IoT Security in Action! Julien Vermillard , Sierra Wireless @vrmvrm - - PowerPoint PPT Presentation

iot security in action
SMART_READER_LITE
LIVE PREVIEW

IoT Security in Action! Julien Vermillard , Sierra Wireless @vrmvrm - - PowerPoint PPT Presentation

IoT Security in Action! Julien Vermillard , Sierra Wireless @vrmvrm - jvermillard@sierrawireless.com EclipseCON EU 2016 Introduction Managing connected devices Why it is simple to exploit non-secured systems How simple to have the minimum


slide-1
SLIDE 1

IoT Security in Action!

Julien Vermillard, Sierra Wireless @vrmvrm - jvermillard@sierrawireless.com EclipseCON EU 2016

slide-2
SLIDE 2

Introduction

slide-3
SLIDE 3

Managing connected devices

Why it is simple to exploit non-secured systems How simple to have the minimum security

slide-4
SLIDE 4

Network security

slide-5
SLIDE 5

Deep dive: demo setup

IoT Device (MangOH) Attacker Internet Gateway (Linux PC) Local network Internet

slide-6
SLIDE 6

Man-in-the-Middle?

IoT Device (MangOH) Attacker PC Linux Ettercap Internet Gateway (Linux PC) Local network Internet

slide-7
SLIDE 7

Before attack

IoT Device (RaspberryPI) Attacker PC Linux Ettercap Internet Gateway (Linux PC) Local network Internet Traffic to Internet

slide-8
SLIDE 8

ARP poisoning

IoT Device (MangOH) Attacker PC Linux Ettercap Internet Gateway (Linux PC) Local network Internet

I’m the gateway!

Route everything to the gateway Traffic to Internet

slide-9
SLIDE 9

DNS spoofing

IoT Device (MangOH) Attacker PC Linux Ettercap Internet Gateway (Linux PC) Local network Internet

Fake DNS response DNS query iot.eclipse.org

LWM2M connection

slide-10
SLIDE 10

With TLS/DTLS?

IoT Device (RaspberryPI) Attacker PC Linux Ettercap Internet Gateway (Linux PC) Local network Internet

Fake DNS response DNS query iot.eclipse.org

DTLS handshake failure

slide-11
SLIDE 11

Security with gateways

Sensor network (ex: Zigbee) Gateway: collect data and push to cloud cable, 4G, etc..

Secure transport Low or no security

public network

slide-12
SLIDE 12

Security with gateways

public network Sensor network (ex: Zigbee) cable, 4G, etc.. Attack gateway get access to all the network Local wireless sniffing

slide-13
SLIDE 13

End-to-end security

public network

Low power nodes: security starts here

Sensor network (ex: Thread) Router cable, 4G, etc.. See only encrypted communication Not your Achilles’ heel

slide-14
SLIDE 14

Other benefits of IP to the edge device

Simplicity: only IP networks Topology flexibility compared to gateway Scaling IP routing is something well known

slide-15
SLIDE 15

Can we trust wireless network?

Wifi password? GPRS encryption? 3G/4G femtocell? Zigbee? Bluetooth? Not talking of plain text wireless network :)

slide-16
SLIDE 16

Example: GPRS

https://discourse.criticalengineering.org/t/howto-gsm-base-station-with-the-bea glebone-black-debian-gnu-linux-and-a-usrp/56

slide-17
SLIDE 17

Example: 3G/4G femtocell

http://www.ioactive.com/pdfs/IOActive_Remote_Car_Hacking.pdf

slide-18
SLIDE 18

Key Management

slide-19
SLIDE 19

Key management

You will have a fleet of device They needs secrets (key, password, etc..) Unique across devices You need to be able to change those secrets You will probably don’t trust your factory

slide-20
SLIDE 20

Lightweight M2M Bootstrap

Flash bootstrap credentials

slide-21
SLIDE 21

I only have bootstrap credentials or I can’t reach final server

Lightweight M2M Bootstrap

slide-22
SLIDE 22

Lightweight M2M Bootstrap

Give me key and my server(s) Bootstrap Server

slide-23
SLIDE 23

Lightweight M2M Bootstrap

New keys and server(s) URLs and ACL Bootstrap Server

slide-24
SLIDE 24

Lightweight M2M Bootstrap

Registration Bootstrap Server Registration Home Automation Server Device Manag. Server

slide-25
SLIDE 25

Secret key rotation using bootstrap?

Renew or upgrade your secret: 1 - Device authenticate with the bootstrap server 2 - Bootstrap server rewrite the bootstrap secret Next bootstrap the device use the new bootstrap secrets

slide-26
SLIDE 26

Public Key Infrastructure?

Root CA Intermediate CA End entity 1 End entity 2 End entity3

slide-27
SLIDE 27

How to verify a certificate

Root trust Identity to verify Intermediate Issuer Signature Expiration ~3 y Public Key Issuer Identity Issuer Signature Expiration ~5 y Public Key Issuer Identity Root Signature Root CA Identity Root Public Key Find Verify Find Verify Identity Identity

slide-28
SLIDE 28

Enrollment with PKI

Generate Private Public

slide-29
SLIDE 29

Enrollment with PKI

Private Public Certification Authority Certificate Request

slide-30
SLIDE 30

Enrollment with PKI

Generate Private Public Certification Authority Certificate CA Private Sign using CA private key a X.509 certificate

slide-31
SLIDE 31

Enrollment with PKI

Generate Private Public Service CA Public Sign using certificate for authentication

slide-32
SLIDE 32

Still not IoT friendly

A lot of enterprise protocols: IKE: Internet Key Exchange

RFC2409

CMP: Certificate Management Protocol RFC4210 SCEP: Simple Certificate Enrollment Protocol

draft-gutmann-scep-02

EST: Enrollment Over Secure Transport

RFC7030

IEEE 802.1AR: Secure Device Identity 802.1AR But still nothing ready to use for constrained networks & devices

slide-33
SLIDE 33

Firmware download

slide-34
SLIDE 34

Firmware download

IoT Device (RaspberryPI) Attacker PC Linux Ettercap Internet Gateway (Linux PC) Local network Internet

Send firmware with backdoor HTTP GET

slide-35
SLIDE 35

CMS (Cryptograpic Message Syntax)

See RFC5652 (replaces PKCS #7) Used to digitally sign, digest, authenticate, or encrypt arbitrary message content. Supported by OpenSSL (CLI: openssl cms)

slide-36
SLIDE 36

Secure boot

Hardware (ROM) enforces booting only correctly signed code Often based on ECDSA signature Hardware based ⇒ no algorithm agility

slide-37
SLIDE 37

Open-source solutions are there

Eclipse IoT: Leshan, Wakaama, TinyDTLS, Scandium, Paho, Mosquitto, Hono OpenSSL, Mbed TLS CFSSL GnuPG U-Boot

slide-38
SLIDE 38

Thanks!

Twitter: @vrmvrm Mail: jvermillard@sierrawireless.com

slide-39
SLIDE 39

Credits

Tom Medley - The Noun Project Guilhem - The Noun Project Giuditta Valentina Gentile - The Noun Project Sergey Krivoy - The Noun Project Jon Anderson - The Noun Project Ryan Beck - The Noun Project Edward Boatman - The Noun Project