SlideShare a Scribd company logo
1 of 24
DEPT. OF ELECTRONICS AND INSTRUMENTATION
TECHNOLOGY
2016-17
TECHNICAL SEMINAR
GUIDE : SMT. S S VIDYA
HOD : DR. M B
MEENAVATHI
PRESENTED BY :
MAITREYA
IOT SECURITY
CHALLENGES IN IOT SECURITY AND ITS COUNTER
MEASURES.
INDEX
• Basics of IOT and Sensors.
• Internet and IOT.
• Securing the IOT.
• Exploiting the IOT(Challenges).
• Practical Exploit (example) – Optional.
• Conclusion.
• References.
IOT (INTERNET OF THINGS)
IOT: The term was first coined in 1999 by Kevin Ashton .The Internet of
things is the inter - networking of physical devices, vehicles (also
referred to as "connected devices" and "smart devices“), buildings and
other items - with electronics, software, sensors, actuators, and network
connectivity that enable these objects to collect and exchange data .
IOT AND SENSORS
The communication part can be handled by the API of
connected device and the predefined RFC protocols (Internet),
but the sensing needs to be still done and from Instrumentation
Point of view we need sensors and actuators to get “smart”
results. Different types of sensors are available in the market for
different purposes in an unbelievable range . Basic sensing and
actuation logic is shown in the side diagram. Some famous
sensors are :
Proximity sensors , Ultrasonic sensors , Accelerometer and
Webcam etc.
HOME SECURITY (WITH OBJECT SENSOR)
Object
Object Sensor(IR,
Ultrasonic &
Webcam)
Node McU (SMTP
server) with PI
Internet
Root(mail)
Exploring the many ways of Object
Detection:
The basic diagram aside explains how
to detect the object in an Iot
connected room . The
Basic IR and ultrasonic sensors can be
used in
conjunction with the NodeMcu
(esp826) to construct an Iot home
security system to send message via
IOT SECURITY
The IOT Security can be divided
into following propaganda:
1. Restricted Access
2. Encryption (network and
data)
3. Default API
4. Human Element (as usual)
5. Defensive Dark Arts
(DEFCON 22)
RESTRICTED ACCESS !
This is probably what will be the most
basic and first step in securing your
IOT device.
(KEEP IT IN A ISOLATED NETWORK)
If you can ,you should always keep
your IOT devices in a restricted
isolated network away from the
devices that you keep normally
connected to the internet.
What this will achieve will be a way of
isolation for your Iot devices which
ENCRYPTION
Encryption:
The Iot Security relies upon the encryption of two basic
separate aspects i.e. first the encryption of network access
(especially IOT network and the other the encryption of data
send via the internet).
Some Basic encryption for IOT involves SSL , Public Key
Cryptography, Hash Functions (SHA -3), Block Ciphers and
Stream Ciphers. The network encryption involves AES,
WPA/WPA-2 and WEP etc. Some of the basic communication
encryption methods are discussed further.
BLOCK CIPHERS
A block cipher is a deterministic and
computable function of k-bit keys and n-bit
(plaintext) blocks to n-bit (cipher text) blocks.
(More generally, the blocks don't have to be
bit-sized, n-character-blocks would fit here,
too). This means, when you encrypt the same
plaintext block with the same key, you'll get
the same result. (We normally also want that
the function is invertible, i.e. that given the key
and the cipher text block we can compute the
plaintext.)
To actually encrypt or decrypt a message (of
any size), you don't use the block cipher
directly, but put it into a mode of operation.
The simplest such mode would be electronic
code book mode (ECB), which simply cuts the
message in blocks, applies the cipher to each
block and outputs the resulting blocks. (This is
generally not a secure mode, though.)
STREAM CIPHERS
A stream cipher is a symmetric key
cipher where plaintext digits are
combined with a pseudorandom cipher
digit stream (keystream). In a stream
cipher, each plaintext digit is encrypted
one at a time with the corresponding
digit of the keystream, to give a digit of
the cipher text stream. Since encryption
of each digit is dependent on the current
state of the cipher, it is also known as
state cipher. In practice, a digit is
typically a bit and the combining
PUBLIC KEY CRYPTOGRAPHY
In a public key encryption system, any
person can encrypt a message using the
public key of the receiver, but such a
message can be decrypted only with the
receiver's private key. For this to work it
must be computationally easy for a user to
generate a public and private key-pair to
be used for encryption and decryption. The
strength of a public key cryptography
system relies on the degree of difficulty
(computational impracticality) for a
properly generated private key to be
determined from its corresponding public
key. Security then depends only on
SSL (SECURE SOCKETS LAYER)
SSL (Secure Sockets Layer) is the standard security
technology for establishing an encrypted link between a
web server and a browser. This link ensures that all
data passed between the web server and browsers
remain private and integral. SSL is an industry standard
and is used by millions of websites in the protection of
their online transactions with their customers.
To be able to create an SSL connection a web server
requires an SSL Certificate. When you choose to activate
SSL on your web server you will be prompted to
complete a number of questions about the identity of
your website and your company. Your web server then
creates two cryptographic keys - a Private Key and a
Public Key.
The Public Key does not need to be secret and is placed
into a Certificate Signing Request (CSR) - a data file also
containing your details. You should then submit the
CSR. During the SSL Certificate application process, the
Certification Authority will validate your details and
