Digital certificate-based port knocking for connected embedded systems

Basim Mahbooba, Michael Schukat

Research output: Chapter in Book or Conference Publication/ProceedingConference Publicationpeer-review

3 Citations (Scopus)

Abstract

The Internet of Things (IoT) is more vulnerable to targeted cyber-attacks than an ordinary Information Technology (IT) infrastructure, where these cyber-attacks operate on subsequent identification (i.e., port scan and exploitation of device's vulnerabilities). Port scans can be rendered useless by applying Port Knocking (PK) as information is transmitted across closed network ports by using a common secret, a device firewall hides all ports from the outside world by filtering (PK) network packets (i.e. TCP connection requests). A secure approach to authenticate IOT devices on the network is required as the current PK approaches (e.g. one time password) suffer from security issues such as sharing secrets. Therefore, this research aims to reinforce existing port knocking methods with a digital certificate for alternative authentication among IoT devices. Such concepts will be complementary to other cryptographic concepts (i.e. shared encryption keys as adopted in ZigBee).

Original languageEnglish
Title of host publication2017 28th Irish Signals and Systems Conference, ISSC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538610466
DOIs
Publication statusPublished - 18 Jul 2017
Event28th Irish Signals and Systems Conference, ISSC 2017 - Killarney, Ireland
Duration: 20 Jun 201721 Jun 2017

Publication series

Name2017 28th Irish Signals and Systems Conference, ISSC 2017

Conference

Conference28th Irish Signals and Systems Conference, ISSC 2017
Country/TerritoryIreland
CityKillarney
Period20/06/1721/06/17

Keywords

  • Internet of things
  • digital certificates
  • keyhole knocking request (KKR)
  • port knocking

Fingerprint

Dive into the research topics of 'Digital certificate-based port knocking for connected embedded systems'. Together they form a unique fingerprint.

Cite this