The Reliability Engineer'S Guide To Understanding Iiot Device, Lan, and Wan Security
The Reliability Engineer'S Guide To Understanding Iiot Device, Lan, and Wan Security
The Reliability
Engineer’s Guide
to Understanding
IIoT Device, LAN,
and WAN Security
Bluetooth 5.0 and Cloud
As wireless sensor technology begins to take the leading edge within the
industrial internet of things community, a new era of data security has emerged
that requires diligent thought and consideration on the part of end users, system
integrators, and key stake holders.
Critical machine health and process data being transmitted wirelessly and hosted
internally as well as externally creates an entirely new series of security concerns
that must clearly be understood to maximize the value of the technology.
This presentation will focus on the key security tools available to end users to
ensure the security of their data when deploying wireless sensor networks and
hosting data internally as well as externally to their organizations.
Bluetooth allows computers talk to each other seamlessly (Svetlik, 2018), which
according to (Wikipedia, 2020), is a wireless technology standard used for exchanging
data between fixed and mobile devices over short distances, using the UHF radio
waves in the industrial, scientific and medical radio bands, from 2.402 GHz to
2.480 GHz, and in building personal area networks (PANs). It is commonly found in
smart phones, smart watches, wireless headphones, wireless speakers etc. It is a
primary mode for communication in smart homes and for internet of things (IIoTs)
technology.
Bluetooth 5.0 is the latest version of the Bluetooth wireless communication standard
(Hoffman, 2018) and thus serves as a common communication feature for the latest
smart phones, smart gadgets and IIoT devices. Bluetooth technology is in itself
backward compatible, where older versions and devices can still function/communicate
with a device having the latest version enabled. Thus the overall advantage to be gleaned
from using the latest version (Bluetooth 5.0) cannot be enjoyed without compatible
peripherals.
Fig 1 depicts a comparison amongst the various versions of Bluetooth, where there are
clear improvements in latency of less than 3ms compared to the 6ms in Bluetooth 4.X
and 100ms in the Bluetooth classic, an increase in maximum distance/range of up to
200metres, compared to 100metres in both Bluetooth 4.X and Bluetooth classic
respectively. A majority of the improvements to Bluetooth technology has been in the
Bluetooth low energy specification. Where, Bluetooth 5.0 enables all audio devices
connected to it to communicate over Bluetooth low energy rather than over the power
hungry Bluetooth classic standard, thus reducing power usage and the resultant longer
battery life. Other related benefits to Bluetooth 5.0 includes, the dual audio feature,
which allows users to play audio on two connected devices at the same time, data
transfer speeds of up to 2Mbps, eight times the broadcast message capacity of older
versions of Bluetooth etc.
1.1 PHANTOM
Phantom has an embedded cryptographic accelerator for providing high grade security
specifications. Specific features of the Phantom and its sister modules relates to data
rates (2Mbps, 1Mbps, 500Kbps, 125Kbps), memory (1MB of flash memory, 256KB RAM),
48GPIO pins, 1.7V to 3.6V DC supply, 255 broadcasting message length , forward error
correction (FEC) coding using Bluetooth SIG CORE_v5.0 LE CODED PHY, range of
650metres using the PCB trace antenna, a high voltage power supply to accept up to
5.5V DC for direct connection to a lithium battery or a 5V power source, an Embedded
CryptoCell 310 co-processor to provide more secure connection and to prevent hackers.
The Phantom’s most importantly offers a cost effective solution for IIoT product
implementations at different ranges with its low prices. No change is required on the
main board hardware for any implementation, thus ensuring that it is modular in design
and implementation.
According to the report in (INSTRUMENTS, 2020), the vulnerabilities facing BLE 5.0 is
deemed very high and more so due to the various benefits and capabilities of Bluetooth
5.0 technology, which has made it a primary communication medium of choice for
connected devices, as opposed to Wi-Fi. The increased bandwidth and connection
distance has been a source of vulnerability, because attackers can access Bluetooth
connections from a long distance away, and with fast data transfer speed, can wreak
havoc without notice. According to NIST report, (NIST, 2012) common areas of
vulnerabilities in traditional Bluetooth 5.0 are as follows:
The lack of end to end security is a major vulnerability of the traditional BLE system.
The current system implements individual link encryption, with message decryption at
intermediate points on the communication link that could lead to man in the middle
attacks (MITM), also the absence of application and user level authentication as a
default in the Bluetooth specification is also an area of vulnerability, as the currently
offered device level authentication isn’t sufficient nor impervious to malicious attacks,
possibility of data corruption during improper synchronization, potential for loss of data
stored on an IIoT device if stolen are all very critical.
