Ece3501: Iot Fundamentals M 3 - I: Security and Privacy Risks, Analyze Security
Ece3501: Iot Fundamentals M 3 - I: Security and Privacy Risks, Analyze Security
Ece3501: Iot Fundamentals M 3 - I: Security and Privacy Risks, Analyze Security
1 06.08.2020-G2
It’s not just PCs and smartphones we should worry about anymore, but
a wide range of Internet-connected devices such as thermostats, smart
meters, self-driving cars and even voice assistant devices such as
Amazon’s Alexa.
Risk by Internet
(e.g. public)
Risk by IoT Devices
Risk by Cloud
(e.g. open source)
Information
3
WHY IS IOT / INTERNET OF THINGS
SECURITY IMPORTANT?
6
INTERNET OF THINGS
---SECURITY VULNERABILITIES
Simplicity and ease of use are crucial
principles in the IT and electronics industry.
Every software and device out there is designed
to be as easy to use as possible, so as to not
confuse consumers and discourage them from
using the product.
Unfortunately, this often means that some
products cut corners, and don’t implement
security features consumers might find “too
clunky”.
7
INTERNET OF THINGS
---SECURITY VULNERABILITIES
The process of identifying assets and threats in
an organization is known as “Threat
Modeling”
8
INSECURE DEFAULT LOGIN
CREDENTIALS
9
POOR SOFTWARE UPDATES
10
THE COMMUNICATION ISN’T ENCRYPTED
Other IoT devices lack basic encryption to hide the
data sent between the device and the central server.
This can potentially expose the user’s personal
information, if a malicious hacker can snoop in on his
personal information.
Another thing that Internet of Things devices do, is that
some of them ask for more permissions than they need
to.
One time, numerous Amazon Echo users were surprised
to see their device ordering dollhouses after a TV
anchor said the phrase “Alexa ordered me a dollhouse”.
In that case, the device had permission to do a purchase
all by itself. Each extra permission in an IoT device
adds another vulnerability layer which can be 11
exploited. The fewer permissions, the more secure your
device is.
INSECURE USER INTERFACE
14
ATTACKS AGAINST IOT DEVICES
15
RECOMMENDATIONS TO IMPROVE IOT SECURITY
16
RECOMMENDATIONS TO IMPROVE IOT SECURITY
To avoid software
To improve data
attacks
privacy i.e to
avoid Man in the
middle, sniffer
To avoid Denial of
17
Service attacks
To avoid physical attacks
VULNERABILITY EXPLOITATION
Every software has its vulnerabilities. It’s nearly impossible
not to. Even Google, with all its resources, hasn’t been able to
stamp them out from Chrome.
Depending on the type of vulnerability, you can use them in
multiple ways.
Buffer overflows. This happens when a device tries to store
too much data into a temporary storage space. This excess
data then spills over into other parts of the memory space,
overwriting it. If malware is hidden in that data, it can end
rewriting the code of the device itself.
Code injection. By exploiting a vulnerability in the
software, the attacker is able to inject code into the device.
Most often, this code is malicious in nature, and it can do a
multitude of tasks, such as shutting down or taking control of
the device.
Cross Site Scripting. These work with IoT devices that
interact with a web-based interface. Basically, the attacker
infects the legitimate page with malware or malicious code, 18
and then the page itself will infect the IoT device.
IOT VULNERABILITY EXPLOIT
19
MALWARE ATTACKS
22
23
SNIFFING / MAN-IN-THE-MIDDLE
ATTACKS
24
25
SPOOFING
26
27
BOTNET ENSLAVING
36
CHANGE YOUR DEFAULT PASSWORDS AND
USERNAMES
43
ENCRYPTION
44
CREATE A SECOND NETWORK FOR YOUR IOT
DEVICES
Your Wi-Fi router is one of the first attack points for a malicious
hacker. To make sure it is secure, we suggest you do the following:
Use a strong and secure password.
Change your username, and make it non-recognizable. Don’t make it
easy for an attacker to identify which Wi-Fi is yours.
Set up a firewall to protect your Wi-Fi. In most cases, the firewall will
be software based, but some routers come with a hardware one
preinstalled.
Disable guest network access for your wireless network. Here’s a
guide to disable this for Linksys routers.
