recommended to use very strong keys and
encryption for CA certificates.
When a CA certificate expires, the CA certificate
and all its subordinate certificates need to be
replaced. This can result in massive costs since
every protected device has to be visited to replace its
certificates.
In conclusion, the CA certificate should be set
to be valid until somewhat before the private key
becomes unsafe. A validity period of 20 to 30 years
is common for root CA certificates (VeriSign, 2009)
(GeoTrust, 2009).
Validity period of the protected device’s server
certificate is not a security concern and can thus be
set to expire at the expiration date of its parent
certificate.
Regarding the validity period of the employee’s
authorisation certificate the following influences
need to be considered: damage of certificate theft,
availability of internet access from the mobile
device, frequency of changes in schedules and
granularity of authorisations. If very specific
authorisations are employed the damage of
certificate theft is smaller and a longer validity
period can be used. Given today’s high availability
of mobile internet access a validity period between
one and three days is feasible and economically
bearable.
Please note that a certificate is never valid longer
than the certificate of its certificate chain expiring
the earliest.
3.4.2 Certificate Theft Protection
CA Certificates. The certificates need to be put in
an encrypted storage. The CA certificates should use
a strong public-key algorithm with large key-size.
Access to the authorisation system (CA) should be
restricted – make it accessible only from intranet
(use VPN for access from outside). Log all access to
help uncovering the theft of a client certificate.
Client Certificates. The employees mobile devices
should be protected by password login and the
certificates and private keys should be stored
encrypted. When a new identity certificate is issued
for an employee, all of his old identity certificates
should be revoked. If a new identity certificate is
installed because the old was stolen (and revoked!),
the employee’s mobile device should be reset to
make sure it doesn’t contain any malware like key
loggers or trojans. Otherwise the administrator might
logon to the authentication system using an infected
system which would enable the attacker to steal the
administrator’s credentials and compromise the
system.
Server Certificates. No special protection is
required.
4 EXPERIENCE
The DustBot project (http://www.dustbot.org) is
aimed at designing, developing, testing and
demonstrating a system for improving the
management of urban hygiene based on a network of
autonomous and cooperating robots, embedded in an
Ambient Intelligence infrastructure. These robots
will be able to clean streets and collect small
quantities of home garbage from citizens. The
concept shown in this paper was successfully
applied to secure the access to the Linux (Ubuntu
Server) based DustBot robots. It was required that
the robots could be accessed even (and especially) if
their network links were down, for example to
diagnose the underlying problem of a network link
failure. As mobile devices ASUS EeePC 1000HE
netbooks were chosen for their price, long battery
runtime and wireless connectivity. Equipped with a
WAN interface, the mobile device can request a new
authorisation certificate at any time. Bluetooth
Personal Area Network (PAN) was employed to
connect the maintenance interface to the robots.
Each robot acts as a PAN Network Access Point
(NAP), similarly to a WLAN Access Point. On
Ubuntu, setup for a PAN NAP is just a matter of
installing precompiled packets (bluez,
www.bluez.org) and configuration – and was thus an
easy task. The robot’s maintenance web interface is
served by lighttpd, a lightweight HTTP Server
(www.lighttpd.net). The web interface was
implemented in Python. The certificate authorisation
extraction is done using the Python ASN.1 library
pyasn1 (http://pyasn1.sourceforge.net/).
We experienced two (non critical) usability
constraints in the implementation:
• HTTPS does not allow displaying a custom
error page when a connection fails due to an
unaccepted or invalid certificate. In such an
event the connection is terminated and the
browser displays an error.
• Firefox 2-3 and Internet Explorer 6-8 (others
were not tested) do not offer an automated
mechanism to remove expired certificates
from their certificate stores. If authorisation
certificates are issued frequently the certificate
SECURING ACCESS TO EMBEDDED SYSTEMS - An Effective Concept for Devices Lacking Internet Connection
157