SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP



Similar documents
Home Automation and Cybercrime

An Overview of ZigBee Networks

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

UG103.9 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: ZLL

ZigBee Security. Introduction. Objectives

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Short-range Low Power Wireless Devices and Internet of Things (IoT)

UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY

IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

In the pursuit of becoming smart

IT 3202 Internet Working (New)

chap18.wireless Network Security

Security vulnerabilities in the Internet and possible solutions

Security in IEEE WLANs

Security of MICA*-based / ZigBee Wireless Sensor Networks

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

PM0237 Programming manual

Internet of Things based approach to Agriculture Monitoring

ETSI M2M / onem2m and the need for semantics. Joerg Swetina (NEC) (joerg.swetina@neclab.eu)

Security Threats on National Defense ICT based on IoT

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

Current and Future Research into Network Security Prof. Madjid Merabti

IoT Security & Privacy

Overview of the Internet of things

MACHINE TO MACHINE COMMUNICATIONS. ETSI TC M2M Overview June 2011

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Industrial Networks & Databases

Wireless security. Any station within range of the RF receives data Two security mechanism

How To Understand The Power Of The Internet Of Things

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Introduction Chapter 1. Uses of Computer Networks

Short range low power wireless devices and Internet of Things (IoT)

Chapter 5. Data Communication And Internet Technology

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Life With Big Data and the Internet of Things

Developing Network Security Strategies

Security Issues with Integrated Smart Buildings

Security and Privacy Issues in Wireless Sensor Networks for Healthcare

MS-55096: Securing Data on Microsoft SQL Server 2012

Smart Cloud Solutions

ITL BULLETIN FOR AUGUST 2012

Remote Monitoring and Controlling System Based on ZigBee Networks

Supporting ZDOs with the XBee API

Network Security Administrator

IT Networking and Security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Kick starting science...

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

SPINS: Security Protocols for Sensor Networks

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Summary of Results from California Testing of the ES&S Unity /AutoMARK Voting System

PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS

CS 356 Lecture 29 Wireless Security. Spring 2013

GreenPeak White Paper Wireless Communication Standards for the Internet of Things

Making Sense of Internet of Things Protocols and Implementations

CONTENTS. PCI DSS Compliance Guide

Internet of Things. Laurent Toutain. June 11, Caen () IPv6 opérateur June 11, / 14

Goals. Understanding security testing

Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges

future data and infrastructure

The security of communication protocols used for Internet of Things

Solar Powered Outdoor Siren Manual

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

How To Understand The Concept Of Internet Of Things (Iot)

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

Best Practices for Outdoor Wireless Security

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Securing Smart City Platforms IoT, M2M, Cloud and Big Data

White Paper How Noah Mobile uses Microsoft Azure Core Services

HANDBOOK 8 NETWORK SECURITY Version 1.0

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Frame of IoT in China

Secure cloud access system using JAR ABSTRACT:

Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Post-Access Cyber Defense

Evaluate the Usability of Security Audits in Electronic Commerce

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

Transcription:

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP

WHO ARE WE? Tobias Zillner Senior IS Auditor @Cognosec in Vienna Penetration Testing, Security Audits, Security Consulting Breaking stuff Owner of a ZigBee based home automation system :D Sebastian Strobl Principal Auditor @Cognosec in Vienna Plans and leads various types of IT audits Still trying to get his HD drone vision to work Now uses Z-Wave for home automation until we manage to break it too

AGENDA 1. Introduction 2. Problems 3. Standards 4. Practical Demonstration 5. Summary

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS WHAT IT S ABOUT?

EVOLUTION Stage 1: Personification of Dumb Stage Stage 2: Partially Autonomous Sensor Networks Stage 3: Autonomous Independent Devices

HOME AUTOMATION Home Automation the introduction of technology within the home to enhance the quality of life of its occupants Goals Save energy Increase comfort Remote monitoring

SMART HOMES https://cdn.hackaday.io/images/2596161408899944332.png

WHY IS THIS IMPORTANT? Number of IoT Devices 30,000,000,000 25,000,000,000 20,000,000,000 15,000,000,000 26 billion Trend is wireless connections Samsung CEO BK Yoon: Every Samsung device will be part of IoT till 2019 4 10,000,000,000 5,000,000,000 0 0.9 billion 2009 2020 Over 500 smart device per household in 2022 2 2 http://www.gartner.com/newsroom/id/2839717 3 http://www.gartner.com/newsroom/id/2636073 4 http://www.heise.de/newsticker/meldung/ces- Internet- der- Dinge- komfortabel- vernetzt- 2512856.html

FUTURE OF WIRED SMART HOMES https://hivizme.files.wordpress.com/2012/06/cable- mess.jpg

WHY SECURITY? HOME automation has high privacy requirements Huge source of personalized data " Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radiofrequency identification, sensor networks, tiny embedded servers, and energy harvesters - all connected to the nextgeneration internet 1 " -Former CIA Director David Petraeus 1 http://www.wired.com/2012/03/petraeus- tv- remote/

