Architectural Considerations in Smart Object Networking IAB RFC 7452. Dave Thaler Hannes Tschofenig Mary Barnes (moderator)



Similar documents
How to secure the Internet of Things?

Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

Internet of Things. Opportunities for device differentiation

UPnP Internet of Things Dec 2014

Who is Watching You? Video Conferencing Security

Thingsquare Technology

Steelcape Product Overview and Functional Description

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

What is Really Needed to Secure the Internet of Things?

The Internet of Things: Opportunities & Challenges

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

UNCLASSIFIED Version 1.0 May 2012

Atmel Crypto Elements Atmel Corporation

Towards the Web of Things

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015

Veracode White Paper The Internet of Things: Security Research Study. The Internet of Things: Security Research Study

Secure, Efficient, and Open Standard Internet of Things

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Device Management for Internet of Things Constrained Devices OMA Lightweight M2M. Duncan Purves Connect2 Systems

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Security Issues with Integrated Smart Buildings

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

In the pursuit of becoming smart

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

Installation and usage of SSL certificates: Your guide to getting it right

The Future of IoT. Zach Shelby VP Marketing, IoT Feb 3 rd, 2015

ARM mbed IoT Device Platform. November 3 rd, 2014

Key requirements for Interoperable IoT systems

8 Steps for Network Security Protection

8 Steps For Network Security Protection

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

UPnP Internet of Things

Future Directions for Internet of Things Work

IT Networking and Security

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

Questions from The New SensorTag - IoT Made Easy Webinar

WIND RIVER INTELLIGENT DEVICE PLATFORM XT

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Network Access Security. Lesson 10

Ranch Networks for Hosted Data Centers

Smart Cities are the Internet of Things

Short range low power wireless devices and Internet of Things (IoT)

Case Study for Layer 3 Authentication and Encryption

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Home Automation and Cybercrime

Security Goals Services

Short-range Low Power Wireless Devices and Internet of Things (IoT)

ASTRI s Internet-of-Things (IoT) Gateway and Management Platform

An introduction to Cryptosoft

Making Sense of Internet of Things Protocols and Implementations

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Reducing Configuration Complexity with Next Gen IoT Networks

CS5008: Internet Computing

Secure Network Communications FIPS Non Proprietary Security Policy

Cisco Virtual Office Express

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

WISE-4000 Series. WISE IoT Wireless I/O Modules

COSC 472 Network Security

What is Web Security? Motivation

Overview. SSL Cryptography Overview CHAPTER 1

SpiderCloud E-RAN Security Overview

Internet of Things based approach to Agriculture Monitoring

The Internet of Things: Risks in the Connected Home. Research Paper

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP

WHITE PAPER Security in M2M Communication What is secure enough?

PrivyLink Internet Application Security Environment *

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

Chapter 1: Introduction

Mobile and Embedded/IoT market Overview and Trends. June 2014

Secure web transactions system

ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

SSL BEST PRACTICES OVERVIEW

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Passing PCI Compliance How to Address the Application Security Mandates

Implementing the Application Control Engine Service Module

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

SSL VPN vs. IPSec VPN

CRYPTOGRAPHY AS A SERVICE

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

Security and the Internet of Things

RTX41xx. Wi-Fi Module

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

Transcription:

Architectural Considerations in Smart Object Networking IAB RFC 7452 Dave Thaler Hannes Tschofenig Mary Barnes (moderator) 1

Note: Slide contains embedded links and, depending how you view this slide deck, those may not work. The PPT file can be found at: https://iab.org/wp-content/iabuploads/2015/03/92plenary.pptx IETF 92 Technical Plenary 2

Some History Behind This Document A couple years ago, the IAB observed that: Many non-ip-based smart object devices are being made and used Various forums exist that defined profiles for non-ip-based devices Belief among some of them that IP is too heavyweight RFC 6574 (Smart Object Workshop Report), April 2012 recommended IAB develop architectural guidelines about how to use existing protocols It also pointed out some things for the IETF to address We wanted a document that explained to device engineers why/when IP should be used This RFC 7452 is the result Thanks to various IETF folks who provided great feedback 3

