SlideShare a Scribd company logo
Securing The IoT
Presented By: Guided By:
Moustafa Najm Dr. RASHMI RANJAN ROUT
NITW – CSE M.Tech
Roll No: 147509
Abstract
• The Internet of Things (IoT) is a computing concept that
describes a future internet where everyday physical objects
will be connected to the Internet making daily life easier.
• on the other hand there will be many security challenges
• This seminar gives overview about IoT, analyzes security
challenges and requirements in IoT, introduces IoT
communication stack for IoT and discusses different
mechanisms to secure communications in each protocol, as
well as limitations and some improvements and open
issues for future research.
Agenda
Overview of the Internet of Things
IoT security challenges
Securing the Internet of Things
Conclusion and summary
Firstly, does it matter?
Motivation
In 2011, the number of
“things” connected to
the Internet surpassed
the number of people
this year, there will be
25 billion connected
devices, and by 2020,
50 billion
By 2018, mobile data
traffic will exceed
fifteen Exabyte each
month.
by 2020, 90% of cars
will have an Internet
connection, less than
10% in 2013.
Yet we are still at the beginning
Motivation
The web search popularity, as measured by the Google search
What is the IoT
Place where machine to machine talk
Internet Evolving
IoT Applications
‘Botnets are already a major security concern and the emergence of “thingbots”
[things being gadgets] may make the situation much worse.’ David Knight, Proofpoint.
http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/
So what is different about IoT?
• The longevity of the device
– Updates are harder (or impossible)
• The size of the device
– Capabilities are limited – especially around crypto
• The fact there is a device
– Usually no UI for entering userids and passwords
• The data
– Often highly personal
IoT security requirements
– There can be many ways the system could be attacked:
– Capture data and messages
– Disabling the network availability
– Pushing erroneous data into the network
– Accessing personal information …
– Security is critical to any network and the first line of
defense against data corruption is cryptography.
• insider attacks ?!
IoT Security requirements
Security
Requirements
confidentialityprivacy
integrity
authentication
availability
nonrepudiation
protocol stack for the IoT
Communication protocols in the IoT
IEEE 802.15.4
Security in IEEE 802.15.4
Security in IEEE 802.15.4
• Efficient symmetric cryptography at hardware
Security in IEEE 802.15.4
– security is available only at the MAC layer
– Security as currently defined by IEEE 802.15.4 is optional
• Confidentiality:
– encryption using AES in the Counter (CTR) mode
• Data authenticity and integrity:
– employing AES in the Cipher Block Chaining (CBC) mode
• Confidentiality, data authenticity and integrity
– The CTR and CBC modes may be jointly employed using the
combined Counter with CBC-MAC AES/CCM encryption mode
Security in IEEE 802.15.4
• protection against message replay attacks
– The sender breaks the original packet into 16-byte blocks,
each block identified by its own block counter.
– each block is encrypted using a different nonce or
Initialization Vector (IV)
Security in IEEE 802.15.4
• Access control mechanisms
– the device stores an access control lists (ACL) with
max of 255 entries, each for particular destination
device.
– A default ACL entry may also be employed
Limitations of security with IEEE 802.15.4
• No keying model.
• The management of IV values
– if the same key is used in two or more ACL entries. it may
enable an adversary to recover plaintexts from cipher
texts.
• No adequate support for all keying models
– in particular group keying and network-shared keying.
• No protection for acknowledgment messages in
respect to integrity or confidentiality  DOS Attack
6LoWPAN
IPv6 over IEEE 802.15.4
6LowPAN Challenge
• Header Size Calculation. . .
127-25-40-8 = 54 octets left for application data!
– The challenges in 6LoWPAN environments are
related to the resource constraints of typical
wireless sensing platforms
• IPv6 MTU Requirements
– IPv6 requires that links support an MTU of 1280
octets
– Link-layer fragmentation / reassembly is needed
Security in 6LoWPAN
• No security mechanisms are currently defined
in 6LoWPAN
• a malicious or misconfigured node sending
forged, duplicate or overlapping fragments
– This is due to the lack of authentication at the
6LoWPAN adaptation layer.
Proposals for Security in 6LoWPAN
• Lightweight IPSec
– confidentiality, authentication and non-repudation
– Analysis:
• With compressed IPSec, packet size is similar to
802.15.4 while IPSec provides end-to-end security
• Space analysis show that AH and ESP consumes just
3.9KB and 9kB, respectively, for mandatory IPSec
Algorithms.
Proposals for Security in 6LoWPAN
• security against packet fragmentation attacks:
– Addition of a timestamp plus a nonce to the
6LoWPAN fragmentation header to support
security against unidirectional and bidirectional
fragment replays
– per-fragment sender authentication using hash
chains
Example of a content chain for a packet consisting of three fragments
RPL
IPv6 Routing Protocol for LLNs
