How To Secure The Internet Of Things



Similar documents
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

An Overview of ZigBee Networks

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Client Server Registration Protocol

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Securing Distribution Automation

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Embedded Java & Secure Element for high security in IoT systems

TLS and SRTP for Skype Connect. Technical Datasheet

Bit Chat: A Peer-to-Peer Instant Messenger

APIs The Next Hacker Target Or a Business and Security Opportunity?

Lightweight Security using Identity-Based Encryption Guido Appenzeller

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Network Access Control and Cloud Security

ZigBee Security. Robert Cragie Chair, ZigBee Alliance ZARC Securit y Task Group Principal Engineer, Jennic Ltd.

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Side Channel Analysis and Embedded Systems Impact and Countermeasures

An Introduction to Cryptography as Applied to the Smart Grid

Network Security Part II: Standards

Network Access Control and Cloud Security

Chapter 6 CDMA/802.11i

Information Security Basic Concepts

Savitribai Phule Pune University

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Chapter 10. Network Security

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Content Teaching Academy at James Madison University

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Firewalls, Tunnels, and Network Intrusion Detection

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

Threat Model for Software Reconfigurable Communications Systems

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Single Sign-On Secure Authentication Password Mechanism

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Cornerstones of Security

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

CS 356 Lecture 29 Wireless Security. Spring 2013

EXAM questions for the course TTM Information Security May Part 1

WIRELESS LAN SECURITY FUNDAMENTALS

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Introduction to Security and PIX Firewall

Sync Security and Privacy Brief

Wireless security. Any station within range of the RF receives data Two security mechanism

Chapter 7: Network security

Case Study for Layer 3 Authentication and Encryption

UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY

Protocol Rollback and Network Security

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

Lecture 10: Communications Security

BlackBerry Enterprise Solution

ZigBee Security. Introduction. Objectives

Network Security Protocols

HANDBOOK 8 NETWORK SECURITY Version 1.0

CS Final Exam

Overview. SSL Cryptography Overview CHAPTER 1

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

M-Shield mobile security technology

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Chapter 7 Transport-Level Security

CRYPTOGRAPHY IN NETWORK SECURITY

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

CCNA Security 1.1 Instructional Resource

Security Analysis of PLAID

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Network Security Essentials Chapter 5

Human Factors in Information Security

TLS/SSL in distributed systems. Eugen Babinciuc

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Data Protection: From PKI to Virtualization & Cloud

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

W ith an estimated 14 billion devices connected to

Secure SCADA Network Technology and Methods

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

SECURITY COMPARISON BETWEEN IBM WEBSPHERE MQ 7.5 AND APACHE ACTIVEMQ 5.9

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Network Security Administrator

Complying with PCI Data Security

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Wireless Networks. Welcome to Wireless

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Applying Cryptography as a Service to Mobile Applications

Transcription:

Pusan National University Howon Kim Oct. 2014

Agenda Security and Privacy Issues in Internet of Things 1. Vulnerabilities in IoT 2. Device Security in IoT 3. Comm./Network Security in IoT 4. Security in IoT Services 5. Privacy Issues in IoT 6. Concluding Remarks 2

1. Vulnerabilities in IoT Security Problems in IoT IoT is highly vulnerable due to its components complexity Also, different subjects make it difficult to resolve the security vulnerabilities Vulnerabilities are possible in device firmware, OS, network protocol, service software, service APIs, etc. It means that difference subjects such as device vendor, service provider, device manufacturer, ISP, etc. should be responsible for fixing the vulnerabilities Also, the horizontal market characteristics in IoT service make the vulnerabilities worse Once private information is gathered by service provider, Ensuring the the Right to self-control on private information is not easy Also, current data mining techniques make this difficulty worse IoT Service (Sensed Privacy information: DB) AP Current IoT devices have many risks such as device theft, data leakage, data disclosure, phising attack, spyware/malware attack, etc. Weight scale Vulnerable wireless protocol is able to be used for eavesdropping attack The cracked sensing device is able to be used for illegal private information gathering (The existence of the user at home, etc.) Adversary Service User [ Possible Security/Privacy Vulnerabilities in IoT Scale ] Ref) https://gigaom.com/2013/10/03/designing-security-into-the-internet-of-things/ 3