issue an SSL Certificate containing your details and
LIGHTWEIGHT CRYPTOGRAPHY & HASH
(FUTURE RESEARCH)
Basically the ciphers having smaller digital
print and most apt for the IOT devices . It`s a
good trade-off for security , cost and
performance.
Ex- DES (X/L) based on AES (Advanced
Encryption Standard) being used in RFID and
other IOT lightweight applications since it
processes 4bit/6 bit words rather than 32/48
bits. Ciphers discussed earlier are used in
development of lightweight cryptography.
HASH - MD5 hash functions / SHA-3 are a
topic of research . Since the memory footprints
are quite larger to be implemented for IOT
API MANAGEMENT (DEVELOPER`S SIDE)
Application Programming Interface is
responsible for everything in your IOT
device– gateways, security and access
management as well as the API key
control.
On the IoT, data is everywhere — flowing
from devices to the cloud, from the cloud
to your back-end systems, from users
back to their devices — all enabled by
APIs. API Management enables you to
govern this flow of data with the security
you need to protect sensitive
information, and the performance
required to support connected cars,
HUMAN ELEMENT
This vulnerability has been since the
beginning of the technology and same
holds true for IOT devices. The
fundamentals here are the same
everywhere ,some of which can be listed
as:
1. Change default passwords. !!!!
2. Don`t share your PGP private keys.
3. Restricted access for your LAN.
4. Regular updated patches.
IOT EXPLOITATION (CHALLENGES)
The some of the most basic limitations of IOT devices
and attacks can be comprised as:
1. Device Limitations.
2. MITM .
3. DOS/DDOS (most common)
4. Botnet
5. Data and Identity theft
6. Brute force/Dictionary (authentication attacks)
DEVICE LIMITATIONS
The first and foremost challenge
we face in securing the IOT devices
is the devices limitations itself.
The typical IOT device with 8-bit
processor and 2-4 MB flash
memory is not able to process the
different HASH functions and
encryption algorithms and being a
relatively new concept , the
methods are still under research
(ex-DESL) to use the functions on
typical IOT devices.
But nonetheless lightweight
cryptography is still an option here.
BOTNET
A botnet is a network of systems combined
together with the purpose of remotely taking
control and distributing malware. Controlled by
botnet operators via Command-and-Control-
Servers (C&C Server), they are used by criminals
on a grand scale for many things: stealing
private information, exploiting online-banking
data, DDos-attacks or for spam and phishing
emails.
With the rise of the IoT, many objects and
devices are in danger of, or are already being
part of, so called thingbots – a botnet that
incorporates independent connected objects.
Ex- It is easy for a smtp filter to stop malicious
request from one client but not from a dozens
or hundreds of client sending the malicious
DOS/DDOS(DENIAL OF SERVICE)
A denial of service (DoS) attack happens
when a service that would usually work is
unavailable. There can be many reasons for
unavailability, but it usually refers to
infrastructure that cannot cope due to
capacity overload.
In a Distributed Denial of Service (DDoS)
attack, a large number of systems
maliciously attack one target. This is often
done through a botnet, where many devices
are programmed (often unbeknownst to the
owner) to request a service at the same time.
(Often a DoS attack lends itself to hacktivists
(MITM) ATTACK/ DATA AND IDENTITY
THEFT
The man-in-the-middle concept is where
an attacker or hacker is looking to interrupt
and breach communications between two
separate systems. It can be a dangerous
attack because it is one where the attacker
secretly intercepts and transmits messages
between two parties when they are under
the belief that they are communicating
directly with each other. As the attacker
has the original communication, they can
trick the recipient into thinking they are
still getting a legitimate message.
These attacks can be extremely dangerous
in the IoT, because of the nature of the
“things” being hacked.
Ex- Many cases have already been reported
BRUTE FORCE/DICTIONARY ATTACK
(CLASSICS)
These are probably the oldest type
of automated attacks still used
widely.
Brute-force - Basically, the attempt
to uncover the password is done by
trying a wide variety of
letter/number combinations to
figure out what a password is so that
an account can be taken over.
Dictionary -On the flipside of things,
dictionary attacks involve the hacker
trying to determine your password
by trying hundreds or sometimes
CONCLUSION
To conclude I would say that we still have a far way to go in
securing the IOT infrastructure but some of the key things can
be generalized for securing the IOT devices are:
1. IOT security design should enable an open, pervasive and
interoperable yet secure infrastructure .
2. For the sake of privacy and security, IOT or smart devices
must be capable of implementing indivual user set policies.
3. Infrastructural security services should be accessible
transparently and regardless of the connection uses by
nomadic smart IOT objects.
“SECURITY IS A MYTH” – DEFCON 22
REFERENCES:
• DEFCON 22 : https://www.defcon.org/html/defcon-22/dc-22-
index.html
• LIGHTWEIGHT CRYPTOGRAPHY white paper :
https://www.iab.org/wp-content/IAB-
uploads/2011/03/Kaftan.pdf
• IOT SECURITY :
https://www.forbes.com/sites/gilpress/2017/03/20/6-hot-
internet-of-things-iot-security-technologies/#7e7ad1c51b49
• HASH and ENCRYPTION white paper : http://repository.root-
me.org/RFC/EN%20-%20rfc1321.txt (rfc1321)
• SHA -1/2/3 white paper : http://repository.root-
me.org/RFC/EN%20-%20rfc5754.txt (rfc5754)

