Week 1-10 uu
Week 1-10 uu
Evolution of Internet
Customizes ^fragmented
Smart cities
Definition an urban area that uses different types of electronic data collection sensors to supply information which is used to
manage assets and resources efficiently.
How it work data collected from citizens, devices, and assets that is processed and analyzed to monitor and manage
example: traffic and transportation systems, power plants, water supply networks, waste management, law
enforcement, information systems, schools, libraries, hospitals,
concept 1- integrates information and communication technology (ICT), and various physical devices connected to the
network IOT
2- to optimize the efficiency of city operations and services and connect to citizens
Aim 1-make a better use of the public resources,
2-increasing the quality of the services offered to the citizens,
3-while reducing the operational costs of the public administrations
Aim achieved by deployment of an urban IoT = communication infrastructure
unified, simple, and economical access , potential synergies (benefits), increasing transparency to the citizens
Smart cities service:
1. Structural Health of Buildings 6. Traffic Congestion
2. Waste Management 7. City Energy Consumption
3. Structural Health of Buildings 8. Smart Parking
4. Waste Management 9. Smart Lighting
5. Air Quality
Week2:
Vehicles
2-Self-driving Vehicles (SDV) make use of sensor data and connected
1-Connected: communicate with peers and infrastructure
vehicle
100M+ LoC = Complexity = vulnerabilities
Significant Code
Integration with other systems
Vehicles Communication
1-V2V : Vehicle-to-vehicle Communication Slow down I’m taking left
2-V2I : Vehicle-to-infrastructure Communication Slow down , Ambulance passing by
3-V2X :Vehicle-to-application Door not close
4-DSRC: Dedicated Short Range Communications SATCOM, Bluetooth-LE, NFC, WiFi, Cellular(4G/LTE, 5G)
Threats:
Actor : Threats: Impact:
1-Identifies vulnerability in SDV code 1-Shakes confidence in CV technology
2-Unauthenticated APIs 2-Lowering windows etc
1-Hacker 3-Gains access to SDV through exposed IP 3-Zero-day published and in wild for others to
address (For example, infotainment system; AP) use
4-Sensor spoofing (For example, LIDAR) 4-Cause a vehicle to run into a pedestrian
-Vehicle owner is denied access to vehicle
2- Criminal/Organized Crime ($$)Ransom ware on vehicle -Vehicle owner is stalked by criminal/other
-Vehicle is crashed
1-Denial of Service against traffic infrastructure
2-Infiltrates the supply chain to install malware
3- Nation-State within SDV or ecosystem Widespread impact event
3-May attempt to circumvent safety
systems/controls
Age of the IoT:
-Merge SDVs and CVs with other IoT domains
-so New Integration Point = New Potential attack point
stakeholders participating growing the cloud help us with:
Cloud -New Integrations point facilitated through the cloud
Example:Traffic management systems
The Certificate Process:
IOT DEVICE(thing) have :
1-unique identities 2-perform remote sensing, actuating and 3-communicate with other device / server / applications over
monitoring capabilities internet or other communication methods
IOT DEVICE(thing) can:
1-Exchange data with other 2-Collect data from 3-Send the data to centralized 4-Perform some tasks locally and
connected devices and other devices and servers or cloud-based other tasks within the IoT
applications (directly or process the data locally application back-ends for infrastructure, based on temporal
indirectly), processing the data and space constraints
IOT MADE of
2-Resource software components on the IoT device for accessing, processing, and storing sensor
information, or controlling actuators connected to the device. that enable network access for
the device
3-Controller Service 1-native service that runs on the device and interacts with the web services.
2-sends data from the device to the web service and receives commands from the application
(via web services) for controlling the device
4-Database can be either local or in the cloud and stores the data generated by the IoT device.
5-Web Service: 1-link between the IoT device, application, database and analysis components
2-implemented using HTTP and REST principles (REST service) or using WebSocket protocol
(WebSocket service).
6-Analysis Component: responsible for analyzing the IoT data and generate results in a form
7-Application: provide an interface that the users can use to control and monitor various aspects of the IoT
system and view system status, processed data
IOT Challenges
1st Challenge: Security and Privacy
-Concern about the personal safety
-Most important
-User data = vulnerable for theft
-one device gets attacked =rest get attack
-poor security = whole network to be damaged.
-Personal information can be tracked / monitored (by device without permission)
2nd Challenge: Connectivity
-wired or wireless connection
-Usage of frequency / spectrum need to be remembered
-latency or poor network reception
-billion device = occur Bottleneck
3rd Challenge: Power
-mostly use battery
-so how long&recharge the battery ?
