75% found this document useful (4 votes)
470 views

IoT Security Guide

This document provides a guide on Internet of Things (IoT) security. It discusses the evolution of IoT and examples of IoT applications. It covers IoT application architecture and security concerns, as well as threats like distributed denial of service attacks. The document also addresses topics like hardware security, data layers, SCADA systems, threat modeling, research and development, standards, and 5G technologies. The overall purpose is to help the IoT industry develop a unified understanding of security challenges and recommend methodologies for building secure IoT services and applications.

Uploaded by

Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
75% found this document useful (4 votes)
470 views

IoT Security Guide

This document provides a guide on Internet of Things (IoT) security. It discusses the evolution of IoT and examples of IoT applications. It covers IoT application architecture and security concerns, as well as threats like distributed denial of service attacks. The document also addresses topics like hardware security, data layers, SCADA systems, threat modeling, research and development, standards, and 5G technologies. The overall purpose is to help the IoT industry develop a unified understanding of security challenges and recommend methodologies for building secure IoT services and applications.

Uploaded by

Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 145

IoT SECURITY

GUIDE
AUGUST 2 0 2 2
Table of Contents

EXECUTIVE SUMMARY 05

Key Takeaways 06

01. Introduction to IoT 10


1.1 Evolution of IoT 10
1.2 Examples of IoT Applications 12
CONTENTS

1.3 IoT Link Layer Connectivity 15

02. IoT Application Architecture 21


2.1 Introduction 21
2.2 Security Concerns of IoT 22
2.3 Security Recommendations 23
2.4 Solutions Among Different Industries 25
2.5 IoT Application Architectures in Focus 31

03. Security and IoT 42


3.1 Overview of Cyberattacks in IoT 42
3.2 Distributed Denial of Service 42
3.3 Hardware Security 45
3.4 Hardware Security v/s Hardware Trust 49
3.5 Embedded System Hardware 50
3.6 Data Layers 54

IOT SECURITY GUIDE 02


Table of Contents

04. SCADA and IoT 64


4.1 SCADA System 64
4.2 Cyberthreats to SCADA and IoT Systems 67
4.3 Protecting SCADA, IIoT and IoT Systems 68
4.4 Challenges to Secure SCADA systems 69
in IoT-Cloud Environments
4.5 Best practices for securing IoT-Cloud 70
based SCADA systems
CONTENTS

05. The Threat Model for IoT 72


5.1 How to Carry out Threat Modelling 73
5.2 Data-centric Threat Modelling 75
5.3 Why IoT Threat Modelling Matters 77
5.4 Threat Modelling for Device-level Security 78
5.5 Defining Threat Model for IoT Networks 85

06. Research and Development 94


6.1 Introduction 94
6.2 Confidentiality 94
6.3 Authentication and Access Control 98
6.4 Identity Management 101

07. IoT Security Standards 103


7.1 Industrial Internet of Things (IIoT) 103
7.2 IoT Security Standards Protocols 107
7.3 GSMA: Global System for Mobile 119
Communications
7.4 One M2M & IoT 124

IOT SECURITY GUIDE 03


Table of Contents

08. 5G-Fifth Generation 125


8.1 Introduction 125
8.2 Features of 5G 125
8.3 Technologies used in 5G 126
8.4 Deployment of 5G 126
8.5 5G Devices 126
8.6 Frequencies of 5G 126
8.7 5G and IoT 127
CONTENTS

8.8 Security Recommendations for 5G 131


8.9 Challenges in 5G 132
8.10 Solutions for 5G 133
8.11 Security Solutions for 5G with IoT 133
8.12 Ways customers can be prepared 134
when prone to 5G security issues

09. References 135

10. Abbreviations 141

IOT SECURITY GUIDE 04


EXECUTIVE SUMMARY
The Internet of Things (IoT), which will soon expand to the Internet of Everything, is a
historical shift in the way we interact with our surroundings, our workplaces, and
society. Our ability to converge the digital and physical worlds through IoT holds
tremendous potential for the digital economy.

With the advent of 5G technologies, IoT technologies are set to take a giant leap
forward. 5G can support a large number of static and mobile IoT devices, which have
unique bandwidth, speed, and quality of service requirements. With these capabilities,
we will see an explosion in IoT usage and innovation. In fact, as per an IDC report, IoT is
expected to consist of more than 55 billion connected devices generating 80
Zettabytes of data by 2025. However, in addition to new opportunities, the IoT era also
introduces new attack surfaces, which are already being exploited by cybercriminals.

While IoT promises to bring efficient business results across several industry verticals,
organisations just focusing on connectivity to win the digital transformation race and
putting security in the backseat would place the entire ecosystem at risk of fraud and
attack.

In this context, we aim to present a wide spectrum of technological perspectives on IoT


Security through our IoT Security Guidebook. This guidebook is a comprehensive
document that covers IoT communication protocols as well as advice for building
architectures for designing and developing IoT applications. Furthermore, the
document highlights existing security architectures used across various industries.
Threat modelling for IoT will assist developers in risk prioritization and lay the
groundwork for establishing a product protection plan.

The purpose of the IoT Security Guidebook is to help the budding Internet of Things
industry develop a unified knowledge of security challenges. The IoT Security
Guidebook advocates for a methodology for designing secure IoT Services that
ensures security best practices are followed throughout the service's life cycle. The
documents offer recommendations on strategies to deal with common security threats
and flaws in IoT services. It is intended to give a set of design recommendations for
developing a secure product for IoT service providers. This document will operate as
an overarching model for evaluating which features of advanced technologies or
services are significant to the developer. Once these elements, or components, have
been identified, the developer can assess the risks associated with each one and
decide how to mitigate them.

Its scope is identified as design and deployment-specific recommendations for IoT


services. It should be noted that national rules and regulations for a given territory may
take precedence over the guidelines outlined in this document in some circumstances.

IOT SECURITY GUIDE 05


Key Takeaways
IoT is the network of inter-connected devices that can process data and communicate
with each other, without the need for human intervention. IoT-based technology will
deliver an advanced level of services in the coming years, effectively changing how
people live their lives. Mobile computing, Pervasive Computing, Wireless Sensor
Networks, and Cyber-Physical Systems are just a few of the categories where IoT is
well-established. A few of the opportunities include new business models,
diversification of revenue systems, real-time information and global visibility. The
elements that shape the IoT ecosystems are Intelligent decision-making,
communications, embedded systems, sensors and actuators. Advancements in
Wearables, Smart Homes, Smart Cities, Smart Grids, Industrial, connected cars, Smart
Retail, Smart Supply Chain, Smart Farming and Connected Health are a very few of the
categorical examples of IoT use cases. This document outlines some of the prominent
standard IoT network communication protocols such as Wi-Fi (Wireless Fidelity),
Bluetooth, Zigbee, and 6LoWPAN (IPv6 over Low-power wireless personal area
networks) and LoRaWAN (Long Range Wide-area network).

A significant proportion of IoT solutions designed for a specific application are


dispersed and heterogeneous, making standardisation difficult. Security is one of the
most important considerations for IoT, and it must be recognised alongside the
overarching need for safety, as the entire world is closely intertwined with both
concerns. The IoT Application Architecture gives detailed outline models and strategies
for both design and development of an application. It also offers the readers a
blueprint and recommendations to develop an application in a well-structured
manner. The lack of technical standardisation in the IoT ecosystem exposes hardware,
software, and relevant data to attacks and threats. It is therefore essential to dedicate
more time to formulating industry guidelines and architectural standards required to
efficiently implement IoT. Regulation of IoT products will be beneficial to improving the
scalability, interoperability, security, and reliability of these products, especially given
the complicated nature and uncertainty of the IoT ecosystem.

The document also underlines the Security concerns of IoT, since almost all IoT devices
can threaten personal Confidentiality and public safety through cyberattacks. A few
standard problems while tackling the security concerns include limited device
resources, fragmentation of Standards and regulations, Security Integration and Data
Privacy. The broad range of security concerns needed in IoT to enable design security,
data protection, risk analysis and other concerns are outlined. The best practices to
tackle these are by establishing secure IoT lifecycle guidelines on software and
hardware development, Implementing role separation in Application Architecture and
Supporting the establishment of IoT security strategies and Regulations.

IOT SECURITY GUIDE 06


The document also highlights the solutions among different Industries such as Huawei’s
IoT solution security architecture (the 3T + 1M framework), LTTS IoT Security Framework
and Zero trust Architecture. The document presents the key components of LTTS IoT
Security Framework and oneM2M standards and the benefits of using oneM2M.

The document presents several IoT Application architectures in


focus such as,
The Healthcare industry uses a bounded network with high integrity zone, a
boundaryless network and a hybrid with different network technologies.
Smart Home Ecosystem that uses Hub Architecture also addresses the security
concerns of hub including device and software security.
Industrial control systems are a broad category that includes DCS, SCADA as well
as other PLCs used in Industries and essential infrastructures.

The document also highlights the solutions among different Industries such as Huawei’s
IoT solution security architecture (the 3T + 1M framework), LTTS IoT Security Framework
and Zero trust Architecture. The document presents the key components of LTTS IoT
Security Framework and oneM2M standards and the benefits of using oneM2M.

Distributed Denial of Service (DDoS), provides types of attacks at different levels


such as device level, network level and Application level.
Hardware Security provides types of attacks on hardware such as side-channel
Attacks, Rowhammer attacks, Hardware Trojan attacks, Physical attacks, Reverse
engineering, Hardware IP Piracy, Mod-chip attacks and Security Architecture
Attacks.

Hardware security issues arise when the vulnerabilities at different levels are not
patched due to the lack of robust security for software and system. The document
comprehensively outlines the Embedded system Hardware and Security, and the
properties of securing an embedded system. A very minor vulnerability is required to
create an exploit, to attack an embedded system. To achieve security, a list of
properties of highly secured embedded systems is specified in the document.

The document gives a comprehensive understanding of the Data-at-rest Protection,


which secures the data from unauthorized access.

The document states about the data layers that include,


The hardware layer, the whole medium used for storage is encrypted by using FDE.
It encrypts all the information including the hidden files.
Block Manager Layer, the encryption is carried out at a higher level, the device-
management layer, typically a block-oriented driver.
The file system layer provides well-gross control over the selection of information
that requires storage privacy.
The application layer can add their data protection by using underlying file-system
encryption features.

IOT SECURITY GUIDE 07


Information concerning secure boot and methods, Hardware resource partitioning,
Software containerization and Isolation, Attack surface Reduction, least Privilege and
Mandatory Access Control, Implicit Distrust and Secure Communication, Data Input
Validation, Secure software development, build options and OS configurations, Integrity
Monitoring and Auditing have been addressed.

A few of the Attacks involving Privacy violation and Data leakage Attacks in each of the
layers is specified. Weak authentication Attacks, firmware Hijacking, Device scan
Attacks, MITM attacks, Identity spoofing attacks, Malware injection attacks, SQL injection
attacks, and Cross-site Scripting are just a few of the attacks associated with
embedded system security and appropriate measures to prevent the attacks are
presented.

The document exemplifies SCADA (Supervisory control and data acquisition) as they
are a set of computing devices both software and hardware that work together to
control a system. The main components of SCADA involve Supervisory computers,
Remote terminal units, PLCs and Human-machine interfaces (HMI). Since SCADA
networks are widely used in today’s businesses to monitor and study real-time data,
control industrial operations and connect with devices. As these systems are critical for
industrial organizations, the need for SCADA security is essential.

Cyberthreats to SCADA and IoT Systems need to be comprehended, as these systems


are usually used to manage Industrial Control Systems. Suggestions proposed by the
President’s critical infrastructure protection board in the United States to increase
SCADA cyber security in protecting Industrial control systems have been stated. While
securing the SCADA systems, the challenges to secure SCADA systems in IoT-Cloud
Environments have been acknowledged. Advanced Persistent threats, Data Integrity,
MITM, Replay Attacks and Dos Attacks are just a few of the threats to SCADA systems in
the IoT-cloud context. The Best practices for securing IoT-Cloud-based SCADA
systems are Network Segregation, Monitoring and Analysis, Log Analysis, File integrity
monitoring, network traffic analysis, Memory dump analysis, Actively evaluating of
security vulnerabilities, and Constant updating and fixing.

The threat model for IoT involves a Risk evaluation methodology which measures the
relative importance of risk and helps organizations work on it. There are several forms
of threat modelling and also how to carry out threat modelling by determining the trust
boundaries, who the stakeholders are, the vital assets that must be safeguarded,
attack surfaces, possible future risks and threats that have been detected are
subjected to a risk assessment. Data-centric Threat modelling explains the
combination of attack and protection side details for data of interest in a structured
model that aids in vulnerability analysis, decision making, and change management in
steps.

IOT SECURITY GUIDE 08


The document illustrates the importance of IoT Threat modelling with an Architectural
IoT Threat Modelling Example which describes basic threats architecturally-based IoT
hazard modelling. Threat modelling for Device-Level security describes different threat
modelling methods, and their features and also gives an in-depth knowledge of each
model with its frameworks. There are different types of threat models which target
different IoT Networks which have different threats and risks which can cause different
rates of damage. The document guides on identifying threats and providing security
with risk mitigation by conducting assessments. There are millions of devices
connected to the internet across the globe and there are several vulnerabilities they
carry which could compromise users' data.

