| Literature DB >> 31357487 |
Daniel Díaz-Sánchez1, Andrés Marín-Lopez2, Florina Almenárez Mendoza2, Patricia Arias Cabarcos3.
Abstract
IoT devices provide real-time data to a rich ecosystem of services and applications. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core networks. To alleviate the core of the network, other technologies like fog computing can be used. On the security side, designers of IoT low-cost devices and applications often reuse old versions of development frameworks and software components that contain vulnerabilities. Many server applications today are designed using microservice architectures where components are easier to update. Thus, IoT can benefit from deploying microservices in the fog as it offers the required flexibility for the main players of ubiquitous computing: nomadic users. In such deployments, IoT devices need the dynamic instantiation of microservices. IoT microservices require certificates so they can be accessed securely. Thus, every microservice instance may require a newly-created domain name and a certificate. The DNS-based Authentication of Named Entities (DANE) extension to Domain Name System Security Extensions (DNSSEC) allows linking a certificate to a given domain name. Thus, the combination of DNSSEC and DANE provides microservices' clients with secure information regarding the domain name, IP address, and server certificate of a given microservice. However, IoT microservices may be short-lived since devices can move from one local fog to another, forcing DNSSEC servers to sign zones whenever new changes occur. Considering DNSSEC and DANE were designed to cope with static services, coping with IoT dynamic microservice instantiation can throttle the scalability in the fog. To overcome this limitation, this article proposes a solution that modifies the DNSSEC/DANE signature mechanism using chameleon signatures and defining a new soft delegation scheme. Chameleon signatures are signatures computed over a chameleon hash, which have a property: a secret trapdoor function can be used to compute collisions to the hash. Since the hash is maintained, the signature does not have to be computed again. In the soft delegation schema, DNS servers obtain a trapdoor that allows performing changes in a constrained zone without affecting normal DNS operation. In this way, a server can receive this soft delegation and modify the DNS zone to cope with frequent changes such as microservice dynamic instantiation. Changes in the soft delegated zone are much faster and do not require the intervention of the DNS primary servers of the zone.Entities:
Keywords: DANE; DNSSEC; IoT; chameleon signatures; microservices
Year: 2019 PMID: 31357487 PMCID: PMC6695896 DOI: 10.3390/s19153292
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1IoT/M2M network infrastructure in which different devices interconnect with network nodes near them and with the backend [24].
Figure 2Comparison of verification chains in DNSSEC and PKIX. Image from [70]. CA, Certificate Authority.
Figure 3An application (app1), composed by several microservices, may move to a different fog as the device moves from one place to other requiring the re-instantiation of those microservices and the generation of new credentials.
Figure 4Fog DNS as a microservice in a node filtered and firewalled from the core of the network.
Figure 5Fog DNS servers will be trusted by clients as they hold DNSSEC credentials delegated by core DNS servers. Thus, trust will be handled locally by fog DNS servers.
Example of a pattern record with placeholders.
| Domain Name | TTL | Class | Type | Value |
|---|---|---|---|---|
|
| MAX_TTL | IN |
| rnd |
Example of pattern record with placeholders and usage. RR, Resource Record.
| Domain Name | TTL | Class | Type | Usage |
|---|---|---|---|---|
|
| MAX_TTL | IN |
| Pattern scheme |
|
| 3600 | IN | A | Allows to verify RRs of type Address (A) for domain xyz.com (like example.xyz.com). The TTL is limited to 3600 |
|
| 1800 | IN | A | Allows to verify RRs of type Address (A) for domain fog1.xyz.com (vending_z34_backup_service.fog1.xyz.com) it would not match A RR of the domain xyz.com |
|
| 720 | IN | TLSA | Allows to verify TLSA records for the domain xyz.com |
Pattern record generation.
|
Resulting in msg = owner | type | class | TTL | RDATA length | Finally, the RRSIG is computed by Then, it is cyphered with The signature, message, and random numbers are sent to fog DNS to be included in the domain zone data: That record is formatted according to DNSSEC. The algorithm ID is 254 (PRIVATEOID), which allows a different verification mechanism. An example is given in |
Example of a signed pattern record.
| Domain Name | TTL | Class | Type | Value |
|---|---|---|---|---|
|
| 3600 | IN | A | 32_bit_random_number (rnd) |
|
| 3600 | IN | RRSIG |
Creation of a DNS record by the DNS fog.
|
find a new random compute the collision for the chameleon hash ( serialize the record: compute this ensures that The new A record can be added to the zone together with That record will be formatted according to DNSSEC using a private algorithm as previously mentioned. The following table illustrates an example of the DNSSEC records. Note the signature value is the same (the signature is not altered), but the new values of | ||||
|
|
|
|
|
|
|
| 3600 | IN | A |
|
|
| 3600 | IN | RRSIG | |
Initial information obtained by the fog DNS upon a resolver (Q) request.
|
|
|
|
|
|
| 3600 | IN | A | 32_bit_random_number | |
| 3600 | IN | RRSIG | ||
| srv.xyz.com | 3600 | IN | A |
|
| srv.xyz.com | 3600 | IN | RRSIG | |
Resolver (Q) verification of the DNS record.
|
According to [ RRSIG RR and other records have the same owner, class, and type; the zone name in the RRSIG matches the record to verify; values of expiry, start, and TTL fields are consistent; verifies the signature algorithm to match with the DNSKEY, and the key is a ZSK;
|
Figure 6The fog DNS receives delegation from the core DNS server, so it can find hash collisions and reuse RRSIG records from core DNS servers to authenticate ephemeral TLS records. A resolver would only need to check the validity of the collision and the pattern record as it trusts the core DNS DNSSEC credentials. KSK, Key Signing Key; ZSK, Zone Signing Key.
Fog DNS soft delegation.
| Entity | Action | Complexity |
|---|---|---|
| Orchestrator | create fog DNS | - |
| Fog DNS | generate key pair; send public key ( | key creation |
| Core DNS | create and sign Key Tag (KTR) |
|
| Core DNS | create pattern, compute CHAM-HASH | chameleon hash |
| Core DNS | sign RRSIG |
|
Comparison of the proposal: new microservice.
| Entity | Action | Signature |
|---|---|---|
| Orchestrator | Send (name and address) to the fog DNS | - |
| Fog DNS | compute the collision, and create RR and RRSIG reusing the original signature | - |
Figure 7Signature computation time versus finding collision (y-axis in CPU ticks).
Figure 8Signature computation time versus computing chameleon signature (y-axis in CPU ticks).
Comparison between signing and finding a collision.
| Finding a Collision in the Chameleon Hash | Signing a New Message |
|---|---|
| Given new M’ and | |
|
find random compute compute compute compute | Given new M’ |