IoT and Security-ICACCA-DDn-RSS-16Sep17
IoT and Security-ICACCA-DDn-RSS-16Sep17
IoT and Security-ICACCA-DDn-RSS-16Sep17
Security
Prof. (Dr.) Rajveer S Shekhawat
Director, School of Computing and IT
Hyp
e
Cycl
e
courtes
y:
Gartner
General Architecture
3
Motivation
• The IoT is complex • Issues
• Many types of devices • IP-enabled – Security
• Many types of network • Life Time - Battery
• Feedback and control • Lack of standards -cost
• Ubiquitous IoT
• Home automation • Energy Budget (typical)
• Health • 40% Comms
• Automotive • 25% Crypto Algos
• Office • 20% Data Acquisition
• Industrial • 15% House keeping
4
Internet of Things – Key Challenges
• Low Power
• Security
• Low Cost
• Small size
• Interoperability
• Others (application specific)
Sensor Networks
6
Sample Architectures - ARM mbed
OS
7
Thesis
While there’s no such thing as ‘IoT security’ as a separate
discipline, the hyper-connected world of the Internet of Things
(IoT) makes everything about data security and data privacy
more confusing. And while we can’t possibly cover all the ins
and outs of this dauntingly complex world, here are some
things to keep in mind as you navigate the treacherous waters
of IoT data security and data privacy.
©Ayla Networks
Key Issues raising security concerns
• More devices, more problems (behind firewall)
• Updates, updates, updates (newer discovery of vulnerabilities)
• Protecting data from corporations (misuse of personal data)
• Lazy Consumers (no liberty of automatic updates or patches)
• Etc.
Security Challenges
• Many small devices have limited power
• Not much processing power for (heavy weight) security algorithms
• Need to look for new encryption schemes with less CPU power
• IOT needs both encryption key management and identity
management (authentication)
• More….
Key Security requirements of IOT –
view 1
• Secure authentication
• Secure bootstrapping and transmission of data
• Security of IoT data
• Secure access to data by authorized persons
Key Security requirements of IOT –
view 2
• Attack Resiliency
• Data authentication
• Access Control
• Client Privacy
Key Security requirements of IOT –
view 3
• Key Management
• Appropriate secret key algorithms
• Secure routing protocols
• Intrusion detection technology
• Authentication and access control
• Physical security design
Complexities of the security tasks
• Disruption and Denial of service attacks
• Understanding the complexities of vulnerabilities
• IOT vulnerability management
• Identifying and implementing security controls
• Fulfilling the need for security analytics capabilities
• Modular hardware and software components
• Rapid demand in bandwidth
Top IOT Security Concerns
• Insecure web interface
• Insufficient authentication/authorization
• Lack of transport encryption
• Privacy concerns
• Insecure software/firmware
• Insecure network services
• Insecure Cloud interface
• Insecure mobile interface
• Insufficient security configurability
• Poor physical security
IOT for Critical Infrastructure
IoT on the CI (Critical Infrastructure)such
as:
M2M (Machine to Machine)
• energy,
standardization activity is essential for
• telecom and such applications.
• utilities, etc New risks and new privacy issues that
Crucial CI's aspects: IoT may brings to CI is an avoidable
• providing safety to prevent industrial challenge. Providing security for IoT
accidents, or gets more important in this matter
• supplying required services to have a
constant electrical power for
hospitals[Gianmarco14].
Approaches to IOT Security
• Privacy by Design Principles
• Defining Authentication Frameworks
• Identity and Trust
• IP-based Security Solutions
• Network Segmentation
• Automated Remediation
• Encryption Security Solution
IOT Security Landscape
Distributing Security Across Layers
#1
• Application Layer: Robust authentication removing any vulnerabilities
due to XSS (cross-site scripting) or CSRF (Cross Site Request Forgery)
• interfaces
• Data acquisition
• energy budget
• Hardware-software codesign
• Protocol parameters
Low Power Security Alternatives
• Distributed like block chains
• Light-weight security algorithms
• Block Ciphers ISO/IEC 29192 (e.g. CLEFIA, PRESENT)
• Stream Ciphers
• Hash functions (e.g. HIMMO)
• Others
• Key exchanges using LEACH, CoAP protocols
• Message Queue Telemetry Transport (MQTT) protocol
• Dynamic keys seeded by time stamps
Gate
efficiency
(ASIC):
CLEFIA and
TLS/IPsec
ciphers
Courtesy: Katagi,
Sony Corpn.
Design goals HIMMO PKC PSK
O-1: Performance * *** *
O-2: Easy device addition to a running system
O-3: Scalable -
O-4: Easy credential management -
O-5: Easy integration with existing protocols -
O-6: Fits device lifecycle -
O-7: Long term security
S-1: Resilient to root of trust compromise -
S-2: Single root of trust cannot monitor -
S-3: Key escrow -
S-4: Facilitates secure manufacturing -
S-5: Device authentication and authorization -
S-6: Back-end authentication and authorization -
S-7: Prevents DoS attacks -
S-8: Fully collusion resistance -
S-9: Device identification and blacklisting -
S-10: Key agreement
S-11: Post-quantum resilience -
S-12: Perfect forward secrecy - -
S-13: Non-repudiation - -
Thanks