More Related Content

What's hot

Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and SolutionsUlf Mattsson
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachThe Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachDeloitte United States
 

What's hot (20)

IoT Security
IoT SecurityIoT Security
IoT Security
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Network security
Network securityNetwork security
Network security
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachThe Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
 

Similar to Iot Security

Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET Journal
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control AddressAngie Lee
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)Wail Hassan
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)rosu555
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationHans Klos
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security andIaetsd Iaetsd
 

Similar to Iot Security (20)

Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Network security
Network securityNetwork security
Network security
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Day4
Day4Day4
Day4
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Designing Internet of things
Designing Internet of thingsDesigning Internet of things
Designing Internet of things
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
Physical Layer Essay
Physical Layer EssayPhysical Layer Essay
Physical Layer Essay
 

Recently uploaded

Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolinonuriaiuzzolino1
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 

Recently uploaded (20)

Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 

Iot Security

  • 1. DEPT. OF ELECTRONICS AND INSTRUMENTATION TECHNOLOGY 2016-17 TECHNICAL SEMINAR GUIDE : SMT. S S VIDYA HOD : DR. M B MEENAVATHI PRESENTED BY : MAITREYA
  • 2. IOT SECURITY CHALLENGES IN IOT SECURITY AND ITS COUNTER MEASURES.
  • 3. INDEX • Basics of IOT and Sensors. • Internet and IOT. • Securing the IOT. • Exploiting the IOT(Challenges). • Practical Exploit (example) – Optional. • Conclusion. • References.
  • 4. IOT (INTERNET OF THINGS) IOT: The term was first coined in 1999 by Kevin Ashton .The Internet of things is the inter - networking of physical devices, vehicles (also referred to as "connected devices" and "smart devices“), buildings and other items - with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data .
  • 5. IOT AND SENSORS The communication part can be handled by the API of connected device and the predefined RFC protocols (Internet), but the sensing needs to be still done and from Instrumentation Point of view we need sensors and actuators to get “smart” results. Different types of sensors are available in the market for different purposes in an unbelievable range . Basic sensing and actuation logic is shown in the side diagram. Some famous sensors are : Proximity sensors , Ultrasonic sensors , Accelerometer and Webcam etc.
  • 6. HOME SECURITY (WITH OBJECT SENSOR) Object Object Sensor(IR, Ultrasonic & Webcam) Node McU (SMTP server) with PI Internet Root(mail) Exploring the many ways of Object Detection: The basic diagram aside explains how to detect the object in an Iot connected room . The Basic IR and ultrasonic sensors can be used in conjunction with the NodeMcu (esp826) to construct an Iot home security system to send message via
  • 7. IOT SECURITY The IOT Security can be divided into following propaganda: 1. Restricted Access 2. Encryption (network and data) 3. Default API 4. Human Element (as usual) 5. Defensive Dark Arts (DEFCON 22)
  • 8. RESTRICTED ACCESS ! This is probably what will be the most basic and first step in securing your IOT device. (KEEP IT IN A ISOLATED NETWORK) If you can ,you should always keep your IOT devices in a restricted isolated network away from the devices that you keep normally connected to the internet. What this will achieve will be a way of isolation for your Iot devices which
