Security factors in IoT devices

by Jun 20, 2020Articles

Limited only by designers’ imaginations, the Internet of Things (IoT) is changing how people live. From medical devices and fitness trackers to tank sensors. Heights of mountains to the depth of ocean IoT is everywhere.

However, by relying on wireless networks, those hundreds of millions of IoT devices present a greater “attack surface”. Making them tempting frontline targets for competitors, hackers, disgruntled employees. Unfortunately, the tools and techniques we’ve applied to PC/smartphone platforms often don’t work well in the IoT for copious reasons.

  1. Limited resources: IoT devices typically have far less battery power, processing speed, and memory. They lack the power and sophistication required to support traditional security measures.
  2. Data complacency: Many companies view the data in their IoT networks as mundane and having little intrinsic value outside the organization. But many breaches are motivated by other factors, such as competitive advantage, social status, or revenge.
  3. Tools: even part-time workers and hobbyists can analyze, modify IoT devices with easy access to tools and expertise in IoT
  4. No physical access necessary: One of the advantages of the IoT is that devices can be remote. Be configured without the need for dispatching a truck. However, thanks to wireless connections, hackers don’t need physical access to devices such as USB or other I/O ports.

Security threats for IoT devices

Confidentiality: This intrusion exposes sensitive or confidential information, including the viewing of data in the actual device or the cloning of device firmware itself.

Service theft: The criminal uses authentication weaknesses or failures to enable unauthorized devices to access data, services, upgrade feature is unlocked without authorization.

Data Integrity: A corruption of information where unauthorized messages are introduced into a network or control of a device is taken over by an unauthorized party

These three are one of the most common security risks faced while constructing an IoT device.

Things to lookout for when constructing an IoT device

Packet Encryption

This is the “go-to” method for protecting data exchanges in IoT solutions with smaller embedded terminal devices. Most systems have the resources to implement basic encryption, such as FIPS-197/AES, which can protect messages from unauthorized viewing or malicious changes.

 Every encryption technique is breakable, but its efficiency is calculated with the time it can withstand an attack. But in today’s world, as cloud computing comes with almost unlimited computing resources, the present-day encryption techniques might become inadequate for securing confidential data in transmission and after transmission. Existing encryption techniques, encrypt the whole data packets in a session using the same session key. If a third party can decrypt a single packet during or after transmission, all the packets in that session can be compromised. This work proposes a packet encryption scheme, where a packet key once used will never be used throughout the session, with minimal latency and maximum security for real-time mobile cloud applications.

Replay Protection

A replay attack is a category of network attack in which an attacker detects a data transmission and fraudulently has it delayed or repeated. The delay or repeat of the data transmission is carried out by the sender or by the malicious entity, who intercepts the data and retransmits it. In other words, a replay attack is an attack on the security protocol using replays of data transmission from a different sender into the intended into receiving system, thereby fooling the participants into believing they have completed the data transmission. This can also be part of an encryption mode
that will use this information within a block cipher. Examples of this are the AES counter mode block cipher.

Message Authentication Code

 A message authentication code (MAC). Sometimes known as a tag is a short piece of information used to authenticate a message. The MAC value protects both a message’s data integrity as well as its authenticity. Allowing verifiers (who also possess the secret key) to detect any changes to the message content.

Let us now try to understand the entire process

  1. The sender uses some publicly known MAC algorithm. Inputs the message and the secret key K and produces a MAC value.
  2. Similar to the hash, MAC function also compresses an arbitrarily long input into a fixed-length output.
  3. The sender forwards the message along with the MAC. Here, we assume that the message is sent in the clear, as we are concerned about providing message origin authentication. Not confidentiality. If confidentiality is required then the message needs encryption.
  4. On receipt of the message and the MAC, the receiver feeds the received message. The shared secret key K into the MAC algorithm and re-computes the MAC value.
  5. The receiver now checks the equality of freshly computed MAC with the MAC received from the sender.
  6. If they match. Then the receiver accepts the message and assures himself that the message has been sent by the intended sender.
  7. If they don’t then. The receiver cannot determine whether it is the message that has been altered

Pre-Shared Keys

pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.

