Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 57

WIRELESS EMBEDDED SYSTEM

IoT Security
07/31/2021

07/31/2021 Copyrights 2020 CE-UIT. All Rights Reserved. 1


07/31/2021 Copyrights 2020 CE-UIT. All Rights Reserved. 2
Objectives

 Understanding the importance of Security in IoT

 Understanding the Challenges of IoT Security

 Knowing Solution Approach for IoT Security

07/31/2021 Copyrights 2020 CE-UIT. All Rights Reserved. 3


Contents

 Introduction to Security in IoT

 Problem and Challenges of IoT Security

 Solution Approaches for IoT Security

07/31/2021 Copyrights 2020 CE-UIT. All Rights Reserved. 4


Introduction to Security

 What is Security?
 “The quality or state of being secure—to be free
from danger”

 A successful organization should have multiple


layers of security in place:
o Physical security
o Personal security
o Operations security
o Communications security
o Network security
o Information security
07/31/2021 Copyrights 2020 CE-UIT. All Rights Reserved. 5
Information Security

 What is Information Security?


 The protection of information and its critical
elements, including systems and hardware that use,
store, and transmit that information

 Necessary tools: policy, awareness, training,


education, technology

07/31/2021 Copyrights 2020 CE-UIT. All Rights Reserved. 6


Security Concepts

07/31/2021 Copyrights 2020 CE-UIT. All Rights Reserved. 7


Security Concepts (cont.)

To ensure protection
against unauthorized To ensure the accuracy
access to or use of and completeness of
confidential information information to protect
business processes

To ensure that information and vital services


are accessible for use when required
07/31/2021 Copyrights 2020 CE-UIT. All Rights Reserved. 8
Security vs. Usability

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 9


Security vs. Safety (General Usage)

 Security is concerned with malicious humans that


actively search for and exploit weaknesses in a system.

 Safety is protection against mishaps that are


unintended (such as accidents)

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 10


Security in IoT Ecosystem

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 11


IoT Security Opportunities

IoT Security means new opportunities


for a security professional to develop
novel security solution!

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 12


IoT Trend

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 13


IoT Trend

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 14


Security Cases

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 15


Problem and Security Challenges

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 16


Problem and Security Challenges

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 17


Security Risk

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 18


Security Domain

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 19


IoT Security Toxonomy

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 20


Typical IoT Infrastructure

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 21


Typical Attack: Fake Control Service

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 22


Typical Attack: Attack on Device Open Port

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 23


Typical Attack: Attack on Server Open Port

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 24


Typical Attack: Steal Credential

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 25


Typical Attack: Inject Bad Configuration or Firmware

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 26


Typical Attack: Sniff Data on Private Networks

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 27


Other Attack

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 28


OWASP Top 10 IoT Vulnerabilities

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 29


Security Approaches

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 30


Security Approaches

• One-Time Pads
Software • Data Encryption Standard (DES)
Approaches • Advanced Encryption Standard (AES
• RSA: Rivest, Shamir, and Adleman

Hardware • Cruptography Accelerator


Approaches • Cruptography Chip

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 31


Basic Cryptography: One-Time Pads
Basic Cryptography: One-Time Pads
Basic Cryptography: One-Time Pads

How?
Symmetric (Shared Key) Cryptography

• Block cipher uses more elaborate algorithms so that key siz


e and message size don’t need to be the same.
• Subsequent identical messages encrypt as different cipher te
xt.
• Data Encryption Standard (DES) – mid 1970s.
• Advanced Encryption Standard (AES) – 2001
Based on a cryptographic scheme called Rijndael proposed
by Joan Daemen and Vincent Rijmen, two researchers from
Belgium. AES uses a message block length of 128 bits and t
hree different key lengths of 128, 192, and 256 bits.
Asymmetric (Public Key) Cryptography

Each participant has two keys, a public and a private one.

A message is encrypted with the public key.

The message can only be decrypted with the private key.

Public and private keys match via clever algorithms.

Relies on a one-way function, easy to compute, hard to revers


e without knowing a (private) key.
RSA: Rivest, Shamir, and Adleman

• Public key: KB = (n,e)


• Encryption: C = Me (mod n)
• Private key: d
• Decryption: M = Cd (mod n)

Ronald L. Rivest, Adi Shamir, and Leonard Adelman, 1978 and 2010
RSA Overview

Based on the fact that it is practical to find three large positive


integers e, d, and n, s.t. for all m coprime with n,

(me)d mod n = m

The public key is then (e, n), and the private key is d.
Encryption:
• Add bits to message M to make m coprime to n.
• Ciphertext: C = (me) mod n
RSA Overview

Based on the fact that it is practical to find three large positive


integers e, d, and n, s.t. for all m coprime with n,

(me)d mod n = m

The public key is then (e, n), and the private key is d.
Decription:
• m = (Cd ) mod n
• Remove extra bits by reversing the padding scheme
RSA Key Generation

 Find two distinct large prime number p and q. Let


 n = pq
RSA’s security relies on the difficulty of finding p and q kno
wing only n (the “factorization problem”). Let
F = (p-1)(q-1)
Find an e s.t. 1 < e < F coprime with F. (e, n) is the public ke
y.
Find a d s.t. de mod n = 1. d is the private key.
Widely Used Asymmetric Cryptography:
SSL/TLS

 Secure Socket Layer/Transport Layer Security

 Widely used for web servers


on the Internet
HTTPS = HTTP over
SSL/TLS
 Provides:
 Authentication
 Confidentiality and integrity of
communication

Slide from Hokeun Kim


Intro to SSL/TLS Based on Certificates

Shared secret: Cryptographic key for encryption

Message Encryption Your bank (server)


Browser (client) ID/Password
Account balance
se c ret ?
Make wire transfer
are the
re ly sh
e s ec u
ca n w
How
Internet

Eavesdropper
Intro to SSL/TLS Based on Certificates

 Public key cryptography (e.g., RSA)

Your bank (server)

Browser (client)

Decrypted With
Bank's Private Key

Secret to be shared
Encrypted With Bank's
Public Key
Bank's Bank's
Public Key Private Key

Slide from Hokeun Kim


Intro to SSL/TLS Based on Certificates

 However, even with public key cryptography…


Browser (client) Your bank (server)
Fake website &
Malory's Public Key

Encrypted With Bank's Bank's


Malory's Public Key Public Key Private Key
Malory
"Man In The Middle" Encrypted With
Bank's Public Key
www.bankofamerica.com
=> Malory's IP address

Spoof network address to redirect Malory's Malory's Decrypted With


client to fake website Public Key Private Key Malory's Private Key
(e.g. DNS cache poisoning)

Slide from Hokeun Kim


Signing a Message

Each participant has two keys, a public and a private one.

A message is encrypted with the private key and both the mes
sage and its encryption are sent.

The encrypted part can be decrypted with the public key. If it


matches the plaintext message, the signature is valid.
Intro to SSL/TLS Based on Certificates
A (Digital) Certificate (Proof of Public Key's Authenticity)
• Name of certificate authority (CA)

• www.bankofamerica.com

• Bank's public key

• Additional Information: validity period, etc.


Signed (encrypted)* with
issuer (CA)'s Private key
• Digital Signature

Can only be decrypted (verified)


with issuer (CA)'s matching
public key!
Actually the hash of data is encrypted (signed), and the
result of decryption is also hash

Slide from Hokeun Kim


Intro to SSL/TLS Based on Certificates

CAs Issues a certificate for Bank

Browser (client) Your bank (server)


Connects to www.bankofamerica.com

CA Certificates Bank's certificate issued by CA


(embedded in browser)
Verify Bank's certificate Malory's (invalid)certificate
with CA's certificate insisting ownership of domain
Can't be verified!

Slide from Hokeun Kim


Issues with Using SSL/TLS for IoT
 Overhead for resource-constrained devices
 Energy/computation overhead for public key crypto, communication
bandwidth, memory, etc.
 Limited support one-to-many communication
 Connections are 1-to-1 (server/client model)

Certificates Thermostat
Roomba
HVAC

Remote door Mobile phone


control
Garage door
Fridge Washing
Machine
Vehicle Sensors

Microwave

Slide from Hokeun Kim


Issues with Using SSL/TLS for IoT
• Management overhead of certificates
– If you use commercial certificate authorities (CAs)

• Company Validation Quotes from www.digicert.com


… First, we will verify that the company requesting a certificate is in good standing …
• Domain Validation
… can include emails or phone calls to the contact listed in a domain's whois record …

– Alternative: free & automated CA


• Overhead for managing domains to get certificates

Slide from Hokeun Kim


Security Hardware
Approaches

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 50


Security Standard FISP 140-2

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 51


FIPS 140-2 Levels of Security

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 52


FIPS 140-2 Levels of Security

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 53


SoC with Crupto Accelerator

07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 54


07/31/2021 Copyrights 2020 CE-UIT . All Rights Reserved. 55


Summary

 Introduction to problems and challenges of Security


in IoT Area

 Discussion on Security approaches

 Software Approaches: one-time pads, DES, AES, RS


A…

 Hardware Aprroaches

07/31/2021 Copyrights 2020 CE-UIT. All Rights Reserved. 56


Q&A

07/31/2021 Copyrights 2020 CE-UIT. All Rights Reserved. 57

You might also like