There is a lot of research and development ensuing in IoT Security in several areas. The
key areas, their importance, technologies and challenges are described in this
document. There are two different security standards covered in this document which
are IIoT and IoXT. IIoT is used in manufacturing, supply chain monitoring, and
management. IoXT has some rules and this document explains each of them in detail.
There are IoT security standard protocols each protocol covers a different area but
shares a common base of making IoT better on a daily basis. This document explains
the importance of these protocols and how they support organizations by explaining
their working models and functionalities.

The advent of 5G will connect all the citizens virtually through machines, objects, and
devices. This document explains different technologies used in 5G, deployment and
how they changed the phase of connectivity in IoT along with the security
recommendations for 5G which explains vulnerabilities and attacks that can cause
data thefts and also how can one avoid these by following different strategies, and
security solutions to make a better 5G environment.

IOT SECURITY GUIDE 09


1.1 Evolution of IoT
The Internet of Things (IoT) is a conceptual paradigm that has emerged
over the last few years. Kevin Ashton introduced the concept of IoT back in
1991. It describes a wide ecosystem where interconnected devices and
services collect, exchange, and process data to adapt dynamically to a
INTRODUCTION TO IOT
context.

Internet of Things (IoT): a wired or wireless network of uniquely identifiable


connected devices that can process data and communicate with each
other with or without human involvement.

IoT encompasses several fields of study, including Mobile Computing (MC),


Pervasive Computing (PC), Wireless Sensor Networks (WSN), and Cyber-
Physical Systems (CPS). IoT represents a growing and changing field with
many definitions.

The Internet of Things is tightly bound to cyber-physical systems and, in this


respect, is an enabler of Smart Infrastructures by enhancing their quality-
of-service provisioning. The IoT is the natural evolution of computing, and it
brings its own challenges – an immature ecosystem plagued by
fragmentation of standards and security concerns in a currently non-
homogeneous IoT market because each industry and application are
different. Another IoT challenge worth highlighting is its ability to scale
globally. According to the IoT Analytics "State of IoT - Summer 2021" report,
the global number of connected IoT devices is expected to grow 9% to 12.3
billion active endpoints and by 2025 the total number of IoT connections is
predicted to reach 27 billion. Currently, there are different solutions available
in the market through various manufacturers such as Google, Microsoft,
Amazon, Apple, and Samsung, among others, many of which use their
proprietary cloud service, protocols, and operating system.

The threats and risks related to the Internet of Things devices, systems and
services are manifold and evolve rapidly. With a great impact on citizens'
safety, security and privacy, the threat landscape concerning the Internet of
Things is extremely wide. Hence, it is important to understand what needs to
be secured and to develop specific security measures to protect the
Internet of Things from cyber threats. Involving billions of intelligent systems
and millions of applications, IoT will drive new consumer and business
behaviours, which will demand increasingly intelligent solutions.

As per Fortune Business Insights, the projected growth of the global IoT
market by 2028 is $1,854.76 billion creating several opportunities for vendors
and companies looking to capitalize on IoT.

IOT SECURITY GUIDE 10


Examples of these opportunities include:
New business models: New value streams for customers, with a faster response.
Diversification of revenue streams: Monetizing added services on top of traditional
lines of business.
Real-time information: Capturing data about products and processes more swiftly,
improving market agility and allowing prompt decision making.
Global visibility: Making tracking easier from one end of a supply chain to the other.

Elements of IoT
The following points provide an overview of the different elements that shape IoT
ecosystems, namely the Things in the IoT, intelligent decision making, sensors and
actuators, communications, and embedded systems.

DEVICE MANAGEMENT

NON-VOLATILE
CONNECTIVITY
MEMORY
(WIRED/WIRELESS)

PROCESSING
UNIT

SENSORS POWER SUPPLY ACTUATORS


(CABLING/BATTERY)

Figure 1. Structure of an IoT Embedded System

IOT SECURITY GUIDE 11


Examples of these opportunities include:
SESSION AMQP, CoAP, DDS, MQTT, XMPP

NETWORK ENCAPSULATION 6LowPAN, Thread

ROUTING CARP, RPL

DATALINK Bluetooth / BLW, Wi-Fi, LoRaWAN, Neul, SigFox, Z-Wave, ZigBee, USB

Table 1. Indicative listing of Communication Protocols for IoT

1.2 Examples of IoT Applications


In this subsection, some examples of IoT applications shall be briefly presented.

Wearables
Wearable technology, sometimes referred to as "wearables," is a class of electronic
devices that may be worn as accessories, attached to clothes, implanted in one’s
body, or even tattooed on the skin. The gadgets are hands-free devices with practical
applications that are powered by microprocessors and can send and receive data via
the Internet.
Wearable technology is considered an important section of IoT. Wearable devices are
more prominent in the Healthcare sector. One example is the Fitbit. It helps us in
maintaining a healthy lifestyle. It is a tracking device that helps track your sleep cycle,
calories burned and tells us how much distance you travelled. Fitbit app also helps in
viewing your key metrics such as oxygen saturation, skin temperature variation, Heart
rate variability, resting heart rate, and breathing rate.

Smart Home
A smart home is a home with computer gadgets that allow for remote administration
of appliances and systems like heating and air conditioning.
Due to IoT Home automation, home security measures have also evolved. Consumers
may use their phones to watch CCTV security footage and operate their security
systems from everywhere on the planet.

Smart Cities
Smart cities use IoT devices such as connected sensors, meters, systems, etc. to
collect and analyze data. The cities then use this data to improve public utilities and
services, infrastructure, and more.

IOT SECURITY GUIDE 12


IoT enabled smart cities' use cases spans across various areas like Smart
Infrastructure, Air Quality Management, Traffic Management, Smart Parking, Smart
Waste Management, Public Safety, etc.

Smart Grid
A smart grid is an electrical platform that allows for a two-way flow of electricity and
data, as well as the ability to detect and respond to changes in usage and other
concerns, thanks to digital communications technology. Smart grids are self-healing
and allow power users to have an active role in the system.
IoT can be utilized in smart meters of the grids in order to measure various metrics like
power consumption, network interoperability, etc., and also can help manage energy
performance and power consumption.

Industrial
The usage of connected systems in industrial applications like automation, monitoring
systems, and maintenance departments is termed as the Industrial IoT.

Connected Car
A connected car is a car that has an internet connection(owned), typically through a
WLAN, which enables it to share the particular internet service and also the data
associated with it, with other devices not only within the car but also outside the car.

Connected cars are linked to the network for enabling bi-directional communication
among vehicles regulating the vehicle operations for enabling quick data transmission.

Smart Retail
Smart retail is a collection of smart technologies that are intended to provide
consumers with a better, faster, and safer shopping experience. This revolution in retail
has been facilitated by a society in which virtually everyone now carries a smart
device – i.e., the smartphone.
Nowadays, consumers shop on their mobile devices and prefer products and services
which offer discounts, faster delivery and a great shopping experience. Early
adaptation of smart technologies by retailers can help them provide a seamless
customer experience and ensure brand loyalty.

IOT SECURITY GUIDE 13


It is also possible to forecast when and what a client needs based on their purchase
history, providing greater scope for targeted marketing.
IoT devices such as sensors are also being installed in teddy bears in hospitals to
monitor the health of sick kids in a subtle and non-threatening manner.

Smart Supply Chain

Smart Supply Chain seeks to raise awareness for better decision-making by


leveraging data from IoT devices and offering a detailed view of commodities and
services from producer to store.
Clients may use Smart Supply Chain to automate not just shipping and delivery, but
also to accurately anticipate product status in real-time and monitor key details that
drive supply network productivity.

Smart Farming
Smart farming is a management concept that focuses on providing the foundation for
the agricultural business to employ modern technology – such as big data, Internet of
Things (IoT), etc. It is used to track, monitor, automate, and analyze activities. Smart
farming, often known as precision agriculture, is controlled by software and monitored
by sensors.
Smart farming is becoming more important as the world's population grows, as does
the need for greater agricultural yields, the need to conserve natural resources and the
growing need for climate-smart agriculture.
An example of a smart farming application includes temperature sensors which are
used to scan the soil and control water, light, and humidity.

Connected Health

Connected health is an interactive-technical paradigm for managing and delivering


healthcare that relies on technology to offer services offsite.
The Internet of Things (IoT) is a network of physical objects that employs connection
to allow data to be exchanged. These gadgets aren't always the most advanced
technological breakthroughs. They help healthcare professionals perform jobs more
quickly by streamlining processes.

IOT SECURITY GUIDE 14


1.3 IoT Link Layer Connectivity

Several communication protocols are used in IoT to provide service to the network
layer. The following are some of the prominent Standard IoT communication protocols.

Wi-Fi (Wireless Fidelity)


Wi-Fi is a local area network which is a wireless network proposed by Wi-Fi Alliance.
Wi-Fi provides internet access to devices within a range of up to 100m. It uses high-
frequency radio signals for sending and receiving data. It uses the IEEE 802.11 standard.
The frequency and range of Wi-Fi are summarized in Table 3.
Wi-Fi data rate varies from 2Mbps (for Legacy 802.11) to 1.73Gbps (for 802.11ac wave
2). The quite common 802.11n has data speed up to 450 Mbps. We can set up PAN
(Personal Area Network) or LAN (Local Area Network), or WAN (Wide Area Network) in
IoT systems. By routing, we can increase the network area.

WI-FI PROTOCOL & SECURITY 802.11a/b/g/n/af

FREQUENCY 2.4 GHz, 3.6 GHz, and 4.9/5.0 GHz bands

RANGE Common range is up to 100m but can be extended

EXAMPLES Routers, Tablets, etc.

Table 3. Table Listing Frequency and Range of Wi-Fi

The data link layer within 802.11 consists of two sublayers: Logical Link Control (LLC)
and Media Access Control (MAC). 802.11 uses the same 802.2 LLC and 48-bit
addressing as other 802 LANs, allowing for very simple bridging from wireless to IEEE
wired networks, but the MAC is unique to WLANs.

NETWORK
LLC Logical Link Control Sublayer

DATA LINK

MAC Medium Access Control Sublayer


PHYSICAL

Figure 2. Data Link Layer

IOT SECURITY GUIDE 15


The 802.11 MAC is very similar in concept to 802.3 in that it is designed to support
multiple users on a shared medium by having the sender sense the medium before
accessing it. For 802.3 Ethernet LANs, the Carrier Sense Multiple Access with Collision
Detection (CSMA/CD) protocol regulates how Ethernet stations establish access to
the wire and how they detect and handle collisions that occur when two or more
devices try to simultaneously communicate over the LAN.
The major drawbacks of Wi-Fi networking are latency and poor security. It is easier to
hack a Wi-Fi hotspot and gain access to a physical link medium. However, a Wi-Fi
network can be secured using WPA types and beacon packets management.
IEEE 802.11 provides for security via two methods: Authentication and Encryption.
Authentication is the means by which one station is verified to have the authorization
to communicate with the second station in a given coverage area. In the infrastructure
mode, authentication is established between an Access Point (AP) and each station.
802.11 provides two methods of authentication: Open System or Shared Key. These
methods are illustrated in Figure 3 and Figure 4. An Open System allows any client to
authenticate as long as it conforms to any MAC address filter policies that may have
been set. All authentication packets are transmitted without encryption. Shared Key
authentication, on the other hand, requires Wired Equivalent Privacy (WEP) to be
enabled and identical WEP keys on the client and AP (for more information on WEP
keys, see below). The initiating endpoint requests a shared key authentication, which
returns unencrypted challenge text (128 bytes of randomly generated text) from the
other endpoint. The initiator encrypts the text and returns the data.

Open Authentication Request

Open Authentication Success


Wireless Client Access Point

Figure 3. Open Authentication

Key 1 = h
Shared Key Authentication Request

Shared Key Challenge Text

Shared Key Encrypted Text

Wireless Client Shared Key Success Access Point

Key 1 = h
Figure 4. Shared Key Authentication

IOT SECURITY GUIDE 16


Encryption is intended to provide a level of security comparable to that of a wired LAN.
The Wired Equivalent Privacy (WEP) feature uses the RC4 PRNG algorithm from RSA
Data Security Inc. According to the protocol, WEP generally uses a 64-bit RC4 stream
cypher (see information on 128-bit below). RC4 is a symmetric encryption algorithm,
meaning the same key is used to encrypt and decrypt the data payload. This
encryption key is generated from a seed value created by combining a 40-bit user-
defined WEP key with a 24-bit Initialization Vector (IV). The WEP key generally takes the
form of a 10-character hexadecimal string (0-9, A-F) or a 5-character ASCII string,
which must be present on both ends of the wireless transmission. The protocol allows
for up to four concurrently defined WEP keys.
The standard does not, however, currently define how the IV is established, so the
implementation varies by vendor. When an encrypted wireless client starts
transmitting data, the IV can start with a value of zero or another randomly defined
starting value and generally increments upwards in a predictable manner with each
successive frame. However, some vendors (such as Cisco) use a more sophisticated,
random determination of the IV.
Although not yet part of the protocol specification, many 802.11b vendors also support
128-bit RC4 encryption. This requires a 104-bit WEP key (26-character hexadecimal or
13 characters ASCII) but uses the same 24-bit IV value.