Secure IoT communications require access to compatible keys. The use of pre-shared keys (PSKs) minimizes the demands on the resource-constrained device. Keys can be transferred through an independent, secure channel and then manually entered into the terminal device. While the overall system to share the keys may have some complexity, the demands on the actual terminal device are minimal. When allowed by the application.

Transport Layer Security

Transport Layer Security (TLS) provides a standard framework for PKE and encryption to secure traffic between devices. However, for resource-limited embedded systems, the memory and processing requirements for the TCP/IP stack may be impossible to support. That’s why TLS is often used on larger embedded systems where communication occurs in IP sessions such as TCP. Even smaller embedded systems may have the resources to support TLS, but this requires careful evaluation.

Wi-Fi Protected Access (WPA2)

Wi-Fi Protected Access (WPA) is a security certification program developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).

When an embedded terminal device uses Wi-Fi (802.11) for communication, the WPA2 suite of standards can secure the communication channel. This widely deployed protocol allows the interoperability of systems from different design authorities. However, it is generally beyond the reach of smaller embedded systems unless specialized Wi-Fi-dedicated coprocessors are present.

Conclusion

Security threats to embedded devices in IoT solutions are increasingly common, as attacks have become easier to carry out. These can include confidentiality breaches, service theft, data integrity, and service availability. IoT systems have unique security requirements and challenges, mostly due to resource limitations. Six core methods (packet encryption, message replay protection, message authentication code, Wi-Fi Protected Access, Transport Layer Security, and pre-shared keys) are typically compatible with the unique needs of M2M terminal devices

Creating a multiplication Skill in Alexa using python

Written By Monisha Macharla

Hi, I'm Monisha. I am a tech blogger and a hobbyist. I am eager to learn and explore tech related stuff! also, I wanted to deliver you the same as much as the simpler way with more informative content. I generally appreciate learning by doing, rather than only learning. Thank you for reading my blog! Happy learning!

RELATED POSTS

5 Booming Technologies in IoT to watch out for in 2022

5 Booming Technologies in IoT to watch out for in 2022

Introduction Internet of Things - IoT is one of the industries that has experienced an exponential rise in the past few years. With technology on the rise, we expect this field to grow even further in the coming years. It is one of the most important technologies...

Furtherance to SIM Technology: eSIM and embedded SIM

Furtherance to SIM Technology: eSIM and embedded SIM

eSIM (electronic SIM) and embedded SIM are two different terms. While both are under development and can be incorporated in IoT. They will result in more efficient SIM technology combined with the fast-growing and in-demand 5G network. Before going into the details...

The Internet of Nano Things (IoNT): Evolution of a new era

The Internet of Nano Things (IoNT): Evolution of a new era

Internet of Nano Things The internet of nano-things (IoNT) is a network that connects a collection of very small devices to transport data. The internet of nano-things is similar to the internet of things. The only difference is that the devices present inside it are...

10 Innovations in IoT Using 5G

10 Innovations in IoT Using 5G

5G usage cases typically depend on the improved speed and stability of 5G, as well as the reduced latency it provides, and they have the potential to disrupt both conventional and digital industries. And, in the coming months, years, and decades, 5G technology will...

What is IoRT(Internet of Robotic Things)

What is IoRT(Internet of Robotic Things)

The IoT and robotics, two different fields, are coming together to create IoRT (Internet of Robotic Things). The IoRT is a concept in which intelligent devices can monitor the events happening around them, fuse their sensor data, use local and distributed intelligence...

Discover the Top 5 proven Use cases of IoT data analytics

Discover the Top 5 proven Use cases of IoT data analytics

Billions of connected IoT devices are generating a massive amount of data every second. Meanwhile, as the IoT is booming this data generation has exponential growth. This data needs to be analyzed in order to retrieve insights out of this data. Further, these insights...

