Lecture11 IoTSecurity
Lecture11 IoTSecurity
Syllabus
This module will cover the following
Challenges:
• System heterogeneity (sensing, computation, communication),
• Complex interactions (systems of systems)
• Hundreds of new types of devices appear monthly
• Software evolving continuously
• Many device in use after vendors discontinued support/went into liquidation
Understand how information flows between blocks, in what order, and based on what conditions
Establish trust boundaries that is the component most likely to be compromised first
Reflect on plausible attack scenarios and incentives an attacker may have to tamper with a system
Goals:
• Identify security risks
• Quantify their severity
• Estimate likelihood of occurrence
• Reason for counteraction and prevention mechanisms
• Prioritize implementation of such mechanisms
Multiple threats (each with their ID) can be classified in each of these groups, the severity
of each being rated from 1 to 5 (the higher the rating, the more likely that threat).
• Part of a broader
Baseline Security
Recommendations
for IoT in the
context of Critical
Information
Infrastructures
• Aligned with the
general ENISA
threat taxonomy,
but specifically
focused on IoT
Device physical interfaces (firmware extraction, privilege escalation, reset to insecure state)
Device web/admin/cloud web interface (SQL injection, XSS, account lockout, 2FA, etc.)
Device network services (injection, DoS, poorly implemented encryption, buffer overflow, etc.)
Mobile application (implicitly trusted by cloud, user enumeration, transport encryption, etc.)
Packet sniffing,
DoS, code injection
User impersonation,
fake measurements
Packet sniffing, Packet sniffing,
injection, exfiltration
DoS, code injection protocol reverse
engineering
User impersonation,
fake measurements
Packet sniffing, Packet sniffing,
injection, exfiltration
DoS, code injection protocol reverse
engineering
Service impersonation,
malware injection
17 © 2020 Arm Limited
Mitigating risks
Service semantics
Encrypted channels
(communication robust
(data never exchanged
to DoS, replay attacks,
in plaintext)
account hijacking, etc.)
Key design is particularly critical, for e.g., only 100 combinations exist for 2-digit pad
locks → not so difficult to brute-force (exhaustive search)
Work factor: Effort or time required by an attacker with given resources to infer an
encryption key
Work factor for breaking a key by exhaustive search is exponential in key length
→ the longer the key, the higher the work factor
Problem: How to verify Possible solution: Receiver keeps a Messages with a known
that a message was not Include a “token” in message for T seconds, token that are older than
already sent every message that is compares new messages T seconds will be ignored
(replay attacks) valid only for a limited to previous ones, and
duration T (e.g., 10 discards any duplicates
seconds)
Use the same key for both encrypting and decrypting messages
Common approach:
Block ciphers (take n-bit blocks of plaintext and convert to n-bit blocks of ciphertext)
Multiple stages divide input into groups and perform a set of operations
- Substitutions and permutations;
- Split, pass through round functions, XOR
Works with 128-bit blocks arranged in 4x4 column-major order matrixes of bytes
01 02 03 04 05
Two parties First selects a Second picks a Second party Both results
agree publicly secret prime secret number computes Ab will be the
on two prime number a, b, computes mod p, first same, i.e.
numbers computes B = gb mod p, party gab mod p.
(generator g, A = ga mod p, and sends B to calculates This is the
and modulus p) then sends A first party Ba mod p. shared secret
3. Calculate totient
• Main advantage: Can provide equivalent level of security as with RSA, but with
much smaller key size
• Key idea: Scalar multiplication is a one-way • Generator (): Point on the elliptic curve that
function, i.e. easy to compute , but very hard to generates a cycling group of points by repeated
find when and are known additions
• Ord(G) = n, but also the smallest positive integer
, such that
• Co-factor
• Domain parameters
• : field parameter (modulo)
• : define the curve
• All parameters known to communicating
parties and potential eavesdroppers
Wi-Fi is the most popular wireless technology and employed in a range of IoT scenarios.
Wired Equivalent Privacy (WEP) and Temporal Key Integrity Protocol (TKIP) used
historically, but shown to have flaws and replaced with Wi-Fi Protected Access II (WPA2)
The latest Bluetooth specification relies on an ECDH key agreement protocol and
connections are subsequently secured with AES