Bluetooth

Bluetooth is a PAN (Personal Area Network), or it is a short-range wireless


communication network for exchanging data between the connected devices through
that network. It is economical in price and effective from a performance point of view
for short-range distance. It is a 2.4GHz network that works well for personal wireless
network communication. It provides a data transfer rate of 3Mbps in a range of 50m
to 150m. Nowadays, Bluetooth is almost present in all smartphones, and it is highly
used in wearable devices connected with mobile applications.
The Bluetooth Link Layer outlines the way Bluetooth devices can use the raw
transmission facility given by the radio layer to exchange information. The link-layer
characteristics of Bluetooth are summarized in Table 4.

MULTIPLE ACCESS SCHEME TDMA

MAXIMUM PACKET SIZE 358 Bytes

ERROR CONTROL METHOD ARQ, FEC

CHECKSUM LENGTH 1 Byte or 2 Bytes

IDENTIFIERS 14-bit public device

Table 4. Link Layer characteristics of Bluetooth

IOT SECURITY GUIDE 17


The functions of the Link Layer are very close to the MAC (Medium Access Control)
sublayer of the OSI model. Functions of the Bluetooth Link Layer include:
Defining procedures for discovering Bluetooth devices.
Establishing logical links between the Bluetooth devices that are communicating.
One of the devices is assigned as master, and the other is the slave.
Broadcasting data to be sent. Managing the links between the devices throughout
data communications.
Sending data by converting the raw bit streams of the radio layer into frames and
defining key formats.
Considering the challenges of wireless transmission like interference, noise, and
deep fades.

There are two main protocols in the link layer, namely, Link Manager Protocol (LMP)
and Logical Link Control and Adaptation Protocol (L2CAP).

Link Manager Protocol (LMP)


LMP establishes logical links between Bluetooth devices and maintains the links for
enabling communications. The other main functions of LMP are device authentication,
message encryption, and negotiation of packet sizes.

Logical Link Control and Adaptation Protocol (L2CAP)


L2CAP provides adaption between the upper layer frame and baseband layer frame
format. L2CAP provides support for both connection-oriented as well as
connectionless services.

Zigbee
Zigbee is similar to Bluetooth technology with a 2.4Ghz frequency. It is a low power
personal communication network. It is cheaper and is widely used for several
applications. It is used for specific commercial and industrial applications. Its range
varies from 10-100m. The link layer characteristics of Zigbee are summarized in Table
5. Mesh networking is one of the important advantages of Zigbee technology. Zigbee
supports star or mesh network topology.

MULTIPLE ACCESS SCHEME CSMA-CA, slotted CSMA-CA

MAXIMUM PACKET SIZE 133 Bytes

PROTOCOL EFFICIENCY (RATIO OF 102/133 = 0.76 (76 Percent Efficient)

PAYLOAD TO TOTAL PACKET LENGTH)

ERROR CONTROL METHOD ARQ, FEC

CRC LENGTH 2 Bytes

LATENCY <16ms (beacon-centric network)

IDENTIFIERS 16-bit short address | 64-bit extended address

Table 5. Link Layer characteristics of Zigbee

IOT SECURITY GUIDE 18


6LoWPAN
6LoWPAN is an acronym for IPv6 over Low-Power Wireless Personal Area Networks
(LPWAN). LPWAN is a wireless wide area network technology whose range varies from
2 km to 1000 km depending on the technology. The 6LoWPAN system is used for a
variety of applications, including wireless sensor networks. This form of wireless sensor
network sends data as packets and uses IPv6, providing the basis for the name,
6LoWPAN.
6LoWPAN has different features like support for 64 bit or 16-bit addressing, targeted at
low power networks including Bluetooth low energy, header compression for IPv base
as well as for UDP headers, network auto-configuration and neighbour discovery,
support for multicast, unicast, and broadcast, supporting the concept of
fragmentation. This makes 6LoWPAN the best-suited protocol for IoT.
Many low-power radio protocols are expected to use very small frame sizes. So, the
frame size is dependent on the amount of payload or the data that need to carry and
the amount of signalling data that is required to carry the packets. Figure 5 shows an
example of a 15.4 standard frame where the payload, the actual user data, consists of
53 bytes whereas the total number of bytes to carry this packet is 127 bytes. One
should realize that the addition of a header creates a fairly large amount of overhead.

HTTP RTP
Upper Layer Stack

TCP UDP ICMP


Data Link (L2)

IP
IEEE 802.15.4 MAC
Physical (L1)
Ethernet MAC
IEEE 802.15.4 IEEE 802.15.4
Ethernet PHY 868/915 MHz 2.4 GHz

(a) Link Layers and IP (b) Link Layer: IEEE 802.15.4 for wireless

Figure 5. Link Layer of 6LoWPAN

LoRaWAN
LoRaWAN (Long Range Wide Area Network) is a wide area network protocol. It is a low
power consumption protocol that targets wide-area network (WAN) applications with
better security and mobility. It supports a large network with millions and millions of
low-power devices deployed on public networks. It is a Media Access Control (Data
Link or Network Access) protocol with some functions of the network layer also
implemented. It is developed by LoRa Alliance. In this protocol stack, multiple end
nodes (IoT devices) are connected to a gateway in Star Topology for M2M
communication.

IOT SECURITY GUIDE 19


This protocol stack has been developed to cater to battery-powered IoT devices that
need to connect wirelessly with a base station frequently. It is similar to Sigfox and
Weightless technologies. The transceivers in this network typically have a coverage
area of about 2 to 5 km in urban areas and 10 to 15 km in deep indoors. The IoT
devices can communicate with a gateway at data speeds ranging from a few
hundred bits per second to 50 Kbps.

IOT SECURITY GUIDE 20


IOT APPLICATION ARCHITECTURE 2.1 Introduction
Application architecture outlines models and strategies for both the
design and development of an application. The architecture offers
you a blueprint and recommendations when developing an
application to wind up with a well-structured application eventually.
Design patterns for software might help you develop an app. A
pattern exemplifies a persistent solution to a problem. Instead of
designing the architecture from scratch, you could use established
design patterns and ensure that things operate appropriately.

Types of Application Architecture


Begin with your organizational plans when determining which
application architecture should be used for a new application or
even when examining your current architecture. Instead of picking an
architecture and then attempting to adapt it to an application, you
can simply design an architecture that will fulfil your interests. There
are numerous application architectures, the most prominent of which
are: Layered or N-tier, Monolithic, Microservices, Event-driven,
Service-oriented Architectures.

Need for Application Architecture in IoT


Even though IoT solutions are designed using specialized techniques
and associated with particular applications, the results are dispersed
and heterogeneous and thus, not standardized. The prime reason is
that the Internet of Things (IoT) is complex and nuanced. In IoT
networks, the lack of technical standardization exposes hardware,
software, and relevant data to threats and attacks. It is therefore
imperative to spend more time in determining guidelines for industry
and architectural standards necessary to implement IoT efficiently.
Without standards, we risk the possibility that technology will not
accomplish its original purpose with a shorter timeline. Scalability,
interoperability, security, and reliability are the fundamental
advantages of IoT standardization.

IOT SECURITY GUIDE 21


2.2 Security Concerns of IoT

As we rely increasingly on smart, interconnected appliances in our lives, billions of


"things" can threaten personal confidentiality and public safety through cyberattacks
and external interference. Security is one of the greatest considerations concerning IoT,
which needs to be acknowledged along with the overarching need for safety, as the
physical world is intricately linked to both concerns. The regulation of IoT products, in
particular given the complicated nature and uncertainty of the IoT ecosystem and
considering scalability issues, is another important aspect.

The following standard problems have been recognized which impede the
aggregation of more reliable IoT ecosystems:

Limited Device Resources


A significant redesigning of the existing IoT infrastructure may be required to execute
standard security protocols because of technical limitations. Most IoT devices possess
minimal computing capacities, memory, and power. Thus, advanced security
measures cannot be easily implemented.

Fragmentation of Standards and Regulations


The fragmented and inconsistent development of guidelines and regulations to
regulate the development of IoT security measures and best practices, as well as the
rapid advent of novel technologies, complicate related concerns even further.

Security Integration
It is a very daunting task since the perspectives and expectations of those involved
can contradict one another. For instance, various IoT devices and systems can be built
on alternative authentication solutions, which must be integrated and interoperable.

Privacy Concerns/Data Privacy


The best way to protect data is not to collect the data in the first place. Since non-
essential data or data which is not needed to meet requirements simply puts
privacy at risk.
Responsibility for securing the data begins the moment we collect it, so it is always
advisable only to collect the data that is required and ensure the protection of the
collected data.

IOT SECURITY GUIDE 22


The data collection should always begin with the user's consent. Even though the
data collection begins with consent, it is necessary to provide protection to ensure
privacy and the collected information remains confidential.
For example, a patient health record should be only accessible by the patient and
the doctor and necessary steps should be taken to ensure the protection of this
data unless the patient provides consent to share.
It is important to dispose of the data which is no longer needed and to achieve this,
proper data retention and data disposal policies should be in place.

2.3 Security Recommendations


A detailed list of security measures and best practices to minimize the threats,
vulnerabilities, and hazards reported affecting IoT devices and applications is
described in this section. The security measures and guidelines for the various IoT
contexts have already been established.
The first set of well-defined initiatives encompasses policies that typically aim to
secure information and make it more comprehensive and robust. They should be
acceptable for the operations of the company and should be well-documented.
Security measures are indeed specified to tackle a broad range of security concerns,
for instance, design security, data protection, risk analysis, etc.

Establish Secure IoT Lifecycle Guidelines on Software and


Hardware Development
IoT products and solutions developers, sellers, and manufacturers should integrate
and execute an SSDLC (Secure Software Development Lifecycle) for their IoT services
and integrate related processes in their operations. At the application level and in
each of the SDLC phases, security must be fully implemented. It is therefore important
to empower more organizations to provide secure components for developers and
end-users at the same time.
The theory of security and privacy by default and security and privacy by design is
naturally the basis for IoT security. In IoT, cyber threats are perspectives (e.g.,
depending on the context of application), and this should consider the principles of
security and privacy by design.
With such a focus on organizations, the incorporation of proper IoT security practices
and well-defined and widely adopted tools (e.g., guidelines, checklists) would strongly
support the default and design of IoT security.

IOT SECURITY GUIDE 23


Support the Establishment of IoT Security Strategies and
Regulations
In terms of standardization, it is worth noting that the concept of the standard is
acknowledged and endorsed by the industry, but diverse stakeholder organizations
have distinct R&D chains, which ultimately adds to fragmentation. It is recommended
that a set of best practices and guidelines for IoT security and privacy be established
to overcome this fragmentation and this could be used as a benchmark for the
implementation and deployment of IoT systems available in the market (for example-
consult reports from AIOTI and ECSO). Each sector should subsequently concentrate
on establishing specific policies, standards, and priorities depending on the specific
context
and risk factors prevalent in each sector.

Implement Roles Separation in the Application Architecture


Every specific process must have a different user identity associated with the
applications that run on an Endpoint. This assures that if an application is exploited,
another application on the same Endpoint cannot be breached unless a second
attack is successful. This additional phase taken by an Attacker is usually a severe
obstacle to the overall exploit creation process, increasing the cost and severity of
intervention against an Endpoint.
A custom privilege must be used for each application or service. In most scenarios,
this is a separate user identity. Implementing separate user identities through the
separation of roles means that if one service is breached, it cannot directly influence
the assets used by another service within the same infrastructure. Secondary
vulnerabilities must be identified in the local operating system to elevate privileges to
exploit other services and users. This requires having a clear and solid application
design that makes proper use of privilege separation.

IOT SECURITY GUIDE 24


2.4 Solutions Among Different Industries

Huawei's IoT Solution Security Architecture


For its IoT solutions, Huawei employs a "3T+1M" security architecture. The 3T+1M
framework prioritizes security features at the machine, node, cloud, and application
levels, all of which are aligned with one another. This might address security concerns
in an IoT network at the sensor, network, and software levels. Huawei utilizes its
comprehensive expertise in providing telecom network security guarantees to
establish security situational awareness, examination, and surveillance for IoT, building
on platform and cloud security. Huawei, in collaboration with other stakeholders,
employs this architecture to effectively deal with the challenges of IoT security. Huawei
is consistently optimizing its 3T+1M architecture to adapt easily to the security
requirements of numerous industrial applications, especially industry-specific security
specifications.
The 3T+1M IoT security solution focuses on the security of IoT scenarios (for instance,
Connected Automobiles, LPWA, and Industrial IoT) by combining Three Technologies
(3T) and One Management Approach (1M) to provide ensured support for IoT
networks. "3T" corresponds to IoT device safety, network security assurance, and cloud
protection technologies, while "1M" refers to security activity and management.
The framework focuses on ensuring consistency with local and international laws, as
well as industry standards, while also providing end-to-end protection against online
threats.

IoT Device Defense Technology Family (1T)


Offers IoT systems with compatible security features and device-cloud connectivity in
a wide range of application scenarios. For weak devices, basic security functionality
such as DTLS/DLTS+, trusted DICE, FOTA, and safe boot must be established (e.g., LPWA
smart meters and shared bike locks). Security Certificate Maintenance, Intrusion
Detection, Encryption Authentication, and a Trusted Platform Module (TPM) are needed
for strong devices (e.g., vehicle-mounted T-Box and OBU).