1. Vulnerabilities in IoT Security & Privacy Domain in IoT Security technology for IoT devices Countermeasure against Side Channel Attack Countermeasure against Physical Attack Security technology for IoT comm./network protocols ZigBee security(ieee 802.15.4 security) CoAP security(dtls security) LwM2M security UDP security MQTT security Security technology for IoT Services IoT Platform security IoT-A security Privacy enhancing technology for IoT services API security for IoT Services OAuth security 4

2. Device Security in IoT Vulnerabilities in IoT Devices Side Channel Attack ex) Power analysis attack (SPA, DPA, CPA) can extract critical information (key values, etc.) in IoT devices Cracking and Reversing Attack Chip Cloning, Chip Reversing, ROM Code extraction, key/password extraction, etc. Attack on Device OS and SW Injecting malicious code, Code cracking, etc. 5

2. Device Security in IoT Side Channel Attack 소비전력 정보 Power Trace Side Channel Analysis http://en.wikipedia.org/wiki/power_analysis 6 Secret Key Extraction (RSA, ECC, AES keys, etc.)

2. Device Security in IoT Cracking and Reversing Attack http://www.ic-cracker.com/ Circuit Engineering Compa ny Limited continues to be recognized as the Souther n China Leader in Services for IC Read, MCU Crack, Chip Extract, Microcontroller Unlock service. With the advancement of today s modern circuit board technology, it is more important than ever to have specialists available to help you at a moment s notice. Our engineering and commercial teams collectively have a vast amount of electronic experience covering field include Consumer Electronics, Industrial Automation Electronics, Wireless Communication Electronics., etc. For more information please contact us through email. 7

2. Device Security in IoT Security technology for IoT devices Tamper Resistance / Tamper Evidence Clone detection (with PUF, etc.) Key zeroisation when tampering attack, etc. Side Channel Attack Countermeasure SPA/DPA/CPA attack countermeasure : Random masking, Algorithmic approaches, etc. Device Authentication/Authorization Using secret credential, Certificate (X.509), etc. Access Control in IoT Devices Access Control techniques (ACL, RBAC, etc.) Code Integrity Hash value, MIC(Message Integrity Code), etc. 8

2. Device Security in IoT Cryptography Issues in IoT Devices Lightweight crypto algorithms Block Cipher: PRESENT, LEA, AES,etc. Public Key Cryptography: ECC (NIST compliant) Target Platform : MSP430, Atmega, Cortex M3, etc. How about Smart Dust? Security Architecture for Device Authentication/Authorization Based on X.509? CA server for Device Revocation List Management Server Pseudonym CA for Privacy Preserving 9

3. Communication & Network Security in IoT ZigBee security Security Architecture SSP (Security Service Provider)/APS (Application Support) provides NWK layer security TC (Trust Center) in ZC (ZigBee Coordinator) is in charge of key management Two security modes are provided: SSM (Standard Security Mode) & HSM (High Security Mode) ZigBee IEEE 802.15.4 Application Object SSP (Security Service Provider) APL(Application Layer) ZDO (ZigBee Device Object) APS (Application Support) Layer NWK (Network) Layer MAC (Medium Access Control) Layer PHY(Physical) Layer ZigBee Stack Structure TC (Trust Center) ZC(ZigBee Coordinator) ZR(ZigBee Router) ZED(ZigBee End Device) ZigBee Network 10

3. Communication & Network Security in IoT ZigBee security Frame encryption & authentication(msg integrity) Confidentiality & Integrity are provided with AES-CCM* NWK Header APS Header Payload ZigBee frame with no security NWK Header Auxiliary Header Encrypted NWK Payload MIC NWK frame which provides confidentiality & integrity Integrity Protection NWK Header APS Header Auxiliary Header Encrypted APS Payload MIC APS frame which provides confidentiality & integrity Integrity Protection Security Level Security Control Key Identifier Frame Counter Extended Nonce Source Address Reserved Key Sequence Number Security Level : notifies CCM* mode is used or not Key Identifier : specifies the types of key used Extended Nonce : The extended nonce sub-field shall be set to 1 if the sender address field of the auxiliary header is present. Otherwise, it shall be set to 0 Frame Counter : prevents replay attack with this counter number Source Address : address of the sending device Key Sequence Number :used when Key Identifier is the NK 11