Routing in RPL
• RPL builds Destination Oriented Directed Acyclic Graph
(DODAG) for each root. by accounting for link costs, node
attributes, and its respective objective function. The topology
is set up based on a rank metric.
RPL Control Messages
• DAG Information Object (DIO)
• DAG Information Solicitation (DIS)
• Destination Advertisement Object (DAO)
• Destination Advertisement Object ACK (DAO-ACK)
• Consistency Check (CC)
– Synchronization of counter values among communicating
nodes
– provide a basis for the protection against packet replay
attacks.
Security in RPL
• secure versions of the various routing control messages
• The high order bit of the RPL Code field identifies whether or not
security is applied
• Support of integrity and data authenticity:
– Confidentiality and Integrity: AES/CCM with 128-bit keys for MAC
– integrity and data authenticity : RSA with SHA-256
• LVL :allows varying levels of data authentication and, optionally, of
data confidentiality.
Security in RPL
• protection against packet replay attacks :
CC (Consistency Check ) messages are used
for synchronization of counter values among
communicating nodes.
Proposal for Security in RPL
• Protection of RPL routing operations against
falsified routing updates :
– a child may have malicious parent !
– Use a version and rank authentication security
scheme based on one-way hash chains providing
security against internal attackers
CoAP
Constrained Application Protocol
CoAP Security
• Define bindings to DTLS , with four security
modes:
– NoSec:
• no protocol-level security and DTLS is disabled
– PreSharedKey:
• PreShared Key(PSK)-based authentication is used.
• The device store list of keys, each key includes a list of nodes
– RawPublicKey:
• the device has an asymmetric key pair.
– Certificate:
• the device has an asymmetric key pair
• The X.509 certificate binds the public key
Evaluation 1
• Large memory footprint in ROM and RAM.
– Complexity of the DTLS handshake, i.e., many messages and states.
– Crypto suites require SHA-2 that is not available on hardware crypto co-
processor.
• Overhead due to lower layer per-packet protocol headers.
Evaluation 2
DTLS Improvement
• Avoiding Fragmentation Through Compression
• on average 15% less energy is used to transmit (and receive)
compressed packets
Conclusion
• With the nature of today’s computing, security is
becoming very critical for wide range of
applications.
• we have seen the requirements, issues, designs
and solutions of secure standard protocol design
to counter the different attacks.
• Several issues, however, still remain open to find
a solution to the problem of IoT security.
• By Complying with the security measures, the IoT
can fully improve daily aspects of our life.
References (1)
• Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva, “Security for the Internet of
Things: A Survey of Existing Protocols and Open Research issues”,
Communications Surveys & Tutorials, IEEE (Volume:PP , Issue: 99 ), Page(s):1,
2015.
• Charith Perera, Member, IEEE, Chi Harold Liu, Member, IEEE, Srimal Jayawardena,
Member, IEEE and Min Chen, Senior Member, IEEE ,”A Survey on Internet of
Things from Industrial Market Perspective” , Access, IEEE jornal, (Volume:2),
Page(s):1660 – 1679, 2015
• Sye Loong Keoh ,Kumar, S.S. ; Tschofenig, H.,”Securing the Internet of Things:A
Standardization Perspective”, Internet of Things Journal, IEEE (Volume:1,Issue: 3 ),
Page(s):265 - 275,2014.
• Christine Hennebert and Jessye Dos Santos,”Security Protocols and Privacy Issues
into 6LoWPAN Stack: A Synthesis”, IEEE INTERNET OF THINGS JOURNAL, VOL. 1,
NO. 5, Page(s):274–279, OCTOBER 2014.
• Yasin Nizami, Emiliano Garcia-Palacios.,”Internet of Things A Proposed Secured
Network Topology”, Irish Signals & Systems Conference 2014 and 2014 China-
Ireland International Conference on Information and Communications
Technologies (ISSC 2014/CIICT 2014). 25th IET,Page(s):274 - 279,2014.
References (2)
• Gurpreet Singh Matharu, Priyanka Upadhyay , Lalita Chaudhary ,”The Internet of
Things: Challenges & Security Issues” Emerging Technologies (ICET), 2014 International
Conference on,Page(s):54 - 59, 2014.
• Jayavardhana Gubbi, Rajkumar Buyyab, Slaven Marusic, Marimuthu Palaniswami,”
Internet of Things (IoT): A vision, architectural elements, and future directions”,Future
Generation Computer Systems jornal,Volume 29, Issue 7, Pages 1645–1660, September
2013.
• Raza, S. ,Shafagh, H. ; Hewage, K. ; Hummen, R. ”Lithe: Lightweight Secure CoAP for the
Internet of Things”, Sensors Journal, IEEE (Volume:13 , Issue: 10 ),Page(s):3711 - 3720,
2013
• Anass RGHIOUI , Mohammed BOUHORMA , Abderrahim BENSLIMANE ,”Analytical
study of security aspects in 6LoWPAN networks”, 2013 5th International Conference
on Information and Communication Technology for the Muslim World, Page(s):1 –
5,2013.
• Shahid Raza, Tony Chung, Simon Duquennoy, Dogan Yazar, Thiemo Voigt1, Utz Roedig
“Securing Internet of Things with Lightweight Ipsec”, SICS Technical Report,ISSN:1100-
3154, 2013
• Ren´e Hummen, Klaus Wehrle, “Standards-based End-to-End IP Security for the
Internet of Things”, Network Protocols (ICNP), 2013 21st IEEE International Conference,
Page(s):1 – 3, 2013.
Seminar V2