  • 9. ENCRYPTION Encryption: The Iot Security relies upon the encryption of two basic separate aspects i.e. first the encryption of network access (especially IOT network and the other the encryption of data send via the internet). Some Basic encryption for IOT involves SSL , Public Key Cryptography, Hash Functions (SHA -3), Block Ciphers and Stream Ciphers. The network encryption involves AES, WPA/WPA-2 and WEP etc. Some of the basic communication encryption methods are discussed further.
  • 10. BLOCK CIPHERS A block cipher is a deterministic and computable function of k-bit keys and n-bit (plaintext) blocks to n-bit (cipher text) blocks. (More generally, the blocks don't have to be bit-sized, n-character-blocks would fit here, too). This means, when you encrypt the same plaintext block with the same key, you'll get the same result. (We normally also want that the function is invertible, i.e. that given the key and the cipher text block we can compute the plaintext.) To actually encrypt or decrypt a message (of any size), you don't use the block cipher directly, but put it into a mode of operation. The simplest such mode would be electronic code book mode (ECB), which simply cuts the message in blocks, applies the cipher to each block and outputs the resulting blocks. (This is generally not a secure mode, though.)
  • 11. STREAM CIPHERS A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the cipher text stream. Since encryption of each digit is dependent on the current state of the cipher, it is also known as state cipher. In practice, a digit is typically a bit and the combining
  • 12. PUBLIC KEY CRYPTOGRAPHY In a public key encryption system, any person can encrypt a message using the public key of the receiver, but such a message can be decrypted only with the receiver's private key. For this to work it must be computationally easy for a user to generate a public and private key-pair to be used for encryption and decryption. The strength of a public key cryptography system relies on the degree of difficulty (computational impracticality) for a properly generated private key to be determined from its corresponding public key. Security then depends only on
  • 13. SSL (SECURE SOCKETS LAYER) SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. SSL is an industry standard and is used by millions of websites in the protection of their online transactions with their customers. To be able to create an SSL connection a web server requires an SSL Certificate. When you choose to activate SSL on your web server you will be prompted to complete a number of questions about the identity of your website and your company. Your web server then creates two cryptographic keys - a Private Key and a Public Key. The Public Key does not need to be secret and is placed into a Certificate Signing Request (CSR) - a data file also containing your details. You should then submit the CSR. During the SSL Certificate application process, the Certification Authority will validate your details and issue an SSL Certificate containing your details and
  • 14. LIGHTWEIGHT CRYPTOGRAPHY & HASH (FUTURE RESEARCH) Basically the ciphers having smaller digital print and most apt for the IOT devices . It`s a good trade-off for security , cost and performance. Ex- DES (X/L) based on AES (Advanced Encryption Standard) being used in RFID and other IOT lightweight applications since it processes 4bit/6 bit words rather than 32/48 bits. Ciphers discussed earlier are used in development of lightweight cryptography. HASH - MD5 hash functions / SHA-3 are a topic of research . Since the memory footprints are quite larger to be implemented for IOT
  • 15. API MANAGEMENT (DEVELOPER`S SIDE) Application Programming Interface is responsible for everything in your IOT device– gateways, security and access management as well as the API key control. On the IoT, data is everywhere — flowing from devices to the cloud, from the cloud to your back-end systems, from users back to their devices — all enabled by APIs. API Management enables you to govern this flow of data with the security you need to protect sensitive information, and the performance required to support connected cars,
  • 16. HUMAN ELEMENT This vulnerability has been since the beginning of the technology and same holds true for IOT devices. The fundamentals here are the same everywhere ,some of which can be listed as: 1. Change default passwords. !!!! 2. Don`t share your PGP private keys. 3. Restricted access for your LAN. 4. Regular updated patches.