A guest network is a second Wi-Fi created from your router, which
limits access to your “core” network. In theory, it should offer extra
security, by isolating guests on the separate network. However, most
Wi-Fi routers set up an insecure guest network, which can act as a
window to your core Wi-Fi.
Here’s a more in-depth guide on how to protect your wireless
network from outside intrusion that you might find useful.
46
DISCONNECT THE DEVICE FROM THE
INTERNET WHEN YOU DON’T USE IT
47
READ THE DEVICE MANUAL FOR ANY
SECURITY TIP YOU MIGHT FIND
48
DOWNLOAD SECURITY APPLICATIONS
49
USE A HARDWARE SOLUTION TO SECURE
YOUR IOT NETWORK FROM OUTSIDE
ATTACKS
52
IOT SECURITY ISSUES
Public Perception: If the IoT is ever going to truly take off, this needs to be
the first problem that manufacturers address. The 2015 Icontrol State of the
Smart Home study found that 44% of all Americans were "very concerned"
about the possibility of their information getting stolen from their smart home,
and 27% were "somewhat concerned." With that level of worry, consumers
would hesitate to purchase connected devices.
Vulnerability to Hacking: Researchers have been able to hack into real, on-
the-market devices with enough time and energy, which means hackers would
likely be able to replicate their efforts. For example, a team of researchers at
Microsoft and the University of Michigan found a plethora of holes in the
security of Samsung's SmartThings smart home platform, and the methods
were far from complex.
Are Companies Ready?: AT&T's Cybersecurity Insights Report surveyed
more than 5,000 enterprises around the world and found that 85% of
enterprises are in the process of or intend to deploy IoT devices. Yet a mere
10% of those surveyed feel confident that they could secure those devices
against hackers.
True Security: Jason Porter, AT&T's VP of security solutions, told Insider
Intelligence that securing IoT devices means more than simply securing the
actual devices themselves. Companies also need to build security into software
applications and network connections that link to those devices.
53
IOT PRIVACY ISSUES
Too Much Data: The sheer amount of data that IoT devices can generate is
staggering. A Federal Trade Commission report entitled "Internet of Things:
Privacy & Security in a Connected World" found that fewer than 10,000
households can generate 150 million discrete data points every day. This
creates more entry points for hackers and leaves sensitive information
vulnerable.
Unwanted Public Profile: You've undoubtedly agreed to terms of service at
some point, but have you ever actually read through an entire document? The
aforementioned FTC report found that companies could use collected data that
consumers willingly offer to make employment decisions. For example, an
insurance company might gather information from you about your driving
habits through a connected car when calculating your insurance rate. The same
could occur for health or life insurance thanks to fitness trackers.
Eavesdropping: Manufacturers or hackers could actually use a connected
device to virtually invade a person's home. German researchers accomplished
this by intercepting unencrypted data from a smart meter device to determine
what television show someone was watching at that moment.
Consumer Confidence: Each of these problems could put a dent in
consumers' desire to purchase connected products, which would prevent the IoT
from fulfilling its true potential.
54
SECURITY RISKS
IoT devices are connected to your desktop or
laptop. Lack of security increases the risk of your
personal information leaking while the data is
collected and transmitted to the IoT device.
IoT devices are connected with a consumer
network. This network is also connected with
other systems. So if the IoT device contains any
security vulnerabilities, it can be harmful to the
consumer’s network. This vulnerability can
attack other systems and damage them.
Sometimes unauthorized people might exploit the
security vulnerabilities to create risks to physical
safety. 55
PRIVACY RISKS
In IoT, devices are interconnected with various
hardware and software, so there are obvious
chances of sensitive information leaking through
unauthorized manipulation.
All the devices are transmitting the user’s
personal information such as name, address, date
of birth, health card information, credit card
detail and much more without encryption.
56
CONTD.,
57
CONTD.,
58
IOT SYSTEM FUNCTIONALITIES- FROM
SECURITY PERSPECTIVE
59
CONTD.,
60
SECURITY ARCHITECTURE
61
SECURITY ARCHITECTURE
62
SECURITY ARCHITECTURE
63
SECURITY ARCHITECTURE
64
CHALLENGES IN IOT SECURITIES
65
CONTD.,
66
CONTD.,
67
CONTD.,
68
69