Abstract
Many devices in various domains operate in different modes. We have suggested to use mode switching for security purposes to make systems more resilient when vulnerabilities are known or when attacks are performed. We will demonstrate the usefulness of mode switching in the context of industrial edge devices. These devices are used in the industry to connect industrial machines like cyber-physical systems to the Internet and/or the vendor’s network to allow condition monitoring and big data analytics. The connection to the Internet poses security threats to edge devices and, thus, to the machines they connect to. In this paper (i) we suggest a multi-modal architecture for edge devices; (ii) we present an application scenario; and (iii) we show first reflections on how mode switching can reduce attack surfaces and, thus, increase resilience.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
References
Allianz Global Corporate & Specialty SE: Allianz Risk Barometer (2022). https://www.agcs.allianz.com/content/dam/onemarketing/agcs/agcs/reports/Allianz-Risk-Barometer-2022-Appendix.pdf. Accessed 20 Feb 2022
AUTOSAR: Guide to Mode Management (2017). https://www.autosar.org/fileadmin/user_upload/standards/classic/4-3/AUTOSAR_EXP_ModeManagementGuide.pdf. Accessed 24 Feb 2022
Cejka, S., Knorr, F., Kintzler, F.: Edge device security for critical cyber-physical systems. In: 2nd Workshop on Cyber-Physical Systems Security and Resilience (CPS-SR), April 2019
European Union Agency for Cybersecurity (ENISA): Good Practices for Security of IoT - Secure Software Development Lifecycle, November 2019. https://www.enisa.europa.eu/publications/good-practices-for-security-of-iot-1
European Union Agency for Cybersecurity (ENISA): Guidelines for securing the Internet of Things: secure supply chain for IoT. Publications Office (2020). https://doi.org/10.2824/314452
Fail2ban: Manual Fail2ban 0.8. https://www.fail2ban.org/wiki/index.php/MANUAL_0_8. Accessed 20 Feb 2022
Firesmith, D.: System Resilience: What Exactly is it? (2019). https://insights.sei.cmu.edu/sei_blog/2019/11/system-resilience-what-exactly-is-it.html. Accessed 23 Feb 2022
freedesktop.org: systemd.target — Target unit configuration. https://www.freedesktop.org/software/systemd/man/systemd.target.html. Accessed 22 Feb 2022
Hess, K.: Linux security: Protect your systems with fail2ban. Red Hat, June 2020. https://www.redhat.com/sysadmin/protect-systems-fail2ban. Accessed 21 Feb 2022
International Electrotechnical Commission (IEC): IEC 62443-4-1:2018 | Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements. https://webstore.iec.ch/publication/33615
International Organization for Standardization (ISO): ISO/IEC 27000:2009 (2009). https://www.iso.org/standard/41933.html
McCormack, M., et al.: Towards an architecture for trusted edge IoT security gateways. In: 3rd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 2020). USENIX Association, June 2020. https://www.usenix.org/system/files/hotedge20_paper_mccormack.pdf
National Institute of Standards and Technology (NIST): Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1, April 2018. https://doi.org/10.6028/NIST.CSWP.04162018
National Institute of Standards and Technology (NIST): Security and Privacy Controls for Information Systems and Organizations, September 2020. https://doi.org/10.6028/NIST.SP.800-53r5
Noghabi, S., Kolb, J., Bodik, P., Cuervo, E.: Steel: simplified development and deployment of edge-cloud applications. In: 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 2018) (2018)
Riegler, M., Sametinger, J.: Mode switching from a security perspective: first findings of a systematic literature review. In: Kotsis, G., Tjoa, A.M., Khalil, I., Fischer, L., Moser, B., Mashkoor, A., Sametinger, J., Fensel, A., Martinez-Gil, J. (eds.) DEXA 2020. CCIS, vol. 1285, pp. 63–73. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-59028-4_6
Riegler, M., Sametinger, J.: Mode switching for secure web applications – a juice shop case scenario. In: Kotsis, G., et al. (eds.) DEXA 2021. CCIS, vol. 1479, pp. 3–8. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-87101-7_1
Riegler, M., Sametinger, J.: Multi-mode systems for resilient security in Industry 4.0. Procedia Comput. Sci. 180, 301–307 (2021). https://doi.org/10.1016/j.procs.2021.01.167. Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing (ISM 2020)
Riegler, M., Sametinger, J., Vierhauser, M., Wimmer, M.: Automatic mode switching based on security vulnerability scores (2022, submitted for publication)
Sametinger, J., Steinwender, C.: Resilient context-aware medical device security. In: International Conference on Computational Science and Computational Intelligence, Symposium on Health Informatics and Medical Systems (CSCI-ISHI), pp. 1775–1778 (2017). https://doi.org/10.1109/CSCI.2017.310
Shultis, J.K., Faw, R.E., McGregor, D.S.: Fundamentals of Nuclear Science and Engineering, 3rd edn. CRC Press (2016). https://cds.cern.ch/record/2245430. Accessed 24 Feb 2022
SmartCockpit: A330-A340 Flight Crew Training Manual, July 2004. https://www.smartcockpit.com/docs/A330-A340_Flight_Crew_Training_Manual_1.pdf. Accessed 24 Feb 2022
van Smoorenburg, M.: init, telinit - process control initialization. Debian, July 2004. https://manpages.debian.org/testing/sysvinit-core/init.8.en.html. Accessed 21 Feb 2022
Statista: Number of edge enabled internet of things (IoT) devices worldwide from 2020 to 2030, by market. https://www.statista.com/statistics/1259878/edge-enabled-iot-device-market-worldwide/. Accessed 20 Feb 2022
Statista: In-depth: Industry 4.0 2021, June 2021. https://www.statista.com/study/66974/in-depth-industry-40/. Accessed 20 Feb 2022
US Nuclear Regulatory Commission (NRC): Standard Technical Specifications – Operating and New Reactors – Current Versions (2019). https://www.nrc.gov/reactors/operating/licensing/techspecs/current-approved-sts.html. Accessed 24 Feb 2022
Zoualfaghari, M.H., Reeves, A.: Secure & zero touch device onboarding. In: Living in the Internet of Things (IoT 2019), pp. 1–3, May 2019. https://doi.org/10.1049/cp.2019.0133
Acknowledgement
This work has partially been supported by the LIT Secure and Correct Systems Lab funded by the State of Upper Austria.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Riegler, M., Sametinger, J., Schönegger, C. (2022). Mode Switching for Secure Edge Devices. In: Kotsis, G., et al. Database and Expert Systems Applications - DEXA 2022 Workshops. DEXA 2022. Communications in Computer and Information Science, vol 1633. Springer, Cham. https://doi.org/10.1007/978-3-031-14343-4_32
Download citation
DOI: https://doi.org/10.1007/978-3-031-14343-4_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-14342-7
Online ISBN: 978-3-031-14343-4
eBook Packages: Computer ScienceComputer Science (R0)