-how use green source
4th Challenge: Complexity
-multidisciplinary field(ENG+IT)
-Limited expertise
-,software, hardware not abundant(available )
5th Challenge: Complexity (Cloud)
-mandatory (for storage)
-so which,cost,service,safty ?
A vulnerability that is not yet publicly known, and for which an exploit has typically been developed, is called a zero-day (or O-day) vulnerability.
Mirai Botnet ● Mirai Botnet – 2016
● Distributed Denial of Service attacks
● Unwilling participation of IoT devices
● DDOS attack – Dyn (21st October 2016)
● The Mirai Botnet harnessed the power of IoT zombies
● US east coast/global event
● Stopped using DNS services from Dyn
● Cost Dyn at least 14,000 Internet domains
DDoS Attack ● The attacker tries to saturate the network – Network bandwidth
● The attacker tries to saturate the host – Host processing capability
● Amplification attacks rely on protocols with minimal input
● Network Time Protocol
● Large quantity of distributed computing resources
● The Mirai Botnet shows that it was all easy to do this
Building a Botnet ● In a DDoS an attacker likely won’t want to use his or her own computers to carry out the
attack; instead relies on compromising other people’s computing resources
● Poor cyber hygiene
● Poor vendor security engineering
● Hard coded passwords
● Misconfigurations
● Software flaws
Poor cyber hygiene Poor vendor security engineering Hard Coded Passwords/Software Flaws
-all patch available updates? -Root account for all logins and then -unchangeable credentials
-missteps ways for an attacker to create a super user account -There are many flaws
compromise &take it over to be part of a -lack of understanding -Zero day exploits
botnet
Managing Botnets to Perform ● 10,000 hosts
DDoS Attacks ● Hosts acting on commands are known as Zombies
● Command and Control to co-ordinate the Zombies
● C&C Server can be used to instruct the botnet
● A control channel often over Internet Relay Chat
Examining Mirai ● TCP port 48101
● multiple attack vectors including:
✓ UDP, DNS and HTTP floods, as well as GRE IP and Ethernet floods
Future Impact of DDoS Attacks ● What does IoT and connectivity enable
● Connected cars
● Smart cities and transportation systems
● Smart and dynamic energy and utility systems
● Automation
Protect :
● Secure their products from easy takeover by botnets like Mirai but also
● Design resiliency into their systems so they can withstand hits by highly powerful botnets
of the future
● A defensive posture that includes resilience to targeted DDoS attacks
Best Practices ● Don’t fall prey to malicious actors
● Provide a defensive posture that includes resilience to targeted DDoS attacks
Week 4:
1-Apply controls that support and strengthen the safety of the system
Safety: 2-Do not forget apply security controls
1-Bad actors may purposely take your system offline
Resilience: 2-System responds during the attack of this nature
Points of 1-Are the API’s developed securely
2-Enforce security connectivity
Integration:
Elements of an IoT Protection Architecture:
Cryptography
✓ provides a necessary tool set for securing data, transactions, and personal privacy in our so-called information age.
✓ Fundamentally, when properly implemented, cryptography can provide the following security features to any data whether in
transit or at rest:
Cryptography Goals:
1. Confidentiality 2. Authentication
• Others cannot eavesdrop on our sensitive information • Use of Digital Signature algorithms
• Use of encryption algorithms • Convert input to a signed hash data - SHA
• Use of a well vetted algorithm • Include ECDSA or Elliptic Curve Digital Algorithm
• DES (data encryption standards)
• and Triple DES
3. Integrity 4. Non-Repudiation
• Use of Hashing and Digital Signature algorithms • Technical non-repudiation assurances are straightforward
• Message Authentication Code or MAC • Will assurances stand up in the court of law?
• Convert Keys into MAC, for example, HMAC
Cryptography Techniques:
•It is used to protect the confidentiality
of the information from eavesdroppers
and only allow it to be deciphered by
intended parties.
1-Encryption and Decryption
•The unprotected data is called plaintext
and the protected data is called
ciphertext.
•Key Management
•Manage the secure distribution of the
same key to multiple parties
2-Symmetric encryption
•The compromise of a single party’s Key
required the replacement of keys for
everyone involved
• Protecting passwords
• Checking the integrity of a large data
Uses of Hashing • Performing asymmetric digital signatures
Algorithms • Providing the foundation for certain message authentication codes
• Performing key derivation
• Generating pseudo-random numbers
•Never give away private key
•Any modification of signature or message is detected by receiver
(verifier)
Digital Signatures
Cryptography Module
-establishes the physical bounds of a cryptographic module& all the hardware, software and /or
firmware components of a cryptographic module
Tips:
• Minimize the size of your cryptographic boundary
• Utilize existing modules
• Re-Validate by learning on another product
• Building your own - very specialized and expensive
• Carefully review crypto modules security policy (posted on NIST website)
• Don’t store any UNPROTECTED key material outside of a crypto module
Cryptographic Key Management:
• Many security weakness found in poor implementations of key management
• Do not use cryptographic keys always - keep the keeps updated
• How new keys are generated, agreed upon, transported, and so on is the domain of key management
• Key management include - secret keys, private and public keys, Nonces, initialization vectors
• Even good, vetted cryptographic algorithm fail to protect your data if keys are not managed.
