IOT 3rd Unit
IOT 3rd Unit
Assets:
Assets (A): Anything valuable to us that is worth protecting. What assets are we protecting? It is
pertinent to classify the assets and prioritize. Example asset profile = {physical devices, internal fuses,
keys, content, data at rest/in transit, etc.}
In IoT security, an asset refers to anything valuable within an IoT ecosystem that needs to be protected
from threats. Assets in IoT systems can take various forms, such as physical devices, data,
communication channels, and credentials. To properly secure an IoT system, it’s crucial to identify,
classify, and prioritize these assets, as their protection directly impacts the overall security and
functionality of the system.
1. Physical Devices
o Definition: The actual hardware used in the IoT ecosystem, such as sensors, cameras,
actuators, wearables, and connected appliances.
o Why it’s valuable: These devices collect and transmit critical data and execute specific
actions, so their security and integrity are essential.
2. Internal Components (Fuses, Chips, Processors)
o Definition: Internal components that form the physical architecture of IoT devices, such
as microcontrollers, sensors, or fuses for hardware protection.
o Why it’s valuable: These components ensure the proper functioning of devices.
Tampering or physical damage could lead to malfunction or vulnerabilities.
3. Data
o Definition: Information that is collected by IoT devices, stored, processed, or
transmitted across networks.
o Types of Data:
Data at Rest: Data stored on devices or in cloud servers.
Data in Transit: Data being transmitted between devices or from devices to the
cloud.
o Why it’s valuable: Data is often sensitive (personal, operational, or business-critical),
and its loss or theft can lead to serious breaches of privacy or integrity.
4. Communication Channels
o Definition: The mediums through which IoT devices communicate, including Wi-Fi,
Bluetooth, Zigbee, cellular networks, and more.
o Why it’s valuable: These channels are essential for device coordination and data
transmission. Securing them ensures that data cannot be intercepted or altered by
attackers.
5. Credentials and Keys
o Definition: Encryption keys, authentication credentials, and access tokens used to
secure communications, devices, and user access.
o Why it’s valuable: These credentials ensure that only authorized users and devices can
access the system, protecting it from unauthorized access and attacks.
6. Software/Firmware
o Definition: The operating systems, applications, and firmware that run on IoT devices,
enabling them to perform their functions.
o Why it’s valuable: Vulnerabilities in software or firmware can be exploited by attackers
to gain unauthorized access or control over devices.
7. Users (Administrators, Operators, End-Users)
o Definition: The human users involved in operating, maintaining, or interacting with the
IoT system.
o Why it’s valuable: Protecting users from phishing, social engineering, or unauthorized
access is key to preventing security breaches.
In summary, an asset in IoT security is anything within the system that is valuable and needs to be
protected from attacks, misuse, or damage. These assets must be identified and prioritized based on
their importance and the potential impact if they are compromised.
Threats:
This explanation refers to the inverted pyramid model of attack surfaces and the corresponding effort
and return on investment (ROI) for attackers in the context of IoT security. It illustrates how different
layers of an IoT system are exposed to varying degrees of attacks, and why security efforts must adapt to
these layers.
The inverted pyramid represents the hierarchy of attack surfaces in an IoT system, with the top
of the pyramid being the most accessible and easiest to attack, and the bottom representing
the most challenging layers to attack.
Top of the Pyramid: Represents areas with a high volume of attack attempts but requires
minimal effort and technical expertise. These are typically more visible and open to broad
exploitation, but the ROI on compromising these layers is often lower.
Bottom of the Pyramid: Represents deeper, more complex layers (such as hardware or side-
channel attack surfaces), where attacks require more significant resources and expertise to
exploit. Consequently, there are fewer attacks, but the potential payoff is higher due to the
critical nature of the underlying assets.
High Volume, Low Effort at the Top: The top layers of the pyramid are more exposed and easier
to attack with low effort. For example, vulnerabilities in software applications, unsecured APIs,
or common network misconfigurations. These are often targeted by automated attacks like
malware or botnets, which can exploit many systems with minimal resources. Since the effort is
low, the number of attacks is high.
