SlideShare a Scribd company logo
Building Secure
Connected Devices
Kedar Sovani
Who am I?
• IoT @ Marvell for 7 years
• 1st
Apple HomeKit SDK, 1st
Google Weave on μC
• Powering millions of Wi-Fi
IoT devices in the field
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Anywhere and Everywhere
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Google for the term IoT Security
Result Type I: Doomsday Hacking
Scenarios
Yes, security is a concern
• Increased surface area for attacks
• Connects to the physical world around us
• Newer and tinier hardware
• Newer developers
Courtesy: Darkreading.com
Result Type II: Buy Our Product
But How Do I Build for Security?
Secure By Design
Device Interactions #1
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Remote Access
Iot secure connected devices indicthreads
Standards!
• No home-grown security schemes
• Rely on established security standards #2
TLS
• Transport Layer Security
• Certificate-based Server Authentication
• Secure Key Exchange
• Encrypted Channel
• Certificate-based Device Authentication
• Secures Bank Transactions
Technology Advancements
• Hardware Capability
• Memory
• CPU
• Strong Software
• Many Open Source implementations
Iot secure connected devices indicthreads
Courtesy: Ars Technica
An interesting search engine
Iot secure connected devices indicthreads
Malformed Content?
• What about: malware/viruses?
• Communicate with known server
• controller by known entities
• Write protection
Iot secure connected devices indicthreads
Local Access
Iot secure connected devices indicthreads
Local Network
• Acts as a client for outside world
• router firewall
• Encrypted traffic at the MAC layer
• Requires Password/Certificate for access (explicit
delegation)
Switch Network?
• Remember AP Security
• Force physical access to reset-to-factory
New
Device
Setup?
New
Device
Setup?
Authenticate the other endpoint! #3
Authenticate the other endpoint!
Iot secure connected devices indicthreads
Compromised User
• Guest access to the network?
• Malware on user’s phone?
• Additional Cryptographic layers on top of the MAC layer
• User Management
Tradeoff
Physical Access
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Physical modification
• Change the server address/keys?
• Change the firmware?
• Trusted Boot
• Signed Firmware
• Encryption
Device Phishing
• Completely change the device?
• Device Authentication – PKI
Zarro Boogs Found!
• Firmware upgradeability
• Connectivity Bonus: evolving appliances
• Fix security vulnerabilities
• Possible attack vector 
Scrutinize #4
Iot secure connected devices indicthreads
@kedarsovani
Thank You!

More Related Content

PPT
IoT testing and quality assurance indicthreads
PPTX
IoT Best Practices: Unit Testing
PDF
Top IOT Testing Challenges Webinar with Jon Hagar
ODP
Internet Of Things
PDF
Testing IoT Apps with the Cloud
PPTX
Internet of Things and Quality Assurance
PDF
Atagg2015 iot internet of things - get ready to test the connected future ata...
PDF
A Pragmatic Reference Architecture for The Internet of Things
IoT testing and quality assurance indicthreads
IoT Best Practices: Unit Testing
Top IOT Testing Challenges Webinar with Jon Hagar
Internet Of Things
Testing IoT Apps with the Cloud
Internet of Things and Quality Assurance
Atagg2015 iot internet of things - get ready to test the connected future ata...
A Pragmatic Reference Architecture for The Internet of Things

What's hot (19)

PPT
Stc 2016 regional-round-iot testing in agile.
PDF
IoT Introduction Architecture and Applications
PPTX
Mobile and IoT testing
PPTX
IoTSummit - Introduction to IoT Hub
PPTX
PDF
Ibm_IoT_Architecture_and_Capabilities
PDF
IoT Node-Red Presentation
PPTX
Using an Open Source RESTful Backend for IoT Applications
PDF
An IoT gateway centric architecture to provide novel m2m services
PDF
Architectural Patterns in IoT Cloud Platforms
PPTX
IoT on Azure
PPTX
Demystifying Internet of Things with Azure IoT Suite
PPTX
Business Transformation with Microsoft Azure IoT
PPTX
Internet of things (IoT) with Azure
PPTX
Global Azure boot camp 2015 - Microsoft IoT Solutions with Azure
PPTX
Devising a practical approach to the Internet of Things
PPTX
Connecting IoT devices to Azure
PPTX
IoT on the Edge
PPTX
DotNetToscana - Azure IoT Hub - Il Concentratore
Stc 2016 regional-round-iot testing in agile.
IoT Introduction Architecture and Applications
Mobile and IoT testing
IoTSummit - Introduction to IoT Hub
Ibm_IoT_Architecture_and_Capabilities
IoT Node-Red Presentation
Using an Open Source RESTful Backend for IoT Applications
An IoT gateway centric architecture to provide novel m2m services
Architectural Patterns in IoT Cloud Platforms
IoT on Azure
Demystifying Internet of Things with Azure IoT Suite
Business Transformation with Microsoft Azure IoT
Internet of things (IoT) with Azure
Global Azure boot camp 2015 - Microsoft IoT Solutions with Azure
Devising a practical approach to the Internet of Things
Connecting IoT devices to Azure
IoT on the Edge
DotNetToscana - Azure IoT Hub - Il Concentratore
Ad

