Professional Documents
Culture Documents
amanreport
amanreport
amanreport
A Survey of Practical
By
(i)
1
Certificate by the Supervisor:
Certificate of Approval
I hereby certify that I have reviewed and approved the report and PowerPoint
presentation submitted by Aman Kumar Roy on 24/02/2023 as part of
Technical seminar(ECS318).
Throughout the project, Aman Kumar Roy demonstrated a strong work ethic
and attention to detail. They incorporated feedback effectively and showed a
high level of commitment to producing a quality final product.
I am confident that the insights and findings presented in the report and
presentation will be beneficial to our organization. I would like to express my
appreciation for the opportunity to mentor Aman Kumar Roy during this
project and to contribute to their professional development.
Signed,
(ii)
2
Table of Contents:
1. Abstract 05
2. Index Terms 05
3. Introduction 06
9. References 27
(iii)
3
Abstract:-
4
INTRODUCTION:-
Attention has been drawn to the risks related to the use of simple
IoT devices in services that have access to sensitive information or
critical controls such as private video recording, real-time personal
localization, health monitoring, building access control, industrial
processes, and traffic lights. In order to make commercial IoT
devices more resilient to cyber attacks, security should be
considered from the design stage of new products. However, the
wide heterogeneity of IoT devices hinders the development of well-
established security-by-design methods for the IoT.
The world is experiencing a profound shift towards sustainability. In
recent years, more and more people have begun to recognize the
importance of reducing our impact on the environment and
preserving natural resources for future generations. This shift
towards sustainability is being driven by a number of factors,
including technological advancements, changing consumer
preferences, and government policies.
5
Another key factor driving the shift towards sustainability is changing
consumer preferences. As people become more aware of the
environmental impact of their choices, they are choosing to support
companies that prioritize sustainability. This has led many businesses to
adopt sustainable practices, such as using renewable energy, reducing
waste, and sourcing materials responsibly. Consumers are also
increasingly interested in buying products that are made from
sustainable materials, such as bamboo, recycled plastic, and organic
cotton.
Government policies have also played a role in driving the shift towards
sustainability. Many countries have introduced regulations and
incentives to encourage businesses and individuals to reduce their
environmental impact. For example, some governments offer tax
incentives for companies that use renewable energy or reduce their
carbon emissions. Others have introduced regulations that require
companies to report on their environmental impact or to take steps
to reduce their carbon footprint. These policies have helped to create
a more sustainable business environment and have encouraged
individuals to make more sustainable choices.
6
Security Challenges in the IoT Domain :-
7
In order to set a common ground for the discussion that will follow in the
next sections, here we provide a broad overview of the IoT security
requirements and of the related challenges.
A. Security Requirements
To begin with, we present a taxonomy of the security requirements for
an IoT system with respect to the different operational levels, that is to
say, at the Information, Access, and Functional level [17], [18].
8
Functional Level: This level defines the security requirements in terms of
9
the following criteria.
Edge Layer: One of the main threats at this level is represented by the
side channel attacks [21]. The goal of these attacks is to leak
information from the analysis of side signals, such as power
consumption, electromagnetic emissions, and communication timing,
while nodes are performing encryption procedures. Among them, the
power consumption of the devices is widely exploited to guess and
recover the encryption secret keys. For each encryption operation, a
power trace can be captured: the power data is generally computed
from the voltage difference across a resistor inserted in series with the
power supply. Simple power analysis attacks try to directly interpret the
power traces related to a small number of encryption rounds. Instead,
the differential power analysis is a more effective and advanced
approach: a bigger amount of traces are statistically analyzed in order
to extract additional encryption information [22].
1
Application Layer: Attacks at the Application Layer are quite different
from
1
the previous ones, since they directly target the software running on the
devices rather than the communication technology. Such attacks may
address the integrity of, e.g., machine learning algorithms, where the
attacker manipulates the training process of the learning algorithm to
induce misbehaviors. There can also be attacks on the login and
authentication phases.
Ignoring the Functionality: This class includes all the attacks in which the
specific functionalities of the IoT device are ignored, and only its
capability to connect to the local area network (LAN) or to the Internet is
exploited. For example, IoT devices can be used to create a bot-net (a
network completely controlled by the attacker) or to penetrate the victim’s
home network and infect his/her computers.
