skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Making IoT Worthy of Human Trust
The Public Key Infrastructure (PKI) is the foundation which enables secure and trusted transactions across the Internet. PKI is subject to both continuous attacks and regular improvements; for example, advances in cryptography have led to rejections of previously trusted algorithms (i.e., SHA1, MD5). Yet there have also been organizational failures and malicious acts by trusted parties. In this work, we focus on the sociotechnical components of the current X.509 PKI with the goals of better understanding its vulnerabilities, and ideally informing the implementation of future PKIs. We begin with a taxonomy of chronic, catastrophic, high impact, or frequent PKI failures. This categorization was informed by a survey of non-expert perceptions of PKI and an interdisciplinary workshop addressing the future of security in the Internet of Things. To evaluate the failure modes, we conducted qualitative interviews with policy scholars and experts in applied cryptography. We summarize the results of the survey and workshop, and detail the expert interviews. Our findings indicate that there are significant failure types which neither the technical nor policy community are deeply engaging. The underlying assumptions about rate and severity of failure differ between these communities. Yet there is a common awareness of the vulnerabilities of the end users: the people who are required to trust PKI to interact and engage with the Internet. We identify an urgency in mitigating such critical issues, because of the increasing adoption of cyberphysical systems and the Internet of Things (IoT). We concluded that there is a need for integrated organizational, policy, and technical coordination to address the chronic and potentially catastrophic risks. We introduce possible economic and regulatory solutions, and highlight the key takeaways which pave our future research directions.  more » « less
Award ID(s):
1814518
PAR ID:
10204026
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
SSRN Electronic Journal
Volume:
TPRC
Issue:
47
ISSN:
1556-5068
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    In this work, we report on a comprehensive analysis of PKI resulting from Certificate Authorities’ (CAs) behavior using over 1300 instances. We found several cases where CAs designed business models that favored the issuance of digital certificates over the guidelines of the CA Forum, root management programs, and other PKI requirements. Examining PKI from the perspective of business practices, we identify a taxonomy of failures and identify systemic vulnerabilities in the governance and practices in PKI. Notorious cases include the “backdating” of digital certificates, the issuance of these for MITM attempts, the lack of verification of a requester’s identity, and the unscrupulous issuance of rogue certificates. We performed a detailed study of 379 of these 1300 incidents. Using this sample, we developed a taxonomy of the different types of incidents and their causes. For each incident, we determined if the incident was disclosed by the problematic CA. We also noted the Root CA and the year of the incident. We identify the failures in terms of business practices, geography, and outcomes from CAs. We analyzed the role of Root Program Owners (RPOs) and differentiated their policies. We identified serial and chronic offenders in the PKI trusted root programs. Some of these were distrusted by RPOs, while others remain being trusted despite failures. We also identified cases where the concentration of power of RPOs was arguably a contributing factor in the incident. We identify these cases where there is a risk of concentration of power and the resulting conflict of interests. Our research is the first comprehensive academic study addressing all verified reported incidents. We approach this not from a machine learning or statistical perspective but, rather, we identify each reported public incident with a focus on identifying patterns of individual lapses. Here we also have a specific focus on the role of CAs and RPOs. Building on this study, we identify the issues in incentive structures that are contributors to the problems. 
    more » « less
  2. Blockchain technology is the cornerstone of digital trust and systems’ decentralization. The necessity of eliminating trust in computing systems has triggered researchers to investigate the applicability of Blockchain to decentralize the conventional security models. Specifically, researchers continuously aim at minimizing trust in the well-known Public Key Infrastructure (PKI) model which currently requires a trusted Certificate Authority (CA) to sign digital certificates. Recently, the Automated Certificate Management Environment (ACME) was standardized as a certificate issuance automation protocol. It minimizes the human interaction by enabling certificates to be automatically requested, verified, and installed on servers. ACME only solved the automation issue, but the trust concerns remain as a trusted CA is required. In this paper we propose decentralizing the ACME protocol by using the Blockchain technology to enhance the current trust issues of the existing PKI model and to eliminate the need for a trusted CA. The system was implemented and tested on Ethereum Blockchain, and the results showed that the system is feasible in terms of cost, speed, and applicability on a wide range of devices including Internet of Things (IoT) devices. 