3. Communication & Network Security in IoT ZigBee security 8 types of security mode 모드 적용내용 No Security No security AES-CBC-MAC-32(MIC-32) 32bit msg authentication AES-CBC-MAC-64(MIC-64) 64bit msg authentication AES-CBC-MAC-128(MIC-128) 128bit msg authentication AES-CTR(ENC) Only encryption is provided AES-CCM-32 32bit Enc/Msg Auth AES-CCM-64 64bit Enc/Msg Auth AES-CCM-128 128bit Enc/Msg Auth There are 3 key types in ZigBee Symmetric Key Distribution Methods Key Transport: is where the Trust Center sends the key (securely wherever possible) to the device Key Establishment: is where the device negotiates with the Trust Center and keys are established at either end without being transported (using SKKE, etc.) Pre Installation: is where keys are placed into device using out-of-band method, e.g. commissioning tool MK(Master Key) LK(Link Key) NK(Network Key) - Shared key between two devices at initial state - Only shared by SKKE protocols - which is uniquely shared between two and only two devices for protecting frames at the APS layer - Usually dynamically established using key establishment service - Can also be pre-installed or transported from the Trust Center - Global key which is used by all devices in the network - Usually transported from the Trust Center - Can also be pre-installed

3. Communication & Network Security in IoT CoAP(Constrained Application Protocol) security CoAP is secured by DTLS (Datagram Transport Layer Security) while HTTP is secured by TLS (Transport Layer Security) Two main issues in CoAP security Difficulty in end-to-end security CoAP HTTP combination problem (Though TLS and DTLS are similar, it does not mean the seamless communication b/w CoAP and HTTP) Proxy is needed for CoAP-HTTP translation Also, dedicated security mechanism is needed for end-to-end security over CoAP and HTTP (To avoid message eavesdropping due to decryption in Proxy, double encryption may be needed) Lack of multicast security No standard exists for CoAP multicast security Dedicated verification method for signed multicast message is needed Certificate based multicast key verification can be considered Ref) Security for Practical CoAP Applications : Issues and Solution Approaches, FGSN 2011 13

3. Communication & Network Security in IoT MQTT security Services based on MQTT should meets the following security requirements Authentication of users and devices Authorization of access to Server resources Integrity of MQTT Control Packets and application data contained therein Privacy of MQTT Control Packets and application data contained therein Security techniques recommended in MQTT standard (1) In MQTT standard, it recommends the standards which are defined in NIST cyber security framework, FIPS-140-2, NSA Suite B, etc. The recommended light weight crypto algorithms Though specific crypto algorithms are not defined in document, it recommends algorithms described in ISO 29192(PRESENT and CLEFIA for lightweight block cipher) http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/csprd01/mqtt-v3.1.1-csprd01.html 14

3. Communication & Network Security in IoT Security techniques recommended in MQTT standard(2) The following security requirements are defined Client Authentication by Server Client authentication by server with proper authentication methods are recommended VPN and SSL certificate can be used Client Authorization by Server Client access to server resources should be controlled by proper authorization Server Authentication by Client MQTT is assumed to be used in untrustable environment, client should do server authentication VPN or SSL can also be used for this purpose Provides Integrity for Application message and control packet Proper integrity should be provided No specific methods are not defined in standard 15

3. Communication & Network Security in IoT Security techniques recommended in MQTT standard(3) Confidentiality in application message & control packet Verified crypto algorithms can be used for encrypting application message Also, TLS and VPN can be used for privacy Other security requirements in MQTT standard Abnormal behavior detection mechanism is needed Repeated connection attempts Repeated authentication attempts Abnormal termination of connections Topic scanning (attempts to send or subscribe to many topics) Sending undeliverable messages (no subscribers to the topics) Clients that connect but do not send data etc. Non-repudiation mechanism is also needed 16

