Chapter 13 IoT Security Chapter

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Radio-frequency Identification (RFID)

(RFID) technology, which uses radio waves to identify items, is increasingly becoming an enabling technology for IoT. The main elements of an RFID system are tags and readers. RFID tags are small programmable devices used for object, animal, and human tracking. They come in a variety of shapes, sizes, functionalities, and costs. RFID readers acquire and sometimes rewrite information stored on RFID tags that come within operating range (a few inches up to several feet). Readers are usually connected to a computer system that records and formats the acquired information for further uses.

Confidentiality

A basic requirement for any secure communications system.

Sensor

A sensor measures some parameter of a physical, chemical, or biological entity and delivers an electronic signal proportional to the observed characteristic, either in the form of an analog voltage level or a digital signal. In both cases, the sensor output is typically input to a microcontroller or other management element.

Transceiver

A transceiver contains the electronics needed to transmit and receive data. Most IoT devices contain a wireless transceiver, capable of communication using Wi-Fi, ZigBee, or some other wireless scheme.

Actuator

An actuator receives an electronic signal from a controller and responds by interacting with its environment to produce an effect on some parameter of a physical, chemical, or biological entity.

Edge

At the edge of a typical enterprise network is a network of IoT-enabled devices, consisting of sensors and perhaps actuators. These devices may communicate with one another. For example, a cluster of sensors may all transmit their data to one sensor that aggregates the data to be collected by a higher-level entity. At this level, there may also be a number of gateways. A gateway interconnects the IoT-enabled devices with the higher-level communication networks. It performs the necessary translation between the protocols used in the communication networks and those used by devices. A gateway may also perform a basic data aggregation function.

A secure IoT framework that defines the components of a security facility for an IoT that encompasses all the levels, as shown in Figure 13.13. The four components are:

Authentication Authorization Network enforced policy Secure analytics, including visibility and control

Freshness

Because sensor nodes often stream time-varying measurements, providing guarantee of message freshness is an important property. There are two types of freshness: Strong and weak. MiniSec provides a mechanism to guarantee weak freshness, where a receiver can determine a partial ordering over received messages without a local reference time point.

Mutual authentication and authorization

Before a device (or an IoT user) can access the IoT, mutual authentication and authorization between the device (or the IoT user) and IoT is required to be performed according to predefined security policies.

IoT Security and Privacy Requirements Defined by ITU-T

Communication security Data management security Service provision security Integration of security policies and techniques Mutual authentication and authorization Security audit

Smart objects/embedded systems

Consists of sensors, actuators, and other embedded systems at the edge of the network. This is the most vulnerable part of an IoT. The devices may not be in a physically secure environment and may need to function for years. Availability is certainly an issue. Network managers also need to be concerned about the authenticity and integrity of the data generated by sensors and about protecting actuators and other smart devices from unauthorized use. Privacy and protection from eavesdropping may also be requirements.

Authorization

Controls a device's access throughout the network fabric. This element encompasses access control. Together with the authentication layer, it establishes the necessary parameters to enable the exchange of information between devices and between devices and application platforms and enables IoT-related services to be performed.

MiniSec is designed to meet the following requirements:

Data authentication Confidentiality Replay protection Freshness Low energy overhead Resilient to lost messages

Assessment

Determining whether data represent a threshold or alert; this could include redirecting data to additional destinations.

Data authentication

Enables a legitimate node to verify whether a message originated from another legitimate node (i.e., a node with which it shares a secret key) and was unchanged during transmission.

Network enforced policy

Encompasses all elements that route and transport endpoint traffic securely over the infrastructure, whether control, management, or actual data traffic.

Authentication

Encompasses the elements that initiate the determination of access by first identifying the IoT devices. In contrast to typical enterprise network devices, which may be identified by a human credential (e.g., username and password or token), the IoT endpoints must be fingerprinted by means that do not require human interaction. Such identifiers include RFID, x.509 certificates, or the MAC address of the endpoint.

Evaluation

Evaluating data for criteria as to whether it should be processed at a higher level.

Expanding/decoding

Handling cryptic data with additional context (such as the origin).

