IOT SECURITY SOFTWARE SOLUTIONS DANNY DE COCK 22 September 2015 - - PowerPoint PPT Presentation

iot security software solutions danny de cock
SMART_READER_LITE
LIVE PREVIEW

IOT SECURITY SOFTWARE SOLUTIONS DANNY DE COCK 22 September 2015 - - PowerPoint PPT Presentation

IOT SECURITY SOFTWARE SOLUTIONS DANNY DE COCK 22 September 2015 SENIOR RESEARCHER HTTP://GODOT.BE/SLIDES STANDARD CRYPTO-TECHNICAL CONSIDERATIONS IOT = big data, focused on functionality, not security Security is afterthought Each


slide-1
SLIDE 1

22 September 2015

IOT SECURITY SOFTWARE SOLUTIONS DANNY DE COCK

SENIOR RESEARCHER

HTTP://GODOT.BE/SLIDES

slide-2
SLIDE 2

 IOT = big data, focused on functionality, not security

  • Security is afterthought
  • Each family of devices works in its own silo, aggregation rather than integration

 User data, preferences, behavior stored in the cloud

  • Who manages the cloud, who is it and where can you find them?
  • Devices push data out automatically to meet user expectations and convenience
  • Location privacy, behavior patterns, backups, contact lists
  • No transparency to end-user wrt access to company/private data

 Authentication, confidentiality and authorization problems

  • Low power = lightweight communications and security protocols
  • Silo-based management of keys, preferences, access control settings…

STANDARD CRYPTO-TECHNICAL CONSIDERATIONS

22/09/2015 2

slide-3
SLIDE 3

 IoT device not different from any other IT device

  • Communicates with its surroundings
  • Firmware, operating system, applications, application data, user data, configurations

 What makes IoT different

  • Restrained resources
  • Not continuously online
  • Many different versions in the field
  • Very short time-to-market
  • Users are Guiney pigs rather than users of well tested devices
  • High number of devices compete for limited network resources
  • Wifi, Bluetooth, ZigBee, Z-Wave…
  • Operation conditions are complex and fragile
  • Just too many devices and more are coming 

SO, WHAT IS THE PROBLEM? 

22/09/2015 3

slide-4
SLIDE 4

22/09/2015 Slide 4

‘‘OUR SYSTEM IS SECURE: WE USE THE AES’’

What about

  • Key management & life cycle
  • ‘‘Random’’ keys?
  • Authenticated (?) key agreement
  • Implementation
  • Modes of encryption, initialization vectors,…
  • Attacking the implementation

Who holds the keys?

  • Who can use the keys?
  • Stored in the clear?
  • Key archives?
slide-5
SLIDE 5

Focus on

  • Functionality – better & earlier than the competition
  • Commercial interest – user is no longer owner of its data

Struggle with

  • Reliability of the devices
  • Stability of the applications
  • Interoperability with other devices

HIGH-LEVEL RISKS (1/2)

22/09/2015 5

slide-6
SLIDE 6

 Forget/ignore/neglect

  • Privacy related issues
  • Collecting all possible data without informing users correctly and beforehand
  • Inappropriate use of information `it is available anyhow, so why not use it?`
  • Integrity protection of data transferred and stored
  • Access control to IoT device, online services, user data, configuration data…

 Happy when it works

  • Do not touch/reconfigure a working system 
  • Limited management of keys, algorithms, protocols, credentials…
  • Backward compatibility constricts deployment of secure environments

HIGH-LEVEL RISKS (2/2)

22/09/2015 6

slide-7
SLIDE 7

 Networked devices

  • Automated data push to the cloud – sensor states, control statuses, user data…
  • Frequent system updates and upgrades
  • Flooding off the shelve (home) wireless access points
  • Lower-power Bluetooth, ZigBee… hubs

 Devices get controlled remotely – who controls what?

  • Botnet-inspired command and controlled push of commands from the Cloud
  • ET phones home: fetch instructions from mother station

IT’S ALIVE! AND WE LOST IT!

22/09/2015 7

slide-8
SLIDE 8

 Third party’s benefit

  • Hacking/infecting remote control points
  • Very similar to botnet activities
  • Compromised meta-controller, e.g.,
  • Can provide full access to critical control points
  • Enables perfect burglary
  • Break-in & entry without signs of break-in!
  • Compromised device manufacturer’s control points
  • Alien firmware, Trojan behavior of *all* devices

 Self-benefit

  • Current state of the art allows fabrication of alibi 
  • Fake presence at home
  • Mimic normal behavior remotely

REAL DANGER – OPEN SESAME

Disclaimer: not claiming the pictured items/service providers have been compromised already  Images: http://www.sevenoaksart.co.uk

22/09/2015 8

slide-9
SLIDE 9

 During design of IoT devices and services:

  • Enable & use robust version and update control from the initial start:
  • Firmware, operating system, application, application modules, device drivers
  • Key material, set of trusted references: keys, certificates
  • Avoid transporting and saving plaintext data to the cloud
  • Enable decent user and system authentication & authorization
  • Special focus on user friendliness & user convenience
  • Similar to TPM initialization: master and normal user

 Good system design relies on embedded security

  • Simplifies security issues: no add-on

 During use:

  • Guarantee interoperability with older versions
  • Discard support of older versions when *ALL* older versions have upgraded
  • Inform users correctly and completely when changing data collection policy

WHAT TO DO ABOUT IT? (DESIGN/DEVELOP VIEW)

22/09/2015 9

slide-10
SLIDE 10

 Apply well known network segregation:

  • Demilitarized zones & self-controlled security gateways!

 During configuration of intelligent devices

  • Prepare separate networks from normal network with Internet access
  • Use different settings to initialize/configure devices/services and to use

devices/services

 After configuration

  • Disable Internet access of critical intelligent devices – power consumers, physical &

logical entry points

  • Disable automated update functionality to avoid unwanted/uncontrolled service

disruption

WHAT TO DO ABOUT IT? (USER VIEW)

22/09/2015 10

slide-11
SLIDE 11

22/09/2015 11

Use of Today’s IoT devices provide

  • No privacy guarantees whatsoever
  • Fake belief you are in control
  • New business opportunities for
  • IoT system aggregators
  • IoT system installers and configurators

About home automation

  • Not to be used for safety and security critical systems 

CLOSING REMARKS

slide-12
SLIDE 12

 Contact details:

  • Email: Danny.DeCock@esat.kuleuven.be
  • Slides: http://godot.be/slides

QUESTIONS?

22/09/2015 12

slide-13
SLIDE 13

22/09/2015 Slide 13

GOOD PRACTICES

 Centralize security knowledge in software architects and application designers

  • Implementers should not have to make delicate security decisions
  • Cryptographic algorithms and protocols should be considered as modular building

blocks

  • Consistent deployment of a security vision saves time and money
  • Security expertise concentrated in a few of the most trusted members of the

development organization

  • Allows for better depth of knowledge
  • Results in more effective and secure results

 Good initial security design avoids hard to solve security issues

  • Security patches do not deal with inherent design flaws
  • Simple design is easily understandable/testable/auditable
slide-14
SLIDE 14

22/09/2015 Slide 14

TH@NK YOU! ANY QUESTIONS?