0
UTS 202042037
IOT SECURITY
STUDY NOTES
2020
1
TABLE OF CONTENTS
TABLE OF CONTENTS ... 1
WEEK 1 – OVERVIEW ... 2
WEEK 2 – IPv6 FOR IOT SECURITY ... 5
WEEK 3 – IOT AUTHENTICATION METHODS ... 8
WEEK 4 – COAP COMMUNICATIONS FOR IOT SECURITY ... 10
WEEK 5 – IOT FORENSICS ... 12
2
WEEK 1 – OVERVIEW
SPECIAL FEATURES OF IOT SECURITY
- Small and everywhere – IoT are small devices and used in most of applications in our lives
- Open systems – When IoT devices are connected, cybersecurity risks are a key concern due to open systems with IP addresses creating more avenues for cyberattacks
- Low capabilities – IoT devices are characterized by low capabilities in terms of both energy and computing resources, and thus they cannot implement complex schemes supporting security
- Wireless connections – IoT communications mostly are wireless, less secure than traditional computer networks SOURCES OF THREATS
- Malicious Users – Uncover flaws in the system, can obtain private information, sell secrets to third parties or attack similar systems
- Malicious Manufactures – Malicious manufactures can deliberately make security holes in their IoT products to be exploited in the future for accessing the users’ data and exposing it to third parties
- External Adversary – Try to perform cyberattacks to gain information about the users of an IoT system for malicious purposes EG. To cause financial damage and undermining the users’ credibility
IOT ARCHITECTURE – THREE LAYER SYSTEM
- Perception Layer – Consists of various sensors EG. Infrared, RFID, ZigBee, and other smart devices for gathering information about the surroundings like humidity, temperature, pH level pressure, force etc.
- Network Layer – Consists of the physical components and network communication software which is responsible for transmitting information acquired from the sensors in the perception layer to the other layers without intervention - Application Layer – IoT has wide range of applications including but not limited to smart home, medical and healthcare,
smart city, energy management, environment monitoring, industrial internet and connected vehicles POTENTIAL THREATS AT PERCEPTION LAYER
- Node Capture – Key nodes are controlled easily by attackers such as gateway node. It may leak sensitive information EG. Passwords, IDs and locations, then threat security of entire network
- Fake node and malicious data – The attackers add a malicious node to the system, and input fake code or data. They stop transmitting real data and consume energy of true nodes, and potentially control and/or destroy entire network - Denial of service attacks – Most common attack in wireless network and Internet. It can cause serious damage to
network resources and make the service unavailable
- Side-channel attacks – Any attack based on information gained from IoT devices. Timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information, which can be exploited - Man-in-the-middle attacks – MITM is an attack where the attacker secretly relays and alters the communication
between two parties who believe they are directly communicating with each other PERCEPTION LAYER SECURITY MEASURES
- Data Encryption - Key Management - Secret Key Algorithms - Security Routing Protocol
- Intrusion Detection Technology - Authentication and Access Control - Physical Security Design
POTENTIAL THREATS AT NETWORK LAYER
- Traditional security problems – General issues in communication networks threaten data confidentiality and integrity - Compatibility problems – The existing Internet network security architecture is designed based on the perspective of
person, and does not necessarily apply to communication between the machines
- Authentication problems – IoT has a huge number of devices. If it uses the existing mode of authentication to authenticate devices, a large amount of data traffic will likely block network
- Privacy disclosure – Information retrieval tech and social engineering, hackers can collect user’s privacy information
3
NETWORK LAYER SECURITY MEASURES- For different network architecture, the following must be setup:
o Specific authentication cohesive mechanisms
o End-to-end authentication and key agreement mechanisms o Public key infrastructure
o Security routing o Instruction detection
- Cross-domain authentication and cross-network authentication in network layer should be considered
- Network virtualization tech is used to reduce complexity of network management and possibility of wrong operation - IPv6 network security mechanism and application of security products can be adopted
APPLICATION LAYER SECURITY MEASURES
- Across heterogeneous network authentication and key agreement - The protection of the private information
- Increasing awareness of safety
- Strengthen information security management QUESTIONS
- What are IOT benefits to humans?
- Security issues related to IOT devices?
- Special features of IOT Security? Heterogenous system, simple, low power devices - Sources of IOT threats?
- What threat is the most dangerous? Malicious Manufacturers o (Cannot be defended from)
- Find practical IOT threats?
- What are potential threats at the perception layer?
ARTICLE EXTRACTS
- IoT devices demand the following set of security requirements in order to be considered as secure:
o Secure authentication
o Secure bootstrapping and transmission of data o Security of IoT data
o Secure access to data by authorized persons - Main security issues identified fit eight categories:
1) Authentication 2) Access control 3) Confidentiality 4) Privacy 5) Trust
6) Secure middleware 7) Mobile security 8) Policy enforcement