Page 142 - Kaleidoscope Academic Conference Proceedings 2021
P. 142
2021 ITU Kaleidoscope Academic Conference
implemented to ensure the security protection of the intranet. application package are verified by applying a protection
With the function of security audit, it can keep and audit the signature.
operation status, records, user behavior and configuration
information of the terminal. Different security risks of the Connection security of IoT-domotics devices. Protect
IoT-domotics devices should be set authority division, network port security, disable port forwarding or close port
according to the authority division to develop access control when not needed. The WiFi automatic connection function
strategy. of an IoT-domotics device is turned off by default. Use the
corresponding technology to ensure the security of RFID
Support for device authentication. The authentication communication between reader and tag. Strengthen the
function of an IoT-domotics gateway for IoT-domotics security of pairing and connection. When pairing, add a key
devices should be designed and implemented to prevent verification link. when connecting, use mutual
unauthorized devices from accessing the network. Establish authentication to ensure the connection security.
a strict identity authentication mechanism and access control
function. Filtering function for unknown protocol. Block the Data transmission security. Through the establishment of a
abnormal access of known protocols. Encryption and secure channel between IoT-domotics devices and the
integrity protection of authentication data to prevent replay communication networks, the reliability guarantee
attacks. mechanism of information transmission is established.
Strengthen data transmission encryption operation. On the
Protection of network. Establish a virus and network basis of eliminating plaintext transmission, further
intrusion prevention mechanism, such as deployment of strengthen data filtering, authentication and other encryption
firewall software, anti-virus software, intrusion prevention operations to ensure the correctness of data transmission.
software. Provide a network intrusion alarm function, and
timely remind IoT-domotics users of security prevention and Enhance the security of hardware. The same as the
treatment. hardware security measures in IoT-domotics gateway
security.
Enhance the security of hardware. Use or develop security
chips to prevent vulnerabilities such as Meltdown and 4.2.4 Security controls for networks
Spectre. The processor system adds a safe boot mechanism
to prevent the boot program from being tampered with or Secure communication protocol. The communication
interrupted. Close unnecessary physical debugging protocol needs to meet the security requirements of the IoT-
interfaces or increase interface access control permissions. domotics system in terms of transmission rate, coverage,
Hide chip information to increase the difficulty of security, power consumption and compatibility. Use a high
identifying sensitive chips and components. intensity encryption algorithm, key exchange technology and
device certification to enhance the security of the protocol.
4.2.3 Security controls for IoT-domotics devices and
physical entities 4.3 Privacy controls
Security protection based on devices classification. 4.3.1 Privacy controls for service subsystems
Classified security protection measures should be
implemented for IoT-domotics devices according to Inform users of privacy policy. When IoT-domotics users
hardware resources and processing capacity. In addition, it is register and log in for the first time, pop-up windows,
necessary to establish corresponding security measures hyperlinks and other obvious ways are used to remind users
according to the hardware performance and business to read the privacy policy. Tell how PII is collected, stored,
category of IoT-domotics devices. used, transmitted, shared and destroyed. Provide full
autonomy, for example, have the option to agree and
Security of device firmware. The same as the firmware disagree with the selection.
security measures in IoT-domotics gateway security.
Transmission security of private data. Privacy encryption
Web service security of devices. Verify the user input technology should be used to enhance the security of PII in
parameters (controllable data) to prevent the risk of the process of transmission.
command injection. The service program strictly certifies
and verifies the input data set. Turn off unnecessary services 4.3.2 Privacy controls for IoT-domotics gateway
and ports, such as telnet and ftp services.
Enhance the privacy protection of firmware. The IoT-
Security of application. For the source code of the domotics gateway vulnerabilities should be detected and
application, the necessary security protection, such as reinforced and upgraded. The security measures
confusion processing, tamper proof, white box encryption implemented may include: Perform necessary vulnerability
and other measures are taken. For important resource files detection before the IoT-domotics gateway leaves the factory,
stored locally, select secure encryption algorithm for repair the remaining vulnerabilities and backdoors. Encrypt
encryption and integrity protection, to prevent theft and the firmware upgrade package.
tampering. The integrity and source validity of the
– 80 –