Viewers also liked (13)

PDF
At8000 s configuracao de gerenciamento
PPTX
Analysing digipaks 3
PDF
At8000 s configurando vlan avancado
PDF
Marvell Plug Computer 3.0- David Novak (TheGadgetGUYcolumn.com)
PDF
At8000 s caracteristicas gerais
PDF
Case Study: Marvell
PDF
Real world IoT for enterprises
PPT
How Marvell Semiconductor Implemented Executive Dashboards in 17 Countries in...
PDF
At8000 s arquitetura de empilhamento
DOC
Maxim zap cv_asic_backend_04_13
PDF
ITC 2015 - Marvell Present : "Improving Quality and Yield Through Optimal+ Bi...
PDF
Summit 16: ARM Mini-Summit - NFV for the Masses - Marvell
PDF
WiFi (IEEE 802.11 WLAN) Patents for Standard Ranking
At8000 s configuracao de gerenciamento
Analysing digipaks 3
At8000 s configurando vlan avancado
Marvell Plug Computer 3.0- David Novak (TheGadgetGUYcolumn.com)
At8000 s caracteristicas gerais
Case Study: Marvell
Real world IoT for enterprises
How Marvell Semiconductor Implemented Executive Dashboards in 17 Countries in...
At8000 s arquitetura de empilhamento
Maxim zap cv_asic_backend_04_13
ITC 2015 - Marvell Present : "Improving Quality and Yield Through Optimal+ Bi...
Summit 16: ARM Mini-Summit - NFV for the Masses - Marvell
WiFi (IEEE 802.11 WLAN) Patents for Standard Ranking
Ad

Similar to Iot secure connected devices indicthreads (20)

PPTX
Hugo Fiennes - Security and the IoT - Electric Imp
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PPTX
Security Testing for IoT Systems
PDF
Lecture 7 - Security
PPTX
IoT Security Briefing FBI 07 23-2017 final
PPTX
Io t slides_iotvillage
PPTX
How to create a secure IoT device
PDF
Bridgera enterprise IoT security
PDF
Protecting your home and office in the era of IoT
PDF
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
PPTX
Internet of Things Security
PPTX
Security issues and solutions : IoT
DOCX
IoT Design Principles
PDF
The (Io)Things you don't even need to hack. Should we worry?
PDF
Securing the Internet of Things
PPTX
Successful Industrial IoT patterns
PDF
[TestWarez 2017] Securing the Internet of Things
PDF
IoThings you don't even need to hack
PDF
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
PPTX
Hacking your doorbell - Karl-Henrik Nilsson - Codemotion Rome 2015
Hugo Fiennes - Security and the IoT - Electric Imp
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Security Testing for IoT Systems
Lecture 7 - Security
IoT Security Briefing FBI 07 23-2017 final
Io t slides_iotvillage
How to create a secure IoT device
Bridgera enterprise IoT security
Protecting your home and office in the era of IoT
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
Internet of Things Security
Security issues and solutions : IoT
IoT Design Principles
The (Io)Things you don't even need to hack. Should we worry?
Securing the Internet of Things
Successful Industrial IoT patterns
[TestWarez 2017] Securing the Internet of Things
IoThings you don't even need to hack
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Hacking your doorbell - Karl-Henrik Nilsson - Codemotion Rome 2015

More from IndicThreads (20)

