Introduction to IoT Security
Introduction to IoT Security
CAPACITY POLICY
Hands on activities Support MS & COM in
Policy implementation
Harmonisation across EU
EXPERTISE
Recommendations
Independent Advice
4
ENISA’s efforts on IoT Security
5
ENISA’s efforts on IoT Security
6
IoT security in sectors
7
ENISA and IoT cybersecurity
https://enisa.europa.eu/iot
8
IoT 101
What is IoT to you?
10
IoT
“
ENISA defines IoT as a cyber-physical ecosystem
of interconnected sensors and actuators which
enable intelligent decision making.
” 11
Sensor
12
Sensor
• accelerometers
• temperature sensors
• pressure sensors
• light sensors
• acoustic sensors
13
Actuator
14
Actuator
15
Sensor + Actuator + ..
• medical implants
• wearables (smart watches)
• connected lights
• smart thermostats
16
Intelligent Decision Making
17
Everything becomes connected
Business side
• “Everything connected” hype
- Competitors do IoT, hence we must do
IoT
- Competitors don’t do IoT, let’s be the
first one!
• Financial gains
• New business models and
opportunities
• Advanced data collection and
processing
18
19
Components of IoT?
20
IoT Ecosystem
CLOUD PLATFORM,
BACKEND AND
SERVICES
GATEWAYS
• Smart appliances
• Smartphones
• Smart ‘things’
22
IoT Components - Communications
• WiFi
• Zigbee
• Z-Wave
• NFC SESSION AMQP, CoAP, DDS, MQTT, XMPP
• RFID DATALINK
ROUTING CARP, RPL
Bluetooth / BLE, Wi-Fi / Wi-Fi HaLow, LoRaWAN, Neul, SigFox, Z-Wave, ZigBee, USB
• BLE
• LoRAWAN
• MQTT/SIP/CoAP
23
24
25
IoT Components - Cloud
26
IoT Cloud platform
27
IoT Components - Use case / context
• Consumer Electronics
• Automotive
• Healthcare
• Industrial IoT
• Wearables
• Logistics
• Sport & Fitness
28
What are the assets of
IoT?
Group of 4 – 5’
29
IoT Assets
30
Development for IoT
31
IoT development platforms
• ThingBox
• Node-RED
• M2MLabs Mainspring
• Kinoma
• Eclipse IoT Project
• Arduino
32
IoT hardware platforms
• Apio • OpenPicus
• Arduino Nano • panStamps
• Arduino Pro Mini • PicAxe
• Arduino Uno • Pinoccio
• Arduino Yún • Raspberry Pi 2
• Arietta G25 • RasWIK
• BeagleBoard • SAM R21 Xplained Pro
• Flutter • SmartEverything
• Flutter • SODAQ
• IMUduino BTLE • SparkFun RedBoard
• Intel Edison • Tessel
• Intel Galileo • Tessel 2
• Libelium Waspmote • The AirBoard
• LightBlue Bean • The Rascal
• Local Motors Connected Car • TinyDuino
• Microduino • UDOO
• Nanode • WIOT
• OpenKontrol Gateway • XinoRF
33
IoT software platforms
34
IoT Iintegration platforms
• Canopy
• Chimera IoT
• DeviceHive(IoT Integration Tools and Horizontal Platforms )
• net
• Distributed Services Architecture (DSA)
• IoT Toolkit
• M2MLabs Mainspring
• Mango
• Nimbits
• Open Source Internet of Things (OSIOT)
• OpenRemote
• Pico Labs (Kynetx open source assigned to Pico Labs)
• prpl Foundation
• RabbitMQ
• SiteWhere
• ThingSpeak
• webinos
• Yaler
35
Node-Red
https://nodered.org/
Presentation Title | Speaker Name ( To edit click Insert/ Header & footer) 36
IoT Security
What could possibly
go wrong?
38
What could possibly go wrong?
39
Based on a real life example
• IoT botnet
• IoT devices used for DDoS attacks
40
Why IoT security matters?
No device is fully secured
• Reliance on third-party components, hardware and
software
• Dependency on networks and external services
• Design of IoT/connected devices
• Vulnerabilities in protocols
• Security by design NOT the norm.
41
IoT Security – Main challenges
44
IoT Threat Landscape
45
Which way would you attack IoT?
Attack scenarios
46
Many ways to attack IoT
47
IoT Attack Scenarios
48
IoT Attack Scenarios
49
Class Exercise
Botnet (Mirai)
51
Shodan
Shodan
IP Angry
52
What to understand
53
IP Angry
54
Code of a Botnet
55
IoT Security Architectures
56
High-level IoT reference model
57
Case-study
Demo on Smart Health Security
Sensor
1 High
Sensor
1 = red (RGB sensor)
0 = green
-1 = blue 0 Med
Display?/LED
-1 Low
59
Interconnectivity
Sensor
(RGB sensor)
1 = red
0 = green
-1 = blue
reading
60
Decision Making
0 Med
If(red)
add blue
-1
Low
If(green)
do nothing
If(blue)
add red
61
Actuator
If(red)
add blue
62
Scenario 1: Sensor tampering
modifying the values read by sensors or their threshold values and settings
63
Real life practice – Electronic
thermometer
64
Scenario 2: Man-In-the-Middle
modifying the values intercepted from the man in the middle
65
Real life practice – Pacemaker
66
Scenario 3: Unauthorised access
modifying or sabotaging normal settings of the device
67
Real life practice – Unauthorised
syringe injections
68
Summary
• IoT 101
• IoT Security
• Challenges
• Threats
• Attack scenarios
• Case-study
69
What follows..
Lab exercises on
BLE attacks
Time to set up the VMachines!
70
Thank you
1 Vasilissis Sofias Str, Maroussi 151 24, Attiki, Greece
www.enisa.europa.eu