IoT Network Assurance Technology Family (1T)


Identifies suspicious activity and imposes isolation, particularly for unusual IoT device
behaviour. Unusual activity encompasses irregular traffic and reporting frequencies.
For various circumstances, different IoT pipe security capabilities are improved. Anti-
DDoS and signalling storm management capabilities, for instance, are enhanced for
NB-IoT applications. The trustworthy functionality of V2X communication must be
enhanced for Cooperative Intelligent Transport Systems (C-ITS) of connected
vehicles.

IOT SECURITY GUIDE 25


IoT Platform Protection Technology Family (1T)
Outlines how to develop IoT platforms and clouds that would provide security
situational awareness associated with big data analytics, awareness of connected
vehicle and security analysis, and IoT data security and privacy protection. It also
offers consumers configurable cloud security compliance capabilities.

IoT Security Operation and Management (1M)


Enables us to create E2E security maintenance resources, as well as how to build
security operation and management requirements and procedures to enhance
operational and testing performance. This also focuses on enhancing the IoT security
framework in terms of threat detection and analysis, as well as response. Improved
security testing tools, frequent IoT security assessments, automated system and
application security monitoring tools, and threat intelligence libraries are all part of
this.
Distinct IoT security techniques are used in various areas with the 3T+1M security
architecture. Some concentrate on device security, others on network security, while
others on cloud security. None of the other technologies exists in isolation; rather, they
work together to form a robust security assurance framework. For instance, IoT devices
must typically support a range of applications with limited resources, so device
security capabilities must be integrated with those of the cloud and networks to
enhance security at the edge.

LTTS IoT Security Framework


Conversations on privacy and cybersecurity threats in the implementation of Industry
4.0 have largely centered on the difficulties associated with the integration of
Operational Technology and Information Technology. Nevertheless, considering the
significance of connected systems in the manufacturing sector, Service Providers must
transition to a Zero Trust Architecture (ZTA) as part of the industry 4.0 transition. This is
needed for the systems that include external devices and services, such as IoT/IIoT
and cloud services.
The LTTS IoT Security Approach allows suppliers and developers to easily switch toward
more modern ZTA, improve security to existing infrastructure, or deploy sophisticated
and advanced cybersecurity in new infrastructure.

Zero Trust Architecture


Zero Trust (ZT) is a security principle that requires auditing for any instance of
accessibility, validating everything before granting access to information. ZT removes
the risks associated with the conventional security strategy of supporting existing
infrastructure implicitly (e.g., networks, devices, and users). ZTA is based on the
authenticity of resources, limiting access to those who require it. Permissions are
issued based on a security strategy of 'least privileges.'

IOT SECURITY GUIDE 26


By adhering to these guidelines, the LTTS IoT Security Framework implements Zero
Trust Architecture:
All sources of data, appliances, and applications are considered resources.
Regardless of the network location, every exchange of information is protected.
Specific resource access is provided on a per-connection basis.
Until permissible access is granted, the resources are dynamically authenticated
and strictly implemented.

Key Components of the Framework


The diagram below illustrates the LTTS IoT Security Framework's features that represent
ZT concepts and are aligned towards the world of connected devices. These features
fulfil the cybersecurity concerns of IIoT-connected devices and services.

LDAP

Sign & Secure


PKI
Encrypt Storage

PEP Agent
Policy Admin Policy Engine IDP
Point
OPERATOR

User AunthN Authentication Authorization


Service Service PEP Proxy

MFA SSO PDP PEP

REMOTE USERS
Operational
Resources

Device Analytics Device Device


Management Provisioning
SIEM / SOC
SERVICES

Device Edge
Device
IDoT, SFOTA, Analytics, Agent
CMD, Config, PWS

Passive Active

Figure 6. Source: "Industry 4.0: Transition to ZTA using LTTS IoT Security Framework,"
L&T Technology Services

IOT SECURITY GUIDE 27


With several elements, the framework performs the functionalities portrayed in Figure
6. Following the ZT concept, LTTS's Identity and access management (IAM) are
fundamental to the security system, performing the essential functions of verification,
authorization, and implementation. LTTS IAM gives the application owner a lot of
freedom in establishing fine-grained authorization policies that are not restricted to
predetermined use cases.

Benefits of LTTS Solution


The LTTS strategy involves minimum attention in terms of integration.
The approach is a mixed security solution that involv­­es both cloud and on-
premises protection.
The framework is 'Cloud Agnostic,' which implies it provides full versatility and
flexibility.
The design is modular, which implies that additional safety modules can be
incorporated at any time to meet new and complex needs.

oneM2M Standards
oneM2M is a global collaborative initiative driven by eight of the world's biggest ICT
standards management organizations. The organization’s mission is to develop a
global technological standard for standardization in the areas of security, architecture,
and API specifications for M2M and IoT applications dependent on specifications
presented by its representatives.
oneM2M project is intended to be a long-term IoT deployment solution. These unified
guidelines allow an Environment to enable a broad spectrum of applications and
products, namely smart grids, smart cities, connected vehicles, smart homes, and
healthcare. Perhaps one of oneM2M's priorities is to promote and start engaging
organizations from M2M-related market domains like automation, navigation systems,
healthcare, enterprise projects, home automation, and so on.
This is an open and accessible standard with transparent project development. At
oneM2M, you can find all the regulations, including the drafts. oneM2M reportedly has
over 200 partners involved.

oneM2M Overview
oneM2M Service Layer:
The oneM2M graded architecture describes an IoT Service Layer, which is a software
interface that sits between processing/communication hardware and IoT
applications and provides a valuable collection of features required by many IoT
systems. It facilitates safe end-to-end data/control transfer between IoT devices, as
well as authentication, authorization, and encryption.

IOT SECURITY GUIDE 28


The Service Layer of oneM2M is usually introduced as a software layer that sits
among IoT applications and services that allow data storage, processing, and
transport, usually on top of IP. Non-IP transports, on the other hand, are assisted by
interworking proxies. The oneM2M Service Layer delivers functionality that is usually
needed for IoT applications across various industrial sectors.

Horizontal Architecture
The Service Layer of oneM2M is usually introduced as a software layer that sits
among IoT applications and services that allow data storage, processing, and
transport, usually on top of IP. Non-IP transports, on the other hand, are assisted by
interworking proxies. The oneM2M Service Layer delivers functionality that is usually
needed for IoT applications across various industrial sectors.

APIs offered by operating systems enable applications


to monitor the connectivity layer and built-in sensors
Applications

API
Data transmission requests from applications are
collected by the OS. The OS enhances and monitors
network use while still providing protection
Operating System

Connection to the internet is established by the


connectivity layer through wired and wireless networks
Connectivity

Figure 7. oneM2M’s Service Layer

Functional Architecture

The oneM2M Layered Model is made up of three layers: the Application, the Common
Services, and the underlying Network Services

Application
AE AE AE
Layer

Mca Mca Mca


Service
Layer CSE CSE CSE CSE
Mcc Mcc Mcc
Mcn Mcn Mcn

Connectivity Underlying NSE NSE Underlying NSE


NSE
Layer Network Network

Application Middle Node Infrastructure Inf. Node


Service Node Node

Figure 8. oneM2M Layered Model


(Source: https://www.onem2m.org/getting-started/onem2m-overview)

IOT SECURITY GUIDE 29


oneM2M Entities:
The following functions are defined in the oneM2M functional architecture:

Application Entity (AE)


It is an entity in the application layer that executes M2M application service logic. Each
instance of application service logic execution is referred to as an "Application Entity"
(AE) and is distinguished via a unique AE-ID. Examples of AEs include a vehicle
monitoring application, a remote healthcare application, and so on.

Common Services Entity (CSE)


It is an entity that involves several oneM2M specified common service functions that
can be utilized. The Mca (visibility to AEs) and Mcc (visibility to other CSEs) reference
points reveal those service roles and responsibilities to other entities. Another
reference point is Mcn which is used to gain access to the underlying Network Service
Entities' services. Each CSE is distinguished via a unique CSE-ID. The CSE provides
service functions such as data storage and sharing with access control,
authentication, system management, and so on.

Network Services Entity (NSE)


This entity offers services to the CSEs from the underlying network. Location services,
system triggering, long sleep cycles, and so on are examples of such services.

Benefits of Using oneM2M


The benefits of using oneM2M are as follows:
To avoid platform or cloud provider lock-in, it uses open standards.
There are several open-source implementations accessible (CSE or AE).
Static and dynamic access control offers complete security at both the channel and
object levels.
The ability to easily interoperate/integrate with established and developing
configurations lays the groundwork for long-term evolution and a sustainable future.
Utilises the network infrastructure of the operators as well as current operational
technologies.
It is incredibly flexible because it can be integrated across all domains and is not
restricted to a single protocol technology.
Supported routing protocols and message serialisation can alter, but the oneM2M
code will still not. This facilitates easy modification to future technological
advancements.
The horizontal platform enables multiple IoT domains by providing common service
functions.
Cross-domain innovation enabled by a unified methodology and standard APIs
enables the exchange of information and processes across previously isolated
domains (for instance, home security system vs heating system), aids in the
development of new opportunities.
The design of data-oriented RESTful API results in effective data sharing and semantic
interoperability.

IOT SECURITY GUIDE 30


2.5 IoT Application Architectures in Focus
Privacy cannot be viewed as a bonus to current goods and services. Since decisions
made in the digital world have a direct impact on the physical world, security must be
built into services from the ground up to make sure that every action is permissible
and every identity is validated as well as ensuring that these activities and the related
meta-data are not disclosed to unauthorized parties.
The healthcare industry, transportation solutions, power grids, smart homes,
surveillance systems, and other technologies have a significant effect on individuals'
physical lives. It is the engineers' responsibility to maintain these goods and services to
the highest degree of assurance possible, reducing the possibility of potential damage
as well as the disclosure of private information.

Focus 1: Healthcare Industry


This section details technological and network frameworks tailored to the health sector
to develop an awareness of potential risks and high-level thinking about securing
healthcare systems and medical information from multiple threats. One such threat
may be personal devices that share data with healthcare providers. We hope to
encourage the best solutions for health-related IoT systems by considering these
architectures for several devices and their security issues.

Reference Architectures
This section introduces three network topologies ("bounded," "boundaryless," and
"hybrid"), as well as an environment map and network architecture about each. The
following network topologies are briefly outlined in the subsequent lines.
A "bounded" network topology has a fixed boundary amongst network zones, which
can be deliberate or unintentional, like access points between protected networks or
even a bridge between connectivity. This architecture is especially applicable to fixed
IoT healthcare products and some portable device use cases.
A "boundaryless" network topology has no fixed operational internal network or security
safeguards. End-to-end security frameworks are thus needed. The use of the trust
boundary to ensure permitted access facilitates data security and credibility. This
topology is especially relevant to portable IoT healthcare systems and some individual
device use cases.
A "hybrid" network topology can involve a mix of network technologies and topologies,
such as bounded and boundaryless networks. This topology is especially pertinent to
portable and personal healthcare devices.

Bounded Network with High Integrity Zone


A boundary could be an ideal location for implementing protective measures like
traffic controls. Using boundaries to distinguish networks facilitates the protection of
sensitive resources. It also encourages better information management practices and
adheres to data protection laws by putting additional regulations in place for patient
information.

IOT SECURITY GUIDE 31


Using boundaries can serve to minimize cyber threats and enhance organizational
management. Boundaries that occur as a consequence of different network
technologies may serve as a bridge between bounded regions or other network
technologies, facilitating interoperability.

Radiology High Integrity Zone Hospital Health Service Public Internet

Radiology
Information
System
Image
Storage
sed
Patient ces
Records Pro ages
Im

e Healthcare
MRI Machine Usag
Operations
Scanner Management

Coolant
Levels

Coolant
Service
Provider

Machine
Status

Remote
Radiologist Service
Commands

Maintenance
Provider

Figure 9. Source: "IoT Security Reference Architecture For The Healthcare Industry,"
IoT Security Foundation (IoTSF), 2019

Figure 9 depicts multiple nested regions, with the radiology department's critical
systems residing in the innermost high integrity region. This is stored inside the
hospital's internal network and is part of a larger healthcare network. Data is also sent
to the public Internet for collaboration with external system maintenance and service
providers.
Boundaries enable strong network security services to be deployed at points of
interconnection. Boundaries often help to provide layered protection in an environment
with a wide range of devices with diverse capacities and criticalities. For instance, if a
section of a network is breached, a security gateway can fulfil the demand of critical
devices by protecting the high integrity zone and its devices with low or weak security
capacity from cyber risks.

IOT SECURITY GUIDE 32


The following are some examples of security management features that can be
applied at network boundaries:
Segregating internal and external networks to safeguard against potential attacks
and facilitate monitoring and traffic segmentation as required.
Isolating local networks into multiple network zones to better handle safety
depending on the needs of that zone and to reduce a network's attack surface
(e.g., protecting a high-integrity zone).
The capability of sending warnings and updates in the event of an anomaly.
The authority to grant permissions to a device or a group of devices.