More Related Content

What's hot

BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat Security Conference
 
IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
IoT Malware: Comprehensive Survey, Analysis Framework and Case StudiesIoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
Priyanka Aash
 
Software Attacks on Hardware Wallets
Software Attacks on Hardware WalletsSoftware Attacks on Hardware Wallets
Software Attacks on Hardware Wallets
Riscure
 
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
FRSecure
 
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat Security Conference
 
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюNFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
Positive Hack Days
 
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & DefensesSecure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
Riscure
 
Riscure Assurance for Premium Content at a glance
Riscure Assurance for Premium Content at a glanceRiscure Assurance for Premium Content at a glance
Riscure Assurance for Premium Content at a glance
Riscure
 
Java Card Security
Java Card SecurityJava Card Security
Java Card Security
Riscure
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Positive Hack Days
 
Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...
Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...
Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...
Priyanka Aash
 
Bypassing Secure Boot using Fault Injection
Bypassing Secure Boot using Fault InjectionBypassing Secure Boot using Fault Injection
Bypassing Secure Boot using Fault Injection
Riscure
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Positive Hack Days
 
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
FRSecure
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
Paul Fremantle
 
CheapSCAte: Attacking IoT with less than $60
CheapSCAte: Attacking IoT with less than $60CheapSCAte: Attacking IoT with less than $60
CheapSCAte: Attacking IoT with less than $60
Riscure
 
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
Chase Schultz
 
Managing Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber SecurityManaging Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber Security
Priyanka Aash
 
Application layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A Survey
Adeel Ahmed
 
Cracking Into Embedded Devices - Hack in The Box Dubai 2008
Cracking Into Embedded Devices - Hack in The Box Dubai 2008Cracking Into Embedded Devices - Hack in The Box Dubai 2008
Cracking Into Embedded Devices - Hack in The Box Dubai 2008
guest642391
 

What's hot (20)

BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
 
IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
IoT Malware: Comprehensive Survey, Analysis Framework and Case StudiesIoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
 
Software Attacks on Hardware Wallets
Software Attacks on Hardware WalletsSoftware Attacks on Hardware Wallets
Software Attacks on Hardware Wallets
 
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
 
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
 
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюNFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
 
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & DefensesSecure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
 
Riscure Assurance for Premium Content at a glance
Riscure Assurance for Premium Content at a glanceRiscure Assurance for Premium Content at a glance
Riscure Assurance for Premium Content at a glance
 
Java Card Security
Java Card SecurityJava Card Security
Java Card Security
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...
Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...
Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...
 