PPTX
Http2 is here! And why the web needs it
ODP
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
PPT
Go Programming Language - Learning The Go Lang way
PPT
Building Resilient Microservices
PPT
App using golang indicthreads
PDF
Building on quicksand microservices indicthreads
PDF
How to Think in RxJava Before Reacting
PPT
Functional Programming Past Present Future
PDF
Harnessing the Power of Java 8 Streams
PDF
Building & scaling a live streaming mobile platform - Gr8 road to fame
PPTX
Internet of things architecture perspective - IndicThreads Conference
PDF
Cars and Computers: Building a Java Carputer
PPTX
Scrap Your MapReduce - Apache Spark
PPT
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
PPTX
Speed up your build pipeline for faster feedback
PPT
Unraveling OpenStack Clouds
PPTX
Digital Transformation of the Enterprise. What IT leaders need to know!
PDF
Architectural Considerations For Complex Mobile And Web Applications
PPTX
Functional Programming With Lambdas and Streams in JDK8
PDF
Changing application demands: What developers need to know
Http2 is here! And why the web needs it
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Go Programming Language - Learning The Go Lang way
Building Resilient Microservices
App using golang indicthreads
Building on quicksand microservices indicthreads
How to Think in RxJava Before Reacting
Functional Programming Past Present Future
Harnessing the Power of Java 8 Streams
Building & scaling a live streaming mobile platform - Gr8 road to fame
Internet of things architecture perspective - IndicThreads Conference
Cars and Computers: Building a Java Carputer
Scrap Your MapReduce - Apache Spark
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
Speed up your build pipeline for faster feedback
Unraveling OpenStack Clouds
Digital Transformation of the Enterprise. What IT leaders need to know!
Architectural Considerations For Complex Mobile And Web Applications
Functional Programming With Lambdas and Streams in JDK8
Changing application demands: What developers need to know

Recently uploaded (20)

PPTX
了解新西兰毕业证(Wintec毕业证书)怀卡托理工学院毕业证存档可查的
PPTX
making presentation that do no stick.pptx
PPTX
English grade 10 st augusitne eoeoknkklm
PPTX
kvjhvhjvhjhjhjghjghjgjhgjhgjhgjhgjhgjhgjhgjh
PDF
Prescription1 which to be used for periodo
PDF
Smarter Security: How Door Access Control Works with Alarms & CCTV
PPTX
Syllabus Computer Six class curriculum s
PPTX
executive branch_no record.pptxsvvsgsggs
PDF
Colorful Illustrative Digital Education For Children Presentation.pdf
PPTX
ATL_Arduino_Complete_Presentation_AI_Visuals.pptx
PDF
DOC-20250802-WA0013._20250802_161719_0000.pdf
PPTX
dhcp concept.pptxfeegrvewfegrgerhtrhtrhredew
PPTX
Embedded for Artificial Intelligence 1.pptx
PPTX
INFERTILITY (FEMALE FACTORS).pptxgvcghhfcg
PPT
Welcome-to-Information-Technology.pptx.ppt
PDF
Layer23-Switch.com The Cisco Catalyst 9300 Series is Cisco’s flagship stackab...
PPTX
STEEL- intro-1.pptxhejwjenwnwnenemwmwmwm
PPTX
udi-benefits-ggggggggfor-healthcare.pptx
PPTX
PROGRAMMING-QUARTER-2-PYTHON.pptxnsnsndn
PDF
Core Components of IoT, The elements need for IOT
了解新西兰毕业证(Wintec毕业证书)怀卡托理工学院毕业证存档可查的
making presentation that do no stick.pptx
English grade 10 st augusitne eoeoknkklm
kvjhvhjvhjhjhjghjghjgjhgjhgjhgjhgjhgjhgjhgjh
Prescription1 which to be used for periodo
Smarter Security: How Door Access Control Works with Alarms & CCTV
Syllabus Computer Six class curriculum s
executive branch_no record.pptxsvvsgsggs
Colorful Illustrative Digital Education For Children Presentation.pdf
ATL_Arduino_Complete_Presentation_AI_Visuals.pptx
DOC-20250802-WA0013._20250802_161719_0000.pdf
dhcp concept.pptxfeegrvewfegrgerhtrhtrhredew
Embedded for Artificial Intelligence 1.pptx
INFERTILITY (FEMALE FACTORS).pptxgvcghhfcg
Welcome-to-Information-Technology.pptx.ppt
Layer23-Switch.com The Cisco Catalyst 9300 Series is Cisco’s flagship stackab...
STEEL- intro-1.pptxhejwjenwnwnenemwmwmwm
udi-benefits-ggggggggfor-healthcare.pptx
PROGRAMMING-QUARTER-2-PYTHON.pptxnsnsndn
Core Components of IoT, The elements need for IOT

Iot secure connected devices indicthreads

Editor's Notes

  • #22: Mention that direct access to the device is protected by the gateway/firewall man in the middle - read/modify traffic replay - open door lock dns spoof - redirect to malicious server
  • #27: Talk about user-association challenges, TLS, authorized APIs OLA Money example
  • #32: From an attacker’s point of view, attack vector limited to being near each device and then exploiting the vulnerability
  • #35: From an attacker’s point of view, attack vector limited to being near each device and then exploiting the vulnerability