events (e.g. voltage deviations). Subsequently a grid operator can follow up with actions in an affected area in order to analyse problems e.g. by increasing the sampling rate. Although the smart meter precision is not comparable to the precision of a commercial network analyser, in large numbers distributed smart meters forming a mesh network can provide sufficient information for power quality in an area while keeping the monitoring overhead and the cost low. It is shown that by using modern interoperable wireless communication protocols and Internet services, the proposed system has a high degree of flexibility, and good potential for scalability and resilience. The preliminary evaluation shows that the smart metering infrastructure, if coupled with suitable information and communication tools, can offer innovative value-added services and enhance existing business processes.

Keywords
Degree of flexibility, Expensive equipments, Information and communication, Power quality event, Power quality monitoring, Value added service, Variable generations, Wireless communication protocols, Electric power transmission networks, Interoperability, Power quality, Smart meters, Wireless telecommunication systems, Smart power grids
National Category
Engineering and Technology
Identifiers
urn:nbn:se:ri:diva-51135 (URN)10.1109/SmartGridComm.2012.6486025 (DOI)2-s2.0-84876035914 (Scopus ID)9781467309110 (ISBN)
Conference
2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012, 5 November 2012 through 8 November 2012, Tainan
Available from: 2021-01-07 Created: 2021-01-07 Last updated: 2023-05-22Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-9491-8183

Search in DiVA

Show all publications