SlideShare a Scribd company logo
DEPT. OF ELECTRONICS AND INSTRUMENTATION
TECHNOLOGY
2016-17
TECHNICAL SEMINAR
GUIDE : SMT. S S VIDYA
HOD : DR. M B
MEENAVATHI
PRESENTED BY :
MAITREYA
IOT SECURITY
CHALLENGES IN IOT SECURITY AND ITS COUNTER
MEASURES.
INDEX
• Basics of IOT and Sensors.
• Internet and IOT.
• Securing the IOT.
• Exploiting the IOT(Challenges).
• Practical Exploit (example) – Optional.
• Conclusion.
• References.
IOT (INTERNET OF THINGS)
IOT: The term was first coined in 1999 by Kevin Ashton .The Internet of
things is the inter - networking of physical devices, vehicles (also
referred to as "connected devices" and "smart devices“), buildings and
other items - with electronics, software, sensors, actuators, and network
connectivity that enable these objects to collect and exchange data .
IOT AND SENSORS
The communication part can be handled by the API of
connected device and the predefined RFC protocols (Internet),
but the sensing needs to be still done and from Instrumentation
Point of view we need sensors and actuators to get “smart”
results. Different types of sensors are available in the market for
different purposes in an unbelievable range . Basic sensing and
actuation logic is shown in the side diagram. Some famous
sensors are :
Proximity sensors , Ultrasonic sensors , Accelerometer and
Webcam etc.
HOME SECURITY (WITH OBJECT SENSOR)
Object
Object Sensor(IR,
Ultrasonic &
Webcam)
Node McU (SMTP
server) with PI
Internet
Root(mail)
Exploring the many ways of Object
Detection:
The basic diagram aside explains how
to detect the object in an Iot
connected room . The
Basic IR and ultrasonic sensors can be
used in
conjunction with the NodeMcu
(esp826) to construct an Iot home
security system to send message via
IOT SECURITY
The IOT Security can be divided
into following propaganda:
1. Restricted Access
2. Encryption (network and
data)
3. Default API
4. Human Element (as usual)
5. Defensive Dark Arts
(DEFCON 22)
RESTRICTED ACCESS !
This is probably what will be the most
basic and first step in securing your
IOT device.
(KEEP IT IN A ISOLATED NETWORK)
If you can ,you should always keep
your IOT devices in a restricted
isolated network away from the
devices that you keep normally
connected to the internet.
What this will achieve will be a way of
isolation for your Iot devices which
ENCRYPTION
Encryption:
The Iot Security relies upon the encryption of two basic
separate aspects i.e. first the encryption of network access
(especially IOT network and the other the encryption of data
send via the internet).
Some Basic encryption for IOT involves SSL , Public Key
Cryptography, Hash Functions (SHA -3), Block Ciphers and
Stream Ciphers. The network encryption involves AES,
WPA/WPA-2 and WEP etc. Some of the basic communication
encryption methods are discussed further.
BLOCK CIPHERS
A block cipher is a deterministic and
computable function of k-bit keys and n-bit
(plaintext) blocks to n-bit (cipher text) blocks.
(More generally, the blocks don't have to be
bit-sized, n-character-blocks would fit here,
too). This means, when you encrypt the same
plaintext block with the same key, you'll get
the same result. (We normally also want that
the function is invertible, i.e. that given the key
and the cipher text block we can compute the
plaintext.)
To actually encrypt or decrypt a message (of
any size), you don't use the block cipher
directly, but put it into a mode of operation.
The simplest such mode would be electronic
code book mode (ECB), which simply cuts the
message in blocks, applies the cipher to each
block and outputs the resulting blocks. (This is
generally not a secure mode, though.)
STREAM CIPHERS
A stream cipher is a symmetric key
cipher where plaintext digits are
combined with a pseudorandom cipher
digit stream (keystream). In a stream
cipher, each plaintext digit is encrypted
one at a time with the corresponding
digit of the keystream, to give a digit of
the cipher text stream. Since encryption
of each digit is dependent on the current
state of the cipher, it is also known as
state cipher. In practice, a digit is
typically a bit and the combining
PUBLIC KEY CRYPTOGRAPHY
In a public key encryption system, any
person can encrypt a message using the
public key of the receiver, but such a
message can be decrypted only with the
receiver's private key. For this to work it
must be computationally easy for a user to
generate a public and private key-pair to
be used for encryption and decryption. The
strength of a public key cryptography
system relies on the degree of difficulty
(computational impracticality) for a
properly generated private key to be
determined from its corresponding public
key. Security then depends only on
SSL (SECURE SOCKETS LAYER)
SSL (Secure Sockets Layer) is the standard security
technology for establishing an encrypted link between a
web server and a browser. This link ensures that all
data passed between the web server and browsers
remain private and integral. SSL is an industry standard
and is used by millions of websites in the protection of
their online transactions with their customers.
To be able to create an SSL connection a web server
requires an SSL Certificate. When you choose to activate
SSL on your web server you will be prompted to
complete a number of questions about the identity of
your website and your company. Your web server then
creates two cryptographic keys - a Private Key and a
Public Key.
The Public Key does not need to be secret and is placed
into a Certificate Signing Request (CSR) - a data file also
containing your details. You should then submit the
CSR. During the SSL Certificate application process, the
Certification Authority will validate your details and
