27
SECURITY IN IoT (Internet of Things) PRESENTED BY:- RAMNEEK KAUR ME(CSE),Regular 152417 1

Security in IoT

  • Upload
    gr9293

  • View
    76

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Security in IoT

SECURITY IN IoT(Internet of Things)

PRESENTED BY:-RAMNEEK KAURME(CSE),Regular152417 1

Page 2: Security in IoT

CONTENTS• Internet of Things(IoT)• IoT Devices• IoT Technology• OWASP Top 10 Security issues in IoT• Security concerns• Wireless Sensor Network(WSN)• Attacks on WSN• Devices under Attack• Countermeasures• Future Scope• References 2

Page 3: Security in IoT

IoT diffusion-Forecast

• Welcome to the era of the Internet of Things (IoT), where digitally connected devices are encroaching on every aspect of our lives, including our homes, offices, cars and even our bodies.

• With the advent of IPv6 and Wi-Fi networks, IoT is growing at a dangerously fast pace, and researchers estimate that by 2020, the number of active wireless connected devices will exceed 50 billion.

3

Page 4: Security in IoT

IoT(Internet of Things)-Definition IoT refers to the network of physical, Identifiable, objects connected

via the internet, which can sense and communicate. It is Ubiquitous-means anywhere, anytime, anyway, anything and

anyhow (5 A’s). IoT includes concepts such as Wireless Sensor Networks(WSN) ,

Machine-to-machine(M2M) communication and Low power Wireless Personal Area Networks (LoWPAN) ,or technologies such as Radio-Frequency Identification(RFID).

4

Page 5: Security in IoT

IoT devices • Thermostat• smoke detector• Lockitron• Smart baby monitor• Philips Hue light bulb• Air Quality egg• Smart Body Analyzer• In Home Health Care

5

Page 6: Security in IoT

IoT Technology• Now that we all understand the IoT concept, it would be worthwhile

to deep dive in order to get familiar with the building blocks of IoT:

6

Page 7: Security in IoT

CONTINUE…1) Sensors & Sensor technology – They will sniff a wide variety of information ranging from Location, Weather/Environment conditions, data to Health essentials of a patient.

2) IoT Gateways – IoT Gateways , as the name rightly suggests, are the gateways to internet for all the things/devices that we want to interact with. Gateways help to bridge the internal network of sensor nodes with the external Internet or World Wide Web.

3) Cloud/server infrastructure & Big Data – The data transmitted through gateway is stored & processed securely within the cloud infrastructure using Big Data analytics engine. This processed data is then used to perform intelligent actions that make all our devices ‘Smart Devices’! 7

Page 8: Security in IoT

CONTINUE…4) End-user Mobile apps – The mobile apps will help end users to control & monitor their devices from remote locations.

5) IPv6 – IP addresses are the backbone to the entire IoT ecosystem. Internet.• With IPv4 we were running out of IP addresses, but with IPv6

(launched in 2012) we now have 3.4*10^38 IP addresses!

8

Page 9: Security in IoT

Key Challenges of IoT• Availability• Architecture• Reliability• Mobility• Performance• Management• Scalability• Security & Privacy

-Security and Privacy is a significant challenge due to lack of common standards and architecture for IoT security.

9

Page 10: Security in IoT

OWASP Top 10 1. Insecure Web Interface2. Insufficient Authentication/Authorization3. Insecure Network Services4. Lack of Transport Encryption5. Privacy Concerns6. Insecure Cloud Interface7. Insecure Mobile Interface8. Insufficient Security Configurability9. Insecure Software/Firmware10. Poor Physical Security

10

Page 11: Security in IoT

IoT security concerns1. Privacy Concerns: 90 percent of devices collected at least one piece of personal information via the device, the cloud or the device’s mobile application. • information like name, address, date of birth or even health and

credit card information.

2. Insufficient Authentication/Authorization: 80 percent users and devices rely on weak and simple passwords and authorizations.

3. Transport Encryption: 70 percent of devices used unencrypted network services. Transport encryption will be crucial as most of the devices are transmitting data that most people would consider crucial. 11

Page 12: Security in IoT

IoT security concerns

4. Web Interface: 60 percent raised security concerns with their user interfaces. These issues included:• persistent cross-site scripting, poor session management and

weak default credentials. • From this, hackers were able to identify valid user accounts

and take them over using things like password reset features.

5. Insecure Software: 60 percent did not use encryption when downloading software updates.

12

Page 13: Security in IoT

Wireless Sensor Network(WSN)-• Wireless sensor networks (WSN), sometimes called wireless

sensor and actuator networks (WSAN)

• The topology of the WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network.