• The IOT make worse the problems such as tracking of SSH keys by adding millions of new devices to the network.
Key Management at Layers
Both types of key management are tightly bounded together.
1-Key management at Module / Embedded Layer 2-Key Management at System Layer
•Algorithms and functions supporting key management •Tracking and management of crypto keys throughout an
operations within an IOT device enterprise
•Updating keys and certificates internally and Zeroization of keys •Includes generation, rotation, distribution, revocation,
destruction
Attack Vector:
1-technique by means of which unauthorized access can be gained to a device or a network by hackers for nefarious (criminal)
purposes (it is used for assaulting or exploiting a network, computer or device.)
2-help unauthorized elements to exploit the vulnerabilities in the system or network, including the human elements.
3-attacks vectors should be actively looked for a remedy.
8-Privacy Concerns
-Access to data is often a bad actors goal
-first knowing what data is being collected
-impact how the data is collected or how long it is stored
-example:Voice Assistant Products: record voice or video
Inform Your Stakeholders:
-Once you know what data you are collecting, it is important to inform your stakeholders
-If the data could be sensitive
-For example – Health care, blood pressure
Safeguard the Data:
Once you know what sensitive data is collected you need to:
1-Encrypted storage
2-Agreements between a data collector and third party organizations
9-Insecure Mobile Interfaces:
Oftentimes, you see that consumer IoT devices pair with smart phone apps. In these instances, the app may ask for the homes’ wifi
key. It’s important to make sure that the app stored that information securely.
10-Insecure Network Services:
-Lateral movement throughout a network: Bad actors gain a foothold and then begin their exploration by jumping from
one device to another
-solution : Own subnets and different subnets from traditional computing equipment
Week8:
IoT lifecycle : Security must be addressed by it
Sensing layer:
integrated with end components of IoT to sense and acquire the information of devices;
The security in sensing layer. :
• Devices authentication
• Trusted devices
• Leveraging the security controls and availability of infrastructures in sensing layer.
• In terms of software update, how the sensing devices receive software updates or security patches in a timely manner
without impairing functional safety or incurring significant recertification costs every time a patch is rolled out.
Requirements:
The security requirements at IoT end-node: The security requirements in sensing layer:
physically security protection, access control, authentication, confidentiality, data source authentication, device
nonrepudiation, confidentiality, integrity, availability, and privacy. authentication, integrity, availability, and timeless
attack modeling attacker-focused and designed to show details of how vulnerabilities may be exploited.
Threat Modeling
• a methodical approach to performing a security evaluation of an IoT system
• develop a thorough understanding of the actors, entry points, and assets within a system.
• provides a detailed view of the threats
• larger exercise of identifying threats & threat sources
Example : Evaluate Threats:
1-Consumer- customers determine vacancy status & pricing for nearby
facing service parking spots
2-Payment accept multiple forms of payment
flexibility
3-Entitlement -Track date of (purchased,expired,overstayed)
enforcement -communicate the violation
4-Trend analysis Collect historical parking data and provide trend reports
to parking managers
5-Demand- change pricing depending on the demand for each space
response pricing:
6-Security Goals •confidentiality of sensitive data within the system
• integrity of all data collected within the system
• availability of the system as a whole and each of its
individual components
Example :
Week 10:
Data:
Data Confidentiality -provided via encryption (with the Advanced Encryption Standard [AES] algorithm as a de facto
industry standard)
-Implemented directly in hardware
Data Integrity -The assurance provides trustworthiness in the data a node sends or receives.
-provided via message authentication codes or cryptographic hashes that are attached to the data
payload.
Peer:
Peer: Authenticity -how a peer can validate another peer’s identity before a communication link is established.
Communication:
Communication: -Peer authenticity can go hand in hand with system availability.
Service and System For example, denial-of-service (DoS)-style attacks are typically external attacks ( they are launched by
availability external nodes outside the jurisdiction of an IoT deployment),
The ability to qualify and if necessary to discard data or connection requests at an early stage can help
to eliminate such attacks
Communication: the ability to ensure that communicating peers cannot deny the authenticity of their action—is linked
back to peer tokens.
Non-repudiation