Reducing the Functionality: In this case, the attacker tries to kill or limit
the functionalities of the device, in order to annoy the victim or
create malfunctions in a wider system. For example, this type of attack
may be directed to IoT devices like smart TVs or smart refrigerators,
with the aim of blocking or limiting their functioning in order to extort
money from the victim for restoring their normal behavior.
1
can only be reversed with a secret key. This prevents eavesdroppers
from interpreting the message content, as they can only access the
ciphertext. Encryption can be either symmetric or asymmetric. In
symmetric encryption, the same secret key is used for both
encryption and decryption, requiring both sender and receiver to
know the key. Asymmetric encryption, on the other hand, requires each
endpoint to have their own unique pair of keys: a public key and a private
key. The public key can be shared freely, while the private key must be
kept secret. Messages are encrypted with the receiver's public key and can
only be decrypted by the receiver's private key, ensuring confidentiality.
AES Block
Light Weight Cryptography:-
1
growing need to develop security algorithms for resource and
1
energy-constrained devices. Lightweight cryptography is a new area of
cryptography that addresses these requirements by designing encryption
block and stream ciphers, message authentication codes, and hash
functions that can be executed by devices with limited computation,
communication, and storage capabilities. In 2012, ISO and IEC introduced
the ISO/IEC 29192 standard that specified lightweight encryption
mechanisms, including the block ciphers PRESENT and CLEIFA. PRINCE is
another lightweight block cipher not included in the standard. Additionally,
the Simon and Speck families of lightweight block ciphers were introduced
by Beaulieu et al. In terms of lightweight hash functions, ISO/IEC 29192
standard proposed PHOTON and SPONGENT. In 2013, NIST launched a
lightweight cryptography project to explore and develop real-world
solutions. In early 2019, NIST called for algorithms for lightweight
cryptography, which will undergo a standardization process after discussion
and evaluation.
Secure Hardware:-
The previous section highlighted that IoT devices are prone to edge
layer attacks due to their deployment in remote and low-security areas.
To mitigate such attacks, various encryption schemes have been
proposed, which can be implemented using both hardware and software
solutions. One promising approach is to use physically unclonable functions
(PUFs) to improve hardware security. PUFs exploit small differences in
the chip fabrication process to generate a unique signature for each
device. The responses generated by a PUF are chip-specific, making
them resistant to reverse engineering attacks. PUFs can be categorized
into strong and weak, with strong PUFs used for authentication protocols
and weak PUFs used for cryptographic key generation. Other hardware
1
solutions, such as
1
randomizing instruction execution cycles and implementing the SIMON
algorithm, have also been proposed to prevent side channel attacks.
However, these techniques can increase power consumption and chip area,
which may not be feasible for resource-constrained IoT devices.
A. ZigBee
ZigBee is a wireless communication standard developed by the ZigBee
Alliance, which is widely used in IoT devices due to its low cost and
power consumption. The standard defines the application and network
layers, while the link and physical layers are taken from the IEEE 802.15.4
standard. ZigBee includes different application profiles that ensure
1
vendor
1
interoperability. Preinstallation, key transport, and key establishment.
ZigBee is vulnerable to plaintext attacks, which can be prevented by
changing the network key periodically. ZigBee is also vulnerable to a
sinkhole attack, where a malicious entity joins the network and pretends to
be the best route for messages.
Fig. 3. ZigBee protocol stack. The technical specifications for ZigBee can
be found in [60].
2
B. Bluetooth Low Energy
Besides physical and MAC layers, the stack entails other protocols such as
the logical link control and adaptation protocol (L2CAP) and the low energy
attribute protocol (ATT). BLE encryption and authentication processes
are based on AES-CCM with 128-bit keys, similar to ZigBee. The symmetric
key for a master-slave link is generated during the pairing procedure.
Starting from BLE version 4.2, a new pairing procedure has been put in
place, using elliptic curve cryptography. Each device generates an elliptic
curve Diffie-Hellman (ECDH) public-private key pair. Then, they exchange
the public key with each other and derive a key, called DHKey, from their
secret key and the public key of the other device, using elliptic curve
functions. The devices use one of the available pairing methods to confirm
that DHKey is the same for both of them and to generate a long-term key
(LTK) that will be used to symmetrically encrypt the data stream.