  • 17. IOT EXPLOITATION (CHALLENGES) The some of the most basic limitations of IOT devices and attacks can be comprised as: 1. Device Limitations. 2. MITM . 3. DOS/DDOS (most common) 4. Botnet 5. Data and Identity theft 6. Brute force/Dictionary (authentication attacks)
  • 18. DEVICE LIMITATIONS The first and foremost challenge we face in securing the IOT devices is the devices limitations itself. The typical IOT device with 8-bit processor and 2-4 MB flash memory is not able to process the different HASH functions and encryption algorithms and being a relatively new concept , the methods are still under research (ex-DESL) to use the functions on typical IOT devices. But nonetheless lightweight cryptography is still an option here.
  • 19. BOTNET A botnet is a network of systems combined together with the purpose of remotely taking control and distributing malware. Controlled by botnet operators via Command-and-Control- Servers (C&C Server), they are used by criminals on a grand scale for many things: stealing private information, exploiting online-banking data, DDos-attacks or for spam and phishing emails. With the rise of the IoT, many objects and devices are in danger of, or are already being part of, so called thingbots – a botnet that incorporates independent connected objects. Ex- It is easy for a smtp filter to stop malicious request from one client but not from a dozens or hundreds of client sending the malicious
  • 20. DOS/DDOS(DENIAL OF SERVICE) A denial of service (DoS) attack happens when a service that would usually work is unavailable. There can be many reasons for unavailability, but it usually refers to infrastructure that cannot cope due to capacity overload. In a Distributed Denial of Service (DDoS) attack, a large number of systems maliciously attack one target. This is often done through a botnet, where many devices are programmed (often unbeknownst to the owner) to request a service at the same time. (Often a DoS attack lends itself to hacktivists
  • 21. (MITM) ATTACK/ DATA AND IDENTITY THEFT The man-in-the-middle concept is where an attacker or hacker is looking to interrupt and breach communications between two separate systems. It can be a dangerous attack because it is one where the attacker secretly intercepts and transmits messages between two parties when they are under the belief that they are communicating directly with each other. As the attacker has the original communication, they can trick the recipient into thinking they are still getting a legitimate message. These attacks can be extremely dangerous in the IoT, because of the nature of the “things” being hacked. Ex- Many cases have already been reported
  • 22. BRUTE FORCE/DICTIONARY ATTACK (CLASSICS) These are probably the oldest type of automated attacks still used widely. Brute-force - Basically, the attempt to uncover the password is done by trying a wide variety of letter/number combinations to figure out what a password is so that an account can be taken over. Dictionary -On the flipside of things, dictionary attacks involve the hacker trying to determine your password by trying hundreds or sometimes
  • 23. CONCLUSION To conclude I would say that we still have a far way to go in securing the IOT infrastructure but some of the key things can be generalized for securing the IOT devices are: 1. IOT security design should enable an open, pervasive and interoperable yet secure infrastructure . 2. For the sake of privacy and security, IOT or smart devices must be capable of implementing indivual user set policies. 3. Infrastructural security services should be accessible transparently and regardless of the connection uses by nomadic smart IOT objects. “SECURITY IS A MYTH” – DEFCON 22
  • 24. REFERENCES: • DEFCON 22 : https://www.defcon.org/html/defcon-22/dc-22- index.html • LIGHTWEIGHT CRYPTOGRAPHY white paper : https://www.iab.org/wp-content/IAB- uploads/2011/03/Kaftan.pdf • IOT SECURITY : https://www.forbes.com/sites/gilpress/2017/03/20/6-hot- internet-of-things-iot-security-technologies/#7e7ad1c51b49 • HASH and ENCRYPTION white paper : http://repository.root- me.org/RFC/EN%20-%20rfc1321.txt (rfc1321) • SHA -1/2/3 white paper : http://repository.root- me.org/RFC/EN%20-%20rfc5754.txt (rfc5754)