Bypassing Secure Boot using Fault Injection
Bypassing Secure Boot using Fault InjectionBypassing Secure Boot using Fault Injection
Bypassing Secure Boot using Fault Injection
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
 
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
CheapSCAte: Attacking IoT with less than $60
CheapSCAte: Attacking IoT with less than $60CheapSCAte: Attacking IoT with less than $60
CheapSCAte: Attacking IoT with less than $60
 
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
 
Managing Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber SecurityManaging Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber Security
 
Application layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A Survey
 
Cracking Into Embedded Devices - Hack in The Box Dubai 2008
Cracking Into Embedded Devices - Hack in The Box Dubai 2008Cracking Into Embedded Devices - Hack in The Box Dubai 2008
Cracking Into Embedded Devices - Hack in The Box Dubai 2008
 

Similar to Seminar V2

Copy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfCopy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdf
Seynji
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
Dr. Shivashankar
 
IoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdfIoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdf
NadouShe
 
NetSim Webinar on IOT
NetSim Webinar on IOTNetSim Webinar on IOT
NetSim Webinar on IOT
KAVITHA IYER
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
Manikandan Kandasamy
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
Usman Arshad
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Brent Bernard, CISSP & PCI-QSA
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
Brent Bernard, CISSP & PCI-QSA
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
Austin Ross
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Brent Bernard, CISSP & PCI-QSA
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
AliSalman110
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
IAEME Publication
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
IAEME Publication
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
EditorJST
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
Alexander Decker
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
kamalakantas
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
Afna Crcs
 
Towards a Security-aware Network Virtualization
Towards a Security-aware Network VirtualizationTowards a Security-aware Network Virtualization
Towards a Security-aware Network Virtualization
Achim Friedland
 

Similar to Seminar V2 (20)

Copy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfCopy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
 
IoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdfIoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdf
 
NetSim Webinar on IOT
NetSim Webinar on IOTNetSim Webinar on IOT
NetSim Webinar on IOT
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
 
Towards a Security-aware Network Virtualization
Towards a Security-aware Network VirtualizationTowards a Security-aware Network Virtualization
Towards a Security-aware Network Virtualization
 

