Security Architecture and Engineering

Internet of Things (IoT) Architecture

Architecture overview 1

  • Things talk to Hubs.
  • Hubs talk to Vendor Sever.
  • Manger talk to Things via Hubs.
  • Things don't always have right interface with Internet.

Home IoT

Architecture overview 2

  • Local managers (maybe a phone app) talk to hubs.
  • Hubs talk to devices via private protocols.
  • Hubs talk to vendor servers.
  • Things may talk to each other via hubs, but probably use the vendor servers.
  • Vendor servers may talk to each other.

Vendor Servers

  • Many devices cannot be called directly (e.g. Nest thermostats).
  • Devices may not have CPU power for some tasks (e.g., voice recognition on Amazon Echo, speech recoginition is costly task, Echo sends data to server).
  • Vendors like to gather data.

Privacy and IoT

Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party.

Security of loT architecture

Any component can be attacked: things, hubs, servers, links.

How to hack each component? Who can hack (component)? What are the consequences (of component being hacked)?

  • E.g. home WiFi networks
  • Easy to encrypt links
  • Primary source of a compromised link: devices at either end of I/O, say, a corrupted firmware.

Ownership

  • E.g. who can control my Nest thermostat?
  • E.g. if I sell my house to other people, should I still have control over the Nest thermostat of that house?
  • Many smart devices have little or no user interface.

Authentication

  • Thing-to-Hub, Hub-to-Server, Server-to-Server authentication.
  • How do Things connected to different Hubs and different Servers authenticate each other?
  • Complex cryptographic protocols may be necessary.
  • If Things are corrupted, private data collected by the Thing are in danger.
  • E.g. My health monitor is corrupted, falsely reporting that my blood pressure is off the charts, I may falsely go to doctor right away.

Access Control

  • E.g. my smart doorknot needs complex access control: who can open the door? How to customize my guests, or cleaning staff coming to my house?
  • In general, setting access control rules properly is very hard.
  • Authorization should not happen on the servers.

Corrupted Servers

  • Biggest risk: corrupted firmware - but can be digitally signed.
  • Can send evil commands to Things.

Protection of IoT artchitecture

Request Filters

  • Sanity Filters: e.g Nest thermostats reject temperatures that go outside certain ranges.
  • Bad commands / sequences of bad commands continue to emerge as more features on Thing are being added.

Cryptography

  • Neccessary, but not sufficient.
  • Encrypt message.

Intrusion Detection

  • Detect ongoing attacks or other compromised components.
  • E.g. alter the owner if a sanity filter is used.