The specification Device Identity Composition Engine (DICE) provides a novel basis for remote attestations specifically suitable in the IoT context. Its purpose is to provide means for remote attestations to devices that are too size-, cost-, energy- or otherwise constrained to have Trusted Platform Module attached. This paper gives a short explanation of DICE and compares different approaches for building up a remote attestation protocol based on it, using symmetric and asymmetric cryptography. Based on this comparison a symmetric attestation protocol is proposed for most resource constrained devices and its implications for attestation servers are discussed. Furthermore a feasibility study is conducted mapping the DICE and the proposed DICE-based attestation approach to commercial off-the-shelf (COTS) hardware -- namely Arduino Uno in this case -- and measurement of the code size, binary size and added computational requirements is provided. The security of the mapping approach is evaluated and its advantages and pitfalls are demonstrated. The goal is to show how DICE-based approaches can be mapped to existing hardware and how a more secure IoT environment can be established on already deployed devices without changes to the hardware.
[1]
Paul England,et al.
RIoT - A Foundation for Trust in the Internet of Things
,
2016
.
[2]
David A. Cooper,et al.
BIOS protection guidelines
,
2011
.
[3]
Hugo Krawczyk,et al.
Keying Hash Functions for Message Authentication
,
1996,
CRYPTO.
[4]
Gene Tsudik,et al.
SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust
,
2012,
NDSS.
[5]
Mihir Bellare,et al.
The Security of the Cipher Block Chaining Message Authentication Code
,
2000,
J. Comput. Syst. Sci..
[6]
Ricardo Dahab,et al.
Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers
,
2015,
SPACE.
[7]
Frank Piessens,et al.
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base
,
2013,
USENIX Security Symposium.
[8]
Mihir Bellare,et al.
The Security of Cipher Block Chaining
,
1994,
CRYPTO.
[9]
Vijay Varadharajan,et al.
TrustLite: a security architecture for tiny embedded devices
,
2014,
EuroSys '14.