Meanwhile, much work happened in parallel IETF WGs (6LO, 6TiSCH, ACE, CORE, DICE, LWIG, ROLL, etc.) IRTF proposed Thing-to-Thing RG RFC 7228 Terminology for Constrained-Node Networks Three classes of constrained nodes, down to <<10KB memory/100kb code ZigBee Alliance created ZigBee IP that uses IPv6 and 6LoWPAN Bluetooth SIG and IETF worked on IPv6 over BTLE (Bluetooth Smart) IP-based alliances expanded (AllSeen, IPSO, OIC, OMA, Thread, etc.) And of course the hackers worked overtime too 4

Headlines IETF 92 Technical Plenary 5

What s so special about a smart object? There s many types of smart objects, so various answers might include: A. It s very constrained in some way (cost, power, memory, bandwidth, etc.) B. It interacts directly with physical world even when no user is around, and so potentially more dangerous C. It s physically accessible by untrusted people and so may be more vulnerable D. It s physically inaccessible by trusted people and has a long (5-40yr) lifespan 6

Smart Object Architecture Information & Data Models Schema for exposing device-specific properties/methods/notifications/etc. Software Stack Choice of protocols from app layer to link layer IETF typically focuses just on this layer Hardware Choice of radio/other technology (Wi-Fi, Bluetooth, IEEE 802.15.4, ) 7

Internet-connectedsmart objects are even harder Besides all of the other issues, there s Internet protocols to deal with Corresponding attacks to deal with More privacy issues to deal with (e.g., jurisdiction-specific legal requirements) 8

There s still tradeoffs of putting IP in smart objects App TCP/IP L2 vs. App L2 If you DO put IP in a smart object: You have to devote resources (code/memory/power) to it that might be desirable for other device functionality You have to worry about securing IP from the Internet If you DON T put IP in a smart object: You usually need an Application-Layer Gateway (ALG) deployed You might end up reinventing things IETF already did You can t leverage the large ecosystem of IP-based knowledge, tools, etc. 9

Four Common Communication Patterns 1. Device-to-device within same network 2. Device-to-cloud 3. Device-to-ALG (to cloud or another local network) 4. Back-end data sharing 10

Device-to-Device Pattern Device talks directly to another local device (often smart phone or a wearable) Security & trust often based on direct relationship between the devices (pairing) Rarely uses IP today but apps instead directly sit over link layer protocol Bluetooth, Z-Wave, ZigBee, Such forums often standardize device-specific data models Results in many orgs doing somewhat redundant work, with differing information models for the same type of device Smart Object Local Network Other Device

Examples StickNFind Suunto Ambit 3 Beacons Hearing Aid Parrot Cadence Sensor 12

Device-to-Cloud Pattern Device connects directly to some cloud service Allows users to access data/device from anywhere Requires choosing L2 already widely deployed, e.g. WiFi Many different config. bootstrap solutions exist today Often service and device are from same vendor Can lead to silos with proprietary protocols Device might become unusable if ASP goes away or changes hosting provider Standard protocols and/or open source can mitigate Application Service Provider Internet Local Network Smart Object 13

Examples Shut down this month Withings Scale LittlePrinter Tractive Dropcam 14

Device-to-ALG Pattern (1/2) Typically used in any of these cases: a) Uses L2 media not already ubiquitous (e.g., 802.15.4) b) Special local authentication/authorization is required c) Interoperability needed with legacy non-ip devices Often ALG and device are from same vendor Another common model is ALG in a smartphone Application Service Provider Internet Local Network Smart Object Other Device Local Network Local Network App- Layer Gateway 15

Device-to-ALG Pattern (2/2) ALG also allows integrating IPv6-only devices and legacy IPv4-only devices/apps/cloud services Cheaper and more reliable generic gateways more likely if devices use standard protocols not requiring an app-layer gateway Lack of standard data models for device types hampers this 16

Examples of ALGs NXP Janet-IP Philips Hue Nest SmartThings Revolv Smart Home Gateway 17

Example devices with phone as ALG Fitbit Zepp Golf Sensor Oral-B Toothbrush Garmin Forerunner 920XT 18