Man in the middle (MITM) attacks can be mitigated by the deployment of user input
passkeys, although passkey linking isn’t applicable for applications without a keypad
or a display, passkeys are also not well suited for passive eavesdropping attacks. Passive
eavesdropping attacks are attacks which are a little different from man in middle
attacks, in that the eavesdropper doesn’t intend to change or impersonate data; rather
he/she sits idly, while gathering information. (INSTRUMENTS, 2020) Surmises that at
least 80% of all Bluetooth enabled smart devices are vulnerable to man in the middle
attacks (MITM).
Data transmission over the Bluetooth 5.0 uses AES-CCM encryption, where this
encryption takes place in the Bluetooth controller. Bluetooth low energy encryption
security modes are of two types; namely the LE security mode 1 and the LE security
mode 2 as shown in fig 3.
LE security mode 1 has four security levels, namely the no security (no authentication,
no encryption mode), the unauthenticated pairing with encryption, the authenticated
pairing with encryption and lastly the Authenticated LE Secure Connections pairing
LE security modes /levels and their associated characteristics are depicted in fig 4.
Due to the processing power requirement for decryption and authentication, the
Phantom and its related sister modules use the ARM cryptocell-310 cryptographic co-
processor to achieve mesh network performance. Features such as secure boot, key
management infrastructure, device life-cycle-state management, cryptography and
security middleware service, cryptographic hardware engines etc are critical for the high
performance delivered by the Phantom on security and possible network vulnerabilities.
The emergence of LE technology in Bluetooth 4.X till the current specification of 5.0,
has ensured that peripheral devices no longer need the same memory or processing
power requirement than the central unit (sender). Single mode peripheral devices have
gained the most advantage (Ravikiran, 2020), thus peripherals can be designed with low
memory, longer battery life and even as low power consumption smart wearable devices.
These peripherals are classified as Bluetooth smart ready devices as shown in fig 4
The four levels of security as well as the two security modes imply there are always
considerations for the mode to be applied for a peripheral device. The secure connection
mode which involves security mode 1, level 4 will ensure there is authentication and
encryption for all communication between the sender and the receiver, however this will
mean more computational power needs and a resultant power drain for battery powered
devices. Thus there must be a compromise with whether encryption without signing will
be sufficient. Phantom balances both the needs of security and battery life by combining
the cryptocell 310 co-processor for cryptographic processes and the high-performance
lithium ion battery that is field replaceable.
The pairing process between a peripheral device and a sender in a Bluetooth connection
involves three phases namely; phase one, where each device makes the other aware of
their capabilities captured in their individual attribution protocol (ATT) values, secondly
the phase two, where a long term key (secure connection ) or short term key (insecure
connection ) is generated after the devices have agreed on a mixed random number
called the temporary key (TK), thirdly the phase three, where the connection signature
resolving key (CSRK) used for data signing and the identity resolving key (IRK) used for
private MAC address generation and lookup are all generated respectively (Mark, 2018).
Once the keys have been generated , there are four pairing modes namely, numeric
comparison ( which involves matching a six digit number generated by both devices),
just works ( a very popular method that’s sets the six digit numeric number to all zeros
for both devices ), passkey entry ( a six digit number from one device which must be
entered into the receiver device for communication ) and the out of band (OOB), which
is using a communication channel outside the main stream Bluetooth channels. The
entire pairing process is as shown in fig 5
The Phantom will always have a peripheral similar to it, with limited display capability
in the case of the gateway and no keypad, thus the most appropriate security protocol
is to implement a key distribution pairing protocol
A Firewall is a network security system that monitors incoming and outgoing network
traffic based on predefined security rules (concept draw, 2020). It establishes a barrier
between an internal network which is trusted and an untrusted network such as the
internet or another wireless communication technology such as Bluetooth. Firewalls
exist as either network firewalls or host based firewalls. A typical depiction of a firewall
between a LAN and a WAN is as shown in fig 6
The use of additional security protocols asides using firewalls are also encouraged,
where examples of these are; the use of WPA or WPA2 for password encryption on all
traffic incoming or outgoing to the internet, filtering of traffic using detailed knowledge
of trusted sources, this is usually achieved using specialized authentication policies,
using tunnel technologies such as VPN, packet control through different areas of the
OSI model, MAC address trust protocol, and internal security features such as antivirus
and antimalware programs.
As much as the use and deployment of virtual personal networks (VPN) helps to provide
some form of security over a WAN network, it is advisable to adopt software defined –
WAN, which is a centralized network control system that enables agile, real-time
application traffic management without overhauling an existing WAN. SD-WANs also
enable access to cloud applications without causing the data bottlenecks a traditional
WAN would.