Boundaryless Network
A Boundaryless Network illustrates the significance of services such as user
authentication and monitoring updates. This is being accompanied by an escalation in
the adoption of Web cloud infrastructure, which offers price and efficiency benefits
while optimizing IT services. Similar developments can be observed in the healthcare
industry, where there is a growing willingness to provide care to patients outside of a
conventional hospital or clinic setting by utilizing cloud computing.

Local Hospital
Network Observations
Sensors Health
Record
Blood Pressure, Information
Temperature, System
SpO 2 , Pulse Time

Time
Patient ID Vital Server
Barcode Signs
Scanner Monitor

Nurse
Mobile Devices
Configuration, Configuration
Firmware Update App
Laptop or
USB Stick
Local Wired
Connections

Figure 10 Source: "IoT Security Reference Architecture For The Healthcare Industry,"
IoT Security Foundation (IoTSF), 2019

Figure 10 depicts three separate networks – local wired or Wi-Fi, as well as public
Internet – that can link healthcare equipment such as a vital signs monitor or a nurse's
smartphone. In essence, this is a boundaryless network architecture in which
communication will occur end-to-end over the Internet while often switching between
networks. For example, the display is portable and can be connected to any
accessible Ethernet port or connected to public Wi-Fi. When "on-site," the nurse's
mobile device can be able to connect to public Wi-Fi or use a cellular link and
thereafter connect to the hospital network when operating locally.

IOT SECURITY GUIDE 33


The following are some examples of security management functionality that could be
incorporated at security management points:
Organise authentication procedures.
Keep your authentication credentials secure.
Cover variety levels of authentication such as single token, server, and so on.
An authorisation tool can issue warnings if an authenticated system has tampered
with or unauthorised acts are being attempted.

Hybrid with Different Network Technologies

It should be noted that not all IoT health information is transmitted over IP-based
networks. As a result, it is critical to understand how various network technologies can
interact in this environment. This topology is especially applicable to portable and
personal healthcare products with the following example architecture focusing on a
personal device use case (connected hearing aid).

Hospital
Hearing Smart Information
Hearing
Aid App Phone System
Aid

Audio
Playback

Audio
Audio
Streamer
Source Visitor
Information
Audio Playback System

Body Area Personal Area Public Local


Network Network Internet Hospital
(NFMI) (Bluetooth) (Wi-Fi) Network

Figure 11. Source: "IoT Security Reference Architecture For The Healthcare Industry,"
IoT Security Foundation (IoTSF), 2019

Figure 11 depicts a framework using three separate network technologies: IP over the
Internet, a Bluetooth Personal Area Network (PAN) with several profiles (excluding IP),
and a Body Area Network (BAN) with Near Field Magnetic Induction (NFMI). These are
depicted as three regions on the diagram. The regions in this example are used to
demonstrate the network technologies that the various appliances and services in this
hybrid network use to communicate with one another. Nevertheless, it is worth
remembering that neighbouring regions may not always have a definite boundary. The
hearing aid could be completely exposed to the PAN, and the hearing aid App may be
completely exposed to the Internet. Moreover, because there is no direct routing
between the BAN and the Internet, the hearing aid is not explicitly exposed to the
Internet, and hence this is not a truly boundaryless network architecture.

IOT SECURITY GUIDE 34


The following are some examples of security management functionality that could be
incorporated at security management points:
Monitoring and auditing capabilities for analysis.
Adding anti-virus/malware services in place.
Applications are updated or patched.
The privilege to revoke authentication and authorisation to pass ownership (for
instance, maintaining device whitelists and blacklists).

Focus 2: Smart Home Ecosystem

Hub Architecture
This hub reference architecture intends to deliver user-friendly centralized security
solutions for homes implementing IoT systems and technologies, particularly because
this usually involves devices from multiple manufacturers. Specifically, the design
prioritizes protection and offers a path forward with that in mind. This Hub Architecture,
in contrast to other IoT architectures, offers a more reliable and straightforward home
IoT ecosystem. By providing tools such as alarms and troubleshooting, the Hub
architecture allows home IoT administrators to easily monitor and control their IoT
environment.
It is also suggested that home IoT devices link to a dedicated IoT network rather than
the personal residence network system for added se­­curity. For example, a router can
easily and intelligently divide the home broadband into two networks: one for regular
internet usage by occupants and the other for IoT devices like LEDs and smart
assistants. The goal is to reduce the cyber threats to home IT and IoT networks by
securing home network events from IoT devices that could be used as an easy target.

Example of Hub-based Architecture


The Hub framework is outlined here within five components. First is a schematic of the
Hub architecture that indicates how the Hub is linked to other connected devices and
security features. This is accompanied by three major procedures and their security
requirements for IoT solution design and operation, namely Network Management,
Connecting Devices, and Lifecycle Management.
Finally, a brief overview of security concerns for the Hub itself, including device and
software security, is given.

IOT SECURITY GUIDE 35


Wireless
Clients
Internet
Wired
Clients

Router
Wireless
AP

Firewall Hub

Figure 12. Source: "IoT Security Architecture and Policy for the Home -
a Hub Based Approach," IoT Security Foundation (IoTSF), 2018

Figure 12 illustrates the multi-layered communication framework in a home IoT


environment, reflecting the complex communication mechanism between devices,
networks, and the centralized Hub. The router and firewall functions are shown
separately, but they could also be integrated into the Hub along with other network
functions, especially in those designed for homes with a limited number of devices.
Devices (connected by grey lines) use this network to communicate with one another,
with the Hub, and likely with external elements through a Hub gateway. The Hub, which
gathers data and interacts with other architectural features like appliances and local
networks, is at the heart of the IoT. Simultaneously, the Hub can act as a gateway to
external home networks as required through its link to the firewall (blue line).

Network Management

Homes operate in several network configurations. It is best to practice for this


architecture to have one dedicated network for IoT systems that uses local web
access. A Hub could help with this by segmenting the home "IT" network. The "local IoT
network" is thought to provide an additional layer of protection to both the devices and
the home by isolating IoT device functions from the home "IT" network in the event of a
data breach or breakdown. Nevertheless, not all Hubs can support network
segmentation, and it is known that not all homes would be able to set up and maintain
two local networks. Hence, security features should be integrated into IoT solutions to
allow for a wide range of network architectures while maintaining a high level of
security.

IOT SECURITY GUIDE 36


Connecting Devices Securely

The reliable authentication of an IoT device's authenticity and technology is essential in


ensuring that only authorized and trustworthy devices are installed in the home.
Authentication is the procedure of confirming that an item (or individual) is all it
claims to be or that data came from the source reported to be its origin. An
authorization manager, like the home IoT administrator, will authorize the system to
operate on the network once it has been authenticated.
Inside a home setting, a Hub may have to handle authentication and authorization
elements like identifying and logging devices, validating changes, and maintaining
certificates without human intervention. As a result, the Hub must be able to merge
data from several sources, including the IoT service provider, appliances, and home
users. In a home, a hub should be adaptable not only in terms of technology or design
but also in terms of home user ability.

Lifecycle Management

Regulating IoT system devices, networks, infrastructure, and efficiency is an important


aspect of IoT security. Auditing data and analytics can be aggregated in a centralized
location for improved visibility and control of the IoT system. A Hub serves as the main
source of knowledge about the functioning of the IoT ecosystem for either the home
IoT administrator or the service provider. With the rapid advancement of deep learning
and big-data analytics, the home IoT administrator would be able to take appropriate
measures, such as consulting a solution provider or taking a system offline and
making intelligent choices based on what is obtained from the Hub's surveillance and
tracking tools. This includes knowledge extracted from other security tools, including
firewalls, gateways, and network access controls.

Hub Device Security

Since the Hub is desired to be a vital component of the home's IoT security, it should
have robust security. This includes features like:
Potential to safely store confidential information such as roots of trust, safety
requirements for website & mobile user interfaces, along with network connections.
Auto-repair and troubleshooting abilities.
FAQ or "support" tools to assist users in the event of a breakdown or anomaly.
Strong physical characteristics to guard against adverse living conditions such as
temperature, humidity, etc.

While there are not many public resources on IoT security best practices for end-users,
some can help developers incorporate security best practices in designing IoT
technology. One such example is the IoT Security Foundation's "IoT Security
Compliance Framework". The segments of the compliance structure are related to the
Hub-based architecture below.

IOT SECURITY GUIDE 37


Hub Functions Compliance Framework Sections

Network Elements of the cloud and the network


Management Supply chain and manufacturing security

Interfaces for wired and wireless devices


Connecting
Authorisation and authentication
Devices Securely Hardware encryption and key protection

Framework

Lifecycle Hardware and physical reliability of the system


Software for devices
Management The management context of the device

Transition in device ownership

Structures and accountability for business


compliance
Device
Web-based user experience
Security API for mobile devices
Confidentiality

Table 6: Compliance Framework Mapping

Focus 3: Industrial Control Systems

Overview of Industrial Control Systems


Industrial control system refers to a broad category of control systems that include
DCS, SCADA, as well as other PLCs that are commonly used in industries and essential
infrastructures. An ICS is made up of control components (i.e., electrical, hydraulic,
mechanical, and pneumatic) that work collectively to build an industrial goal such as
manufacturing, transportation, etc. The system's control section involves the
requirement of the expected outcome or efficiency. Control may be completely
automated or include a person in the process.
A large number of contemporary ICS are the result of the integration of IT functionality
into established physical structures, frequently substituting or augmenting physical
control mechanisms. In machines and motors, for instance, embedded digital controls
have supplemented analogue mechanical systems. Savings and efficiency
advancements have aided this progression, contributing to several contemporary
"smart" innovations, including the smart power grid, industrial automation, smart
homes, and advanced manufacturing. Although this facilitates the connectedness and
robustness of these systems, this also increases the necessity for their versatility,
sustainability, privacy, and security.

IOT SECURITY GUIDE 38


ICS Security Architecture
Ideally, it is suggested to distinguish the ICS network from the corporate network when
designing a network architecture for an ICS development. Because the essence of
network traffic differs between these two networks. If ICS network traffic is routed via
the corporate network, it can be disrupted or exposed to Denial-of-Service (DoS) or
Man-in-the-Middle attacks. Because its networks are distinct, scalability and reliability
issues on the corporate network will unlikely influence the ICS network.
Practical issues, like the expenditure on ICS implementation or the maintenance of
homogeneous network infrastructure, usually entail a connection between the ICS and
corporate networks. This connection poses a major security concern and must be
safeguarded with boundary detection systems. In this network section, servers holding
ICS data that must be viewed from the corporate network are installed. Only these
devices should be able to link to the corporate network. For any other interfacing, the
firewall should only allow the bare minimum of approachability, which includes
accessing only the ports needed for specific communication. These architectural
considerations are outlined below:

Network Segmentation and Segregation


The purpose of network segmentation and segregation is to limit access to private
data for certain systems and individuals while still allowing the enterprise to function
efficiently. Typically, network segmentation and segregation are enforced at domain
gateways. ICS environments frequently have many well-defined domains, like the
operational LANs, control LANs, and operational DMZs, along with gateways to non-ICS
and less reliable domains, like the Internet and corporate LANs.
Once network segmentation and segregation are executed properly, the amount of
access to sensitive information is reduced. This could be established by the use of
several mechanisms and practices. Some of the popular mechanisms and practices
for offering good network segmentation and segregation, depending on the design
and configuration of your network, includes the following:

Encryption or network handset partitioning imposes logical network segregation.


This could be accomplished using VLANs, VPNs that employ cryptographic
mechanisms, unidirectional gateways, and other similar technologies.
Incorporate techniques that go beyond the network layer. Where appropriate, each
device and network must be segregated and separated from the data link layer to
the application layer.
Use the least right and need-to-know ideals. When a device does not need to
interact with another device, it should be prohibited from doing so. A device only
has to communicate with another device on a particular port.
Differentiate information and infrastructure according to security needs. Along with
network separation, virtualisation could be used to achieve the necessary
segregation.
Incorporate whitelisting rather than blacklisting; in other words, allow access to the
identified good entities rather than refusing access to the identified threat.

IOT SECURITY GUIDE 39


Boundary Protection
Boundary protection systems are important aspects of architectural design that
implement unique security procedures. Organizations may separate ICS and business
system resources that carry out various missions or operations. Separating device
components with boundary protection mechanisms allows for greater protection of
individual components as well as more efficient monitoring of information flows
among these components. Boundary protection devices decide if data transmission is
allowed, often by inspecting the data or related metadata.
The placement of boundary protection devices is determined by the operational
security architecture. The demilitarized zone (DMZ), a host or network segment
incorporated as a "neutral zone" between security domains, is an effective design
construct. It aims to implement the ICS domain's policy and procedures for the
external exchange of information and to grant restricted access to external domains
while securing the ICS domain from external risks.

Firewalls
Firewalls are systems or structures that regulate the flow of traffic between networks
with varying levels of security. Firewalls will limit ICS inter-subnetwork interactions
between functional security subnetworks and applications even further. An
organization can prevent unauthorized access to the respective services and devices
within the more critical areas by using firewalls to monitor connections in these areas.
Firewalls demand regular monitoring, preservation, and recovery. Rulesets must be
checked to ensure that they are receiving proper defense in the face of constantly
evolving cyber threats. System features should be analyzed to ensure that the firewall
is collecting data and could be relied on in the event of a security breach. Real-time
management of firewalls is needed to identify and respond to cyber incidents as
quickly as possible.