Low Volume, High Effort at the Bottom: As you move down the pyramid, the attack surfaces
become more technical and difficult to compromise. Attacks here involve more sophisticated
methods like hardware attacks, side-channel attacks, or physical tampering, which demand
advanced expertise and resources. The cost to the attacker is high, which is why these attacks
are fewer and more targeted, but they can compromise highly valuable assets.
Defense in Depth means employing multiple layers of security controls to protect the system.
Since the attack surfaces vary in exposure and vulnerability, different levels of defense are
required at each layer of the platform.
o Top layers (software, network): Can be protected with common techniques such as
firewalls, encryption, intrusion detection, and strong authentication.
o Bottom layers (hardware, firmware): Require specialized techniques, such as tamper-
resistant hardware, physical security controls, and secure boot mechanisms, to defend
against side-channel and physical attacks.
The rectangle outlines the IA (Information Assurance) value additions, which refer to security
measures and IP (intellectual property) capabilities that can be implemented to protect
customer assets. These security IP capabilities might include encryption algorithms, secure
communication protocols, hardware security modules, and intrusion detection systems. These
can be integrated into the IoT ecosystem to mitigate threats at various levels of the pyramid.
Low Effort, Low ROI at the Top: Exploits at the top of the pyramid (e.g., exploiting unpatched
software) are easier to create and deploy, but the return on investment is generally lower.
Attackers can compromise many devices but gain less valuable access, such as user data or
access to non-critical systems.
High Effort, High ROI at the Bottom: As we move down the pyramid, the effort and resources
needed to create exploits increase significantly. Attacks at the lower levels (e.g., hardware
exploits, side-channel attacks) require expertise and sometimes physical access to devices,
making them more costly. However, if successful, these attacks can yield higher-value
compromises, such as gaining control over critical infrastructure, confidential data, or
intellectual property.
The bottom six layers of the inverted pyramid could refer to hardware-specific components
where side-channel attacks (attacks that exploit physical information leakage, like power
consumption, electromagnetic emissions, etc.) and physical attacks (where the attacker
physically tampers with the device) become relevant. These layers involve a deeper level of
interaction with the IoT device’s architecture.
However, the book mentioned limits the scope of discussing these side-channel and physical
attacks, possibly because they are specialized and require more advanced security approaches,
such as tamper-evident hardware or specific cryptographic countermeasures.
Summary
The inverted pyramid model highlights how IoT systems present multiple layers of attack surfaces, each
requiring different levels of security protection. Attacks are more frequent but less sophisticated and
rewarding at the top, whereas the deeper, more technical layers are harder to breach but offer greater
rewards for attackers. A defense-in-depth approach is essential to mitigate risks across the platform by
deploying different types of security solutions based on the varying degrees of exposure and threat at
each layer.
Vulnerabilities
A vulnerability is a weakness or flaw in the IoT system that can be exploited by attackers to gain
unauthorized access or cause damage. Common IoT vulnerabilities include:
Risks
Risks are potential negative outcomes or impacts that arise from exploiting vulnerabilities in an IoT
system. Some common risks include:
Privacy in IoT:
As the Internet of Things (IoT) grows, protecting consumer privacy becomes more challenging. With
increased connectivity among devices, users have less control over both data and the devices
themselves.
1. Loss of Control:
o Hacking of smartphones or computers, which act as hubs for IoT devices, can lead to
stolen personal data, including banking and email information. This can be done
remotely and often without detection.
o Vehicles, once isolated, are now vulnerable due to their connection to the Internet.
2. Data Collection by Companies:
o Companies collect vast amounts of user data, tracking online activities to improve
experiences and market products.
o This extensive data collection raises concerns about users losing control over their
personal information.
3. Need for Privacy Policies:
o Companies must revise privacy policies to allow consumers to access and control their
data.
o Privacy awareness is rising, with users increasingly conscious of data privacy in the IoT
era.
4. Privacy by Design:
o The concept of Privacy by Design mandates that manufacturers consider privacy risks in
the design phase of IoT products.
o The GDPR enforces this, requiring privacy-friendly settings to be built into new products
and processes to protect user data.