Security for cloud based services can be classified into three areas of vulnerabilities.
The physical security protocol, establishes protocols for the protection of physical assets
at a geographical location, infrastructure security, establishes protocols for the ensuring
that security patches are updated as soon as possible, ports are scanned for abnormal
behavior and data and access security deals with data encryption and user privileges
control.
Cloud services are remotely hosted , run and managed by leading tech companies, and
this sometimes give the false belief that it is impervious to security challenges. (Fred,
2018) highlights some security challenges that cloud services face such as; data
breaches, human errors, data loss with no backup, insider threats, DDoS attacks,
insecure API’s, exploits, account hijacking, advanced persistent threats and meltdowns.
While there are numerous benefits to using a cloud based service such as Amazon cloud
services (AWS) and Microsoft azure, they take security seriously and try to implement
some protocols that protect data transmitted and stored on their infrastructure.
AWS adopts isolation as its main security mantra (Sarapremashish, 2020), this ensures
that customers cannot access any other resource within their network unless they
explicitly enable such access. Isolation is achieved by accounts, which are completed
Microsoft Azure on the other hand is its adoption of an azure active directory which is
the singular platform for authorization and permissions management, but it still has
some vulnerability as ports and destinations are left open and exposed to the internet,
during default initiation.
According to (Michael, 2020), Microsoft has more than 3,500 cybersecurity experts
working to keep Azure secure and an extensive threat intelligence operation that
includes analysis of 18 billion Bing web pages, 400 billion emails, a billion Windows
device updates, and 450 billion monthly authentications. The azure system also
improves its security by ensuring tight controls on setting up user accounts, where they
restrict the opening of multiple accounts with the same domain email.
6. CONCLUSION
AWS has been a long time player in the cloud space and thus have more optimized
processes as well as optimized security protocols that would ensure end to end
protection of data and the entire communication network.
References
concept draw, 2020. Firewall between LAN and WAN, s.l.: concpet draw,
https://www.conceptdraw.com/examples/firewall-between-lan-and-wan, retrieved 10/21/2020.
Fred, B., 2018. 10 critical cloud security threats in 2018 and beyond, s.l.: Synopsys,
https://www.synopsys.com/blogs/software-security/10-cloud-security-threats-2018/, Retrieved
10/21/2020.
Giovanni, P., Mario, C. & Vincenzo, M., 2017. Bluetooth 5 Energy Management through a Fuzzy-PSO
Solution for Mobile Devices of Internet of Things. Energies , 10(7), pp. 992, DOI: 10.3390/en10070992.
Harsh Kupwade, P. & Thomas, M. C., 2017. Wireless Sensor Network Security. Third Edition ed.
s.l.:Computer and Information Security Handbook .
Hoffman, C., 2018. Bluetooth 5.0: What’s Different, and Why it Matters, s.l.: How-to-geek, retrieved
from https://www.howtogeek.com/343718/whats-different-in-bluetooth-5.0/, 10/20/2020.
Kai, R., 2016. Bluetooth Pairing Part 1 –Pairing Feature Exchange, s.l.: Bluetooth blog,
https://www.bluetooth.com/blog/bluetooth-pairing-part-1-pairing-feature-exchange/, Retrieved
10/21/2020.
Michael, C., 2020. Cloud Security Considerations for AWS, Azure, & Google, s.l.: Sonrai security,
https://sonraisecurity.com/blog/aws-azure-google-cloud-security-iam/, Retrieved 10/21/2020.
NIST, 2012. Guide to Bluetooth Security, s.l.: National Institute of Standards and Security.
Ravikiran, H., 2020. Security Considerations For Bluetooth Smart Devices, s.l.: design and reuse,
https://www.design-reuse.com/articles/39779/security-considerations-for-bluetooth-smart-
devices.html, retrieved 10/21/2020.
Sarapremashish, B., 2020. Understanding Cloud Security Considerations for AWS, Azure, and GCP, s.l.:
appknox, https://www.appknox.com/blog/understanding-cloud-security-considerations-for-aws-azure-
and-gcpRetrieved 10/21/2020.
Shah, H., 2019. Introduction to BLE security for IoT, s.l.: Simform, retrieved from
https://www.simform.com/iot-bluetooth-security-vulnerabilities/, 10/20/2020.
Svetlik, J., 2018. Bluetooth 5: everything you need to know, s.l.: whathifi? retrieved from
https://www.whathifi.com/advice/bluetooth-5-everything-you-need-to-know 10/20/2020.
Walter, F., 2005. (Local area) network security. s.l., Computer Security and Industrial Cryptography pp
211-226.