Architectural Considerations in Smart Object Networking
IAB RFC 7452 Dave Thaler Hannes Tschofenig Mary Barnes (moderator)
1
Architectural Considerations in Smart Object Networking IAB RFC - - PowerPoint PPT Presentation
Architectural Considerations in Smart Object Networking IAB RFC 7452 Dave Thaler Hannes Tschofenig Mary Barnes (moderator) 1 Note: Slide contains embedded links and, depending how you view this slide deck, those may not work. The PPT file
IAB RFC 7452 Dave Thaler Hannes Tschofenig Mary Barnes (moderator)
1
IETF 92 Technical Plenary 2
architectural guidelines about how to use existing protocols
3
4
IETF 92 Technical Plenary 5
include:
potentially more dangerous
vulnerable
6
7
Information & Data Models Software Stack Hardware
IETF typically focuses just on this layer
8
desirable for other device functionality
9
App TCP/IP L2 App L2 vs.
10
information models for the same type of device
Smart Object Local Network Other Device
Beacons Cadence Sensor Parrot Hearing Aid
StickNFind Suunto Ambit 3
12
13
Internet Application Service Provider Smart Object Local Network
changes hosting provider
LittlePrinter
Withings Scale Tractive Dropcam
14
15
a) Uses L2 media not already ubiquitous (e.g., 802.15.4) b) Special local authentication/authorization is required c) Interoperability needed with legacy non-IP devices
Internet Application Service Provider App- Layer Gateway Local Network Smart Object Local Network Other Device Local Network
16
and legacy IPv4-only devices/apps/cloud services
use standard protocols not requiring an app-layer gateway
Philips Hue
NXP Janet-IP SmartThings
Zepp Golf Sensor Oral-B Toothbrush Fitbit Garmin Forerunner 920XT
18
19
IETF 92 Technical Plenary 20
Internet SmartThings service DropCam service Cloud APIs
21
servers” for Internet communication
smart object
22
We care most about this.
Total Cost Hardware Cost Energy Cost +%
,!
… and here. (e.g. firmware update, manageability)
More detailed treatment of this topic in a webinar by Peter Aldworth about “How to Select Hardware for Volume IoT Deployments?”
Which approach to take?
.# .#
&%/#
24 IETF 92 Technical Plenary
Deployment Implementation Protocol Specifications and Architecture Cryptographic Primitives
,! , 11!2 !
33!
Understanding the distributed nature of the development process is essential for tackling security problems.
25 IETF 92 Technical Plenary
automatic key management and recommends the use of automatic key management.
Pervasive monitoring significantly more expensive or infeasible (such as by using opportunistic security - RFC 7435).
algorithm to another over time (called Crypto Agility).
subsequent slide
26 IETF 92 Technical Plenary
PCs are not available at embedded systems.
timings.
27 IETF 92 Technical Plenary
/ 501+111367783 #897:40#;93
378;3
4%%3#
113
28 IETF 92 Technical Plenary
According to the Open Web Application Security Project (OWASP) this is the #1 security vulnerability.
29 IETF 92 Technical Plenary
vulnerability of devices implementing the TR69 protocol, which also provides a software update mechanism, was disclosed.
along the value chain of chip manufacturers, gateway manufacturers, Internet service providers.
need a “time-to-die”/”shelf-life”?
30 IETF 92 Technical Plenary
about the lack of software update mechanisms in IoT deployments.
using IDA Pro.
Pictures taken from http://contextis.co.uk/resources/blog/hacking-internet-connected-light-bulbs
31 IETF 92 Technical Plenary
Insteon LED Bulbs
/0/ 033!2!
<$
33!
!33
. 3!
32 IETF 92 Technical Plenary
030
.4+3! =>?? @0#% ? A/ 0B
Ghena,et al. analyzed the security of the traffic infrastructure.
the radios use factory default usernames and passwords.”
via the physical interface on the controller, but they may also be modified though the network. An FTP connection to the device allows access to a writable configuration
they are fixed to default values which are published online by the manufacturer.”
33 IETF 92 Technical Plenary
wide range of additional attack possibilities.
keys contained on chip. This can be accomplished using power analysis, or fault injection (glitching) attacks.
become easier to use.
we will see more of them in the future.
Chip Whisperer JTAGulator
34 IETF 92 Technical Plenary
kiddie” category.
(see DragonFly, and attack against German steel factory).
further attacks. Hence, indirect consequences also need to be taken into account.
hacked Femto home router used for spying
35 IETF 92 Technical Plenary
protocol engineering.
such as
as behavioral pattern)
Recent Developments on the Internet of Things" from September 2014.
IETF 92 Technical Plenary 36
due to a single software bug.
37 IETF 92 Technical Plenary