4. Security in IoT Services IoT Platform Security Privacy/Trust management Authentication/Authorization Secure Data Exchange System Security Security & Privacy Privacy/Trust management Data anonymization ID management Trust management Authentication & Authorization Secure identification Access control Privilege management Secure data exchange Data encryption Secure protocols System Security Firewall & Intrusion detection Runtime verification & Malware detection Key management Bootstrapping 17

4. Security in IoT Services IoT-A Security In IoT-A, 5 security components (AuthZ, AuthN, IM, KEM, TRA) are defined for providing service security Component Name and Short Name Component Functionality Security Goals Targeted AuthZ(Authorization) Access control on services Service access control Confidentiality (data) Integrity (data) Access control on resolution infrastructure Service privacy Service availability AuthN (Authentication) IM (Identity Management) Authentication of service users Management of Identities, Pseudonyms and related access policies Authentication Accountability User privacy Service privacy KEM (Key Exchange and Management) TRA (Trust & Reputation) Exchange of cryptographic keys Collecting user reputation scores and calculating service trust levels Confidentiality (communication) Integrity (communication) Service Reputation Metering Service Trust 18

4. Security in IoT Services Relationships b/w Security Techniques defined in IoT-A Secret key, certificate mgmt KEM (Key Exchange & Mgmt) Trust and reputation mgmt on Things, Services TRA (Trust & Reputation) User authentication, object(things, services) authentication Authentication (AuthN) Access rights are granted Authorization (AuthZ) Execution Thing/Service Discovery, Resolution and Lookup Thing/Service Resolution Infrastructure Access Access Control (RBAC, ABAC) Fine grain access control IM (ID Mgmt) ID mgmt., Pseudonym, Anonymity mgmt 19

4. Security in IoT Services IoT-A security (1/2) AuthN: Authentication For authentication, methods, password, smartcard, secure token, fingerprint can be used Also, Pre-shared secret key and public key based certificate can be used for user/server/thing authentication AuthZ: Authorization Through authentication, access rights are assigned to a certain resource Authorization may be combined to resource finding operations(discovery/resolution/lookup) RBAC(Role Based Access Control) or ABAC(Attribute Based Access Control) can be used for fine grain access control to resources IM: ID Management From the privacy viewpoint, the ID management is needed for privacy enhancing Anonymization or Pseudonymization techniques can be used for this purposes 20

4. Security in IoT Services IoT-A security (2/2) KEM: Key Exchange & Management Secret key/certificate management, key distribution and exchange are needed TRA: Trust & Reputation In IoT services, user reputation on sensor and services should be collected and then trust levels should be calculated This is necessary because the sensed data and remotely located IoT services may be malfunctioned and even be malicious 21

5. Privacy Issues in IoT Privacy Enhancing Technology in IoT PII (Personally Identifiable Information) : Name, Social Security number, phone number, email, address, etc. Anything that identifies a person directly Does removing PII mean Privacy Preservation? Not enough! PII can be constructed from Re-identification by Linking It means that Re-identification by Data mining in IoT Services à infringes the Privacy 22

5. Privacy Issues in IoT Example of the Re-identification by Linking NAHDO(National Association of Health Data Organization) can collect Medical Data legally Ethnicity Visit date Diagnosis Procedure Medication Total charge Medical Data ZIP Birthdate Gender Name Address Date registered Party affiliation Date last voted Voter List Group Insurance Commission in Massachusetts bought anonymized Medical Data from NAHDO Massachusetts State sells its Medical Data to Disease Researchers based on the rule One of Researcher who had Medical Data got Voter List information in Massachusetts Using the ZIP, Birthdate, Gender information from Voter List, the Researcher can get someone s Medical Information From Data Linking, the Researcher can specify someone (Re-identification by Linking) 23

5. Privacy Issues in IoT Traditional Privacy Preserving Method Get owner s permission when gathering information When gathering information, getting owner s permission should be provided Privacy enhancing by encryption Data confidentiality is provided by encryption However, privacy is different from encryption Preventing information leakage by strong access control Well defined access control blocks the information leakaga Also DB encryption techniques, searchable encryption technique can be used Using legacy security technology Firewall, sandbox, etc. Privacy is not preserved by encryption, access control and firewall etc. Because current big data processing, data mining techniques will cause privacy imfringement problem 24

