2021
DOI: 10.1007/978-3-030-91631-2_1
|View full text |Cite
|
Sign up to set email alerts
|

Securing Node-RED Applications

Abstract: Trigger-Action Platforms (TAPs) play a vital role in fulfilling the promise of the Internet of Things (IoT) by seamlessly connecting otherwise unconnected devices and services. While enabling novel and exciting applications across a variety of services, security and privacy issues must be taken into consideration because TAPs essentially act as persons-in-the-middle between trigger and action services. The issue is further aggravated since the triggers and actions on TAPs are mostly provided by third parties e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 37 publications
(27 reference statements)
0
6
0
Order By: Relevance
“…Our design choice of using a TEE enforces all three interpretations of isolation using hardware assistance and a small privileged security monitor. This is a stronger security property than current TAPs that rely on JavaScript language-based isolation that has a history of bugs [19] and only provides a weak version of the first two interpretations of isolation above.…”
Section: Tapdance Designmentioning
confidence: 99%
See 3 more Smart Citations
“…Our design choice of using a TEE enforces all three interpretations of isolation using hardware assistance and a small privileged security monitor. This is a stronger security property than current TAPs that rely on JavaScript language-based isolation that has a history of bugs [19] and only provides a weak version of the first two interpretations of isolation above.…”
Section: Tapdance Designmentioning
confidence: 99%
“…The Keystone [48] framework considers three types of side channels: (i) Controlled channel (ii) Timing based and (iii) Cache based. Controlled channel var season = Meta.currentUserTime.month(); var sunrises: Array<number> = [9,8,7,7,6,5,5,6,7,8,8,9]; var sunsets: Array<number> = [15,16,17,19,20,21,21,20,19,18,16,15] To mitigate timing attacks against the cryptographic code inside an applet enclave, we enable timing resistance in WolfSSL during compilation. This only leaves timing attacks against applet code as a possibility.…”
Section: Single Execution Per Trigger Event and Freshness Of Datamentioning
confidence: 99%
See 2 more Smart Citations
“…The TTN was connected to the cloud hosting by Digital Ocean as a storage resource and outsourced the data for integration via the MQTT broker. Node-RED was deployed in this study to wire together the measurement unit, Application Programming Interfaces (APIs), and diagnostic unit to create a smooth data flow in the editor dashboard (Ahmadpanah et al, 2021;Ferencz et al, 2020). Node-RED refers to a JavaScript-based tool built with the Node.js platform.…”
Section: Measurement Unitmentioning
confidence: 99%