Building Touch-Less Trust in IoT Devices

Steve Kerrison
2024-09-30
Abstract:Trust mechanisms for Internet of Things (IoT) devices are commonly used by manufacturers and other ecosystem participants. However, end users face a challenge in establishing trust in devices, particularly as device encounters become more frequent thanks to the proliferation of new and unique products. Communication or even physical interaction with a device can expose a user to various threats, such as biometric theft or exploit of their own device. To address this, we propose a mechanism for verifying the integrity and trustworthiness of an IoT device before physical interaction or any significant communication has taken place.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is: how to establish trust between Internet of Things (IoT) devices and users, especially verifying the integrity and credibility of devices before physical interaction or important communication. With the popularization of IoT devices, users are facing more and more security threats, such as biometric data being stolen, devices being maliciously exploited, etc. Traditional trust mechanisms mainly focus on the trust between manufacturers and devices, and users often need to implicitly trust these mechanisms when using these devices. Therefore, it is difficult for users to ensure the security and credibility of unfamiliar devices before interacting with them. To solve this problem, the paper proposes a mechanism named "Touch - Less Trust" (TLT). This mechanism allows users to verify the integrity and credibility of devices through a verification platform before having physical interaction or important communication with IoT devices. Specifically, TLT is achieved in the following ways: 1. **Trust Architecture**: A trust architecture covering users, IoT devices, manufacturers and verification platforms is constructed. 2. **Encryption Method**: The encryption method used to efficiently provide trust, which is suitable for IoT communication technology, is described in detail. 3. **Threat Model**: A threat model is provided and how the TLT mechanism can provide additional protection compared to traditional control measures is explained. Through these measures, TLT aims to reduce the potential security risks faced by users when interacting with IoT devices and ensure that users can fully understand the security of devices before interaction.