Spiceboxlab
s
IoT Product Development
Spiceboxlabsdevelops connected products.
We provide our clients end to end smart solutions that use hardware, firmware, and software to create a
bridge of communication between the brand and the user.
agendaCommon Challenges in Connected Device Development - Shimon Yannay
Challenges with iOS Based Products - Tommer Ben Shaul
Security Requirements in Embedded Devices - Pavel Stessin
Selecting Connectivity Type - Pavel Stessin
Common challenges in
connected devices development
Shimon Yannay : shimon@spiceboxlabs.com
pairing
Internet
connectivity
IP68
size
specia
l
Low power
consumption
fOT
A
Mobile support
Selecting the
connectivity per project
Pavel Stessin : pavel@spiceboxlabs.com
Considerations
Cost
Target Purpose
And Use
Power, Size And
Form Factor
Security
Requirements
Deployment
Process
Considerations
Cost
Target Purpose
And Use
Power, Size And
Form Factor
Security
Requirements
Deployment
Process
Considerations
Cost
Target Purpose
And Use
Power, Size And
Form Factor
Security
Requirements
Deployment
Process
Considerations
Cost
Target Purpose
And Use
Power, Size And
Form Factor
Security
Requirements
Deployment
Process
Considerations
Cost
Target Purpose
And Use
Power, Size And
Form Factor
Security
Requirements
Deployment
Process
Latest major developments
in connectivity protocols
Cellular Evolution Bluetooth Evolution
Cellular evolution for IoT
Speed
Power & Cost
2G 3G 4G
5G
Now is
the Future
IoT
Specific
LPWAN
$$ $$$ $$$$
$
MobileIoTDevices
Cellular IoTProtocols
• Sigfox
• LoRa (LoRaWAN)
• LTE Cat 0/1
• LTE Cat NB-IoT
• LTE Cat M1
• And more…
Parameters
• Infrastructure
• Power, cost and size (Also very minimal)
• Specific use cases adaptation
• Politics
Bluetooth
EVOLUTION
Features
Flexibility
Time
2.0 3.0
4.0
4.2
5.0
4.1
Bluetooth
EVOLUTION
Features
Flexibility
Time
2.0 3.0
4.0
4.2
5.0
4.1
Challenges with
iOS based products
Tommer Ben Shaul : tommyb@spiceboxlabs.com
iOSWhy do we need BLE in the background?
BLE Background
CENTRAL
Scan responsibly
Different BLE protocol in the background
iO
SWhy do we
need BLE in
the
background?
BLE Background
Peripheral
Advertise responsibly
iOS Device identification and recognition
Security
Breach
Inter App
communicatio
n
shared
memory
Security requirements
in embedded devices
Pavel Stessin : pavel@spiceboxlabs.com
I just paid for
AES128Are you sure You are
secured?
AES128 handles very well
encryption between two sides
Assumes synced keys
on both sides
Secure key Exchange
Bluetooth 4.0 has AES128, but its key exchange appeared to be non-secure: Hacking instruction link
Bluetooth 4.2 fixes it, allowing secure key exchange (but optional!)
sometimes costs more then AES
Authentication
I got my keys exchanged with
YOU?!
Digital Signatures
making sure you talk with the right one
Use asymmetric PKI
public key cryptography
Protocols
Veteran standard – RSA
IoT generation hero – ECDSA (based on ECC)
Improvements come close…
Just don’t forget to align on the specific flavor…
“Man In The Middle”
Secure storage
Secure storage
All caused by the service at http://www.break-ic.com/
SECURITY solutions
MCUs with flash protection
Dedicated security chips with secure storage
Java Card standard
Store encrypted
Encrypted flash and secure boot
Tunneling
Brand & Business Protection
Cloning prevention
• Certificates and digital signatures
• Secure hardware protection chips
Run only high quality and secure code
• Secure boot
• IP protection
• Java Card
Sounds familiar? (Apple and MFI)
Brand and Business
Protection Solutions
Some more attacks to remember
Replay
Denial-of-Service
Mobiles are vulnerable (specially unprotected android apps)
Firmware upgrade over the air
https://www.shodan.io/ (Search engine for all connected devices)
Spicebox labs
Thank you!

IoT Product development Meetup