Ece3501: Iot Fundamentals Module 3 - Iot Security and Privacy
Ece3501: Iot Fundamentals Module 3 - Iot Security and Privacy
1 06.08.2020-G2
It’s not just PCs and smartphones we should worry about anymore, but a wide
range of Internet-connected devices such as thermostats, smart meters, self-driving
cars and even voice assistant devices such as Amazon’s Alexa.
Risk by Internet
(e.g. public)
Risk by IoT Devices
Risk by Cloud
(e.g. open source)
Information
3
WHY IS IOT / INTERNET OF THINGS
SECURITY IMPORTANT?
In 2016, the Mirai botnet launched one of the biggest DDoS
attacks ever recorded. More than 1 terabyte per second
flooded the network of Dyn, a major DNS provider, and
brought down sites such as Reddit and Airnbnb.
But what made this attack so special was that it was the first
to be carried out with IoT devices. Nearly 150,000
compromised smart cameras, routers and other devices all
enslaved into a single botnet, focused on a single target.
The Mirai botnet however is much bigger! By some
estimates, it contains millions of enslaved devices. And it
wasn’t even that hard to create in the first place.
4
CONTD..
Manufacturers use a handful of default password and usernames to
protect an IoT device.
Had a few hundreds/ thousands of password combinations to protect tens
of millions of smart devices.
All it took were a few simple lines of code, designed to test each of
those default passwords. A device could be hacked and
enslaved within a few seconds, so long as the user didn’t change
the standard login information.
But IoT botnets aren’t the only type of threat.
6
INTERNET OF THINGS
---SECURITY VULNERABILITIES
Simplicity and ease of use are crucial principles in the
IT and electronics industry. Every software and device
out there is designed to be as easy to use as possible, so
as to not confuse consumers and discourage them from
using the product.
Unfortunately, this often means that some products cut
corners, and don’t implement security features
consumers might find “too clunky”.
7
INTERNET OF THINGS
---SECURITY VULNERABILITIES
The process of identifying assets and threats in an
organization is known as “Threat Modeling”
8
INSECURE DEFAULT LOGIN
CREDENTIALS
In practice, they might hide the “Change password/
Username” options deep in the UI, out of sight for most
users. No wonder so many people kept their default user
names and passwords.
If each Internet of Things device had a randomized
username and password, Mirai might not have happened
in the first place. But that is too expensive a process in
competitive industries with razor-thin profit margins.
9
POOR SOFTWARE UPDATES
10
THE COMMUNICATION ISN’T
ENCRYPTED
Other IoT devices lack basic encryption to hide the data sent
between the device and the central server. This can potentially
expose the user’s personal information, if a malicious hacker can
snoop in on his personal information.
Another thing that Internet of Things devices do, is that some of
them ask for more permissions than they need to.
One time, numerous Amazon Echo users were surprised to see
their device ordering dollhouses after a TV anchor said the
phrase “Alexa ordered me a dollhouse”.
In that case, the device had permission to do a purchase all by
itself. Each extra permission in an IoT device adds another
vulnerability layer which can be exploited. The fewer
permissions, the more secure your device is.
11
INSECURE USER INTERFACE
13
THE MAIN TYPES OF ATTACKS
AGAINST IOT DEVICES
Smart devices can be hacked in a number of ways,
depending on the type of vulnerability the attacker
decides to exploit.
14
ATTACKS AGAINST IOT DEVICES
15
RECOMMENDATIONS TO IMPROVE IOT SECURITY
16
RECOMMENDATIONS TO IMPROVE IOT SECURITY
Buffer overflows. This happens when a device tries to store too much data
into a temporary storage space. This excess data then spills over into other
parts of the memory space, overwriting it. If malware is hidden in that data,
it can end rewriting the code of the device itself.
Code injection. By exploiting a vulnerability in the software, the attacker is
able to inject code into the device. Most often, this code is malicious in
nature, and it can do a multitude of tasks, such as shutting down or taking
control of the device.
Cross Site Scripting. These work with IoT devices that interact with a
web-based interface. Basically, the attacker infects the legitimate page with
malware or malicious code, and then the page itself will infect the IoT
18
device.
IOT VULNERABILITY EXPLOIT
19
MALWARE ATTACKS
20
21
PASSWORD ATTACKS
22
23
SNIFFING / MAN-IN-THE-MIDDLE
ATTACKS
24
25
SPOOFING
26
27
BOTNET ENSLAVING
location data
usage patterns
search history
Sometimes, companies are the ones that leak information, and not the
devices. Such was the case of a teddy bear that spilled recordings from
nearly 2 million kids and parents.
This kind of information goes into the company’s cloud. If that’s
compromised, chances are each one of its consumers are also hacked.
One major weakness of Internet of Things devices is that is that many
of them send data over unsecured ports. In other words, you can
actually see the data live, without requiring a password and username.
All it takes to view this data is a paid account at Shodan, and you’re 34
set.
WHY THERE ISN’T A WIDELY AGREED UPON
SOLUTION TO TRAFFIC FILTERING
36
CHANGE YOUR DEFAULT PASSWORDS AND
USERNAMES
The Mirai malware is still out there, actively seeking out more
IoT devices to enslave into the botnet. Fortunately, it’s a fairly
simple malware, and can be easily countered by setting up a
strong and secure password and changing your default
username.
For the best results, we recommend you make the password at
least 10 characters long, and use at least 1 capitalized letter, 1
normalized one, 1 number and 1 special character, such as an *
or a &.
Here’s a website you can use to
figure out how strong your passwords are.
Also, try to have a different password for each device. That
way, if one device gets hacked, then you can rely on the other 37
ones.
AS MUCH AS POSSIBLE, UPDATE TO THE LATEST
SOFTWARE
41
TWO-FACTOR AUTHENTICATION
42
PHYSICAL WEAKNESSES IN IOT
DEVICES
43
ENCRYPTION
44
CREATE A SECOND NETWORK FOR YOUR IOT
DEVICES
Your Wi-Fi router is one of the first attack points for a malicious hacker. To
make sure it is secure, we suggest you do the following:
Use a strong and secure password.
47
READ THE DEVICE MANUAL FOR ANY SECURITY
TIP YOU MIGHT FIND
48
DOWNLOAD SECURITY
APPLICATIONS
49
USE A HARDWARE SOLUTION TO SECURE YOUR
IOT NETWORK FROM OUTSIDE ATTACKS
52
IOT SECURITY ISSUES
Public Perception: If the IoT is ever going to truly take off, this needs to be the first
problem that manufacturers address. The 2015 Icontrol State of the Smart Home study
found that 44% of all Americans were "very concerned" about the possibility of their
information getting stolen from their smart home, and 27% were "somewhat
concerned." With that level of worry, consumers would hesitate to purchase connected
devices.
Vulnerability to Hacking: Researchers have been able to hack into real, on-the-market
devices with enough time and energy, which means hackers would likely be able to
replicate their efforts. For example, a team of researchers at Microsoft and the
University of Michigan found a plethora of holes in the security of Samsung's
SmartThings smart home platform, and the methods were far from complex.
Are Companies Ready?: AT&T's Cybersecurity Insights Report surveyed more than
5,000 enterprises around the world and found that 85% of enterprises are in the process
of or intend to deploy IoT devices. Yet a mere 10% of those surveyed feel confident that
they could secure those devices against hackers.
True Security: Jason Porter, AT&T's VP of security solutions, told Insider Intelligence
that securing IoT devices means more than simply securing the actual devices
themselves. Companies also need to build security into software applications and 53
network connections that link to those devices.
IOT PRIVACY ISSUES
Too Much Data: The sheer amount of data that IoT devices can generate is
staggering. A Federal Trade Commission report entitled "Internet of Things: Privacy &
Security in a Connected World" found that fewer than 10,000 households can generate
150 million discrete data points every day. This creates more entry points for hackers
and leaves sensitive information vulnerable.
Unwanted Public Profile: You've undoubtedly agreed to terms of service at some
point, but have you ever actually read through an entire document? The aforementioned
FTC report found that companies could use collected data that consumers willingly
offer to make employment decisions. For example, an insurance company might gather
information from you about your driving habits through a connected car when
calculating your insurance rate. The same could occur for health or life insurance
thanks to fitness trackers.
Eavesdropping: Manufacturers or hackers could actually use a connected device to
virtually invade a person's home. German researchers accomplished this by intercepting
unencrypted data from a smart meter device to determine what television show
someone was watching at that moment.
Consumer Confidence: Each of these problems could put a dent in consumers' desire
to purchase connected products, which would prevent the IoT from fulfilling its true 54
potential.
SECURITY RISKS
IoT devices are connected to your desktop or laptop.
Lack of security increases the risk of your personal
information leaking while the data is collected and
transmitted to the IoT device.
IoT devices are connected with a consumer network.
This network is also connected with other systems. So if
the IoT device contains any security vulnerabilities, it
can be harmful to the consumer’s network. This
vulnerability can attack other systems and damage them.
Sometimes unauthorized people might exploit the
security vulnerabilities to create risks to physical safety.
55
PRIVACY RISKS
In IoT, devices are interconnected with various hardware
and software, so there are obvious chances of sensitive
information leaking through unauthorized manipulation.
All the devices are transmitting the user’s personal
information such as name, address, date of birth, health
card information, credit card detail and much more
without encryption.
56
CONTD.,
57
CONTD.,
58
IOT SYSTEM FUNCTIONALITIES-
FROM SECURITY PERSPECTIVE
59
CONTD.,
60
SECURITY ARCHITECTURE
61
SECURITY ARCHITECTURE
62
SECURITY ARCHITECTURE
63
SECURITY ARCHITECTURE
64
CHALLENGES IN IOT SECURITIES
65
CONTD.,
66
CONTD.,
67
CONTD.,
68
69