Skip to main content

Mode Switching for Secure Edge Devices

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1633))

Abstract

Many devices in various domains operate in different modes. We have suggested to use mode switching for security purposes to make systems more resilient when vulnerabilities are known or when attacks are performed. We will demonstrate the usefulness of mode switching in the context of industrial edge devices. These devices are used in the industry to connect industrial machines like cyber-physical systems to the Internet and/or the vendor’s network to allow condition monitoring and big data analytics. The connection to the Internet poses security threats to edge devices and, thus, to the machines they connect to. In this paper (i) we suggest a multi-modal architecture for edge devices; (ii) we present an application scenario; and (iii) we show first reflections on how mode switching can reduce attack surfaces and, thus, increase resilience.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://systemd.io.

  2. 2.

    https://www.fail2ban.org.

References

  1. Allianz Global Corporate & Specialty SE: Allianz Risk Barometer (2022). https://www.agcs.allianz.com/content/dam/onemarketing/agcs/agcs/reports/Allianz-Risk-Barometer-2022-Appendix.pdf. Accessed 20 Feb 2022

  2. AUTOSAR: Guide to Mode Management (2017). https://www.autosar.org/fileadmin/user_upload/standards/classic/4-3/AUTOSAR_EXP_ModeManagementGuide.pdf. Accessed 24 Feb 2022

  3. Cejka, S., Knorr, F., Kintzler, F.: Edge device security for critical cyber-physical systems. In: 2nd Workshop on Cyber-Physical Systems Security and Resilience (CPS-SR), April 2019

    Google Scholar 

  4. European Union Agency for Cybersecurity (ENISA): Good Practices for Security of IoT - Secure Software Development Lifecycle, November 2019. https://www.enisa.europa.eu/publications/good-practices-for-security-of-iot-1

  5. European Union Agency for Cybersecurity (ENISA): Guidelines for securing the Internet of Things: secure supply chain for IoT. Publications Office (2020). https://doi.org/10.2824/314452

  6. Fail2ban: Manual Fail2ban 0.8. https://www.fail2ban.org/wiki/index.php/MANUAL_0_8. Accessed 20 Feb 2022

  7. Firesmith, D.: System Resilience: What Exactly is it? (2019). https://insights.sei.cmu.edu/sei_blog/2019/11/system-resilience-what-exactly-is-it.html. Accessed 23 Feb 2022

  8. freedesktop.org: systemd.target — Target unit configuration. https://www.freedesktop.org/software/systemd/man/systemd.target.html. Accessed 22 Feb 2022

  9. Hess, K.: Linux security: Protect your systems with fail2ban. Red Hat, June 2020. https://www.redhat.com/sysadmin/protect-systems-fail2ban. Accessed 21 Feb 2022

  10. International Electrotechnical Commission (IEC): IEC 62443-4-1:2018 | Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements. https://webstore.iec.ch/publication/33615

  11. International Organization for Standardization (ISO): ISO/IEC 27000:2009 (2009). https://www.iso.org/standard/41933.html

  12. McCormack, M., et al.: Towards an architecture for trusted edge IoT security gateways. In: 3rd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 2020). USENIX Association, June 2020. https://www.usenix.org/system/files/hotedge20_paper_mccormack.pdf

  13. National Institute of Standards and Technology (NIST): Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1, April 2018. https://doi.org/10.6028/NIST.CSWP.04162018

  14. National Institute of Standards and Technology (NIST): Security and Privacy Controls for Information Systems and Organizations, September 2020. https://doi.org/10.6028/NIST.SP.800-53r5

  15. Noghabi, S., Kolb, J., Bodik, P., Cuervo, E.: Steel: simplified development and deployment of edge-cloud applications. In: 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 2018) (2018)

    Google Scholar 

  16. Riegler, M., Sametinger, J.: Mode switching from a security perspective: first findings of a systematic literature review. In: Kotsis, G., Tjoa, A.M., Khalil, I., Fischer, L., Moser, B., Mashkoor, A., Sametinger, J., Fensel, A., Martinez-Gil, J. (eds.) DEXA 2020. CCIS, vol. 1285, pp. 63–73. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-59028-4_6

    Chapter  Google Scholar 

  17. Riegler, M., Sametinger, J.: Mode switching for secure web applications – a juice shop case scenario. In: Kotsis, G., et al. (eds.) DEXA 2021. CCIS, vol. 1479, pp. 3–8. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-87101-7_1

    Chapter  Google Scholar 

  18. Riegler, M., Sametinger, J.: Multi-mode systems for resilient security in Industry 4.0. Procedia Comput. Sci. 180, 301–307 (2021). https://doi.org/10.1016/j.procs.2021.01.167. Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing (ISM 2020)

  19. Riegler, M., Sametinger, J., Vierhauser, M., Wimmer, M.: Automatic mode switching based on security vulnerability scores (2022, submitted for publication)

    Google Scholar 

  20. Sametinger, J., Steinwender, C.: Resilient context-aware medical device security. In: International Conference on Computational Science and Computational Intelligence, Symposium on Health Informatics and Medical Systems (CSCI-ISHI), pp. 1775–1778 (2017). https://doi.org/10.1109/CSCI.2017.310

  21. Shultis, J.K., Faw, R.E., McGregor, D.S.: Fundamentals of Nuclear Science and Engineering, 3rd edn. CRC Press (2016). https://cds.cern.ch/record/2245430. Accessed 24 Feb 2022

  22. SmartCockpit: A330-A340 Flight Crew Training Manual, July 2004. https://www.smartcockpit.com/docs/A330-A340_Flight_Crew_Training_Manual_1.pdf. Accessed 24 Feb 2022

  23. van Smoorenburg, M.: init, telinit - process control initialization. Debian, July 2004. https://manpages.debian.org/testing/sysvinit-core/init.8.en.html. Accessed 21 Feb 2022

  24. Statista: Number of edge enabled internet of things (IoT) devices worldwide from 2020 to 2030, by market. https://www.statista.com/statistics/1259878/edge-enabled-iot-device-market-worldwide/. Accessed 20 Feb 2022

  25. Statista: In-depth: Industry 4.0 2021, June 2021. https://www.statista.com/study/66974/in-depth-industry-40/. Accessed 20 Feb 2022

  26. US Nuclear Regulatory Commission (NRC): Standard Technical Specifications – Operating and New Reactors – Current Versions (2019). https://www.nrc.gov/reactors/operating/licensing/techspecs/current-approved-sts.html. Accessed 24 Feb 2022

  27. Zoualfaghari, M.H., Reeves, A.: Secure & zero touch device onboarding. In: Living in the Internet of Things (IoT 2019), pp. 1–3, May 2019. https://doi.org/10.1049/cp.2019.0133

Download references

Acknowledgement

This work has partially been supported by the LIT Secure and Correct Systems Lab funded by the State of Upper Austria.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Riegler .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Riegler, M., Sametinger, J., Schönegger, C. (2022). Mode Switching for Secure Edge Devices. In: Kotsis, G., et al. Database and Expert Systems Applications - DEXA 2022 Workshops. DEXA 2022. Communications in Computer and Information Science, vol 1633. Springer, Cham. https://doi.org/10.1007/978-3-031-14343-4_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-14343-4_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-14342-7

  • Online ISBN: 978-3-031-14343-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics