Internet of Things: Iot Protocols and Security
Internet of Things: Iot Protocols and Security
Internet of Things
18 MCA 5 4 E
IoT Protocols and Security
FACULTY
Adaptabi
y
lity
Confide
tiality
Security
equirem
nts
Tamper Availabili
ce ty
Trust
Secure
Softwar
Execu
Security Requirements
• Access Control
– Provides authorized access to network resources
– IoT is ad-hoc, and dynamic in nature
– Efficient & robust mechanism of secure access to
resources must be deployed with distributed nature
• Authentication
– Identity establishment b/w communicating devices
– Due to diversity of devices & end users, an attack
resistant and lightweight solution for authentication
Security Requirements
• Data Confidentiality
– Protecting data from unauthorized disclosure
– Secure, lightweight, and efficient key
exchange mechanism is required
• Availability
– Ensuring no denial of authorized access
to network resources
Security Requirements
• Trust Management
– Decision rules needs to be evolved for
trust management in IoT
• Secure Software Execution
– Secure, managed-code, runtime environment
designed to protect against different applications
• Secure Storage
– Involves confidentiality and integrity of
sensitive information stored in the system
Security Requirements
• Tamper Resistance
– Desire to maintain security requirements even
when device falls into hands of malicious parties
– Can be physically or logically probed
• Scalability
– IoT consist of various types of devices with
different capabilities from intelligent sensors
and actuators, to home appliances
– Communication (wire or wireless) & protocols
(Bluetooth, ZigBee, RFID, Wi-Fi, etc.)
Security Requirements
• Flexibility and Adaptability
– IoT will consist of mobile communication devices
– Can roam around freely from one type
of environment to others
– With different type of risks and
security threats
– So users are likely to have different privacy
profile depending on environment
Security Architecture for IoT
Threat Modeling
• Presented by first defining misuse case
• Means negative scenario describing the
ways the system should not work
• And then standard use case
• Assets to be protected in IoT will vary
with respect to every scenario case
Threat Analysis
• Assets needs to be identified to drive
threat analysis process
• Smart home is localized in space,
provide
services in a household
• Devices in Smart Home are
combined with n/w
• Provide means for entertainment, monitoring
of appliances, controlling of house components
and other services
Use Cases and Misuse Cases
• Actor in use case and misuse case in the
scenario of smart home includes:
– Infrastructure owner (smart home)
– IoT entity (smartphone device or software
agent)
– Attacker (misuser)
– Intruder (exploiter)
Use Cases and Misuse Cases
• Access rights granted to unauthorized entity
• Corruption of access credentials
• Unauthorized data transmission
• Denial of service (DoS) attack
• Man-in-the-middle attack
IoT Security Tomography
• Classified according to attacks addressing
to different layers
– Transport Layer
– Network Layer
– MAC layer
– RF layer
IoT Security Tomography
Key Elements of Security
• Authentication
• Access Control
• Data and Message Security
• Prevention from denial of taking part in
a transaction
Identity Establishment
• Secure Entity Identification or Authentication
• Authentication is identity establishment
between communicating devices or entities
• Entity can be a single user, a set of users, an
entire organization or some networking
device
• Identity establishment is ensuring that origin
of electronic document & message is
correctly identified
Access Control
• Also known as access authorization
• Principles is to determine who should be able
to access what
• Prevents unauthorized use of resources
• To achieve access control, entity which trying
to gain access must be authenticated first
• According to authentication, access rights
can be modified to the individual
Data and Message Security
• Related with source authenticity, modification
detection and confidentiality of data
• Combination of modification & confidentiality
of message is not enough for data integrity
• But origin of authenticity is also important
• Location privacy is equally important risk in IoT
• Should not be any way for attacker to reveal
identity or location information of device
Non-repudiation and Availability
• Non-repudiation is the security services
for point-to-point communications
• Process by which an entity is prevented
from denying a transmitted message
• So when message is sent, receiver can prove
that initiating sender only sent that
message
• Sender can prove that receiver got message
• To repudiate means to deny
Non-repudiation and Availability
• Availability is ensured by maintaining all h/w,
repairing immediately whenever require
• Also prevents bottleneck occurrence by
keeping emergence backup power systems
• And guarding against malicious actions
like Denial of Service (DoS) attack
Security Model for IoT