issue an SSL Certificate containing your details and
LIGHTWEIGHT CRYPTOGRAPHY & HASH
(FUTURE RESEARCH)
Basically the ciphers having smaller digital
print and most apt for the IOT devices . It`s a
good trade-off for security , cost and
performance.
Ex- DES (X/L) based on AES (Advanced
Encryption Standard) being used in RFID and
other IOT lightweight applications since it
processes 4bit/6 bit words rather than 32/48
bits. Ciphers discussed earlier are used in
development of lightweight cryptography.
HASH - MD5 hash functions / SHA-3 are a
topic of research . Since the memory footprints
are quite larger to be implemented for IOT
API MANAGEMENT (DEVELOPER`S SIDE)
Application Programming Interface is
responsible for everything in your IOT
device– gateways, security and access
management as well as the API key
control.
On the IoT, data is everywhere — flowing
from devices to the cloud, from the cloud
to your back-end systems, from users
back to their devices — all enabled by
APIs. API Management enables you to
govern this flow of data with the security
you need to protect sensitive
information, and the performance
required to support connected cars,
HUMAN ELEMENT
This vulnerability has been since the
beginning of the technology and same
holds true for IOT devices. The
fundamentals here are the same
everywhere ,some of which can be listed
as:
1. Change default passwords. !!!!
2. Don`t share your PGP private keys.
3. Restricted access for your LAN.
4. Regular updated patches.
IOT EXPLOITATION (CHALLENGES)
The some of the most basic limitations of IOT devices
and attacks can be comprised as:
1. Device Limitations.
2. MITM .
3. DOS/DDOS (most common)
4. Botnet
5. Data and Identity theft
6. Brute force/Dictionary (authentication attacks)
DEVICE LIMITATIONS
The first and foremost challenge
we face in securing the IOT devices
is the devices limitations itself.
The typical IOT device with 8-bit
processor and 2-4 MB flash
memory is not able to process the
different HASH functions and
encryption algorithms and being a
relatively new concept , the
methods are still under research
(ex-DESL) to use the functions on
typical IOT devices.
But nonetheless lightweight
cryptography is still an option here.
BOTNET
A botnet is a network of systems combined
together with the purpose of remotely taking
control and distributing malware. Controlled by
botnet operators via Command-and-Control-
Servers (C&C Server), they are used by criminals
on a grand scale for many things: stealing
private information, exploiting online-banking
data, DDos-attacks or for spam and phishing
emails.
With the rise of the IoT, many objects and
devices are in danger of, or are already being
part of, so called thingbots – a botnet that
incorporates independent connected objects.
Ex- It is easy for a smtp filter to stop malicious
request from one client but not from a dozens
or hundreds of client sending the malicious
DOS/DDOS(DENIAL OF SERVICE)
A denial of service (DoS) attack happens
when a service that would usually work is
unavailable. There can be many reasons for
unavailability, but it usually refers to
infrastructure that cannot cope due to
capacity overload.
In a Distributed Denial of Service (DDoS)
attack, a large number of systems
maliciously attack one target. This is often
done through a botnet, where many devices
are programmed (often unbeknownst to the
owner) to request a service at the same time.
(Often a DoS attack lends itself to hacktivists
(MITM) ATTACK/ DATA AND IDENTITY
THEFT
The man-in-the-middle concept is where
an attacker or hacker is looking to interrupt
and breach communications between two
separate systems. It can be a dangerous
attack because it is one where the attacker
secretly intercepts and transmits messages
between two parties when they are under
the belief that they are communicating
directly with each other. As the attacker
has the original communication, they can
trick the recipient into thinking they are
still getting a legitimate message.
These attacks can be extremely dangerous
in the IoT, because of the nature of the
“things” being hacked.
Ex- Many cases have already been reported
BRUTE FORCE/DICTIONARY ATTACK
(CLASSICS)
These are probably the oldest type
of automated attacks still used
widely.
Brute-force - Basically, the attempt
to uncover the password is done by
trying a wide variety of
letter/number combinations to
figure out what a password is so that
an account can be taken over.
Dictionary -On the flipside of things,
dictionary attacks involve the hacker
trying to determine your password
by trying hundreds or sometimes
CONCLUSION
To conclude I would say that we still have a far way to go in
securing the IOT infrastructure but some of the key things can
be generalized for securing the IOT devices are:
1. IOT security design should enable an open, pervasive and
interoperable yet secure infrastructure .
2. For the sake of privacy and security, IOT or smart devices
must be capable of implementing indivual user set policies.
3. Infrastructural security services should be accessible
transparently and regardless of the connection uses by
nomadic smart IOT objects.
“SECURITY IS A MYTH” – DEFCON 22
REFERENCES:
• DEFCON 22 : https://www.defcon.org/html/defcon-22/dc-22-
index.html
• LIGHTWEIGHT CRYPTOGRAPHY white paper :
https://www.iab.org/wp-content/IAB-
uploads/2011/03/Kaftan.pdf
• IOT SECURITY :
https://www.forbes.com/sites/gilpress/2017/03/20/6-hot-
internet-of-things-iot-security-technologies/#7e7ad1c51b49
• HASH and ENCRYPTION white paper : http://repository.root-
me.org/RFC/EN%20-%20rfc1321.txt (rfc1321)
• SHA -1/2/3 white paper : http://repository.root-
me.org/RFC/EN%20-%20rfc5754.txt (rfc5754)