Seminar V2

  • 1. Securing The IoT Presented By: Guided By: Moustafa Najm Dr. RASHMI RANJAN ROUT NITW – CSE M.Tech Roll No: 147509
  • 2. Abstract • The Internet of Things (IoT) is a computing concept that describes a future internet where everyday physical objects will be connected to the Internet making daily life easier. • on the other hand there will be many security challenges • This seminar gives overview about IoT, analyzes security challenges and requirements in IoT, introduces IoT communication stack for IoT and discusses different mechanisms to secure communications in each protocol, as well as limitations and some improvements and open issues for future research.
  • 3. Agenda Overview of the Internet of Things IoT security challenges Securing the Internet of Things Conclusion and summary
  • 5.
  • 6. Motivation In 2011, the number of “things” connected to the Internet surpassed the number of people this year, there will be 25 billion connected devices, and by 2020, 50 billion By 2018, mobile data traffic will exceed fifteen Exabyte each month. by 2020, 90% of cars will have an Internet connection, less than 10% in 2013. Yet we are still at the beginning
  • 7. Motivation The web search popularity, as measured by the Google search
  • 8. What is the IoT Place where machine to machine talk
  • 11. ‘Botnets are already a major security concern and the emergence of “thingbots” [things being gadgets] may make the situation much worse.’ David Knight, Proofpoint.
  • 13.
  • 14. So what is different about IoT? • The longevity of the device – Updates are harder (or impossible) • The size of the device – Capabilities are limited – especially around crypto • The fact there is a device – Usually no UI for entering userids and passwords • The data – Often highly personal
  • 15. IoT security requirements – There can be many ways the system could be attacked: – Capture data and messages – Disabling the network availability – Pushing erroneous data into the network – Accessing personal information … – Security is critical to any network and the first line of defense against data corruption is cryptography. • insider attacks ?!
  • 17.
  • 18. protocol stack for the IoT Communication protocols in the IoT
  • 20. Security in IEEE 802.15.4
  • 21. Security in IEEE 802.15.4 • Efficient symmetric cryptography at hardware
  • 22. Security in IEEE 802.15.4 – security is available only at the MAC layer – Security as currently defined by IEEE 802.15.4 is optional • Confidentiality: – encryption using AES in the Counter (CTR) mode • Data authenticity and integrity: – employing AES in the Cipher Block Chaining (CBC) mode • Confidentiality, data authenticity and integrity – The CTR and CBC modes may be jointly employed using the combined Counter with CBC-MAC AES/CCM encryption mode
  • 23. Security in IEEE 802.15.4 • protection against message replay attacks – The sender breaks the original packet into 16-byte blocks, each block identified by its own block counter. – each block is encrypted using a different nonce or Initialization Vector (IV)
  • 24. Security in IEEE 802.15.4 • Access control mechanisms – the device stores an access control lists (ACL) with max of 255 entries, each for particular destination device. – A default ACL entry may also be employed
  • 25. Limitations of security with IEEE 802.15.4 • No keying model. • The management of IV values – if the same key is used in two or more ACL entries. it may enable an adversary to recover plaintexts from cipher texts. • No adequate support for all keying models – in particular group keying and network-shared keying. • No protection for acknowledgment messages in respect to integrity or confidentiality  DOS Attack
  • 27. 6LowPAN Challenge • Header Size Calculation. . . 127-25-40-8 = 54 octets left for application data! – The challenges in 6LoWPAN environments are related to the resource constraints of typical wireless sensing platforms • IPv6 MTU Requirements – IPv6 requires that links support an MTU of 1280 octets – Link-layer fragmentation / reassembly is needed
  • 28. Security in 6LoWPAN • No security mechanisms are currently defined in 6LoWPAN • a malicious or misconfigured node sending forged, duplicate or overlapping fragments – This is due to the lack of authentication at the 6LoWPAN adaptation layer.
  • 29. Proposals for Security in 6LoWPAN • Lightweight IPSec – confidentiality, authentication and non-repudation – Analysis: • With compressed IPSec, packet size is similar to 802.15.4 while IPSec provides end-to-end security • Space analysis show that AH and ESP consumes just 3.9KB and 9kB, respectively, for mandatory IPSec Algorithms.
  • 30. Proposals for Security in 6LoWPAN • security against packet fragmentation attacks: – Addition of a timestamp plus a nonce to the 6LoWPAN fragmentation header to support security against unidirectional and bidirectional fragment replays – per-fragment sender authentication using hash chains Example of a content chain for a packet consisting of three fragments
  • 32. Routing in RPL • RPL builds Destination Oriented Directed Acyclic Graph (DODAG) for each root. by accounting for link costs, node attributes, and its respective objective function. The topology is set up based on a rank metric.
  • 33. RPL Control Messages • DAG Information Object (DIO) • DAG Information Solicitation (DIS) • Destination Advertisement Object (DAO) • Destination Advertisement Object ACK (DAO-ACK) • Consistency Check (CC) – Synchronization of counter values among communicating nodes – provide a basis for the protection against packet replay attacks.
  • 34. Security in RPL • secure versions of the various routing control messages • The high order bit of the RPL Code field identifies whether or not security is applied • Support of integrity and data authenticity: – Confidentiality and Integrity: AES/CCM with 128-bit keys for MAC – integrity and data authenticity : RSA with SHA-256 • LVL :allows varying levels of data authentication and, optionally, of data confidentiality.
  • 35. Security in RPL • protection against packet replay attacks : CC (Consistency Check ) messages are used for synchronization of counter values among communicating nodes.
  • 36. Proposal for Security in RPL • Protection of RPL routing operations against falsified routing updates : – a child may have malicious parent ! – Use a version and rank authentication security scheme based on one-way hash chains providing security against internal attackers
  • 38.
  • 39. CoAP Security • Define bindings to DTLS , with four security modes: – NoSec: • no protocol-level security and DTLS is disabled – PreSharedKey: • PreShared Key(PSK)-based authentication is used. • The device store list of keys, each key includes a list of nodes – RawPublicKey: • the device has an asymmetric key pair. – Certificate: • the device has an asymmetric key pair • The X.509 certificate binds the public key
  • 40. Evaluation 1 • Large memory footprint in ROM and RAM. – Complexity of the DTLS handshake, i.e., many messages and states. – Crypto suites require SHA-2 that is not available on hardware crypto co- processor. • Overhead due to lower layer per-packet protocol headers.
  • 42. DTLS Improvement • Avoiding Fragmentation Through Compression • on average 15% less energy is used to transmit (and receive) compressed packets
  • 43. Conclusion • With the nature of today’s computing, security is becoming very critical for wide range of applications. • we have seen the requirements, issues, designs and solutions of secure standard protocol design to counter the different attacks. • Several issues, however, still remain open to find a solution to the problem of IoT security. • By Complying with the security measures, the IoT can fully improve daily aspects of our life.
  • 44. References (1) • Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva, “Security for the Internet of Things: A Survey of Existing Protocols and Open Research issues”, Communications Surveys & Tutorials, IEEE (Volume:PP , Issue: 99 ), Page(s):1, 2015. • Charith Perera, Member, IEEE, Chi Harold Liu, Member, IEEE, Srimal Jayawardena, Member, IEEE and Min Chen, Senior Member, IEEE ,”A Survey on Internet of Things from Industrial Market Perspective” , Access, IEEE jornal, (Volume:2), Page(s):1660 – 1679, 2015 • Sye Loong Keoh ,Kumar, S.S. ; Tschofenig, H.,”Securing the Internet of Things:A Standardization Perspective”, Internet of Things Journal, IEEE (Volume:1,Issue: 3 ), Page(s):265 - 275,2014. • Christine Hennebert and Jessye Dos Santos,”Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis”, IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, Page(s):274–279, OCTOBER 2014. • Yasin Nizami, Emiliano Garcia-Palacios.,”Internet of Things A Proposed Secured Network Topology”, Irish Signals & Systems Conference 2014 and 2014 China- Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014). 25th IET,Page(s):274 - 279,2014.
  • 45. References (2) • Gurpreet Singh Matharu, Priyanka Upadhyay , Lalita Chaudhary ,”The Internet of Things: Challenges & Security Issues” Emerging Technologies (ICET), 2014 International Conference on,Page(s):54 - 59, 2014. • Jayavardhana Gubbi, Rajkumar Buyyab, Slaven Marusic, Marimuthu Palaniswami,” Internet of Things (IoT): A vision, architectural elements, and future directions”,Future Generation Computer Systems jornal,Volume 29, Issue 7, Pages 1645–1660, September 2013. • Raza, S. ,Shafagh, H. ; Hewage, K. ; Hummen, R. ”Lithe: Lightweight Secure CoAP for the Internet of Things”, Sensors Journal, IEEE (Volume:13 , Issue: 10 ),Page(s):3711 - 3720, 2013 • Anass RGHIOUI , Mohammed BOUHORMA , Abderrahim BENSLIMANE ,”Analytical study of security aspects in 6LoWPAN networks”, 2013 5th International Conference on Information and Communication Technology for the Muslim World, Page(s):1 – 5,2013. • Shahid Raza, Tony Chung, Simon Duquennoy, Dogan Yazar, Thiemo Voigt1, Utz Roedig “Securing Internet of Things with Lightweight Ipsec”, SICS Technical Report,ISSN:1100- 3154, 2013 • Ren´e Hummen, Klaus Wehrle, “Standards-based End-to-End IP Security for the Internet of Things”, Network Protocols (ICNP), 2013 21st IEEE International Conference, Page(s):1 – 3, 2013.