Logically Separated Control Network


At the very least, the ICS network should be technically segregated from the corporate
network. Implementing an intermediate DMZ network is a viable approach for
facilitating connectivity between an ICS network and a corporate network. The DMZ
should be linked to the firewall so that the corporate network and the DMZ, as well as
the ICS network and the DMZ, can communicate. The corporate network and the ICS
network must not communicate with one another directly. Implementing a Virtual
Private Network (VPN) between the ICS and external networks will provide added
security.

IOT SECURITY GUIDE 40


Recommended Defense-in-Depth Architecture
An ICS cannot be safeguarded by a single security product, infrastructure, or strategy.
A multiple layer approach involving at least two (or more) separate overlapping
security measures, also known as defense-in-depth, is desired to minimize the impact
of any one process failing.
Figure 13 presents an ICS defense-in-depth architecture approach established by the
NCCIC/ICS-CERT Recommended Practices committee and DHS Control Systems
Security Program (CSSP). The document Control Systems Cyber Security: Defense in
Depth Strategies guides designing defense-in-depth architecture techniques for
enterprises that use control system networks while preserving a multi-tiered design
concept.
CS PBX CS MODEM POOL
Applications Historian Database Configuration HMI Engineering
Server Server Server Computers Workstation

Telephony
Firewall
Wireless Access Points Data
Controller/RTU/PC/ SED Acquisition
Server

Control System
Field Device
FIELD COMM BUS CONTROL SYSTEM LAN
Communications
Field Locations Interface External Business WWW
Communications Server DB /
Infrastructure Server Historian Security
Server
Authentication
Server

Dedicated
Backup Control Center
Comm Path
Business Comm. DMZ
CS
Firewall Web Server DMZ

DB DMZ
External
VPN Access
Security DMZ
Remote Business Peers
Telephony Authentication DMZ
Firewall
CS PBX
Business Web Applications FTP
Business eMail Wireless
Servers Servers Server
Workstations Server Access Points

CS MODEM DNS
POOL Server
Internet
Web
Server Authentication
CORPORATE LAN Server

External DNS DMZ


Communications Corporate
Infrastructures Firewall eMail DMZ

: IDS SENSOR Web Server DMZ

FTP DMZ

Authentication DMZ

Wireless DMZ

Figure 13. CSSP Recommended Defense-In-Depth Architecture


(Source: K. Stouffer, J. Falco, and K. Kent. Guide to supervisory control and data acquisition (SCADA) and industrial control systems
security. Sp800-82, NIST, September 2006.)

This ICS architecture includes firewalls, the use of demilitarized zones, and intrusion
detection. The use of multiple demilitarized zones offers the potential to distinguish
features and access privileges and has proven to be very efficient in securing huge
architectures consisting of networks with varying operational mandates.

IOT SECURITY GUIDE 41


3.1 Overview of Cyberattacks in IoT
SECURITY AND IOT IoT has created entirely new businesses and revenue streams or
delivers a more efficient experience for consumers. Along with this, it
also creates new opportunities for all that information to be
compromised. Not only is more data being shared through IoT
among many more devices, but more sensitive data is being shared.
As a result, the risks are exponentially greater. There are many
classifications of IoT attacks. In this subsection, we have described
the DDoS, Weak Authentication Attacks, Privacy Violations and Data
Leakage Attacks, and Malware Injection Attacks. To an extent, we
have further classified these attacks based on the IoT layers.

3.2 Distributed Denial of Service

Introduction
It is a DoS (Denial of Device) attack that uses multiple computers or
machines to flood a targeted resource. It occurs when an attacker or
attackers attempt to make it hard or impossible for a service to
deliver by overloading it with requests to virtually anything: services,
devices, networks applications and even specific transactions within
the application. Since DDoS uses multiple systems, it will be hard to
track the source system that is causing the attack, overloading
volume is high, and due to the speed of this attack, it will be hard to
detect flooding before it is too late, and the outcome/damage is high
or sometimes even catastrophic. This attack can successfully affect
compromised devices and systems. Some of the examples of DDoS
attacks in IoT are Mirai –it is malware that infects smart devices that
run on ARC (Argonaut RISC Core) processors, turning them into a
network of remotely controlled bots or “zombies” This network of bots,
called a botnet, inflects Linux systems, Reaper – Unlike MIRAI, REAPER
majorly employs exploits that target disclosed vulnerabilities in IoT
devices. Currently, many popular router brands as well as IP cameras
and Network Attached Storage devices are affected.

IOT SECURITY GUIDE 42


How it Works
The control of the network and devices that help to execute a DDoS attack is
necessary a step for the attacker shown in “Figure 14”. Malware like bots or zombies
software helps the hacker to gain control, then he sends commands to each bot
remotely and then directs it to the desired source IP address. Therefore, if a hacker
sends hundreds of commands to the equipped robots, there will be an overflow of
requests in the target port or server. In this way, the service will be down for normal
traffic.
Attacker

Bot
Targeted
Victim

Bot

HTTP GET /index.php

Bot

Figure 14: DDoS attack work

Classification of DDoS Attack on IoT


IoT is divided into three key layers that are Observation Layer, Network Layer, and
Application Layer; in this subsection, we present DDoS attacks possible on each layer.

Types of Attacks at Different Levels:

1. Device Level
Attacks like Jamming - It prevents other nodes from using the channel to
communicate by occupying the channel that they are communicating on. The military
uses jamming attacks as a tool to attack and disrupt terrorist's communications
because the open nature of wireless networks makes them vulnerable to various
attacks. This can occur when technique like RFID (radio-frequency identification) is
used to receive and send the data from IoT sensors without any human interference.

IOT SECURITY GUIDE 43


2. Network Level
This layer is most vulnerable to attacks, as huge data is pumped through wired and
wireless networks to carry out an attack. Examples of network layer attacks: ICMP
(Internet Control Message Protocol) flood – happens when a hacker attempts to
overwhelm a target device with ICMP echo-requests (pings). SYN flood attack (half-
open attack) – occurs when the attacker aims to make a server unavailable to
legitimate traffic by consuming all available server resources.

3. Application Level
Reprogramming attacks, Path-based DoS attacks are common in this layer. Mainly the
application layer, which contains basic user interfaces like smart cities, smart devices,
smart governments, etc.

Measures to Prevent an Attack:

1. Mitigating flooding
This defence is based on the technology of directing the harmful flood to an external
server through a mediator, with a fee-based agreement for the mediator to protect
IoT devices. This technique is used for attacks whose scale is very large.

2. Detecting intrusions
Network Traffic detection is considered one of the classical solutions to prevent DDoS
attacks in the IoT networks, which goes toward the system-level model. To prevent the
attack, it begins with capturing the attack, then defining the types of the hacker and
finally applying the defence operation that is, the sabotaged device that sends larger
than usually identified requests is disposed of, but we cannot prevent all the DDoS
attacks with this technique. The prohibition technique is considered a modern method
that works successfully for IoT devices. It has software whose mission is defencing
(SDN – Software-defined networking) its primary objective is to effectively detect and
mitigate the attack using software features, i.e., it monitors all the data transmission
received by IoT devices and sends an alter to mitigate the exploits when a suspicious
interaction is detected.

3. Blockchain defence
The blockchain mechanism is another modern defence method to protect IoT devices.
As organized records are kept in the blockchain, the IoT device is connected to servers
in a sequence. Launched applications for IoT devices are built into this blockchain, with
the status logged each time an interaction occurs between the server and IoT device.
When IoT devices are major buildings and cities, it would be better to monitor them
and protect them using blockchain.

IOT SECURITY GUIDE 44


3.3 Hardware Security

Overview
The term hardware security refers to utilizing physical devices to protect our IoT
devices. Hardware-based security solutions boost the device’s performance and work
more efficiently. These solutions are operated on a chip, and they are enhanced well
to perform their tasks. They follow two procedures encryption and decryption, and it is
far more efficient than any other normal processor. Sensitive data such as keys and
random generators are encrypted into the hardware, which in turn will be difficult to
trace.
Implementing a hardware solution may be costly, and sometimes it requires a lot of
time and effort, but this can help to keep our sensitive data safe and assures that it
does not get leaked. Hardware security has been in more demand along with SoCs,
microprocessors, and microcontrollers. These devices can be used to check the flow of
the network traffic. Hardware security can be added as an extra layer to secure the
systems. It is very important to access and pay attention to the vulnerabilities which
are present while manufacturing as well as to the potential codes and the data on the
network.

Types of Attacks on Hardware


Several types of security attacks can be planned on hardware. Here is the list of the
attacks:

Side-Channel Attack
It is a kind of attack in which a secure system is attacked using an insecure system, i.e.,
the system that is not secured. For example, the attackers can easily access the file if
they remove the hard drive and connect it to another pc. This is used to check
parametric behaviours, i.e., Power, Timing, and EM, to pull out the hidden data. There
are some other examples and these attacks in which we can get the data that resides
in the chip by managing and analyzing the channels, i.e., physical signals.
The information embedded in the side-channel parameters will depend on the
computation of the intermediate values while executing the crypto-algorithm and
comparing it with the inputs and secret key of the cypher. An adversary can efficiently
extract this key by observation, and he or she can achieve it with the help of a low-
cost tool in a minimal amount of time, ranging from few minutes to few hours.

Rowhammer Attack
In this attack, the values which are in the row of a memory cell are modified and thus
result in alteration of the neighbour rows. They can insert malicious codes that may
consist of kernel-level privileges. It represents a bit flip in the DRAM memory that can
result in privilege escalation or other malicious things. These types of errors can occur
in the memory because of the background radiations and neutrons.

IOT SECURITY GUIDE 45


Bit errors that can be controlled up to some limit and are repeatable can cause a
major threat to security. An attacker uses the targeted bit flip to a certain memory
location that gives the read permission for the restricted memory.

Hardware Trojan Attack


It is a kind of malicious circuit that destroys the function or reliability of the electronic
system. The Trojan functions consist of removing, controlling, altering, and sneaking the
design contents. It is difficult to find the stealthy Hardware Trojan. The SoCs that are
spoiled can see a difference in their working. Sensitive data may be leaked, or it may
suffer from poor performance.
There is no device implemented to detect these Trojans. We are unaware of its size,
type, and location. Activation happens very rarely. A Trojan is well hidden during the
normal working of a chip, and it is activated only when triggering conditions are
applied.

Physical Attack
Modern PCBs typically integrate with ICs with high pin complexity and a huge number
of components with a miniature layout. Current PCBs operate at 1-10 GHz to support
high-speed data communication. Since they are more complex and have so many
layers in them, System Integrators rely on third-party designers. Counterfeiting has
become a major issue in the PCB industry. Its features can help in making
countermeasures, i.e., the JTAG infrastructure can be used for trust validation.
Research on PCB products shows that PCBs are designed in various countries. If we
rely on a third party, the PCB can be untrustworthy and have a greater degree of
vulnerability. Today’s PCB designs consist of 20 to 30 layers and embedded passive
components to minimize the form factor. This will allow an attacker to tamper with the
internal layers to modify the design or change the components.

Reverse Engineering
This is also known as backward engineering, and it is the process in which one tries
with very little insight to know how a device, process, system, or piece of software
manages to finish a task. This technique does not only deal with just making a
duplicate or modifying an artefact. It is just an analysis to reduce design features with
some amount or not much knowledge about the steps to build the system all the way
to the actual production.
The main aim is the redocumentation of legacy systems. If a competitor uses a
reverse-engineering method, the goal is not to copy it in toto. It is to perform a
competitive analysis. It is used to interface one system with another system. Knowing
about the enemy’s research by taking their data and dismantling it could yield insights
to produce the same product or result in a good countermeasure.

IOT SECURITY GUIDE 46


Hardware IP Piracy
Hardware IP means portable hardware intellectual property. It is a renewable and
computable unit of the logic cell or IC layout generally designed by an IP vendor.
These are different hardware IPs: Soft IP, Firm IP, and Hard IP. The issue of security
comes because these will be supplied by different vendors from all over the world.
Some rogue people in the foundry illegally copy the IP and distribute it to unauthorized
persons. An attacker can steal it and take the design ownership. We should thoroughly
check the details of IP vendors. Security in OS should be enhanced. Persistent
encryption should be done to maintain system security.

Mod-chip Attack
This type of attack is generally carried out by connecting wires to particular points on
a system circuit board. These Mod-chips alter the system h/w and s/w protection.
These chips consist of one or more integrated circuits joined with distinct points on
small PCBs. These are known as drive chips that affect the running of the system by
overriding security. These chips consist of a microcontroller, FPGA, or CPCD to attack
the system.
This could be prevented by removing attack points that are used by the mod-chip by
doing modifications to the PCB arrangement. LPC bus is used at the time of testing the
system. Keeping it secure by additional tamper detection and protective circuit on a
PCB.
Security Architecture Attacks
Simple mistakes in IC design can expose the IC to a lot of attacks. Vulnerabilities will
be introduced in ICs in the form of some changes such as Hardware Trojans,
backdoors, etc. Even now, many tools are not fortified with security measures. Due to
the increase in manufacturing ICs, the design houses depend on third parties with no
proper verification.
It is crucial to find weaknesses during hardware design and validation. It is nearly
impossible to fix design and architecture problems past this phase. Detecting and
fixing it at a later stage is extremely difficult and involves a much higher cost.