Back-end Data Sharing Pattern Data silos result from proprietary schemas Intentionally or simply due to lack of any standardization Many usage scenarios need data/devices from multiple sources Results in federated cloud services and/or (often RESTful) cloud APIs Standard protocols (HTTP, OAuth, etc.) help but are not sufficient Standardized information models generally outside scope of IETF 19

Example SmartThings service Cloud APIs DropCam service Internet IETF 92 Technical Plenary 20

Summary of Lack of Standardization Information/data models for various types of smart objects Often outside scope of IETF, except for general connectivity models There s lots of other forums in this space The nice thing about standards is that you have so many to choose from. Tanenbaum See also http://xkcd.com/927/ App-layer mechanism to configure Wi-Fi (etc) settings WiFi Alliance has WPS but not ubiquitously accepted Using browser with web server in device avoids need to standardize Still some desire for common mechanisms, but unclear where it best belongs Smart objects today often compete on time-to-market Standardization seen as too slow 21

Effect on End-to-End IAB RFC 1958: the goal is intelligence is end to end rather than hidden in the network But the smallest of constrained devices need proxies, gateways, or servers for Internet communication IAB RFC 3724: Requiring modification in the network typically more difficult than modifying end nodes But can be expensive to put a secure software update mechanism in a smart object 22

Total Cost of Ownership = + + Total Cost Hardware Cost Energy Cost Development Cost (amortized, inc. deployment cost) We care most about this. But it can make sense to spend more here (e.g., on flash/ram, CPU, BOM) if it results in savings here (e.g. sophisticated power management) and here. (e.g. firmware update, manageability) More detailed treatment of this topic in a webinarby Peter Aldworth about How to Select Hardware for Volume IoT Deployments?

Securing the Internet of Things Perform Classical Threat Analysis Which approach to take? Following Security Recommendations Learn from Attacks Follow Design Patterns IETF 92 Technical Plenary 24

Areas of Responsibility Examples of Problems Cryptographic Primitives Protocol Specifications and Architecture Implementation Deployment Improved algorithms for integer factorization, too small key size. No end-to-end security, complexity in specifications, insecure authentication protocols Buffer overflow attacks, poor UI or other usability problems, poor choice of hardware Enabled debug ports, missing deployment of security mechanisms Understanding the distributed nature of the development process is essential for tackling security problems. IETF 92 Technical Plenary 25

Security Recommendations (IETF) Key management:rfc 4107 discusses the trade-off between manual and automatic key managementand recommends the use of automatic key management. RFC 7258 argues that protocols should be designed such that they make Pervasive monitoring significantly more expensive or infeasible (such as by using opportunistic security - RFC 7435). draft-iab-crypto-alg-agilityargues for the ability to migrate from one algorithm to another over time (called Crypto Agility). Randomness requirements and key length recommendations subsequent slide Also available are protocol-specific recommendations Using TLS in Applications (uta) working group DTLS In Constrained Environments (dice) working group IETF 92 Technical Plenary 26

Randomness Requirements RFC 4086 Randomness Requirements for Security Security protocols frequently use random numbers for Nonces for use with authentication and to avoid replay protection Key transport Asymmetric key generation (e.g., ephemeral Diffie-Hellman key pairs) Signature algorithms based on El Gamal Unfortunately, most sources of randomness available at laptops and desktop PCs are not available at embedded systems. Startup clock time in nanosecond resolution, input events, disk access timings, IRQ timings. The danger is that there is little (to no) randomness in embedded systems, as observed by NadjaHeningeret al.and Kenneth Paterson et al. IETF 92 Technical Plenary 27

Key Length Requirements The chosen key length impacts security and performance. [I-D.ietf-uta-tls-bcp] recommends at least 112 bits symmetric keys. A 2013 ENISA report states that an 80bit symmetric key is sufficient for legacy applications but recommends 128 bits for new systems. ECC offers better performance than RSA for the same level of security taking over-the-wire bandwidth into account. For this reason, there is a preference for use of ECC with IoT protocols. IETF 92 Technical Plenary 28

