Security Classification of IoT Devices

Security Classification of IoT Devices

When classifying IoT devices and IoT hardware from a security perspective, there are different taxonomies or frameworks based on a variety of factors, including functionality, risk level, architecture, and attack surface.

Recent standard ISO/IEC 30141:2024, titled "Internet of Things (IoT) – Reference Architecture," provides a standardized framework for designing IoT systems, and unlike its 2018 version, it is emphasizing trustworthiness. On the other side, NIST Internet of Things (IoT) Component Capability Model (IoT CCM), where capability is defined as “the quality of being able to perform a given function”, is including security in “supporting capabilities”, but is not giving any details about classifications.

CROSSCON project deliverable D1.5, which deals with requirements elicitation (https://crosscon.eu/library/deliverables), gives an overview of different standards and papers that deal with this issue, but also mentions that these efforts are “resource centric”, meaning that device resources (i.e., commuting power) and functionality are used as a key differentiation for dividing devices into classes.

The CROSSCON device classification is based in two aspects:

·???????? Security Capabilities, understood as the security capabilities that the hardware and firmware of the device can offer to users and applications.

·???????? Security Guarantees, which are security requirements a device might have due to its usage or context, and these are independent for the security capabilities. For example, a device might have very few security capabilities but requires high security guarantees.

The security capabilities of a device are either typically provided by the CPU itself, e.g., as part of the architecture, or by additional hardware provided by the MCU manufacturers. They include features such as memory protection, memory virtualization, secure identifiers or crypto primitives. These capabilities can be used then to implement trusted security services for devices, such as secure boot, secure storage or control flow integrity.

This is a different approach than for example draft ISO/IEC 27404, titled "Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT," aims to establish a standardized framework for cybersecurity labeling of consumer Internet of Things (IoT) devices. It is designed to complement existing standards, such as ISO/IEC 27402, which specifies baseline security and privacy requirements for IoT devices.

Other approaches include German Federal Office for Information Security (BSI) Security Label based on the ETSI EN 303 645 standard, which again outlines security requirements for consumer IoT devices, more aligned with what we called “security guarantees” in CROSSCON.

In other words, CROSSCON classification is also contemplating “what could IoT device/hardware do” and not only “what IoT device should do”.

The proposed device classification for the CROSSCON project is the following:

·???????? Class 0 (NO SECURITY): devices that have no built-in security capabilities at all. These are normally devices that respect ultra-low power and low-costs constrains, and are therefore not adequate to perform critical functions not being able to provide any security guarantee per-se. These devices need to rely entirely on software-based security, which makes them more vulnerable to attacks.

·???????? Class 1 (BASIC SECURITY): devices that are resource constrained but which contains basic security capabilities such as memory protection via MPU and basic privilege system. While these devices may have a better secure stack than Class 0 devices, they may still be vulnerable to specific attacks. Providing certain security guarantees on them can be a complex task and require a lot of secure software development.

·???????? Class 2 (STRONG SECURITY) devices which already contain integrated or discrete hardware functions with security capabilities such as secure storage, crypto services and measuring and reporting, as well as hardware-based enclaves. These can be MCU using CPUs such as Cortex M23 or M33.

·???????? Class 3 (EXTENDED SECURITY) devices which typically can be used in high-security environments such as critical infrastructure, military applications, or secure communications. They have the highest level of security by incorporating he most advanced security capabilities such as subsystems to isolate specific parts of the device, True Random Number Generators (TRNG), physically unclonable functions (PUFs), or hardware-based intrusion detection.

Other public CROSSCON project deliverables will be published soon, check the project website or contact me for more information. ?

要查看或添加评论,请登录

Aljosa Pasic的更多文章

  • Mutual authentication of Cinderella and a shoe

    Mutual authentication of Cinderella and a shoe

    Once upon a time, in a faraway kingdom, not subject to EC eIDAS regulations, there lived a young girl named Cinderella.…

    3 条评论
  • Cybersecurity Fairy Tale

    Cybersecurity Fairy Tale

    Cybersecurity awareness and education should start with the primary school!!! Some 10 years ago this was the typical…

    2 条评论
  • AI based anomaly detection for decentralised Electrical Power and Energy Systems

    AI based anomaly detection for decentralised Electrical Power and Energy Systems

    On Novemeber 10th 2022, SDN-microSENSE project held Virtual Open Event where the latest results and outcomes of…

  • Lessons from Descartes, part 3: hardware and software dualism

    Lessons from Descartes, part 3: hardware and software dualism

    (You might want to read part 1 and part 2 before this article, although these are not related directly). Unfortunately,…

    1 条评论
  • Lessons from Descartes, part 2: technology and market dichotomy

    Lessons from Descartes, part 2: technology and market dichotomy

    The coordinate system, as we know it today, is called the Cartesian system, after the French mathematician René…

  • Future of Cybersecurity Education in Europe

    Future of Cybersecurity Education in Europe

    Recently I was listening to recording of Sir Ken Robinson, a professor, advisor, author, and speaker on education…

    1 条评论
  • Smart Cybersecurity?

    Smart Cybersecurity?

    The prefix “cyber” has been used in many terms like cybercrime, cyberterrorism and cyberwarfare, although often with…

    1 条评论
  • Efficient R&D in collaborative projects

    Efficient R&D in collaborative projects

    When it comes to efficient technology transfer from R&D to company portfolio, change is the only constant. In Atos…

  • NGI Talk: Cybersecurity for teleworking

    NGI Talk: Cybersecurity for teleworking

    Every day we must make decisions about hundreds of different risks. Whether it is crossing the street, washing your…

  • ENSURESEC project

    ENSURESEC project

    We do not hear much about specific e-commerce threats, apart from common site and transaction security, and maybe…