5. Long-Term Considerations:
o Manufacturers need to address privacy concerns throughout the lifecycle of devices,
including the use of cloud services, data retention policies, and secondary markets for
durable goods like cars and refrigerators.
These measures aim to ensure that consumers maintain greater control over their data as IoT devices
proliferate.
As the Internet of Things (IoT) expands, security has become a critical concern. To address this, various
organizations and governments have developed security standards and guidelines to ensure the safe
deployment and operation of IoT systems. Here are some key IoT security standards:
Developed by: International Organization for Standardization (ISO) and the International
Electrotechnical Commission (IEC).
Purpose: Provides a framework for establishing, implementing, maintaining, and continually
improving information security management systems (ISMS).
Focus: Addresses overall cybersecurity, including IoT, by emphasizing risk management, incident
response, and system controls.
6. IEC 62443
9. IEEE P2413
Protocol Attacks
Evasdropping
Scanning and mapping are fundamental techniques used by attackers to gather information about a
network's infrastructure. This information can be used to identify vulnerabilities and plan further
attacks. Both wired and wireless networks can be targeted, each with its own specific techniques and
challenges.
Wired networks typically use Ethernet cables to connect devices. Attackers can use various tools and
techniques to scan these networks:
Ping Sweeps: This involves sending ICMP echo requests to a range of IP addresses to determine
which ones are active.
Port Scanning: This technique identifies open ports on a target system by sending specific
packets to each port.
Network Mapping: Tools like Nmap can be used to create a visual representation of a network's
topology, including devices, connections, and services.
Vulnerability Scanning: Once a network has been mapped, vulnerability scanners can identify
weaknesses in devices and software.
Wireless networks, often using technologies like Wi-Fi, are more susceptible to scanning and mapping
due to their broadcast nature. Attackers can use tools to:
SSID Enumeration: This involves identifying the names of accessible wireless networks.
Channel Hopping: Attackers can scan multiple channels to find networks and avoid detection.
WEP/WPA Cracking: If a wireless network uses weak encryption, attackers can attempt to crack
it to gain unauthorized access.
War Driving: This involves driving around with a laptop equipped with a wireless network
interface to identify and map accessible networks.
Common Tools and Techniques
Nmap: A versatile network scanner capable of both wired and wireless scans.
Aircrack-ng: A suite of tools for wireless network analysis, including cracking WEP and WPA
encryption.
Wireshark: A packet analyzer that can be used to capture and analyze network traffic.
Metasploit: A penetration testing framework that includes modules for scanning, mapping, and
exploiting vulnerabilities.
1. Passive Eavesdropping:
o Involves listening to communications without interfering with the transmission.
o Example: Wiretapping phone lines or intercepting wireless network traffic.
2. Active Eavesdropping:
o Involves modifying or manipulating communications to gain unauthorized access or
information.
o Example: A man-in-the-middle attack, where an attacker intercepts and modifies
communication between two parties.
Wiretapping: Physically tapping into communication lines (e.g., phone lines, fiber optic cables)
to intercept data.
Radio Frequency (RF) Monitoring: Using specialized equipment to intercept wireless
communications (e.g., Wi-Fi, Bluetooth).
Social Engineering: Tricking individuals into revealing sensitive information or compromising
their security.
Phishing: Sending fraudulent emails or messages to trick individuals into clicking on malicious
links or providing personal information.
Malware: Installing malicious software on a target's device to capture keystrokes, screen
activity, or other sensitive data.
Cryptographic algorithms and key management are fundamental components of modern security
systems. However, even the most robust algorithms and practices can be vulnerable to attacks.
Spoofing and masquerading are common attack techniques used in IoT environments. These attacks
involve deceiving devices or systems into believing that they are communicating with a trusted entity.
Spoofing in IoT
IP Address Spoofing: Attackers can forge the IP address of their packets to appear as if they are
coming from a legitimate source. This can be used to bypass firewalls or access restricted
resources.
MAC Address Spoofing: Attackers can change the MAC address of their devices to impersonate
legitimate devices on a network. This can be used to gain unauthorized access to network
resources or launch denial-of-service (DoS) attacks.