5. Privacy Issues in IoT Privacy Preserving at the stage of Data Collection and Publishing à Sanitization Input perturbation Add noise to sensed input data (i.e., add noise to database) Output perturbation Add noise to data statistics(published information) 25

5. Privacy Issues in IoT Privacy Preserving at the Stage of Data Processing/Usage à Privacy preserving data mining Privacy-preserving data publishing Data mining algorithm which applies to perturbed data ex) Anonymization Changing the results of data mining applications Many data mining methods such as association rule mining, classification rule mining infringe privacy. So mining results are needed to modify to enhance privacy ex) Association rule hiding method Query auditing Query requests and results are controlled ex) Query output perturbing, Query restriction 26

5. Privacy Issues in IoT Cryptographic methods for Distributed Privacy Restricts information gathering by data distribution ex) Pinkas s multiparty protocol Randomization 기법 Add noise to data ex) data perturbation 27

5. Privacy Issues in IoT Differential Privacy Differential Privacy : DB Privacy Preserving Technique Alice Bob You M Collection and sanitization Users (government, rese archers, marketers, ) Census problem Utility: Users can extract global statistics Privacy: Individual information stays hidden à Typical method for providing differential privacy : Sanitization technique 28

5. Privacy Issues in IoT Differential Privacy Differential Privacy example of sanitization Input perturbation Change data before processing E.g. Randomized response Summary statistics Means, variances Marginal totals (# people with blue eyes and brown hair) Regression coefficients Output perturbation Summary statistics with noise Interactive versions of above: Auditor decides which queries are OK 29

5. Privacy Issues in IoT Differential Privacy Differential Privacy definition of Differential Privacy The risk to my privacy should not substantially increase as a result of participating in a statistical database Pr [t] Any info adversary can obtain, it could obtain without Me (my data). 30

5. Privacy Issues in IoT Differential Privacy Differential Privacy can be implemented by output perturbation User Database Tell me f(x) f(x)+noise x 1 x n For noise, Laplace noise is used frequently 31

5. Privacy Issues in IoT Differential Privacy Differential Privacy Laplace noise Laplace distribution K adds noise to the function output f(x) Add noise to each of the k dimensions 32

5. Privacy Issues in IoT Differential Privacy Differential Privacy Also in differential privacy, indistinguishability should be satisfied DB= Differ in 1 row DB = x 1 x 2 x 3 M x n-1 x n x 1 x 2 y 3 M x n-1 x n Sanitization random coins Sanitization query 1 answer 1 M query T answer T query 1 answer 1 M query T answer T transcript S transcript S Distance between distributions is at most e random coins 33

6.Concluding Remarks III. 맺음말 Security/Privacy Issues exist in each IoT Service Components From devices to services via network and platform, each IoT domains need proper (different) security/privacy technology Also, the perimeter security and the security/privacy issues in integration of different domains should be carefully designed and managed Main Issues in IoT Security/Privacy Device Security Self-control on private information 34

Howon Kim Pusan National University howonkim@pusan.ac.kr 35

참고 자료 참고 자료 [1] 부산대학교, 개방형 고성능 표준 IoT 기술 개발, 2014.2 [2] Internet of Things Architecture, IoT-A, Project Deliverable D4.2 [3] Getting Started with OAuth 2.0 [4] OAuth Web Authorization Protocol [5] OAuth 공식 홈페이지 - http://oauth.net [6] Google Developer site - https://developers.google.com/ [7] MAC Access Authentication 자료 - http://hdknr.github.io/docs/identity/oauth_mac.html [8] Karol Furdik, IoT challenges, approaches, and outcomes in the context of European research projects [9] CISCO, The Internet of Things, How the Next Evolution of the Internet Is Changing Everything [10] Security as a Service for User Customized Data Protection by Kenichi Takahashi, etc., Software Engineering and Computer Systems, 2011 36