Learn from Attacks Selected attacks to illustrate common problems: Limited software update mechanism Missing key management Inappropriate access control Missing communication security Vulnerability to physical attacks Don t forget to secure the server-side as well. According to the Open Web Application Security Project(OWASP) this is the #1 security vulnerability. IETF 92 Technical Plenary 29

Limited Software Update Mechanism In January 2014 Bruce Schneierpublished an articlewhere he expresses concerns about the lack of software update mechanisms in IoT deployments. In a presentationat the Chaos Communication Congress in December 2014 a security vulnerability of devices implementing the TR69 protocol, which also provides a software update mechanism, was disclosed. Real problem: Fix released in 2005 by AllegroSoftalready but has not been distributed along the value chain of chip manufacturers, gateway manufacturers, Internet service providers. What happens when vendors do not supportcertain products anymore? Do IoTdevices need a time-to-die / shelf-life? IETF 92 Technical Plenary 30

Missing Key Management Problem Example: LIFX- Internet connected light bulb The attackrevealed that an AES key shared among all devices to simplify key management. The firmware image was extracted via JTAG using a Bus Blaster. Then, the firmware was analyzed using IDA Pro. Mistakes only made by startups? See BMW ConnectedDrive IETF 92 Technical Plenary Pictures taken from http://contextis.co.uk/resources/blog/hacking-internet-connected-light-bulbs 31

Inappropriate Access Control Insecure default settings have caused problems with Insteon LED Bulbs, as reported in When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via The Internet Insteon LED Bulbs To find IoT devices connected to the Internet global scans have been used, for example, using ZMap. Similar problems have been seen with various other appliances, such as surveillance cameras, baby monitoring cameras and gas stations. Lacking access control to configuration files can cause problems for the entire system, as demonstrated with attacks against industrial control systems. IETF 92 Technical Plenary 32

Missing Communication Security In Green Lights Forever: Analyzing the Security of Traffic Infrastructure Ghena,et al. analyzed the security of the traffic infrastructure. Results: The wireless connections are unencryptedand the radios usefactory default usernames and passwords. All of the settings on the controller may be configured via the physical interface on the controller, but they may also be modified though the network. An FTP connection to the device allows access to a writable configuration database. This requires a username and password, but they are fixed to default values which are published online by the manufacturer. A similar attack also exploited the unencrypted communication. I even tested the attack launched from a drone flying at over 650 feet, and it worked! IETF 92 Technical Plenary 33

Vulnerability to Physical Attacks Physical access to IoTdevices introduces a wide range of additional attack possibilities. In some cases it might be necessary to extract keys contained on chip. This can be accomplished using power analysis, or fault injection (glitching) attacks. Tools for physical attacks decrease in cost and become easier to use. Important to keep these attacks in mind since we will see more of them in the future. JTAGulator Chip Whisperer IETF 92 Technical Plenary 34

Remarks Internet of Things security today is like PC security 20 years ago. Most attacks on consumer-oriented IoT systems fall under the script kiddie category. For industrial control systems many attacks are already scary (see DragonFly, and attack against German steel factory). Risk analysis is often complex since hacked devices may be used for further attacks. Hence, indirect consequences also need to be taken into account. Examples: DDoSattacks using SNMP (used in printers), hacked Femto home router used for spying IETF 92 Technical Plenary 35

Privacy RFC 6973 provides generic guidance that is also applicable to IoT protocol engineering. Privacy challenges with the deployment of IoTtechnologies arise, such as Quality of user consent, and Consequences of big data processing and inferences derived from data (such as behavioral pattern) See also Article 29 Working Party publication: "Opinion 8/2014 on the Recent Developments on the Internet of Things" from September 2014. IETF 92 Technical Plenary 36

Summary Re-use Internet security technologies: Use state-of-the-art key length Always use well-analysed security protocols. Use encryption to improve resistance against pervasive monitoring. Support automatic key management and per-device keys. Additional IoT relevant security aspects: Crypto agility is a hard decision and you need to think deeply about it. Integrate a software update mechanism and leave enough head room. Include a hardware-based random number generator. Threat analysis must take physical attacks into account. Use modern operating system conceptsto avoid system-wide compromise due to a single software bug. IETF 92 Technical Plenary 37