Protocol Spoofing: Attackers can mimic the behavior of legitimate protocols to deceive IoT
devices or gateways. For example, an attacker could spoof the MQTT protocol to send malicious
commands to IoT devices.
Masquerading in IoT
Device Masquerading: Attackers can create fake IoT devices that appear to be legitimate. These
fake devices can be used to collect data, launch attacks, or disrupt network operations.
Identity Masquerading: Attackers can impersonate legitimate IoT devices or users to gain
unauthorized access to network resources. This can be done by stealing credentials or exploiting
vulnerabilities in authentication mechanisms.
These attacks target the core of an IoT device—its operating system. If the OS is compromised, attackers
can control the entire device and all the data it processes.
Firmware tampering: Attackers can alter the firmware (the software that runs the device) to
introduce backdoors or vulnerabilities. Once the firmware is compromised, an attacker can gain
persistent control of the device.
Privilege escalation: Attackers exploit vulnerabilities in the OS to gain higher levels of control
than they should have, potentially giving them root access.
Rootkits: These are malicious software programs designed to hide their presence while
controlling the system. They can be injected into the OS to manipulate it without detection.
Remote Code Execution (RCE): Exploiting OS vulnerabilities, attackers can inject malicious code
remotely, allowing them to control the device without physical access.
These focus on the applications running on the IoT devices. If the applications are compromised, the
attackers can manipulate device behavior or access sensitive data.
Malware injection: Attackers can install malicious software in the form of seemingly legitimate
apps. These apps may spy on the user, steal data, or disrupt operations.
Data manipulation: Applications on IoT devices may process sensitive data, like health or
location information. Attackers can manipulate this data by corrupting the application, leading
to inaccurate information or malicious actions.
Man-in-the-Middle (MitM) attacks: Attackers intercept the communication between the IoT
device’s application and its server. By doing so, they can alter data in transit, which can affect
the integrity of the application’s processes.
Buffer Overflow: This vulnerability allows attackers to send too much data to an application,
causing it to crash or execute malicious code.
1. Attack trees
Attack trees help us model these characteristics in devices and systems. Attack trees are conceptual
diagrams showing how an asset, or target, might be attacked
(https://en.wikipedia.org/wiki/Attack_tree). In other words, when it is time to really understand a
system's security posture and not just knee-jerk worry about the latest, sensational reported attack
vectors du jour, it is time to build an attack tree. An attack tree can help your organization visualize,
communicate, and come to a more realistic understanding of the sequence of vulnerability that can be
exploited for some end effect.
If you haven't done it before, building an attack tree can seem like a daunting task, and it is difficult to
know where to start. To begin, a tool is needed to both build the model and run analysis against it.
One example is SecurITree, a capabilities-based attack tree modeling tool built by the Canadian
company Amenaza (the Spanish word for threat) (http://www.amenaza.com/). Building an attack tree
is perhaps best described with a simple example. Suppose an attacker wishes to accomplish the
overarching goal of re-directing an Unmanned Aircraft Systems (UAS), that is, a drone, while in
flight. The following diagram shows the top-level activities of the attack tree to accomplish this:
You will notice the two well-known logic operator symbols for AND (smooth an rounded top) and OR
(pointy top). The root node, entitled Redirect UAS represents the end objective and is made up of an OR
operator. This means that any one of its children can satisfy the end goal. In this case, the attacker may
redirect the aircraft by any of the following methods:
• Corrupting its navigation database: A navigation database maps named locations to positions in space
(latitude, longitude, and typically, altitude above mean sea level). In practice, there are many potential
ways to compromise a navigation database, for example, either directly on the aircraft, its ground control
station, or even in the navigation and mapping supply chain (this is true of manned aviation as well, as
commercial airliners' flight computers have extensive navigation databases).
• Spoofing GPS: In this case, the attacker could choose to perform an active RF-based GPS attack in
which they generate and transmit false GPS timing data that the drone interprets as a false location. In
response, the drone (if under autonomous flight) navigates unknowingly, based on its falsely perceived
location, and follows a path maliciously designed by the attacker. (Note, we assume there is no machine
vision or other passive navigation system in use.)