    more » « less
  3. Scholars have investigated numerous barriers to accessible software development tools and processes for Blind and Low Vision (BLV) developers. However, the research community has yet to study the accessibility of software development meetings, which are known to play a crucial role in software development practice. We conducted semi-structured interviews with 26 BLV software professionals about software development meeting accessibility. We found four key themes related to in-person and remote software development meetings: (1) participants observed that certain meeting activities and software tools used in meetings were inaccessible, (2) participants performed additional labor in order to make meetings accessible, (3) participants avoided disclosing their disability during meetings due to fear of career repercussions, (4) participants suggested technical, social and organizational solutions for accessible meetings, including developing their own solutions. We suggest recommendations and design implications for future accessible software development meetings including technical and policy-driven solutions. 
    more » « less
  4. Although internet access and affordability are increasingly at the center of policy decisions around issues of the “digital divide” in the US, the complex nature of usage as it relates to structural inequality is not well-understood. We partnered with Project Waves, a community internet provider, to set up connectivity across the urban landscape of a city in the Eastern United States to study factors that impact the rollout of affordable broadband internet connectivity to low-income communities during the COVID-19 pandemic. The organization endeavored to meet structural challenges, provide community support for adoption, and stave off attendant privacy concerns. We present three dimensions of equitable use prioritized by the community internet provider: safety from COVID-19 through social distancing enabled by remote access, trusted connectivity, and private internet access. We use employee interviews and a phone survey of internet recipients to investigate how the provider prioritized these dimensions and who uses their service. 
    more » « less
  5. Failure analysis is central to the work of engineers, and yet we neglect to analyze our failures in the field of engineering education. In this paper, we examine our failure in the development and deployment of an immersive faculty experience for graduate students in engineering education. Professional development is a significant focus of graduate studies. Professional development broadly defined includes any activities supporting the acquisition of skills, knowledge, and abilities relevant to one’s current or desired position. In the context of graduate studies, professional development often involves such activities as conference or workshop attendance, internships or job exploration, mentoring or coaching directed at students, and certification programs. Despite the importance of professional development in graduate school, anecdotal and research-based evidence supports the assertion that graduate students experience professional development unevenly. Whether this unevenness results from intrinsic or extrinsic factors is not established. We investigate the barriers to participation in professional development, with a focus on an immersive faculty internship; however, this work revealed barriers associated with professional development in general and related to specific other types of professional development. We focus on barriers specifically because engineers examine both successes and failures in the effort to improve product design, and because our product—an immersive faculty experience for graduate students—was designed to overcome barriers identified during customary discovery research. For this analysis of failure, we rely on interviews and survey data from varied stakeholders (e.g., graduate students, their mentors, graduate program directors, representatives from grant-giving organizations, and faculty on hiring committees) to identify these barriers. We also share our personal reflections on the challenges associated with this effort. From the data collected from members of the engineering education community, we found that barriers to participation include time spent away from support systems, potential delays in graduation, lack of understanding of the value of professional development, and funding for participating in these opportunities. Graduate students perceive (rightly or wrongly) that their advisors do not support an immersive, off-site professional development experience, perhaps because advisors want graduate students to continue the work important to advisors or the advisors do not consider the experience valuable for cultivating the students’ professional identities. In addition, organizational challenges include facilitating a multi-site experience from a single institution that is subject to both institutional and NSF rules for budgeting. Stakeholders in graduate education have a significant interest in removing barriers to professional development, including opportunities like immersive internships. By doing so, they increase graduate students’ satisfaction with the graduate school experience and improve graduate students’ placement and career success. We connect our failure to both the concept of root cause failure analysis and the literature in organizational change. By doing so, we highlight how failure is an under-appreciated experience in the field of engineering education. 
    more » « less