4IoT Security Whitepaper-1
4IoT Security Whitepaper-1
10 Security
Checks
I S S I N
O R D TO M
T
F F
N
A
E
N ’ T
M
A
P
YOU C
D E V E L O
IOT
www.aujas.com | North America. Middle East. APAC
NSEIT
50 Billion devices
online by 2020.
From classrooms to industry floors and from hospitals to homes, Internet of Things
is making our world smarter, easier and more efficient. The need to connect,
communicate and remotely manage an army of networked devices via the internet,
either automatically or manually has become a reality today. Cisco had estimated
that we will have 50 Billion devices online by 2020. But given current trends, we
might be beating those estimates sooner than 3 years.
NSEIT
“Security” .
We have transitioned from closed loop networks to
enterprise networks to connectivity over internet, and
this has accelerated at a tremendous pace. By design
and by functionality, IoT devices leverage the Internet’s
reach and capabilities, which has historically been a
challenge from the security perspective.
Services &
Apps
{ API }
Platform API Design & API Management 4
Develop Platforms
3
Cloud Platform
Framework
The layers above depict various levels of integration in IoT at an abstract level. It shows the
design flow from end-user towards the actual hardware performing the tasks measurable in the
physical world.
The flow starts with an input from the end-user. The input could be initiated by human
intervention via any application (Web/Mobile) or it could be automated where no human
intervention is needed. Then the web services responsible for handling the request from
end-user kicks into action. These web-services or APIs are managed by an API platform. API
platform not only manages the lifecycle of the APIs but also acts as a middleware for interaction
between itself and the underlying IoT Platform. The IoT platform can be tightly (or loosely)
coupled with the API management platform. Both the platforms can communicate with cloud (or
local storage) as per the design considerations of the IoT solution architecture in scope.
The IoT platform takes care of connecting As you can visualize, information passes
different cyber-physical systems. It acts as a through a large number of information
medium for different types of sensors, processing nodes before it is consumed by
actuators etc. to communicate with each the end-user. This is where the security
other and share data when required. The challenge comes into picture. As the number
platform can handle multiple communication of hops increase, there is an increase in the
and operating protocols utilized by multiple opportunities for data manipulation,
types of underlying devices. The IoT platform interception and other malicious activities.
is responsible for management of data Hence security at each level of interaction
generated by the IoT sensors, devices, (API, Communication Channels, Data
actuators etc. and supplying them to the Storage, Applications etc.) must be
APIs for users to comprehend. thoroughly verified.
NSEIT
NSEIT
security incidents
that highlight the need for better
Security iN ioT
6 Security
Challenges
with Internet of Things
1 Data Privacy Issues
C Illegal Surveillance
Manufacturers and hackers could actually use a connected device to virtually invade a person's home.
Cameras, DVRs, Medical devices, smart home sensors etc. can be used by rouge agents for eavesdropping
and intruding into the personal life of its users. Different IoT devices transmit data autonomously amongst
themselves as well as other devices via various communication channels. Interoperability is one of the basic
pillars of IoT functioning. Even if data transmitted by a single device does not breach someone’s privacy, a
collection of fragmented data from various devices on the network can be a risk.
B Hardware limitations
Due to the exceeding estimates interest in a connected eco-system, hardware that was not specifically
designed keeping IoT security in mind is being ushered into the market. While chip makers like ARM, Intel etc.
are implementing security features on SoC itself, it will be expensive to start with. Also the complex design leads
to higher battery consumption which is definitely a challenge for IoT applications. Affordable solutions will not
be able to use such chips, which means there is a need of a different approach.
NSEIT
Hardware/Software
3
patching issues
The Update Mechanism must also contain checks to verify the update package source, data integrity etc.
Malicious firmware files could be uploaded to the device memory and direct the device to perform
malicious activities and may even brick the device. As firmware works at a very low level, it can execute
malicious tasks with system level privileges.
Another one of the main area of concern for IoT devices is that they are very hard to patch. As the IoT eco
system is growing at a rapid rate, ubiquitous deployment of unattended devices throughout our homes,
offices, factories, and public spaces is taking place. All these devices by design need to connect to the
internet for working smoothly and eventually hackers find out and exploit un-patched vulnerabilities.
Various incidents of devices being vulnerable to decade old exploits in Linux are bubbling up. For
example, in case of Industrial IoT most of the devices are legacy devices and no proper replica
environment is available, even to test patches before deploying on production environments.
NSEIT
5 Connectivity Issues
IoT devices have come to forefront due to broad penetration of easy
connectivity options like Internet, Bluetooth and their derivatives. By
design, IoT systems rely on intermediaries to reduce response time,
bandwidth, and energy consumption. The dependency on proxies and
gateways for caching requests and responses has increased as many
IoT devices sleep for most of the time because of high power
consumption for radio reception and transmission. As the number of
nodes increase, it also increases the attack surface. Even by using
SSL/TLS like mechanisms the data can be protected at transport level,
large number of intermediaries may allow malicious data injections and
manipulations.
Devices which are mission critical are connected and live 24*7, which can be a huge benefit for a hacker
in the case of a botnet. These devices could also be target specific and in the case of medical applications
of IoT it can have fatal consequences on an individual or an organization.
NSEIT
10 Security
Checks for
Internet of Things
Ecosystem
Verify Device
1 Implement Secure Booting 5 Authenticity
Verifying the device’s firmware for data As soon as device is connected to the network, it
tampering using cryptographically generated should be authenticated based on device id or
digital signatures. another device specific identifier.
About Aujas
Aujas is a pure-play cybersecurity services company with deep expertise in Identity and Access
Management, Risk Advisory, Security Verification, Managed Detection and Response and Security
Engineering services. Our unique products and services help businesses build and transform security
postures while mitigating risks. The service focus is to strengthen security resilience by minimizing the
occurrence of attacks, threats, and risks, so that you drive change, innovate, and accelerate growth.
For more information, do visit us at www.aujas.com or you ou can also write to us at [email protected]
Ottawa
Jersey City
UAE
Cupertino
Dallas Gurgaon
Bangalore
No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the express written
permission from Aujas Cybersecurity. The information contained herein is subject to change without notice. All other trademarks mentioned herein are the property of their respective owners.