• Spoofing the ground control station (GCS): In this option, the attacker can find a way to spoof the
drone's legitimate operator and attempt to send malicious routing commands.
One of the most commonly used types of industrial control system, SCADA can be used to manage
almost any type of industrial process.
SCADA systems include hardware and software components. The hardware gathers and feeds data into
field controller systems, which forward the data to other systems that process and present it to a human-
machine interface (HMI) in a timely manner. SCADA systems also record and log all events for reporting
process status and issues. SCADA applications warn when conditions become hazardous by sounding
alarms.
SCADA systems include components deployed in the field to gather real-time data, as well as related
systems to enable data collection and enhance industrial automation. SCADA components include the
following:
Sensors and actuators. A sensor is a feature of a device or system that detects inputs from
industrial processes. An actuator is a feature of the device or system that controls the mechanism
of the process. In simple terms, a sensor functions like a gauge or meter, which displays the status
of a machine; an actuator acts like a switch, dial or control valve that can be used to control a
device. Both sensors and actuators are controlled and monitored by SCADA field controllers.
SCADA field controllers. These interface directly with sensors and actuators. There are two
categories of field controllers:
1. Remote telemetry units, also called remote terminal units (RTUs), interface with sensors
to collect telemetry data and forward it to a primary system for further action.
SCADA supervisory computers. These control all SCADA processes and are used to gather
data from field devices and to send commands to those devices to control industrial processes.
HMI software. This provides a system that consolidates and presents data from SCADA field
devices and enables operators to understand and, if needed, modify the status of SCADA-
controlled processes.
Although SCADA systems may include special features for specific industries or applications, most
systems support the following features:
Data acquisition is a foundation of SCADA systems; sensors collect data and deliver it to field
controllers, which, in turn, feed data to the SCADA computers.
Remote control is achieved through the control of field actuators, based on the data acquired
from field sensors.
Networked data communication enables all SCADA functions. Data collected from sensors
must be transmitted to SCADA field controllers, which, in turn, communicate with the SCADA
supervisory computers; remote control commands are transmitted back to actuators from the
SCADA supervisory computers.
Data presentation is achieved through HMIs, which represent current and historical data to the
operators running the SCADA system.
Real-time and historical data are both important parts of the SCADA system, as they enable
users to track current performance against historical trends.
Alarms alert SCADA operators to potentially significant conditions in the system. Alerts can be
configured to notify operators when processes are blocked, when systems are failing, or when
other aspects of SCADA processes need to be stopped, started or adjusted.
Reporting on SCADA system operations can include reports on system status, process
performance and reports customized to specific uses.
SCADA architecture
SCADA systems operate at five of the six levels defined in the Purdue Enterprise Reference
Architecture for enterprise integration:
Level 0. The field level includes field devices, such as sensors, used to forward data relating to
field processes and actuators used to control processes.
Level 1. The direct control level includes local controllers, such as PLCs and RTUs, that interface
directly with field devices, including accepting data inputs from sensors and sending commands
to field device actuators.
Level 2. The plant supervisory level includes local supervisory systems that aggregate data from
level controllers and issue commands for those controllers to carry out.
Level 3. The production control level includes systemwide supervisory systems that aggregate
data from Level 2 systems to produce ongoing reporting to the production scheduling level, as
well as other site or regionwide functions, like alerts and reporting.
Level 4. The production scheduling level includes business systems used to manage ongoing
processes.
Note that CPS, even if technically air-gapped from the Internet, will almost always be connected in some
way to the Internet, whether through its supply chain, operating personnel, or out-of-band software patch
management system.
In other words, it is worthwhile to think of the IoT as a superset of CPS, as CPS can be enveloped into the
IoT simply by connectivity to the Internet. A CPS is generally a rigorously engineered system designed
for safety, security, and functionality. Emergent enterprise IoT deployments should take lessons learned
from the engineering rigor associated with CPS.
Internet of Things (IoT) devices, once primarily seen as consumer conveniences, have
become integral parts of critical infrastructure, making them attractive targets for
cybercriminals. IoT malware is specifically designed to exploit vulnerabilities in these
devices, often characterized by:
Limited processing power and memory: IoT devices typically have less robust security
features than traditional computers.