More Related Content

What's hot

Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
CAS
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
IoT Security
IoT SecurityIoT Security
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
CableLabs
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
MohanPandey31
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
Shreya Pohekar
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
Ulf Mattsson
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
Gowdhaman Jothilingam
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
Tonex
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
Er. Ajay Sirsat
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
Jinia Bhowmik
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
noornabi16
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
OWASP Delhi
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
SHAAMILIVARSAGV
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
Vishnupriya T H
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
SKS
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 

What's hot (20)

Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Network security
Network securityNetwork security
Network security
 

Similar to Iot Security

Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET Journal
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
AliSalman110
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
Angie Lee
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
Wail Hassan
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
rosu555
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
Day4
Day4Day4
Day4
Jai4uk
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
Hans Klos
 
Internet of things , presentation, rajiv gandhi university
Internet of things , presentation, rajiv gandhi universityInternet of things , presentation, rajiv gandhi university
Internet of things , presentation, rajiv gandhi university
PulakMandal14
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
 
Designing Internet of things
Designing Internet of thingsDesigning Internet of things
Designing Internet of things
Mahdi Hosseini Moghaddam
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
Sarah Jimenez
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
Iaetsd Iaetsd
 
Physical Layer Essay
Physical Layer EssayPhysical Layer Essay
Physical Layer Essay
Jenny Richardson
 

Similar to Iot Security (20)

Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Network security
Network securityNetwork security
Network security
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Day4
Day4Day4
Day4
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
Internet of things , presentation, rajiv gandhi university
Internet of things , presentation, rajiv gandhi universityInternet of things , presentation, rajiv gandhi university
Internet of things , presentation, rajiv gandhi university
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Designing Internet of things
Designing Internet of thingsDesigning Internet of things
Designing Internet of things
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
Physical Layer Essay
Physical Layer EssayPhysical Layer Essay
Physical Layer Essay
 

Recently uploaded

History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 

Recently uploaded (16)