Fog

In many IoT deployments, massive amounts of data may be generated by a distributed network of sensors. The purpose of what is sometimes referred to as the edge computing level is to convert network data flows into information that is suitable for storage and higher-level processing. Processing elements at these levels may deal with high volumes of data and perform data transformation operations, resulting in the storage of much lower volumes of data. The following are examples of fog computing operations: Evaluation Formatting Expanding/decoding Assessment

With reference to the end systems supported, the Internet has gone through roughly four generations of deployment culminating in the IoT:

Information technology Operational technology (OT) Personal technology Sensor/actuator technology

Skipjack

It is one of the simplest and fastest block cipher algorithms, which is critical to embedded systems. A study of eight possible candidate algorithms for wireless security networks concluded that Skipjack was the best algorithm in terms of code memory, data memory, encryption/decryption efficiency, and key setup efficiency. Skipjack makes use of an 80-bit key. It was intended by NSA to provide a secure system once it became clear that DES, with only a 56-bit key, was vulnerable.

Operational technology (OT)

Machines/appliances with embedded IT built by non-IT companies, such as medical machinery, SCADA (supervisory control and data acquisition), process control, and kiosks, bought as appliances by enterprise OT people and primarily using wired connectivity.

Operating Modes

MiniSec has two operating modes: Unicast (MiniSec-U) and broadcast (MiniSec-B). Both schemes use OCB with a counter, known as a nonce, that is input along with the plaintext into the encryption algorithm. The least significant bits of the counter are also sent as plaintext to enable synchronization. For both modes, data are transmitted in packets. Each packet includes the encrypted data block, the OCB authentication tag, and the MiniSec counter.

Information technology

PCs, servers, routers, firewalls, and so on, bought as IT devices by enterprise IT people, primarily using wired connectivity.

Replay protection

Prevents an attacker from successfully recording a packet and replaying it at a later time.

Internet protocol protection

Protection of data in motion from eavesdropping and snooping is essential between all levels.

Role-based security

RBAC systems assign access rights to roles instead of individual users. In turn, users are assigned to different roles, either statically or dynamically, according to their responsibilities. RBAC enjoys widespread commercial use in cloud and enterprise systems and is a well-understood tool that can be used to manage access to IoT devices and the data they generate.

Distillation/reduction

Reducing and/or summarizing data to minimize the impact of data and traffic on the network and higher-level processing systems.

Formatting

Reformatting data for consistent higher-level processing.

Within this four-level architecture, the Cisco model defines four general security capabilities that span multiple levels:

Role-based security Anti-tamper and detection Data protection and confidentiality Internet protocol protection

Communication security

Secure, trusted, and privacy protected communication capability is required, so unauthorized access to the content of data can be prohibited, integrity of data can be guaranteed and privacy-related content of data can be protected during data transmission or transfer in IoT.

Data management security

Secure, trusted, and privacy protected data management capability is required, so unauthorized access to the content of data can be prohibited, integrity of data can be guaranteed, and privacy-related content of data can be protected when storing or processing data in IoT.

Service provision security

Secure, trusted, and privacy protected service provision capability is required, so unauthorized access to service and fraudulent service provision can be prohibited and privacy information related to IoT users can be protected.

Security audit

Security audit is required to be supported in IoT. Any data access or attempt to access IoT applications are required to be fully transparent, traceable and reproducible according to appropriate regulation and laws. In particular, IoT is required to support security audit for data transmission, storage, processing, and application access.

Components of IoT-enabled Things

Sensor Actuator Microcontroller Transceiver Radio-frequency Identification (RFID)

Sensor/actuator technology

Single-purpose devices bought by consumers, IT, and OT people, exclusively using wireless connectivity, generally of a single form, as part of larger systems

Cryptographic Algorithms

Skipjack The block cipher

An IoT Security Framework The IoT model is a simplified version of the World Forum IoT Reference Model. It consists of the following levels:

Smart objects/embedded systems Fog/edge network Core network Data center/cloud

Personal technology

Smartphones, tablets, and eBook readers bought as IT devices by consumers (employees), exclusively using wireless connectivity and often multiple forms of wireless connectivity.

