Blog

IoT_Blog-copy.png

How security implications affect Internet of Things

As every player with a stake in IoT is aware, security is paramount for the safe and reliable operation of IoT connected devices. It is, in fact, the foundational enabler of IoT. Where there is less consensus is how best to implement security in IoT at the device, network, and system levels.

Network firewalls, Intrusion Prevention Systems, and protocols can manage the internet traffic coursing through the network, but how do we secure deeply embedded endpoint devices that usually have a very specific, defined mission with limited resources available to accomplish it?

These are critical concern that must be addressed to enable several current and future applications. Existing solutions are often not integrated into the entire system, and sometimes they violate the criteria that designers have taken into consideration from the beginning.

Get the WhitePaper on security implications that affect Internet of Things

Enter your email address to grab your copy of our white paper on Internet of Things in Healthcare

ATTACKS ON IoT SYSTEMS

  1. Physical Attacks
    These types of attacks tamper with the hardware components and are relatively harder to perform because it requires expensive material. Some examples are de-packaging of chip, layout reconstruction, micro-probing, and particle beam techniques.
  2. Side Channel attacks
    These attacks are based on “side channel Information” this information can be extracted from a device that is neither the plaintext to be encrypted or the ciphertext resulting from the encryption process. Encryption devices produce information that is easily traceable. Side channel attacks make use of some or all of this information to extract the key the device is using.
  3. Cryptanalysis attacks
    These attacks are focused on the ciphertext and they try to break the encryption, i.e. find the encryption key to obtain the plaintext. Examples of cryptanalysis attacks include Ciphertext-only attack, Known-plaintext attack, Chosen-plaintext attack, Man-in-the-middle attack, etc.
  4. Software Attacks
    Software Attacks are the major source of security vulnerabilities in any system. With little computing power the devices, brute force attacks can be easily executed. Software attacks exploit implementation vulnerabilities in the system through its own communication interface. This kind of attack includes exploiting trojan horse programs, buffer overflows and worms or viruses to deliberately inject malicious code into the system.
  5. Network Attacks
    Wireless communications systems are vulnerable to network security attacks due to the broadcast nature of the transmission medium. Basically, attacks are classified as active and passive attacks. Examples of Passive attacks include Monitor and Eavesdropping, Traffic Analysis, Camouflage Adversaries, etc.

BUILDING SECURITY IN FROM THE FOUNDATION BLOCKS

Knowing no one single control is going to adequately protect a device, how do we apply what we have learned to implement security in this scenario? We do so through a layered approach to security which starts at the inception when power is applied, establishes a handshake of trusted computing baseline, and anchors that trust in something immutable that cannot be tampered with.
Embedded security refers to building security in from the start i.e. security features built into a device. Some of the major building blocks for embedded security for IoT are:

  • Cryptographic Algorithms
    This is the essential foundation of a strong security solution within IoT. The design constraints placed on IoT sensors require lightweight, highly optimized, easily deployable cryptography scheme that provides high levels of security while at the same time minimizing memory usage and power requirements.
  • Secure Storage
    Cryptographic algorithms involve keys as their root for operation. Since the algorithms are published and known to all, which also includes potential attackers. Thus, defending the secrecy of the key is a significant issue for security. Secure Storage fundamentally deals with shielding access to keys and other pieces of data.
  • Secure Boot
    The idea of Secure Boot is to transport the system to a recognized and trusted state. The Secure Boot routine is a ROM-based routine. Therefore, an attacker cannot interrupt the process. Extra features are essential to provide a complete Secure Boot solution.
  • Secure JTAG
    Most of the embedded devices have a JTAG interface for debugging. However, if this is not properly secured, this interface is open to the risk of becoming an attack vector within the solution. Some solutions allow the regulation of JTAG access using One Time Programmable eFuses:
  1. Disabled JTAG: This mode provides the highest level of security. All critical JTAG features are permanently blocked. This mode is not always recommended as sometimes there is a requirement of boundary scan which could affect the RMA procedure.
  2. Disabled debugging: This mode prevents debugging but allows for the boundary scan functionality to be enabled. This solution is the recommended mode for ensuring the maximum level of security.
  3. Enabled: This solution provides the lowest level of security and is the default setting of devices.
  4. Secure: This mode provides high security. JTAG use is regulated by a 56-bit secret key-based challenge/response authentication mechanism.
  5. Secure Execution Environment (SEE)
    It refers to a processing unit which is capable of executing applications in a protected manner.
    Secure Execution Environment refers to a plurality of distinct virtual machines that are created and operate simultaneously and distinctly from one another. This includes at least one virtual machine to implement trusted guest software in a secured memory area and another virtual machine to deploy a non-trusted guest operating system (OS) parallelly in an unsecured memory area.

END-TO-END SECURITY SOLUTION: The Way Ahead….

Security at both the device and network levels is critical to the operation of IoT. The same intelligence that enables devices to perform their tasks must also enable them to recognize and counteract threats. Fortunately, this does not require a revolutionary approach, but rather an evolution of measures that have proven successful in IT networks, adapted to the challenges of IoT and to the constraints of connected devices.

Get the WhitePaper on security implications that affect Internet of Things

Enter your email address to grab your copy of our white paper on Internet of Things in Healthcare

adminHow security implications affect Internet of Things
Share this post

Join the conversation