Editor's Notes

  1. Recently Proofpoint, a leadin security service provider, claims that they identified a phishing attack launched by sending more than 750,000 spam emails using devices which are non-traditional IP devices like, smart TVs, smart refrigerators, IP cameras, etc.
  2. Security will be a major concern wherever networks are deployed at large scale.
  3. Adaptation Layer mapping fragmentation and reassembly header commpresion
  4. TSMP, an acronym for Time Synchronized Mesh Protocol, was developed by Dust Networks as a communications protocol for self-organizing networks of wireless devices called motes. TSMP devices stay synchronized to each other and communicate in timeslots, similar to other TDM (time-division multiplexing) systems. Such deterministic communication allows the devices to stay extremely low power, as the radios only turn on for the periods of scheduled communication. The protocol is designed to operate very reliably in a noisy environment. It uses channel hopping to avoid interference -- the packets between TSMP devices get sent on different radio channels depending on time of transmission. Digi International has also developed a time synchronized mesh protocol called DigiMesh. Dust Networks' underlying time synchronized mesh networking technology has been standardized by the HART Communications Foundation with the WirelessHART protocol, and the International Society of Automation ISA100 standard. Time synchronized mesh networking is marketed for applications that require reliability and ultra long battery life, typically measured in years. It is intended for the industrial market for manufacturing process monitoring and control.
  5. Adaptation Layer mapping fragmentation and reassembly header commpresion
  6. Adaptation Layer mapping fragmentation and reassembly header commpresion
  7. Adaptation Layer mapping fragmentation and reassembly header commpresion