Introduction To Iot and Its Security: Mr. Avinash Kumar
Introduction To Iot and Its Security: Mr. Avinash Kumar
Introduction To Iot and Its Security: Mr. Avinash Kumar
• Embedded Hardware
• Mobile & Control Applications Mobile
• Cloud APIs & Web Services
Ne
or
t
tw
• Network Communication
w
or
Ne
k
• Data Data
Hardware Cloud
Network
Ecosystem Approach
* Functional Evaluation
* Device Reconnaissance
* Cloud & Web APIs
* Mobile & Control Applications
* Network
* Physical Embedded hardware Inspection
* Physical Device Attacks
* Radio (RF)
Functional Evaluation
* Standard deployment
* Two environments
* Map out
- Features
- Functions
- Components
- Communication paths
Device Reconnaissance
* Component versions
* Software versions
* Vulnerability history
* Open source data
* White labeled product history
* User Manuals
* Component data/spec sheets
* FCC Data
Device Reconnaissance
Eview Panic Button Reconnaissance
* Exposed services
* Authentication
* Access rights
* Encryption
* Intra product “ecosystem” communication
Network
Device Local Mode Security
* Chips
- CPU
- Memory
- Communication
* Physical Ports
- Ethernet
- USB
- Serial
* Circuitry connection
- UART
- JTAG
- SPI
Physical Device Attacks
* JTAG/SWD
* UART
* SPI
* Memory extraction
- Firmware
- configurations
Flash Memory Extraction on Wink Hub 2
Flash Memory Extraction on Wink Hub 2
Gathering RF Configuration Data
from Inter Chip Communication
Gathering RF Configuration Data
from Inter Chip Communication
Gathering RF Configuration Data
from Inter Chip Communication
Firmware Extraction
embedded Multi-Media Controller (eMMC)
Firmware Extraction
embedded Multi-Media Controller (eMMC)
Firmware Extraction
embedded Multi-Media Controller (eMMC)
Radio (RF)
* Encryption
* Pairing
* Access Control
* Command and control
* Replay attacks
RF Analysis
Insteon Vulnerable to Replay Attacks
Insteon RF Anlaysis Reconnaissance
Reduced issues
Reduced risk
Better products
Deeper understanding
Questions
Thank You
Functional View
IoT
• Functional View describes the system's runtime Functiona
l Components, their responsibilities, default functions, inte
rfaces and primary interactions. The Functional View deriv
es from the Functional Model and reflects the developer's
perspectives on the system.