History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 

Iot Security

  • 1. DEPT. OF ELECTRONICS AND INSTRUMENTATION TECHNOLOGY 2016-17 TECHNICAL SEMINAR GUIDE : SMT. S S VIDYA HOD : DR. M B MEENAVATHI PRESENTED BY : MAITREYA
  • 2. IOT SECURITY CHALLENGES IN IOT SECURITY AND ITS COUNTER MEASURES.
  • 3. INDEX • Basics of IOT and Sensors. • Internet and IOT. • Securing the IOT. • Exploiting the IOT(Challenges). • Practical Exploit (example) – Optional. • Conclusion. • References.
  • 4. IOT (INTERNET OF THINGS) IOT: The term was first coined in 1999 by Kevin Ashton .The Internet of things is the inter - networking of physical devices, vehicles (also referred to as "connected devices" and "smart devices“), buildings and other items - with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data .
  • 5. IOT AND SENSORS The communication part can be handled by the API of connected device and the predefined RFC protocols (Internet), but the sensing needs to be still done and from Instrumentation Point of view we need sensors and actuators to get “smart” results. Different types of sensors are available in the market for different purposes in an unbelievable range . Basic sensing and actuation logic is shown in the side diagram. Some famous sensors are : Proximity sensors , Ultrasonic sensors , Accelerometer and Webcam etc.
  • 6. HOME SECURITY (WITH OBJECT SENSOR) Object Object Sensor(IR, Ultrasonic & Webcam) Node McU (SMTP server) with PI Internet Root(mail) Exploring the many ways of Object Detection: The basic diagram aside explains how to detect the object in an Iot connected room . The Basic IR and ultrasonic sensors can be used in conjunction with the NodeMcu (esp826) to construct an Iot home security system to send message via
  • 7. IOT SECURITY The IOT Security can be divided into following propaganda: 1. Restricted Access 2. Encryption (network and data) 3. Default API 4. Human Element (as usual) 5. Defensive Dark Arts (DEFCON 22)
  • 8. RESTRICTED ACCESS ! This is probably what will be the most basic and first step in securing your IOT device. (KEEP IT IN A ISOLATED NETWORK) If you can ,you should always keep your IOT devices in a restricted isolated network away from the devices that you keep normally connected to the internet. What this will achieve will be a way of isolation for your Iot devices which
  • 9. ENCRYPTION Encryption: The Iot Security relies upon the encryption of two basic separate aspects i.e. first the encryption of network access (especially IOT network and the other the encryption of data send via the internet). Some Basic encryption for IOT involves SSL , Public Key Cryptography, Hash Functions (SHA -3), Block Ciphers and Stream Ciphers. The network encryption involves AES, WPA/WPA-2 and WEP etc. Some of the basic communication encryption methods are discussed further.
  • 10. BLOCK CIPHERS A block cipher is a deterministic and computable function of k-bit keys and n-bit (plaintext) blocks to n-bit (cipher text) blocks. (More generally, the blocks don't have to be bit-sized, n-character-blocks would fit here, too). This means, when you encrypt the same plaintext block with the same key, you'll get the same result. (We normally also want that the function is invertible, i.e. that given the key and the cipher text block we can compute the plaintext.) To actually encrypt or decrypt a message (of any size), you don't use the block cipher directly, but put it into a mode of operation. The simplest such mode would be electronic code book mode (ECB), which simply cuts the message in blocks, applies the cipher to each block and outputs the resulting blocks. (This is generally not a secure mode, though.)
  • 11. STREAM CIPHERS A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the cipher text stream. Since encryption of each digit is dependent on the current state of the cipher, it is also known as state cipher. In practice, a digit is typically a bit and the combining
  • 12. PUBLIC KEY CRYPTOGRAPHY In a public key encryption system, any person can encrypt a message using the public key of the receiver, but such a message can be decrypted only with the receiver's private key. For this to work it must be computationally easy for a user to generate a public and private key-pair to be used for encryption and decryption. The strength of a public key cryptography system relies on the degree of difficulty (computational impracticality) for a properly generated private key to be determined from its corresponding public key. Security then depends only on
  • 13. SSL (SECURE SOCKETS LAYER) SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. SSL is an industry standard and is used by millions of websites in the protection of their online transactions with their customers. To be able to create an SSL connection a web server requires an SSL Certificate. When you choose to activate SSL on your web server you will be prompted to complete a number of questions about the identity of your website and your company. Your web server then creates two cryptographic keys - a Private Key and a Public Key. The Public Key does not need to be secret and is placed into a Certificate Signing Request (CSR) - a data file also containing your details. You should then submit the CSR. During the SSL Certificate application process, the Certification Authority will validate your details and issue an SSL Certificate containing your details and
