Internet of Things Security
A Survey by Avi Webberman
Internet of Things Security A Survey by Avi Webberman Outline What - - PowerPoint PPT Presentation
Internet of Things Security A Survey by Avi Webberman Outline What is the Internet of Things (IoT)? Why is IoT Security so Important? Dyn DDOS Attack What are the security challenges of an IoT network? A Proposed Taxonomy
A Survey by Avi Webberman
communicate with each other to accomplish a goal
○ Healthcare ○ Supply-Chain ○ Transportation ○ Resource Management ○ Home Automation ○ Environmental Monitoring
protected by common factory default passwords
○ Hardware-efficient stream cipher (a type of symmetric key cipher) with 128-bit key ○ Uses 96-bit Initialization Vector (IV) to prevent patterns in encryption ○ Generates Message Authentication Code (improvement from Grain-128)
Frame Control Seq # Destination Address Source Address Auxiliary Security Header Payload CRC
Frame Control field is set to indicate that frame is black (encrypted)
Frame Control Initialization Vector Encrypted Message MIC CRC
Encrypted with Grain-128a Cipher
○ Separate control plane from data plane ○ Uses centralized SDN controller that manages routing by sending ‘Flow Tables’ to nodes
network
○ Sensor OpenFlow for wireless sensors networks ■ Simple flow tables, duty cycle handling ○ Ubiflow for large, heterogenous networks (ex. Smart cities) ■ Distributed SDN controllers
if unauthorized person gains access
○ Privacy (clandestine tracking/inventorying) ■ “Killing” and “Sleeping” ■ Rotating Pseudonyms ■ Distance Measurement ○ Authentication (unwanted cloning of tags) ■ Not really a lot of options right now ■ Can store evidence that two tags scanned simultaneously ■ Use “Kill” PIN to authenticate tag to reader
○ Privacy ■ Key search
1. Tag sends encrypted nonce 2. Reader searches through all keys to find one that returns nonce
○ Authentication ■ Challenge-response protocol (Tag Ti and key Ki)
1. Tag identifies itself by transmitting Ti 2. Reader generates random nonce (R) and transmits to tag 3. Tag computes hash H = h(Ki, R) and transmits H 4. Reader verifies that H = h(Ki,R)
■ Still issue of relay attacks
context
could prevent serious attacks
helpful
part needs more exploration
more expensive) along with risk of relay attacks
Application Security Risks Security Challenges Security Vulnerabilities