• The propagation technique between the hops of the network can be routing or flooding.

• Wireless Sensor Networks (WSNs) are playing more and more a key role in several application scenarios such as healthcare, agriculture, environment monitoring, and smart metering. 13

Page 14: Security in IoT

WSN- Architecture

14

Page 15: Security in IoT

WSNs are Vulnerable to various types of Attacks

15

Page 16: Security in IoT

Attack Models• Eavesdropping: an attacker intercepts packets transmitted over the air

for further cryptanalysis or traffic analysis.• Traffic analysis: allows an attacker to determine that there is

activity in the network, the location of the BSs, and the type of protocols being used.

• Message injection: an adversary injects bogus control information into the data stream.

• Message modification: a previously captured message is modified before being retransmitted

• Node capture: An embedded device is considered being compromised when an attacker, through various means, gains control to the node itself.

• Denial-of-Service (DoS) attacks: can be grouped into two categories Service degradation (e.g., collision attack), and Service disablement through power exhaustion (e.g. jamming)

16

Page 17: Security in IoT

Layer-based attack categorization

17

Page 18: Security in IoT

Attacks in Wireless Sensor Networks• Selective forwarding• Acknowledgement spoofing• Wormhole Attack• Sinkhole Attack• Helloflood Attack• Sybil Attack

18

Page 19: Security in IoT

• Selective forwarding: A malicious node refuses to forward all or a subset of the packets it receives and simply drops them. If a malicious node drops all the packets, the attack is then called black hole.

• Acknowledgement spoofing: Spoof link layer acknowledgements(ACKs) to trick other nodes to believe that a link or node is either dead or alive.

Attacks in Wireless Sensor Networks

19

Page 20: Security in IoT

Wormhole and Sinkhole Attacks• In Wormhole the attacker tunnels the packets received at one location of the network and replays them in another location.• In Sinkhole node tries to attract network traffic by advertise its fake routing update. • launch other attacks like :selective forwarding attackacknowledge spoofing attack

Wormhole Link

20

Page 21: Security in IoT

HELLO Flood Attack• Every new node broadcasts “Hello messages” to find its

neighbors. Also, it broadcasts its route to the BS.• Attacker with a high radio transmission range and processing

power sends HELLO packets to number of sensor nodes.• Sensors are thus persuaded that the attacker is their neighbor.• Victim nodes try to go through the attacker.

21

Page 22: Security in IoT

Sybil Attack

•“a malicious node illegitimately claims multiple identities”•The Sybil attack can disrupt geographic and multi-path routing protocols.

Adversary A at actual location (3,2) forges location advertisements for non-existent nodes A1, A2, and A3 as well as advertising her own location. After hearing these advertisements, if B wants to send amessage to C: (0,2), it will attempt to do so through A3. This transmission can be overheard and handled by the adversary A.

22

Page 23: Security in IoT

Devices under Attack• Smart Watch: Data sent between the Smart watch and an

Android mobile phone could be intercepted.• Bluetooth communication between most Smart watches and

Android devices relies on a six digits PIN.• Easy to crack with a brute-force attack.

• Smart Homes• Smart Cars• and many more….

23

Page 24: Security in IoT

Overview of Countermeasures• Confidentiality is provided through the use of encryption

technologies. Cryptographic algorithms such as the DES, RSA are used to protect the secrecy of a message.

• MAC (Message Authentication Code) or Digital Signature Algorithms(DSA) can be used to assure the recipient’s integrity of the data and authenticity of the message

• Digital Signatures can be used to ensure non-repudiation.• Availability can be achieved by adding redundant nodes. Multi

path and probabilistic routing can also be used to minimize the impact of unavailability.

• Data freshness is ensured by adding a counter value in each message. 24

Page 25: Security in IoT

Future Scope• Identify vulnerabilities (e.g. replay attacks) in the proposed

authentication method and find solutions to them before implementation.

• Further research and implementation of key exchanges together with security protocols for IP-communication in constrained networks.

• Lot of work can be done in this field as no efficient security architecture for IoT is given yet.

25

Page 26: Security in IoT

References• G. Padmavathi, D. Shanmugapriya,“A Survey of Attacks, Security

Mechanisms and Challenges in Wireless Sensor Networks”, International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA

• https://en.wikipedia.org/wiki/Internet_of_Things• https://www.owasp.org/index.php/

OWASP_Internet_of_Things_Project• http://

www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.html

26

Page 27: Security in IoT

27