Examples of Hardware Security

Crypto Acceleration
This is one of the primary forms of hardware security and secondary to hardware
defence. It is a technique that uses cryptographic functions that not only speed up the
applications but also provide hardware with systems that cannot be exploited in
software. For example, a software-based AES may cause a code injection attack, but it
is difficult to attack hardware-based AES.

IOT SECURITY GUIDE 47


True Random Number Generators
Random Number Generators are generally written in software and have therefore
made the job of the attacker very simple. Let us consider a scenario in which two
security experts are controlling the jeep from a remote place. This is done by
connecting to the car’s multimedia system, and they send their messages through the
CAN bus. Hence this can result in the attacker taking full control of breaks, accelerator,
and steering.

Memory Encryption
Earlier, memory-related processes directly moved the data which was stored in
memory (RAM and ROM). This had the vulnerability that the unencrypted data could
be stolen. But now, there are encryption options, which ensure that even if the attacker
reads the contents of RAM or ROM, without the exact hardware, he or she cannot use
the data.

Secure Boot
Designers have introduced a method called secure boot in the processor where it
begins by running the boot code, which cannot be modified and is thus immune to
code injection attacks. After this, it checks the application which is about to be loaded
as well as the code integrity. In case the code is injected, the system will run only up to
some stage, or it will show the warning that the code injection has been found in the
system.

Trust Zone
Trust zones can help to deal with the situation if the user is not aware of whether the
code that he or she runs is malicious. There may be some CPU instructions that can be
dangerous, and they can access hardware, pointers, and critical systems. Therefore,
modern processors have certain advantages in which the OS operates on the highest
privilege and can access all the instructions, whereas, the processes that the OS
executes are put on the lower privilege. These processes cannot use sensitive data,
and hence they are less prone to attack a critical system or a processor.

Tamper Pins
Tamper pins are one of the most useful hardware features because they are difficult
to detect and prevent. Sometimes attackers have to physically remove the parts to
use the I/O, such as debugging the ports and memory. These pins can trace out the
mechanical event that has occurred, such as the opening of an enclosure. Once it is
found out, it can instruct the processors to do a specific task which consists of a
simple reboot to protect sensitive data being read. It is also used to obscure the pins
which are not visible to the attackers.

IOT SECURITY GUIDE 48


3.4 Hardware Security v/s Hardware Trust
Hardware security issues come from vulnerabilities (i.e., Side-Channel Attacks or
Trojan attacks) at different levels and due to the lack of robust security for software
and system. Similarly, hardware trust issues appear from the untrusted entities of the
hardware life cycle which includes untrusted IP or CAD (Computer-Aided Design) tool
vendors, fabrication, test, or distribution facilities. Such parties misuse the hardware
components or system.
The table below represents some of the major concerns that occur due to untrusted
design, fabrication, and test processes for an IC. The same can be considered for an
SoC life cycle that integrates the IPs typically acquired from third-party vendors into a
design that meets functional and performance criteria.

IC Lifecycle Attack Vectors Counter measures

A Hardware Trojan acts as a hidden


front door inserted in the chip by
Verified Hardware
IP-Vendor using an ASIC semiconductor that we
IP Trust
can get from a non-reputable source,
or it can be inserted by a rogue
employer.

Hardware
Some well-known IP piracy
obfuscation can
threats such as reverse
help to prevent
SoC Design engineering and malicious
piracy as well as
House circuit modifications are a major
Hardware Trojan

concern.
attacks.

We can apply the


The foundry strategies are
techniques such as
designed based on each
Foundry physical inspection
stage of the Technology Life
and advanced
Cycle (TLC).
image processing.

Side-Channel
Side-Channel Attacks resistant design
Hardware
Deployment Reverse Engineering
IP Counterfeiting obfuscation
Hardware
Authentication

Table 7. Attack Vectors During an IC Lifecycle

IOT SECURITY GUIDE 49


3.5 Embedded System Hardware
An Embedded System is a microprocessor- or microcontroller-based system made
for a specific use and surrounded by a giant mechanical or electrical system. Since
these are made for some specific tasks instead of a general-purpose system, their
size, power, and cost are limited. These are applied in commercial, military, and
industrial applications. Some embedded systems may have Real-time Operating
Systems (RTOS), whereas some do not.
Generally, hardware-based embedded systems are used to calculate real-time
operations. As a microprocessor is just a CPU, other components of the system should
also be integrated.

Characteristics of an Embedded System


Task-specific: An embedded system is made for a specific use/task, for e.g., a fire
alarm is an embedded system which senses smoke.
Tightly constrained: The embedded system is tightly resourced and time-
constrained. For e.g., an embedded system must be quick and task-tolerant, with
limited memory and minimal power consumption.
Real-time and reactive: Real-time or near real-time is required in many
environments. For e.g., a GPS should provide road and location data and must alert
users to increase situational awareness in a real-time or near real-time manner.
Any delay can cause catastrophic results.
Hardware/Software Co-design: The hardware part is used for performance and
security, and the software part is used for flexibility and features.
Microprocessor/Microcontroller based: These are designed at the heart of the
embedded system and used to perform operations.
Memory: Having a memory is essential as programs are loaded are stored into the
memory.
Connected Peripherals: Peripherals are used to connect input and output devices.

Embedded System Security


Embedded system security is one of the traditional methodologies to keep our
systems secure by preventing threats. These are designed to perform some specific
tasks. We can get these systems in process control systems, aircraft, and other
applications. Because of their minimal size and limited resources, designers and
developers may face some security issues.
Firmware in the system is almost impossible to update, and therefore in the past, some
systems were designed to have a lifecycle of at least 15 years. With the IoT, the nature
of embedded systems is changing, and the attack vectors are also growing
exponentially. An embedded system attached to the smart device can be hacked to
control small thermostats to industrial control systems.
We have to take embedded system security as an end-to-end approach during the
design phase, like taking security in the IT field. These security issues should include the
cost of an attack and the number of possible attack vectors.

IOT SECURITY GUIDE 50


The solutions to these embedded attacks are:

Regularly updating the firmware.


Using the firmware according to the need-to-use basis.
Monitoring the networking connections to and from embedded systems.
Integrating with third-party management systems.

Properties of Securing an Embedded System


To attack an embedded system, it requires only a single vulnerability to create an
exploit. Therefore, if the defender wants to secure his or her system, he or she must
think thoroughly and be well prepared to get protected from any possible vulnerability.
Any opening can make the attacker's work simpler. They can steal your information,
control your data, and create exploits for others to use anytime and anywhere.
It is also possible for an attacker to use an initial compromised device to pivot from
one subsystem to another that may cause further damage to our networks, tasks, and
reputations.
To achieve security, here is the list of 10 properties of highly secured embedded
systems based on experience in engineering security solutions from various platforms.
These properties will assure that it will make the attackers' work difficult.

Design Principle Description Implementation

Software, data, and


configuration files will be Full-disk encryption
Data-at-rest
safe if kept in non-volatile File encryption
protection
memory, especially when TPM/HSM
using encryption.

It will be authenticated and/or


decrypted before using that TXT, Bootguard
Authenticated/ software (including firmware UEFI SecureBoot
Secure Boot and configuration data). It will Application Whitelisting
be authenticated and/or
decrypted.

Hardware resources are


MMU/Paging
Hardware segregated such that they
Multi-Core/Multi-Socket
Resource can perform functions
Cache Allocation
Partitioning individually up to the
Technology
maximum possible degree.

IOT SECURITY GUIDE 51


Design Principle Description Implementation

Process Address
Software Software should be well- Spaces/Virtual Memory
Containerization defined, self-contained, Dockers/Containers
and Isolation and isolated. Virtualization/Hypervisor

Minimize
Code removal
Dependencies/Trusted
Network and Application
Attack Surface Computing Base
Firewalls
Reduction Minimize Codebase
Software Guard
Limited and well-defined
Extensions (SGE)
interfaces

Users and applications can SELinux/AppArmor/SM


Least privilege
get only limited privileges by ACK
and
using non-bypassable SECCOMP/chroot
mandatory
Memory Access Control XSM/FLASK
access control (MAC). (hypervisor)

Communication with
Implicit Distrust SSL/TLS
external sources is only
and Secure Identity and certificate
allowed after
Communication management
authentication.

Information received from


Data Format Filters
Data Input untrusted sources should be
Cross-Domain
Validation validated before using them
Guards
in our software applications.

Software applications
Secure Software Type and memory-safe
and OS Kernel shall be
Development, Build languages
compiled and configured
options and OS Build Parameters
with the available
configurations Kernel Configuration
security options enabled.

Systems monitor the


Integrity
integrity and logging the Continuous Memory
monitoring
audits of security-related Hash Verification
and auditing
events.

Table 8. Properties of Highly Secured Embedded Systems

IOT SECURITY GUIDE 52


Data-at-rest Protection
In this type, the data is stored on a device either encrypted or follows definite
protocols, including encryption to secure our data from unauthorized access. The
storage components consist of hard drives, flash memory, and USB thumb drives.
Many recent embedded systems have encrypted-storage protection requirements
determined by intellectual property protection, digital rights management, sensitive
customer data, and more.
The flowchart below represents the different layers in which we can protect our data
which is at rest.

Application Layer E.g., Encrypted Mail Folders

File System E.g., Encrypted file system

Block Manager E.g., Encrypting device driver

Hardware Layer E.g., Self-encrypting device

Figure 15. Flowchart: Different Layers in Data-at-rest Protection

IOT SECURITY GUIDE 53


3.6 Data Layers

Hardware Layer
The whole medium used for storage is encrypted by using FDE (Full-Disk Encryption). It
encrypts all the information, including hidden files such as OS temporary files and
swap space. The benefit is that the file cannot leak. But if the drive is unencrypted, it
can expose the boot records.
We manage our FDEs within the medium peripheral called SED (Self-Encrypting
Device). Nowadays, these devices are common in every laptop shop. The advantage
is that no new or minimal software is written to make use of the data-protection
facilities. If self-encrypting storage media is possible, it is the best alternative because
of its easy use and excellent performance, and it can hide the storage encryption key
from the main application and memory.

Block Manager Layer


We can carry out the encryption at a higher level, the device-management layer,
typically a block-oriented driver. Such a kind of protection can cover the overall
managed device (FDE). However, the execution may vary. If it consists of an
encryption accelerator that is symmetric, there is a chance of overhead. Perhaps,
implementing pure crypto-software can cause a severe loss in performance.

File System Layer


The major use of this layer is to provide well grossness over the choice of information
that needs storage privacy. This is very much important if the encryption is performed
in software with minimal or no hardware acceleration. Based on the implementation of
the file system, developers can decide whether they want to encrypt at the volume
level or the individual file level.

Application Layer
After doing all the above steps, at last, applications can add their data protection by
using underlying file-system encryption features or a custom implementation. E.g., an
audit logging device can encrypt its audit records before calling the standard file
system output functions. For volume, file, or application-level data protection,
developers can make separate keys for these groups of data instead of a single key
for the entire system.

IOT SECURITY GUIDE 54


Authenticated/Secure Boot
Secure Boot is when OS boot images and validates code against the hardware before
being used in the boot process. The hardware is already made to authenticate only
the codes according to the security credentials that we trust. In simple words, it makes
sure that the version of the OS and the boot software are from the intended
manufacturer and have not been tampered with by malicious or malware third
parties.
It can be used for a single device, e.g., i.MX6 processor is specifically used for e-
reading. At Boot, the locked-down Linux is a good choice to consider. Once we design
our boot images on this processor, we have to generate a secure key against an SSL
certificate. For more integrated systems such as IP cameras operating on Linux, it is
advisory to use Secure Boot because malicious boot code can lead to circumstances
where the device is a part of a botnet.

Use the following methods to Secure Boot on i.MX6:

Secure Process
If we want to go down the route of Secure Boot, the surrounding processes should
be well prepared and secure. Keys leaking out of the production environment can
result in exfiltration.
Strong Encryption
The encryption should be very strong. It is very easy to generate weak keys and is a
common problem. The algorithms should be up to date.
Code Checking
The remaining code in the bootloader, OS, and other software should be well written
for Secure Boot, and make sure it lacks security holes to make Secure Boot
meaningful.
Authenticate Anywhere
For proper security, we have to authenticate the code as much as we can and
make sure that it follows the practices made for the libraries. Securing the process
depends on how the keys are generated and stored.
Proper Authentication
It is very important to ensure that the code is genuinely performing the secure Boot.
We can even move from a secure piece of code to an arbitrary location in memory
to continue with the execution. It is essential to ensure that the code authenticates
the next step of the code to maintain its security.

Hardware Resource Partitioning


Hardware partitioning divides resources into many server entities where OS and
applications work independently. This is more useful since application-related
hardware is much faster than software. But this hardware is very costly. Software is
cheaper, but it works slowly. Therefore performance-critical components should be
realized in hardware and non-critical in software. In this way, we can achieve a good
trade-off between cost and performance.

