A Survey of the Security Challenges and Requirements for IoT Operating Systems

Alvi Jawad
2023-10-28
Abstract:The Internet of Things (IoT) is becoming an integral part of our modern lives as we converge towards a world surrounded by ubiquitous connectivity. The inherent complexity presented by the vast IoT ecosystem ends up in an insufficient understanding of individual system components and their interactions, leading to numerous security challenges. In order to create a secure IoT platform from the ground up, there is a need for a unifying operating system (OS) that can act as a cornerstone regulating the development of stable and secure solutions. In this paper, we present a classification of the security challenges stemming from the manifold aspects of IoT development. We also specify security requirements to direct the secure development of an unifying IoT OS to resolve many of those ensuing challenges. Survey of several modern IoT OSs confirm that while the developers of the OSs have taken many alternative approaches to implement security, we are far from engineering an adequately secure and unified architecture. More broadly, the study presented in this paper can help address the growing need for a secure and unified platform to base IoT development on and assure the safe, secure, and reliable operation of IoT in critical domains.
Operating Systems,Cryptography and Security
What problem does this paper attempt to address?
The paper aims to address the security challenges faced by Internet of Things (IoT) operating systems (OS) and proposes security requirements for building a unified and secure IoT OS. Specifically, the paper focuses on the following points: 1. **Identifying existing and emerging security challenges**: The paper categorizes security challenges in the IoT field, including common security challenges and unique challenges specific to IoT. These challenges cover various aspects, from the security of resource-constrained devices to the management difficulties brought by large-scale device connections. 2. **Determining the role of the operating system in addressing these challenges**: The paper explores how the operating system, as a core component, can standardize and promote the development of stable and secure solutions to address the aforementioned security challenges. 3. **Defining specific security requirements**: To guide the development of a secure IoT operating system, the paper proposes specific security requirements. These requirements aim to ensure the confidentiality, integrity, and availability of data, as well as the resilience and recovery capability of the system in the face of attacks. 4. **Evaluating the security of existing IoT operating systems**: The paper also conducts a security evaluation of some mainstream IoT operating systems. By comparing their security measures with the proposed security requirements, it discusses the security performance and shortcomings of these systems. Through this research, the paper hopes to enhance the understanding of the flaws and usage risks of currently available IoT operating systems and provide guidance for developing a unified and secure IoT operating system to ensure the safe and reliable operation of IoT in critical areas.