The available pairing methods are Just Works, Out of Band, and
Passkey. Just Works sets the TK to 0 and provides no security. Out of
Band exchanges the TK out-of-band, e.g., using near field
communication, but can be inconvenient for the user. Passkey uses a six-
digit number that the user passes between the devices. In this case, the
security level is high, but the devices need to be equipped with user
2
interfaces that make it possible to read and type-in the TK, which may
be impractical for miniaturized IoT devices. The pairing methods have
been updated with the introduction of a new option and the hardening of
the methods in the previous version.
2
6LoWPAN and CoAP are two protocols that facilitate interaction between
IoT devices and standard IP-based systems. 6LoWPAN is an IPv6 adaptation
protocol used by resource-constrained devices that communicate over low
power and lossy links. It uses compression and fragmentation mechanisms
to reduce the size of IP datagrams and remove redundant fields. On the
other hand, CoAP is a RESTful protocol at the Application Layer, built on top
of the UDP transport protocol. It supports retransmissions, sleepy devices,
and resource discovery. Networks employing 6LoWPAN and CoAP typically
rely on protocols from the IEEE 802.15.4 family at the PHY and MAC layers.
Routing within IoT networks is usually based on the IPv6 routing protocol
for low-power and lossy networks (RPL), which creates a destination-
oriented directed acyclic graph (DODAG) tree. A hypothetical attacker can
target RPL or operate at the adaptation layer, depending on the level of
control over the network they want to achieve.
2
D. LoRaWAN
Examples of Implementation in
Commercial Devices :-
This passage discusses the microcontrollers used in IoT devices, specifically
focusing on the microcontrollers responsible for connectivity and their
security features. The ARM Cortex-M series is the most commonly used
microcontroller series in IoT devices, with the M0, M0+, and M23
models designed for applications that require minimal cost, power, and
size. The M3 and M4 models offer a balance between performance and
energy efficiency, while the M7 model is designed for high-performance
embedded applications. Microcontrollers from the Cortex-M series only
provide memory protection, and do not integrate any hardware
pseudorandom number generator or cryptographic algorithm module.
Instead, cryptographic algorithm support is implemented via software or
dedicated co-processors. The performance of different cryptographic
algorithms implemented in software in the M0/M0+ and M3/M4
microprocessors can vary widely between different microcontrollers,
even within the same family. The optimal tradeoff between RAM usage and
performance must be reached, and increased performance is usually
worth the additional RAM usage.
Conclusion :-
The widespread adoption of IoT solutions for various applications has made
secure communications in IoT networks a critical issue. It is essential to
provide end-to-end security to protect sensitive personal information
and prevent malicious attacks that can disrupt IoT network operations.
The limited computational capabilities and the need for low energy
consumption also limit the cryptographic functionalities that can be
2
installed in IoT devices.
Despite the existence of proposed security extensions, they have not been
adopted by standardization entities and in commercial devices yet. It is
crucial to prioritize the security of IoT networks, and standardization
entities and manufacturers should consider implementing stronger
security measures in their devices and protocols. End-users should also
be made aware of the security issues related to IoT devices and take
necessary precautions to protect their personal information. Only
through collective efforts can we ensure a secure and safe IoT environment
for everyone.
Reference :-
[0] https: //ieeexplore.ieee.org/document/8796409- IoT: Internet of Threats? A
Survey of Practical Security Vulnerabilities in Real IoT Devices
Authors :-
Francesca Meneghello, Daniel Zucchetto, Michele Polese, Matteo Calore,
Andrea Zanella
Other References :-
1. A. Zanella N. Bui A. Castellani L. Vangelista and M. Zorzi "Internet of
Things for smart cities" IEEE Internet Things J. vol. 1 no. 1 pp. 22-32 Feb.
2014.
2. D. Evans The Internet of Things. How the next evolution of the Internet
is changing everything San Jose CA USA Apr. 2011
[online] Available:
https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411F
I NAL.pdf.
2
3. H. Almuhimedi et al. "Your location has been shared 5398 times! A field
study on mobile app privacy nudging" Proc. 33rd Annu. ACM Conf. Human
Factors Comput. Syst. pp. 787-796 2015.
2
4. S. Misbahuddin J. A. Zubairi A. Saggaf J. Basuni S. A-Wadany and A. Al-
Sofi "IoT based dynamic road traffic management for smart cities" Proc.
12th Int. Conf. High Capacity Opt. Netw. Enabling Emerg. Technol. pp. 1-5
Dec. 2015.
11. K. Zhao and L. Ge "A survey on the Internet of Things security" Proc.
9th Int. Conf. Comput. Intell. Security pp. 663-667 Dec. 2013.