Details specific security functions that the gateway should implement, some of which are illustrated in Figure 13.11. These consist of the following:

Support authentication with devices. Based on application requirements and device capabilities, it is required to support mutual or one-way authentication with devices. With one-way authentication, either the device authenticates itself to the gateway or the gateway authenticates itself to the device, but not both. Support mutual authentication with applications. Support the security of the data that are stored in devices and the gateway, or transferred between the gateway and devices, or transferred between the gateway and applications. Support the security of these data based on security levels. Support mechanisms to protect privacy for devices and the gateway. Support identification of each access to the connected devices. Support authentication with devices. Based on application requirements and device capabilities, it is required to support mutual or one-way authentication with devices. With one-way authentication, either the device authenticates itself to the gateway or the gateway authenticates itself to the device, but not both. Support mutual authentication with applications. Support the security of the data that are stored in devices and the gateway, or transferred between the gateway and devices, or transferred between the gateway and applications. Support the security of these data based on security levels. Support mechanisms to protect privacy for devices and the gateway.

Microcontroller

The "smart" in a smart device is provided by a deeply embedded microcontroller.

Integration of security policies and techniques

The ability to integrate different security policies and techniques is required, so as to ensure a consistent security control over the variety of devices and user networks in IoT.

Cloud

The cloud network provides storage and processing capabilities for the massive amounts of aggregated data that originate in IoT-enabled devices at the edge. Cloud servers also host the applications that (1) interact with and manage the IoT devices, and (2) analyze the IoT-generated data. Table 13.4 compares cloud and fog computing

Core network

The core network level provides data paths between network center platforms and the IoT devices. The security issues here are those confronted in traditional core networks. However, the vast number of endpoints to interact with and manage creates a substantial security burden.

Core

The core network, also referred to as a backbone network, connects geographically dispersed fog networks as well as provides access to other networks that are not part of the enterprise network

The Patching Vulnerability

The device manufacturers choose a chip based on price and features and do very little if anything to the chip software and firmware. Their focus is the functionality of the device itself. The end user may have no means of patching the system or, if so, little information about when and how to patch. The result is that the hundreds of millions of Internet-connected devices in the IoT are vulnerable to attack.

Resilient to lost messages

The relatively high occurrence of dropped packets in wireless sensor networks requires a design that can tolerate high message loss rates.

Data protection and confidentiality

These functions extend to all level of the architecture.

Secure analytics, including visibility and control

This component includes all the functions required for central management of IoT devices. This involves, firstly, visibility of IoT devices, which simply means that central management services are securely aware of the distributed IoT device collection, including identity and attributes of each device. Building on this visibility is the ability to exert control, including configuration, patch updates, and threat countermeasures

Anti-tamper and detection

This function is particularly important at the device and fog network levels but also extends to the core network level. All of these levels may involve components that are physically outside the area of the enterprise that is protected by physical security measures.

Low energy overhead

This is achieved by minimizing communication overhead and by using only symmetric encryption.

Data center/cloud

This level contains the application, data storage, and network management platforms. IoT does not introduce any new security issues at this level, other than the necessity of dealing with huge numbers of individual endpoints.

Fog/edge network

This level is concerned with the wired and wireless interconnection of IoT devices. In addition, a certain amount of data processing and consolidation may be done at this level. A key issue of concern is the wide variety of network technologies and protocols used by the various IoT devices and the need to develop and enforce a uniform security policy

An Open-source IoT Security Module

This section provides an overview of MiniSec, an open-source security module that is part of the TinyOS operating system. MiniSec has two operating modes, one tailored for single-source communication, and another tailored for multi-source broadcast communication. The latter does not require per-sender state for replay protection and thus scales to large networks.

The block cipher

mode of operation chosen for MiniSec is the Offset Codebook (OCB) mode. As mentioned in Chapter 2, a mode of operation must be specified when a plaintext source consists of multiple blocks of data to be encrypted with the same encryption key.


Ensembles d'études connexes

Chapter 3 - Database System and Big Data - Principles of Information Technology

View Set

Professional Behaviors / Professionalism NUR103-PrepU

View Set

Pathophysiology Ch. 8 Infection and Defects in Mechanisms of Defense

View Set

Fundamentals VSIM FINAL (ALL pre and post Q)

View Set

F**K STUDYING (swearing and taboo language)

View Set

Language Arts - Parts of Speech and Types of Phrases assignment

View Set

ACC 312 - Managerial Accounting Chapters 1-3

View Set

history chapter 19 online quizzes, Ch. 18 self check quizzes, history ch. 16 online quizzes

View Set

Hydrology and fluvial geomorphology

View Set

CLEP Marketing Practice Test 1& 2

View Set

Ch 2 Service characteristics of hospitality

View Set