  • 14. LIGHTWEIGHT CRYPTOGRAPHY & HASH (FUTURE RESEARCH) Basically the ciphers having smaller digital print and most apt for the IOT devices . It`s a good trade-off for security , cost and performance. Ex- DES (X/L) based on AES (Advanced Encryption Standard) being used in RFID and other IOT lightweight applications since it processes 4bit/6 bit words rather than 32/48 bits. Ciphers discussed earlier are used in development of lightweight cryptography. HASH - MD5 hash functions / SHA-3 are a topic of research . Since the memory footprints are quite larger to be implemented for IOT
  • 15. API MANAGEMENT (DEVELOPER`S SIDE) Application Programming Interface is responsible for everything in your IOT device– gateways, security and access management as well as the API key control. On the IoT, data is everywhere — flowing from devices to the cloud, from the cloud to your back-end systems, from users back to their devices — all enabled by APIs. API Management enables you to govern this flow of data with the security you need to protect sensitive information, and the performance required to support connected cars,
  • 16. HUMAN ELEMENT This vulnerability has been since the beginning of the technology and same holds true for IOT devices. The fundamentals here are the same everywhere ,some of which can be listed as: 1. Change default passwords. !!!! 2. Don`t share your PGP private keys. 3. Restricted access for your LAN. 4. Regular updated patches.
  • 17. IOT EXPLOITATION (CHALLENGES) The some of the most basic limitations of IOT devices and attacks can be comprised as: 1. Device Limitations. 2. MITM . 3. DOS/DDOS (most common) 4. Botnet 5. Data and Identity theft 6. Brute force/Dictionary (authentication attacks)
  • 18. DEVICE LIMITATIONS The first and foremost challenge we face in securing the IOT devices is the devices limitations itself. The typical IOT device with 8-bit processor and 2-4 MB flash memory is not able to process the different HASH functions and encryption algorithms and being a relatively new concept , the methods are still under research (ex-DESL) to use the functions on typical IOT devices. But nonetheless lightweight cryptography is still an option here.
  • 19. BOTNET A botnet is a network of systems combined together with the purpose of remotely taking control and distributing malware. Controlled by botnet operators via Command-and-Control- Servers (C&C Server), they are used by criminals on a grand scale for many things: stealing private information, exploiting online-banking data, DDos-attacks or for spam and phishing emails. With the rise of the IoT, many objects and devices are in danger of, or are already being part of, so called thingbots – a botnet that incorporates independent connected objects. Ex- It is easy for a smtp filter to stop malicious request from one client but not from a dozens or hundreds of client sending the malicious
  • 20. DOS/DDOS(DENIAL OF SERVICE) A denial of service (DoS) attack happens when a service that would usually work is unavailable. There can be many reasons for unavailability, but it usually refers to infrastructure that cannot cope due to capacity overload. In a Distributed Denial of Service (DDoS) attack, a large number of systems maliciously attack one target. This is often done through a botnet, where many devices are programmed (often unbeknownst to the owner) to request a service at the same time. (Often a DoS attack lends itself to hacktivists
  • 21. (MITM) ATTACK/ DATA AND IDENTITY THEFT The man-in-the-middle concept is where an attacker or hacker is looking to interrupt and breach communications between two separate systems. It can be a dangerous attack because it is one where the attacker secretly intercepts and transmits messages between two parties when they are under the belief that they are communicating directly with each other. As the attacker has the original communication, they can trick the recipient into thinking they are still getting a legitimate message. These attacks can be extremely dangerous in the IoT, because of the nature of the “things” being hacked. Ex- Many cases have already been reported
  • 22. BRUTE FORCE/DICTIONARY ATTACK (CLASSICS) These are probably the oldest type of automated attacks still used widely. Brute-force - Basically, the attempt to uncover the password is done by trying a wide variety of letter/number combinations to figure out what a password is so that an account can be taken over. Dictionary -On the flipside of things, dictionary attacks involve the hacker trying to determine your password by trying hundreds or sometimes
  • 23. CONCLUSION To conclude I would say that we still have a far way to go in securing the IOT infrastructure but some of the key things can be generalized for securing the IOT devices are: 1. IOT security design should enable an open, pervasive and interoperable yet secure infrastructure . 2. For the sake of privacy and security, IOT or smart devices must be capable of implementing indivual user set policies. 3. Infrastructural security services should be accessible transparently and regardless of the connection uses by nomadic smart IOT objects. “SECURITY IS A MYTH” – DEFCON 22
  • 24. REFERENCES: • DEFCON 22 : https://www.defcon.org/html/defcon-22/dc-22- index.html • LIGHTWEIGHT CRYPTOGRAPHY white paper : https://www.iab.org/wp-content/IAB- uploads/2011/03/Kaftan.pdf • IOT SECURITY : https://www.forbes.com/sites/gilpress/2017/03/20/6-hot- internet-of-things-iot-security-technologies/#7e7ad1c51b49 • HASH and ENCRYPTION white paper : http://repository.root- me.org/RFC/EN%20-%20rfc1321.txt (rfc1321) • SHA -1/2/3 white paper : http://repository.root- me.org/RFC/EN%20-%20rfc5754.txt (rfc5754)