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS PROBLEMS

PROBLEMS Unsecure devices are roled out Now getting connected Similar to SCADA problematic Not managed Physical protection not enough Problems CIO of the house

UNIQUE CHARACTERISTICS Limited Reliability Limited Resources Dynamic Changes / Topology Interconnectivity Heterogeneity

REQUIREMENTS Interoperability Future proof Moderate costs Usability Installation overhead User interaction Configuration effort

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS STANDARDS

STANDARDS EnOcean Wave2m (Wavenis) Z- Wave Bluetooth LE / Smart ZigBee HomeMatic KNX BidCoS Insteon

THE ZIGBEE STANDARD Based on IEEE 802.15.4 Low-cost ZigBee Low-power Two-way Reliable Purely wireless

Home Automation Health Care Smart Energy Building Automation Retail Services Remote Control ZigBee Application Domains Telecom Services

ZIGBEE Focused on sporadic real time communication No constant communication Remote Control Home Automation Building Automation Smart Energy Health Care

ZIGBEE SECURITY ZigBee Security Symmetric Encryption Message Authentication Integrity Freshness AES- CCM* 128bit MIC 0-128 bit Frame Counter 4 Byte

ZIGBEE SECURITY One security level per network Security based on encryption keys Network Key Used for broadcast communication Shared among all devices Link Key Used for secure unicast communication Shared only between two devices

HOW ARE KEYS EXCHANGED? Preinstalled Devices Key Transport Out of band recommended Key Establishment Derived from other keys Also requires preinstalled keys

HOME AUTOMATION PUBLIC PROFILE Default Trust Center Link Key 0x5A 0x69 0x67 0x42 0x65 0x65 0x41 0x6C 0x6C 0x69 0x61 0x6E 0x63 0x65 0x30 0x39 ZigBeeAlliance09 Use Default Link Key Join 0x01(True) This flag enables the use of default link key join as a fallback case at startup time. Return to Factory Defaults In support of a return to factory default capability, HA devices shall implement the ZDO Management Leave server service.

LIGHT LINK Devices in a ZLL shall use ZigBee network layer security. The ZLL security architecture is based on using a fixed secret key, known as the ZLL key, which shall be stored in each ZLL device. All ZLL devices use the ZLL key to encrypt/decrypt the exchanged network key. nwkallfresh False Do not check frame counter

LIGHT LINK

THE KNX STANDARD KNX is a bus system for home and building automation KNX Shared bus used for communication No Security at the moment Security not a real concern

KNX " It is quite unlikely that legitimate users of a network would have the means to intercept, decipher, and then tamper with the KNXnet/IP without excessive study of the KNX Specifications. Thus the remaining security threat is considered to be very low and does not justify mandating encryption, which would require considerable computing resources. 5 " 5 KNX System Specifications - KNXnet/IP, Version 01.04.02

KNX WEBINAR "... you will learn how to develop KNX devices that guarantee secure communication and that protect data, within a KNX installation. 6 Featuring: " Authentication Data integrity Installation freshness Confidentiality 6 http://www.knx.org/knx- en/training/knx- eacademy/webinars/secure- KNX- Installations/index.php

KNX

KNX Security specification only in draft state Security features not included in configuration software No products that support security available

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS PRACTICAL DEMONSTRATION

SECBEE ZigBee security testing tool Target audience Security testers Developers Support of encrypted communication Reset to factory Join to network Raspbee Based on scapy-radio, µracoli and killerbee Provides features for testing of security services as well as weak security configuration and implementation Test security services Command injection Scan for weak key transport https://github.com/zu1na/secbee USRP B210

DATA TRANSFER DIRECT INDIRECT Coordinator End device Coordinator End device DATA ACK timeframe < 8ms Data request ACK DATA

PRACTICAL DEMONSTRATION NETWORK KEY EXTRACTION

NETWORK KEY EXTRACTION Fallback key exchange unsecure Most vendors only implement fallback solution Same security level as plaintext exchange

WHAT DOES THE VENDOR SAY?

NETWORK KEY EXTRACTION So, the 1. Timeframe limited 2. Proximity is necessary 3. Key extraction works only at pairing what would an attacker do?

WHAT WOULD AN ATTACKER DO?

NETWORK KEY EXTRACTION Jam the communication Wait for users to re-pair the device It is not only about technology :D

PRACTICAL DEMONSTRATION COMMAND INJECTION

PRACTICAL DEMONSTRATION DEVICE HIJACKING

DEVICE HIJACKING Devices are paired and working 1. Reset to factory default settings 2. Setup own network 3. Join the target device to our network

DEVICE HIJACKING No physical access is required No knowledge of the secret key is needed Usability overrules security

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS SUMMARY

SUMMARY Security measures provided are good Requirements due to interoperability weaken the security level drastically Vendors only implement the absolute minimum to be compliant Usability overrules security

SUMMARY Last tier communication is, however, still only one part

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS TIME FOR QUESTIONS / LETS TALK ABOUT IT

CONTACT Tobias Zillner, BSc MMSc Mobile: +43 664 8829 8290 Email: tobias.zillner@cognosec.com