Data Analysis role in IoT

Data Analysis role in IoT

Before diving into Data analysis role in IoT, let us first understand what data analysis exactly mean What is Data Analysis? According to Wikipedia, Data analysis is a process of...

What is the future of IoT?

What is the future of IoT?

IoT or the Internet of Things describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the Internet. The definition of...

IoT Security Solutions

IoT Security Solutions

Introduction IoT is one of the emerging technology. Moreover, this has its own risks and rewards. IoT devices sure make our lives simpler and automate a lot of processes. By now there are billions of IoT devices which include Smart TVs, Smart Refrigerators, Smart...

The relation between Embedded Systems and IoT

The relation between Embedded Systems and IoT

Embedded systems are the major part of our technological advances, found in everyday items such as – microwave oven, washing machine, remote control, RFID tags, routers, modems, PDAs, mobile phones etc. However, we’re in a new era of internet-based...

VIDEOS – FOLLOW US ON YOUTUBE

EXPLORE OUR IOT PROJECTS

IoT Smart Gardening System – ESP8266, MQTT, Adafruit IO

Gardening is always a very calming pastime. However, our gardens' plants may not always receive the care they require due to our active lifestyles. What if we could remotely keep an eye on their health and provide them with the attention they require? In this article,...

How to Simulate IoT projects using Cisco Packet Tracer

In this tutorial, let's learn how to simulate the IoT project using the Cisco packet tracer. As an example, we shall build a simple Home Automation project to control and monitor devices. Introduction Firstly, let's quickly look at the overview of the software. Packet...

All you need to know about integrating NodeMCU with Ubidots over MQTT

In this tutorial, let's discuss Integrating NodeMCU and Ubidots IoT platform. As an illustration, we shall interface the DHT11 sensor to monitor temperature and Humidity. Additionally, an led bulb is controlled using the dashboard. Besides, the implementation will be...

All you need to know about integrating NodeMCU with Ubidots over Https

In this tutorial, let's discuss Integrating NodeMCU and Ubidots IoT platform. As an illustration, we shall interface the DHT11 sensor to monitor temperature and Humidity. Additionally, an led bulb is controlled using the dashboard. Besides, the implementation will be...

How to design a Wireless Blind Stick using nRF24L01 Module?

Introduction Let's learn to design a low-cost wireless blind stick using the nRF24L01 transceiver module. So the complete project is divided into the transmitter part and receiver part. Thus, the Transmitter part consists of an Arduino Nano microcontroller, ultrasonic...

Sending Temperature data to ThingSpeak Cloud and Visualize

In this article, we are going to learn “How to send temperature data to ThingSpeak Cloud?”. We can then visualize the temperature data uploaded to ThingSpeak Cloud anywhere in the world. But "What is ThingSpeak?” ThingSpeak is an open-source IoT platform that allows...

Amaze your friend with latest tricks of Raspberry Pi and Firebase

Introduction to our Raspberry Pi and Firebase trick Let me introduce you to the latest trick of Raspberry Pi and Firebase we'll be using to fool them. It begins with a small circuit to connect a temperature sensor and an Infrared sensor with Raspberry Pi. The circuit...

How to implement Machine Learning on IoT based Data?

Introduction The industrial scope for the convergence of the Internet of Things(IoT) and Machine learning(ML) is wide and informative. IoT renders an enormous amount of data from various sensors. On the other hand, ML opens up insight hidden in the acquired data....

Smart Display Board based on IoT and Google Firebase

Introduction In this tutorial, we are going to build a Smart Display Board based on IoT and Google Firebase by using NodeMCU8266 (or you can even use NodeMCU32) and LCD. Generally, in shops, hotels, offices, railway stations, notice/ display boards are used. They are...

Smart Gardening System – GO GREEN Project

Automation of farm activities can transform agricultural domain from being manual into a dynamic field to yield higher production with less human intervention. The project Green is developed to manage farms using modern information and communication technologies....