Lack of updates: Many IoT devices receive infrequent or no software updates, leaving
them vulnerable to known exploits.
Default credentials: Unchanged default passwords and usernames provide easy entry
points for attackers.
Mirai Botnet: One of the most infamous IoT botnets, Mirai exploited vulnerabilities in
IoT devices to create a massive network of compromised devices, used for Distributed
Denial of Service (DDoS) attacks.
Data theft: IoT devices can store sensitive personal or proprietary data, making them
targets for data exfiltration attacks.
IoT Botnets
IoT botnets are networks of compromised IoT devices controlled by a malicious actor. These
botnets can be used for various nefarious activities, including:
Lack of standardization: There is no universal standard for IoT device security, making
it challenging to enforce best practices.
Resource constraints: IoT devices often have limited resources for security measures.
Privacy concerns: Implementing strong security measures can raise privacy concerns.
Mitigation Strategies
Regular updates: Ensure IoT devices receive timely software updates to address known
vulnerabilities.
Strong passwords: Use unique, complex passwords for all IoT devices.
Network segmentation: Isolate IoT devices from critical networks to limit the potential
damage of a compromise.
IoT security solutions: Consider using specialized IoT security solutions designed to
protect these devices.
User education: Educate users about the risks associated with IoT devices and best
practices for security.
Unpatched Vulnerability: The attack leverages a vulnerability that has not been
publicly disclosed or addressed by the vendor.
Surprise Element: The sudden nature of these attacks can catch organizations off guard,
making it difficult to respond effectively.
Potential for Severe Damage: Zero-day attacks can lead to significant data breaches,
system disruptions, and financial losses.
Applications: Popular software applications, including web browsers, email clients, and
productivity tools, are frequent targets.
Network Devices: Routers, switches, and firewalls can also be vulnerable to zero-day
attacks.
State-Sponsored Actors: Governments may use zero-day attacks for espionage, cyber
warfare, or other strategic purposes.
Data Breaches: Sensitive information, such as customer data, financial records, and
intellectual property, can be compromised.
System Disruption: Critical systems and services may be rendered inoperable, leading to
business disruptions and financial losses.
Patch Management: Keep software and systems up-to-date with the latest security
patches to address known vulnerabilities.
Network Segmentation: Isolate critical systems and networks to limit the potential
damage of a compromise.
Incident Response Planning: Develop and regularly test incident response plans to
address security breaches effectively.
Threat Intelligence: Stay informed about emerging threats and vulnerabilities through
threat intelligence feeds.
1. Power Analysis:
2. Timing Attacks:
4. Acoustic Analysis:
Countermeasures
Hardware Countermeasures:
o Noise Injection: Introducing random noise into the power supply or clock signal
to obscure side-channel information.
o Clock Gating: Turning off unused parts of the device to reduce power
consumption.
Software Countermeasures:
Cryptographic Algorithms:
Description: Attackers may attempt to modify the firmware of an IoT device to alter its
functionality or inject malicious code. This could involve adding malware, backdoors, or
other malicious components that compromise the device's operations.
Consequences:
Consequences:
Countermeasures:
Countermeasures:
Description: Many IoT devices run outdated or poorly written firmware with exploitable
vulnerabilities, such as buffer overflows or weak encryption mechanisms.
Consequences:
o Control over the device to launch attacks (e.g., Distributed Denial of Service -
DDoS)
Countermeasures:
Consequences:
Consequences:
Countermeasures:
o Encrypt all data transmitted to and from IoT devices (including firmware updates)
Description: Some firmware comes with hardcoded default credentials (e.g., usernames
and passwords) or backdoors left by manufacturers for maintenance purposes. These pose
significant risks as attackers can use them to easily compromise the device.
Consequences:
Countermeasures:
Description: Attackers may target the supply chain of IoT devices to tamper with
firmware before devices are delivered to end users. This could involve the introduction of
malicious components during manufacturing or distribution.
Consequences:
Countermeasures: