Get IoT security issues Gilchrist free all chapters
Get IoT security issues Gilchrist free all chapters
com
https://textbookfull.com/product/iot-security-issues-
gilchrist/
OR CLICK BUTTON
DOWNLOAD NOW
https://textbookfull.com/product/security-in-iot-social-networks-fadi-
al-turjman/
textboxfull.com
https://textbookfull.com/product/antimicrobial-stewardship-1st-
edition-gilchrist/
textboxfull.com
https://textbookfull.com/product/ubiquitous-computing-and-computing-
security-of-iot-n-jeyanthi/
textboxfull.com
https://textbookfull.com/product/industrial-iot-challenges-design-
principles-applications-and-security-ismail-butun/
textboxfull.com
Demystifying Internet of Things Security: Successful IoT
Device/Edge and Platform Security Deployment Sunil Cheruvu
https://textbookfull.com/product/demystifying-internet-of-things-
security-successful-iot-device-edge-and-platform-security-deployment-
sunil-cheruvu/
textboxfull.com
https://textbookfull.com/product/flexible-network-architectures-
security-principles-and-issues-first-edition-rudra/
textboxfull.com
https://textbookfull.com/product/iot-security-and-privacy-paradigm-
internet-of-everything-ioe-1st-edition-souvik-pal-editor/
textboxfull.com
https://textbookfull.com/product/the-iot-architects-guide-to-
attainable-security-and-privacy-1st-edition-damilare-d-fagbemi/
textboxfull.com
https://textbookfull.com/product/security-designs-for-the-cloud-iot-
and-social-networking-first-edition-chintan-m-bhatt/
textboxfull.com
Alasdair Gilchrist
IoT Security Issues
Alasdair Gilchrist
IoT Security
Issues
First Edition
PRESS
ISBN 978-1-5015-1474-6
e-ISBN (PDF) 978-1-5015-0577-5
e-ISBN (EPUB) 978-1-5015-0562-1
www.degruyter.com
|
To Rattiya and Arrisara
Acknowledgements
Much of the research in this book stems from Internet research based on published
industry reports from Gartner, Cisco, Beecham’s, Pew Research Center among
many others. I would also like to acknowledge the many security resources availa-
ble on the Internet such as Privacy International, OWASP, Microsoft Technet, and
the Online Trust Alliance. Additionally, little of the section on Internet surveillance
would have been possible to verify had it not been for the Guardian and Washing-
ton Posts published articles on the Edwards Snowden files and the Guardian’s arti-
cles on the Investigatory Powers bill in the UK.
I would also acknowledge the efforts of Jeffrey Pepper and Megan Lester at
De Gruyter for their efforts in publishing this book, as well as Stephanie Defrayne,
Angie MacAllister and Scott MacAllister for their copy editing, technical verifica-
tion and formatting help.
Contents
Introduction | 1
Clash of Cultures | 37
Developers and the Security Puzzle | 38
Reputational loss | 40
Flawed firmware | 76
Code re-use | 76
The issue with open source | 77
Part V: Trust
Chapter 20 – The IoT of Trust | 169
Trust between partners – there isn’t that much about | 170
IBM Vs. Microsoft | 171
Apple vs. Samsung | 171
Uber Vs Crowdsources drivers | 172
Manufacturer and customer trust model | 172
Dubious toys | 173
Kids play | 174
Index | 257
Introduction
IoT Security Issues looks at the burgeoning growth of the multitude of devices
controlled by the Internet, where product comes first and security second. In this
case, security trails badly. This book examines the issues surrounding these prob-
lems, vulnerabilities, what can be done to solve the problem, investigating the
stack for the roots of the problems and how programming and attention to good
security practice can combat the problems today that are a result of lax security
processes on the Internet of Things.
This book is for those interested in understanding the vulnerabilities on the
Internet of Things, such as programmers whose primary focus is not the IoT, se-
curity professionals, and a wide array of interested hackers and makers. This
book assumes little experience or knowledge of the Internet of Things on the part
of its readers. To fully appreciate the book, limited programming back- ground
would be helpful for some of the later chapters, though the basic con- tent is
explained.
The author, Alasdair Gilchrist, has spent 25 years as a company director
in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/
SDN/NFV technologies, as a professional technician, support manager, net-
work and security architect. He has managed both agile SDLC software devel-
opment projects as well as technical network architecture designs. He has ex-
perience in the deployment and integration of systems in enterprise, cloud,
fixed/mobile telecoms, and service provider networks. He is therefore knowl-
edgeable in a wide range of technologies and has written a number of books in
related fields.
DOI 10.1515/9781501505775-001
|
Part I: Making Sense of the Hype
The hype surrounding the IoT that consumers have been subjected to over the
last decade is truly astonishing. We have been told that 50 billion devices will be
connected to the Internet and communicating with one another, and that they
will deliver untold of pleasures. An Internet of 50 billion devices all sharing data
and collaborating will produce a lifestyle experience that was impossible to con-
sider even a decade ago. We will have autonomous vehicles, drones delivering
parcels, even drones as air taxis, bots answering contact centres and even the
possibility of cyber-sex with virtual reality robots.
The problem is that we cannot just accept the hype as consultants, security
practitioners and regurgitate this to our clients – we must keep an open mind and
try to balance evangelism versus skepticism.
So, where has the promise of the Internet of Things gone astray? After all, we
were promised a new world not so long ago, a world that heralded the connectiv-
ity of devices that would make our lives so easy and fulfilling.
Did the proponents of the IoT overstate their case? Did they perhaps believe
that the IoT would escalate to a disruptive level, such as the smartphone and the
tablet? Perhaps they did, but we are still not seeing that through future projec-
tions, which still look optimistic.
In this section, we will consider why the IoT has not grown exponentially as
predicted, and why consumers are so reticent to embrace the technologies. After
all, when we think in terms of securing the IoT, we need to understand why the
public has not embraced a truly innovative array of solutions and products as
they have other technologies.
Therefore, in this opening chapter, the consideration in regard to how con-
sumers can analyze the hype and come to realistic terms with the IoT.
DOI 10.1515/9781501505775-002
Chapter 1 – The Consumer Internet of Things
The Internet of Things, is a real enigma, not only is it such a vague term, covering
all sorts of network capable connected things, which can be anything from a light
bulb to a car to a home security system. It also appears to have almost unlimited
scope bringing just about any modern consumer gadget or technical appliance,
under its umbrella by virtue of its very loose definition.
From WhatIs.com:
“The Internet of Things (IoT) describes the revolution already under way that is seeing a
growing number of Internet-enabled devices that can network and communicate with each
other and with other web-enabled gadgets. IoT refers to a state where Things (e.g. objects,
environments, vehicles and clothing) will have more and more information associated with
them and have the ability to sense, communicate, network and produce new in- formation,
becoming an integral part of the Internet.”
By Technology Strategy Board – IoT Special
Interest Group
There are many more definitions of the IoT that can leave us bemused, but if we
cannot agree on a definition then how can we secure it?
DOI 10.1515/9781501505775-003
6 | Chapter 1 – The Consumer Internet of Things
continue to see a significant industrial and agricultural increase in the role sen-
sors and other IoT devices will play. But the consumer market continues to trail
expectations.
Gartner and General Electric have major interests in the field; however, they
are a bit more reticent and have a restricted scope of the IoT to sensors and de-
vices. As a result, they are making a more conservative forecast of the IoT’s short-
term growth and financial potential. Hence they are speaking 20-25 Billion de-
vices and 1.9 trillion new dollars spent by 2020.
These forecasts, regardless of the variance between the two sets of figures,
are astonishing predictions. Yet, perhaps not; this may well be due to the ambig-
uous nature of these things. Initially, when we consider these new things it is
typical to think of network-connected devices and gadgets such as wearable’s,
like the smart watch and the fitness bands. Some other, commonly identified con-
sumer IoT devices are the smart thermostat, light bulbs and the smart TV.
Cisco and their fellow supporters of IoT, with some justification, claim that
this wave of new consumer buying will produce trillions in new dollar spending
across the IoT in the consumer, industrial, enterprise and commercial land-
scapes. Furthermore, in 2015, Gartner said that 6.4 billion ‘things’, might be con-
nected and in use in the consumer IoT ecosystem alone by 2016. Furthermore,
they predicted an acceleration of 5.5m devices per day joining the consumer IoT
from 2016 onward.
The skeptics do have a point; for even if we accept the lower forecasts of 20
billion IoT devices, installed and networked by 2020, this would require a tremen-
dous amount of spending and installation effort over the coming years. Further-
more, what areas will see the greatest adoption and deployment? Recent surveys
indicate that it will not be in the consumer IoT environment, which is contrary to
much of the market’s belief. Will it be in the enterprise, commercial or the indus-
trial ecosystems?
The industrial IoT is the obvious area of adoption as it has had M2M for dec-
ades and the IoT conceptually at least is merely a slight evolution. Indeed, many
engineers in operational technology mock the term IoT as being nothing more
than the M2M (with hype) as they have worked with this technology under a dif-
ferent name for decades. From a security perspective, this is actually good news,
because it means that at least one major sector of the IoT domain has the potential
risk well-in-hand.
and skepticism prevailed over their initial desire for life- changing products. As
far as the majority was concerned, they were not ready to buy as they doubted
whether the technology had advanced enough, and that is preventing the IoT
from really taking off.
Seven in ten shoppers told Deloitte they would not be buying any connected
devices over the next twelve months and the only kinds of connected products
owned by more than one in thirty households were smart TVs, entertainment sys-
tems and games consoles, although they discounted smartphones.
Just three percent of people had a connected security system, the same num-
ber as owned a smart thermostat. Only two percent had any form of home appli-
ance, such as a fridge, cooker or kettle that connected to the Internet. However,
in a more upbeat sign of the IoT potential, 40 percent of consumers responded
that they would consider buying a smart device when they come to upgrading
their current appliances.
The IoT would not be itself without another example of its inherent contra-
diction and paradox. Gartner’s surveys in 2016 supports a contradiction to the
theory of the Internet of Nothing, in recent polls among others, the results did
suggest that the IoT had reached a tipping point in public acceptance. For just
over 35% of the respondents claimed to have bought an IoT device in the last year
(2015), which equates to just over 1/3rd of the population, and 70% – which is over
2/3rds – intended to buy an IoT device within the next 12 months (2016- 2017) so
at least the future looks bright.
homes, could well go unnoticed. One product that would skew results signifi-
cantly in any poll is the classification of the smartphone.
Before the consumer leaps in though, they might be wise to look under the
bonnet to see what they are actually purchasing. A risk assessment and cost/ben-
efit examination of the consumer ecosystem would be advantageous. What is the
IoT actually delivering as a benefit to the consumer that is worth them spending
their hard-earned money?
Customer’s do cost/benefit and risk assessments even though they might
know it. Yes, they will not know the terms, but they do know the process. For
example, when they purchase a Wi-Fi router they will almost certainly have been
informed about the security issues. The threat is obvious, yet they will decide to
implement or not bother with encryption or authentication. Why is that?
What tends to happen is that consumers do actually go through risk assess-
ment and cost/benefit analysis, in that they use their experience, and history to
evaluate the risk. For example, did having an open Wi-Fi or unauthenticated net-
work connection actually cause them visible harm? They may well have listened
to their technical friends and secured the Wi-Fi only to have found it a pain when
hosting guests to a barbecue to go around and configure everyone’s phone. In-
stead, they just switched of authentication and everyone was happy. After all,
how many people can claim to be hacked and that attack rendered actual harm?
This is of course not saying that they were not hacked, they most likely were, but
it just wasn’t harmful and the exploit invisible to them.
They may well be the most productive and virulent zombie within a botnet,
but it is transparent to them. Furthermore, the fact they are a prized zombie (sol-
dier) within that botnet may well be beneficial, as the botnet controller will make
efforts to protect their asset. For example, a malicious piece of malware doesn’t
need to be harmful to the host; indeed, it can be beneficial to the host. It can be
parasitic but also symbiotic, as the controller of the botnet will protect his assets
from other Internet predators – the device will host the malware and the malware
will do the host no harm, even protect it from other dangers.
This ambiguity with IoT security and value is where the marketing of di- verse
IoT products really does become an issue. There appears to be large amounts of
popular media hype, both positive and increasingly negative, that are throwing
out contradictory messages. The positive hype of course is required to create a
market, which enthuses the public, but it does contrast with a lack of fresh, im-
aginative and exciting products. This is noticeable in particular with consumer
IoT when it comes to selling the idea of the automated smart home to the cus-
tomer. It actually is disappointing to read or listen to presentation after presenta-
tion selling the concept of consumer IoT as being limited to a smart thermostat or
a smart fridge. So why do manufacturers and their marketing teams never come
There be Monsters | 11
up with more enthusing examples of the consumer IoT, rather than smart fridges,
toasters and washing machines?
There be Monsters
In a survey in March 2016, 66% of IT professionals stated that security concerns
were the main barrier to them embracing IoT in the enterprise – now this is a
theater where they are adept at securing diverse technologies, certainly since the
adoption of BYOD – although it is getting more difficult. However, when consum-
ers responded in similar market surveys held around the same time, over 70%
12 | Chapter 1 – The Consumer Internet of Things
said they planned to buy an IoT device during the next year. But, why are con-
sumers so ready to walk where IT professionals fear to tread?
If we cast aside skepticism for a minute and accept there are scenarios where
a diverse range of IoT devices that intercommunicate and are interconnected via
an intelligent IoT hub in the home can be wonderful … well the potential is in-
credible, so let’s think …
are stored under refrigeration conditions and the consumer may not want
that information leaked out with the confines of the home. However, in more
complex scenarios where the fridge is learning the eating and drinking pat-
terns of each specific householder, in identifying an individual, then secur-
ing the data would be essential. As any data leakage, from a home that was
not anonymized could be a major privacy issue. Lastly, as the fridge, most
likely will have an embedded OS and computer components, it will be neces-
sary to protect the appliance just like any other computer on the home net-
work. This would mean at least protecting the fridge with AV software and
firewalls to prevent, as in one notorious case, the appliance becoming a
member of a botnet sending out spam emails.
2. Smart lights – This product is actually very popular despite the fact that a
smart bulb is approximately twenty times the cost of an ordinary light bulb
yet it is one of the success stories of the smart home scenario. It is simply an
expensive light bulb that changes its hue and intensity depending on control
from a smartphone app or going on the occupant’s past historic usage and
somehow inexplicably the occupant’s mood. Now how does that work if sev-
eral people are in the room? Are the bulbs going to start flashing during a
dispute and aggravate the situation?
Although, if the smart bulb can interface with a presence detector, it can
also switch on or off depending on when someone enters or leaves a room,
therefore, it could be an energy saving device. However, smart light bulbs,
despite being one of the poster-products of the smart home, have checkered
security.
3. Bluetooth door lock – This is another technology for the sake of it. A device
that has the capability to recognize an occupants approach and automati-
cally open the lock. How is this security improvement over a standard lock?
The dangers with using radio frequencies to control sensitive devices are that
they are very susceptible to frequency jamming. Bluetooth uses adaptively
frequency-hops over 79 channels, which makes it less susceptible to this
threat than other wireless technologies. However, it is still vulnerable to
some commercially available wireless jammers and importantly, Blue- tooth
eaves dropping tools. In addition, security analysts have exploited several
makes of commercial Bluetooth locks using proven field exploits. There will
be more about this later.
4. Smart thermostats – There is also the home thermostat, which learns the
occupant’s environmental preferences and can adjust temperatures
throughout the house in order to make the habitat pleasant and save costs
and energy. This is a good use of inter-connected devices if they could only
14 | Chapter 1 – The Consumer Internet of Things
get them to work; as it is both sensible and based on sound energy and cost
saving principles. One of the issues is that programmable thermostats can
actually increase energy bills if deployed in an old building. The smart
home is the best example of diverse sensors and actuators inter-connecting,
communicating and co-operating through a controller, or a hub as they are
more commonly called, in order to produce a holistic lifestyle experience.
However, as there are so many diverse technologies and protocols typically
deployed in a smart home solution, it is also the most difficult to secure due
to the many diverse threat points.
5. Smart TV – A networked connected TV that connects to the Internet is an in-
teresting idea that utilizes the capabilities of the TV to harness the additional
functionality of the PC. However, by transforming a TV into an Inter- net-con-
nected computer, it is also opening it up to all the same vulnerabilities and
possible exploits. However, if the TV is similar to the other home network
devices placed behind a router using a network address translation, it will be
protected from the external threats out on the Internet. The configuration
flaw that many home Internet connected devices have is that they actually
allow incoming connection by default when they have no requirement to re-
ceive incoming connections. Outgoing connections are handled securely via
NAT. If or when the device requires check-in to a cloud server to look for any
firmware updates, it can do this from an internally initiated outbound con-
nection to a manufacturer’s cloud server. This might mean that a connection
URL is hardcoded into the firmware and that can be a security risk. But as
long as any local DNS servers are identified and secured and the home net-
work is secure, this is not a major issue. However, to mitigate the rogue DNS
threat there should be anti-virus and anti-malware software activated, up to
date, and running across all capable devices on the network. Firmware at-
tacks and hard coding are discussed later.
