Chapter 4 - Iot Security
Chapter 4 - Iot Security
Chapter 4 - Iot Security
2
Importance of
security
3
IoT is almost in every field
4
Examples of security
issues
Door locks
◦cars
◦house
House appliances
◦burn
◦used as network bots
Medical devices
◦harm people
Public utilities
◦power grid
◦water network
https://www.pubnub.com/blog/2015-05-04-10-challenges-securing-iot-communications-iot-security/
5
Security types
SECURITY BY DESIGN SECURITY BY OBSCURITY
6
Local Security
Network Security
Securing
a device Software
Hardware
7
Local
Security
8
Change the default password
Raspberry Pi
◦pi/raspberry
BeagleBone
◦ debian/temppwd
Mirai Net
◦ Rent devices for DDoS
9
Disable unused
services
SSH
◦login access
If you don’t need it, stop it!
X Server
◦UI, unless you have a display
Disable administration over the air
◦default login
Avahii
◦device discovery (multicast)
SMB (Samba)
◦WannaCry, used SMB 1
10
Networ
k
security
11
Avoid self-written
protocols
You are the the only one using it
No one tested it
Is it theoretically secure?
Firewalls might stop it
12
Use secure protocols
HTTPS
◦Authenticates the server
◦Encrypted communication
MQTT/SSL
◦Encrypted MQTT
XMPP
◦Secure messages exchange protocol
◦Authenticates servers between each other
Devices
◦Computers
◦Microcontrollers
13
Read before implementation
Read about security issues in the field
problems
14
Hardwar
e
15
What should you
use?
The right hardware for the right job
Cloud Storage
Internet
Local storage
Local Processing
Sensors
16
Microcontrollers and Computers
Simple systems Full CPUs
Control hardware High speeds
Low speeds Large
memory
Small memory ◦Is able to
◦2 KB
use
◦RSA key might security
be is 2KB
Run OS
Run single ◦Linux OS
software
◦RTOS Local
network
Local network and
only Internet
17
Softwar
e
18
Supported Software
Raspberry Pi CHIP
Arduino YUN Banana Pi
BeagleBone
Arduino TIAN
UDOO
19
Upstream changes
If you change software, push it upstream
20
Use open
libraries
If the protocol is used, someone wrote a
library
Use a library that is actively maintained
Follow security updates for the library
21
Sure you want to use it?
22
This is all right to use
23
How do you update the device?
Your software will have update
◦features
◦Security
OS
◦ dual partition
Applications
◦ snap
◦ Google Store (Android Things)
24
Trusted software
Digitally sign the software
Secure boot
◦hardware support here
◦additional hardware
Secure software
◦ digitally signed
◦ Verified before install
25
Trust store
26
Security by design
Local security
Security is important
27
Questions?
28