Differentiated Levels of Security in IoT Devices
Our goal is to provide device specific security policy control in a domestic IoT environment. IoT Security Hub provides a simple‐to‐implement and effective solution to the security conundrum.
The first level of defense in the trusted environment is a set of IDS (Intrusion Detection Systems) and a firewall service running at the point of interaction between the trusted environment and the Internet. Containers, each containing a pre-configured snapshot of security policies for the respective class of devices are invoked. An SDN (Software Defined Networking) controller is in charge of networking. Device-specific policies are downloaded onto an IoT arbitration agent which provides flexible control over the network topology. Hardware integrity is ensured by Intel SGX working in conjunction with RADIUM (Race free on demand integrity measurement) architecture. This architecture derives from research conducted at the University of North Texas. Chain of trust is established during system boot through DRTM (Dynamic root of trust measurement). When a hypervisor is deemed trustworthy, it takes control of the platform.