6. Smart garage door – These devices recognize the occupant’s car approaching
and opens the door but this requires inter-connectivity between the car and
the garage door – in this use case there has to be some method of securely
exchanging the identities of the car and lock mechanism to ensure proper
authentication takes place before the garage door is opened. This could be by
using low power radio protocols such as Z-wave, Bluetooth or ZigBee depend-
ing on the effective range required, but again this is not revolutionary but just
as insecure. Worse, many garage doors have fixed frequencies that they op-
erate on and can easily be hacked just by playing a sequence of frequency
combinations. This is discussed later
Discovering Diverse Content Through
Random Scribd Documents
Hyvä, niinkuin kuutamolla kuljeskellessamme,
Ompi toivo, sielun valo, vaelluksessamme;
Pois, pois epäillys
Erhetyksen yöstä;
Pois, pois pimeys
Tunnosta ja työstä!
J. Juteini
ANNI
Kulkeissani vainiolla
Kuulin Annin laulavan,
Kuulin kuuset takalolla,
Kalliotkin kaikuvan:
Tulan, tulan, tee. :,:
Wapaus on rinnastani,
Rauha, riemu rientänyt,
Yöt ja päivät korvissani
Soittaa sama ääni nyt:
Tulan, tulan, tee. :,:
Kallio
IKÄWÖITSIÄ
J. F. Granlund
Nouse länsi-tuulinen ja
perhosena lennä,
Ett'ei kanteleeni suru
metsään saisi mennä.
Lennätä se kullalleni,
kauvas metsän taahan,
Yli suon ja yli järven,
toiseen taka-maahan!
J. F. Granlund
(Ruotsinkielisestä)
Kaukana nä'in
Purjehen, lennossa läntehen päin.
Hauska on seurata vielä
Friitjoa siellä!
Lainneinen, so'!
Hiljastu! rientää se muutonkin jo.
Loistakaa tähtiset noille
Purjehtijoille.
Muotoses saan
Neulojen liinasen kulmalle vaan:
Siiviss' on hopia multa,
Warpaiksi kulta.
Haukalta sai
Frejakin siivet, ja niillä hän kai
Lenteli lystinsä vuoksi
Kultansa luoksi.
Haukkanen so'!
Katsos nyt kanssani lainneille, jo!
Ah, mutta eipä nyt vielä
Näy häntä siellä.
Kuolluna mun
Löytää hän vissiin, ja hengissä sun.
Terveiset saa sitte sulta
Itkevä kulta.
J. F. Granlund
Ilakoiten ilta-henki
Ulpukoita uittelee,
Nukkuvaisen kukkasenki
Hieno-huulet suutelee.
Uskollinen olevansa
Wanno varsin kuolemaan;
Eipä liene armastansa
Häntä saatu unhottaan.
Hiljasesti kyhkyläinen
Kumppaninsa kyljessä.
Laulurastas yksinäinen
Kuultelee hän tyttöä.
Yö jo maita peitteleepi
Warjohonsa; uupuva
Ääni viimein vaikeneepi
Walittava rannalta.
Sinne aina iltasella
Palas nuori neitonen,
Siellä tahto odotella
Tulemista sulhasen.
Wiipymättä vihkiääpi
Rakkaus he rauhassa,
Suosiolla säilyttääpi.
Onnen oivan runsasna.
A. Warelius
NEITON KUOLLO
Kanteleinen kajahteli
Sulhasensa ilossa;
Neiton silmät tipahteli
Wettä kuumaa huolissa.
Keviästi kevä-tuuli
Sai sen latvan häilymään,
Waikka aina kukka luuli
Ruusujensa säilyvän.
J. G. D–n
IDA JA FRANS ALFRED
Sammaltunut kota,
Heklan juuressa,
Waston tuulten sotaa
Puiten suojassa;
Murhe vielä
Kaipaa siellä
Kukkaa, myrskyn kaatamaa,
Idaa, jonk' on vielä
Risti haudalla.
Tytärtänsä suree
Wanha vaikiast’,
Tauti häntä puree
Yltä haikiast’.
Ida kuule!
Älä luule
Fransis menneen tuonelaan;
Häntä kohta sulle
Lähden noutamaan.
(Kansan-laulu)
(Kansan-laulu)
(Kansan-laulu)
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com