Damianou, A., Khan, M.A., Angelopoulos, C.M. and Katos, V., 2021. Threat Modelling of IoT Systems Using Distributed Ledger Technologies and IOTA. In: 17th International Conference on Distributed Computing in Sensor Systems (DCOSS), 14-16 July 2021, Online, 404-413.
Full text available as:
|
PDF
Threat modelling of the IoT Systems Using Distributed Ledger Technologies and IOTA.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial. 230kB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
DOI: 10.1109/DCOSS52077.2021.00070
Abstract
Internet of Things has emerged as a key techno-logical enabler for broader socio-technical and socio-economic paradigms, such as smart cities and Circular Economy. However, IoT systems are characterised by constraints and limitations which in order to be overcome they need to be deployed in conjunction and in synergy with other emerging ICT. Distributed Ledger Technologies (DLT) can help overcome challenges pertaining to data immutability, timeliness and security. However, the use of DLT does not satisfactorily mitigate security risks and vulnerabilities per se and currently cybersecurity aspects of IoT systems are addressed in a fragmented way. Furthermore, the conflict between the resource demanding Blockchains and the highly constrained nature of IoT devices hinders implementation efforts of corresponding systems. We consider networked systems that comprise both IoT and DLT technologies via the prism of Intelligent Transportation Systems (ITS). We elicit a three-tier threat model identifying attack vectors at the Device, the Network and the DLT layers. The identified attacks are then ranked by using the DREAD ranking scheme. The use of the threat model is demonstrated on a novel proof-of-concept IoT networked system implemented using the IOTA Tangle distributed ledger, where it helps to critically appraise the design of the system against the most critical attacks. Furthermore, the developed system is among the first in the literature to demonstrate the synergy of IoT and DLT on actual constrained embedded devices. The performance evaluation provides insights showing that such systems can be efficient and suitable for real-life deployment.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
ISSN: | 2325-2936 |
Uncontrolled Keywords: | Distributed Ledger Technologies; Internet of Things; Intelligent Vehicles |
Group: | Faculty of Science & Technology |
ID Code: | 36971 |
Deposited By: | Symplectic RT2 |
Deposited On: | 23 May 2022 11:32 |
Last Modified: | 23 May 2022 11:32 |
Downloads
Downloads per month over past year
Repository Staff Only - |