Hanyang University

IoT (Internet of Things) Laboratory

Secure Swarm Toolkit (SST)


Secure Swarm Toolkit (SST) is an open-source software toolkit for construction and deployment of an authentication and authorization service infrastructure for the IoT, available on a GitHub repository. SST takes an locally centralized, globally distributed approach to provide security services for the Things (IoT devices).

Auth, the key component of SST is a software written in Java, to be deployed on edge-computing devices or gateway devices such as Intel's IoT Gateways. Auth functions as a trust center for authenticating and authorizing Things in the local network, while communicating with other Auths as one of the distributed nodes in the global Internet.

SST provides various security configurations with different level of resource overhead and security guarantees to support heterogeneous IoT environments. SST scales well with the increasing number of IoT devices and dynamically changing environment by leveraging the edge computing architeture. SST also provides software components for programming IoT nodes.

Edge Computing & Resilient IoT

Quam Id Leo

An emerging type of network architecture called edge computing has the potential to improve the availability and resilience of IoT services under anomalous situations such as network failures or denial-of-service (DoS) attacks. However, relatively little has been explored on the problem of ensuring availability even when edge computers that provide key security services (e.g., authentication and authorization) become unavailable themselves. SST supports a resilient authentication and authorization framework to enhance the availability of IoT services under DoS attacks or failures. This approach leverages a technique called secure migration, which allows an IoT device to migrate to another trusted edge computer when its own local authorization service becomes unavailable.

Quam Id Leo

Specifically, the design of a secure migration framework and its supporting mechanisms include (1) automated migration policy construction and (2) protocols for preparing and executing the secure migration. The secure migration policy construction is formulized as an integer linear programming (ILP) problem and show its effectiveness using a case study on smart buildings, where the proposed solution achieves significantly higher availability under simulated attacks on authorization services. Experiments have been carried out to demonstrate the effectiveness of the proposed migration approach for maintaining availability. As an experimental scenario, door controllers and door opening applications are used in a smart building. This setup is inspired by a prototype door controller deployed on the fifth floor of Cory Hall at UC Berkeley as shown in the diagram here.

Lingua Franca

Lingua Franca Logo We are actively working on Lingua Franca, an open-source software project for a polyglot coordination language for concurrent and time-sensitive applications, jointly with research groups and institutions all over the world, including UC Berkeley, UT Dallas, TU Dresden, Kiel University, Inria, and DTU Compute.

Please see the links below for more information about Lingua Fraca.

Machine Learning for IoT and Edge Network

To be updated