IOT SECURITY GUIDE 55


Hardware and software designs are inadequate for some specific tasks. Composing
hardware and software can create problems. E.g., communication and system
architecture-related issues. Hardware-Software Co-Design (HSCD) methods can be
used to overcome this problem. Partitioning is the necessary step while designing
HSCD, i.e., which components should be used for realizing the hardware and which
components for software. The above-defined step can help in finding the optimal
trade-off between cost and performance.
Generally, partitioning is done manually. Since the system design is becoming more
and more complex, this method turned out as infeasible, and researchers are trying to
automate the partitioning as much as possible.

Software Containerization and Isolation


Containerization has become popular in the development of software as an
alternative or companion to virtualization. It involves the packaging of codes and their
dependencies to run in a uniform and consistent manner.
The technology is upgraded every day, giving developers, operations teams, and
software infrastructure an advantage. This technique enables them to produce and
deploy applications more securely. By using special methods, code is made in a
specific environment. When this is sent to a new location, bugs and errors may occur.
Containerization can remove this problem by bundling the application codes with
related configuration files, libraries, and dependencies required to run. This single
package is far away from the host OS. Therefore, it stands alone and becomes
moveable.

As regards isolation, many embedded systems include on-chip FPGA (Field-


Programmable Gate Array) along with processors to meet the high computation
demand to provide flexibility to users to add custom hardware accelerators. We can
capture sensitive data by using these accelerators or with the help of hardware
Intellectual Properties (IPs). The built-in accelerators in embedded systems cannot
help in preventing unnecessary access to the IPs causing a harmful security breach.
There is an approach used called FPGA accelerated embedded system design. This
inherits MAC-based authentication policies operating at software, bringing it down to
hardware accelerators in FPGA. It ensures proper use of confidential data to prevent
software-originated attacks at hardware IPs and data leaks.

Attack Surface Reduction


Commonly there are 12 attacks, and each of these attacks is divided into three
subcategories depending on their targets:

IOT SECURITY GUIDE 56


Attacks on embedded system

Software-based Network-based Side-based

1. Malware 1. MITM
2. Brute-forcing 2. DNS poisoning 1. Power Analysis
access 3. DDoS 2. Timing Attacks
3. Memory-buffer 4. Session 3. Electro-
overflow hijacking magnetic
4. Web-server 5. Signal analysis
exploits jamming

Figure 16. Categories of Attacks on Embedded Systems

Best practices are defined to reduce these attacks. Developers need to be thorough
with the industry standards for embedded software development and learn effective
measures and practices before coding. The below figure defines 11 best practices, and
each is divided into subparts that can make our protection even more reliable at all
development stages, from design to support.
Design and software
configuration

1. Use safe languages


2. Enable secure boot
Data protection
3. Disable insecure and
non-essential devices
8. Encrypt something Best Practices to
9. Obfuscate object code Improve Embedded
Systems’ Security Memory and
application security

4. Restrict memory
Release and support allocation
5. Create partitions

10. Conduct end-to-end


threat assessment
Communication
11. Update the Software security

6. Implement access
control
7. Secure communication
channels

Figure 17. Best Practices to Enhance Embedded System Protection

IOT SECURITY GUIDE 57


Least Privilege and Mandatory Access Control
The least privilege concept says that only small privileges should permit systems
software components to do their essential tasks. Applications only can use the
minimum set of interfaces and services required to do their work. Most software
developers and system engineers use the shortest method, i.e., explicitly granting
excessive privileges to applications with the supposition of a trusted operator or
activities of an application, a practice that an attacker can easily compromise.
Therefore, the embedded systems should be made with Mandatory Access Control
(MAC). MAC checks for access grants and restriction policies at the time of system
design. These controls are always imposed on the fielded device. Within the fielded
device, it is impossible to bypass the security controls.
Even if attackers succeed in compromising systems sub-component or gain root-level
access, they cannot change or disable security settings. Using both techniques
frustrates the attackers and blocks their ability to modify, disable, or interrupt system
services.

Implicit Distrust and Secure Communication


Let us consider a scenario where a person receives a call from an unknown number
and is asked to share their credit card number. The obvious answer would be a "No". In
the same way, communication from external sources to our system should be denied
until the remote source has been authenticated. The simple way to say it is that a
security system does not permit any other systems to talk. It compels the external
systems to prove who they are. The starting point for a secure communication system
should be default-deny.
Coming back to the scenario, the way we give credit card information only to a person
we trust, that too in a closed room where no one hears, our system should also enforce
secure communication despite having authenticated other parties.
These properties can be deployed by using protocols such as SSL and TLS with identity
and certificate management. When crypto comes into the picture, there is always a
question on how to secure these TLS keys and certificates? Using mutual
authentication and encryption, without a doubt, we can state that the communication
is happening only between the trusted entities (not the attacker), and no one can
listen to our communication.

Data Input Validation


Most of the developers could not figure out how attackers inject malicious inputs
causing the software to get damaged. Giving data into the system via any crossing
point can exploit software vulnerabilities to get restricted access or corrupt system
application memory to create a denial of service. A secure software design cannot
perform any guess on the acceptability of the provided data and performs validation
of the format and the contents written in it before being processed by the rest of the
system.

IOT SECURITY GUIDE 58


There is a requirement for an additional examination of the input given by the user.
Each device should check the agreement of the messages to a predefined data
standard as they are passed from device to device.
Secure software architecture always follows the principle of mutual distrust.
Components residing in the system have to prove themselves well through a
continuous authentication step. Moreover, authentication expires for a given period
and should be renewed.

Secure Software Development, Build Options and OS Configurations


Some options are given to notify us of many types of potential security and to get
security enhancements such as:
Detecting signed/unsigned conventions.
Warnings for using format functions that can show possible security issues.
Making use of 64-bit random address randomization.
Compilation of code with unintended return addresses.
Lightening various spectres.
Defeating stack smash attacks.
Preventing stack and heap against code execution.

If we are able to specify our programming language, we can remove all classes of
software vulnerability in the code. Properly following the code practices, secure build
options, and modifying the end system to maximize the security, there is less chance
for the possible attacks to compromise most parts of the system.

Integrity Monitoring and Auditing


Finally, it is impossible to determine an attacker if we do not know when our system
has been targeted. Here integrity monitoring and auditing play a major role. These are
essential methods to find out when the device has been attacked or has been
compromised. These alerts can help us to stop the attackers before the situation
becomes worse. Some techniques include network and OS-level anomaly detection,
system log monitoring, and scanning for known malware. This allows system operators
to take action against attackers.
Auditing is a must for many compliance regulations as they support organizations to
check for unauthorized tampering of necessary files, data, or other aspects of a
system. Well-implemented auditing and monitoring allow us to know when we are
attacked, fix the damage, and enable us to recover quickly, preventing loss of time,
revenue, and damage to reputation.

IOT SECURITY GUIDE 59


Privacy Violation and Data Leakage Attacks

Mishandling a user’s password, social security numbers, and other private information
can compromise user privacy and is often illegal. Privacy violations occur when private
user information enters the application, and the data is written to an external location
such as the console, file system, or network. Physical or electronic data leakage is the
unauthorized transmission of data within an organization to an external recipient.
Examples of such attacks are Cross-Site Scripting (XSS, refer to the subsection on
page 58), Eavesdropping, Phishing attacks, Node capture (tampering), Wormhole
attack, Backdoors, and exploits. The following table will describe the attacks in each of
the three layers in an IoT device with its countermeasures.

Layer Attack Counter measures

Link-layer encryption,
Physical Layer Eavesdropping
key-pre-distribution

Tamper resistance
Node capture hardware, disabling JTAG
and/or protecting bootstrap
loader, camouflaging

Location-based keys,
Network Layer Wormhole
centralized computing

Filter input on what is


Application Layer XSS
expected upon data arrival

Backdoors and Intrusion Detection


exploits System

Rotate passwords regularly


Phishing
and do not give information
to an unsecured site

Table 9. Data leakage and privacy violation attacks table

Weak Authentication Attacks


Authentication can be viewed as the first line of security by enforcement of security
measures at level 0. Weak Authentication describes any scenario in which the strength
of the authentication mechanism is relatively weak compared to the value of the
assets being protected and scenarios in which the authentication mechanism is
flawed or vulnerable. When the control system of the IoT has a weak authentication
system, the attacker can log in by brute-forcing or using the default password lists.
This subsection describes and classifies different IoT attacks occurring at the
Application level, Network level, and Device-level as shown in Table 10.

IOT SECURITY GUIDE 60


Attacks
Threats
In transit At rest

Limited Firmware; Firmware;


resources; Brute force; Physical;
Device Level Architecture; Defraud; Credential.
Interface; DoS;
Software

Architecture; Eavesdropping; Device Scan;


Openness; Device scan; Brute force
Protocols. Spoofing;
Network Level Man-in-the middle
Reply;
Unknown Key
sharing

Interactions; Impersonation;
Application Level Constraints; Malware;
Environment; Insider.
Human.

Table 10. Classification of Authentication threats and attacks

Firmware Hijacking
If firmware updates downloaded by an IoT device are not checked to make sure they
originate from a legitimate source, an attacker can hijack the device and download
malicious software.

Device Scan Attack


Adversaries scan devices in HIS to gather network information of these devices before
launching sophisticated attacks to undermine security systems. Commonly used
scanning techniques to gather computer network information include IP address
scanning, port scanning, and version scanning.

Man-in-the-middle Attack
The attacker over the internet intercepts the communication between the two nodes.
They obtain sensitive information by eavesdropping.

Identity Spoofing Attack


These attacks are easy to launch in an IoT access network. By using a faked identity
such as the MAC (Media Access Control) or IP (Internet Protocol) address of the
legitimate user, an attacker can claim to be another legitimate IoT device. The attacker
can then gain illegal access to the IoT network and launch more advanced attacks,
such as man-in-the-middle attacks and denial-of-service attacks.

IOT SECURITY GUIDE 61


Malware Injection Attacks
In an injection attack, an attacker supplies untrusted or malicious input to a program.
This input gets processed by an interpreter as part of a command or query. In turn, this
alters the execution of that program. As injection attacks are a very well-understood
vulnerability class, many freely available and reliable tools allow even inexperienced
attackers to abuse these vulnerabilities automatically. Malware injection attack is a
sub-category of Injection attacks. Here the cyber attacker creates a malicious
application and injects it into Software as a Service (SaaS), Platform as a Service
(PaaS), and Infrastructure as a Service (IaaS), respectively. Once the injection is
completed, the malicious module is executed as a normal code in the cloud
infrastructure. Now the hacker can launch any sorts of attacks such as eavesdropping,
data manipulation, and data theft. The two common forms of this attack in cloud
computing platforms are the Structured Query Language (SQL) injection attack and
the cross-site scripting attack.

SQL injection attacks


Server-side vulnerability attacks target SQL servers in the cloud infrastructure that run
vulnerable database applications. Thus, the vulnerabilities of the web servers are
exploited, and then the hacker can inject malicious code in order to avoid the login
credentials and gain unauthorized access to the backend databases. If this attack is
successful, then the attacker can even change the contents, retrieve confidential
information, remotely execute the commands, or even take control of the webserver
for further criminal activities. These attacks can also be launched by a botnet. For
example, the Asprox botnet used a thousand bots that were equipped with SQL
injection kits to fire an attack that affected 153,000 different websites that were hosted
on various cloud infrastructures.

Cross-Site Scripting (XSS)


It is a client-side vulnerability where an attacker injects malicious scripts such as
JavaScript, VBScript, ActiveX, HTML, and Flash into a vulnerable dynamic webpage in
order to execute these scripts on the victim’s web browser. Later, the hacker could
steal the user’s cookies information used for authorization for accessing the user's
account or tricking him into clicking a malicious link. For example, cyber researchers in
Germany have successfully accessed all the customer's data in an AWS session using
this XSS attack.

Measures
The first step in preventing a SQL injection attack is by knowing the vulnerable
applications by either self-imposing the attacks or by using penetration tools
available online, which help the user to identify the vulnerabilities present in an
application.

IOT SECURITY GUIDE 62


Some of the steps to prevent the attack are -
1. Validate user inputs by establishing a whitelist of all valid SQL statements and

leaving unvalidated statements out of the query.
2. Sanitize the data by limiting the special characters to not allow string

concatenation.
3. For writing all database queries use prepared statements with parameterized
queries (variable binding)
By following the above steps, users can differentiate between user input and
code, actively manage patches and updates, limit read access and perform
regular auditing and penetration testing.
XSS attack can be prevented by the following mechanisms:
1. Filter input on arrival: Wherever user input is received, filter strictly based on

what is expected as valid input.
2. Encode data on output: In HTTP responses where user-controllable data is

output, encode the output to prevent it from being interpreted as active content.

Depending on the output context, it might require applying combinations of

HTML, URL, JavaScript, and CSS encoding
3. Use appropriate response headers: Content-Type and X-Content-Type-

Options headers can be used to ensure that browsers interpret the responses in

the way you intend. This helps prevent XSS in HTTP responses that are not

intended to contain any HTML or JavaScript.
4. Content Security Policy: You can use Content Security Policy (CSP) to reduce

the severity of any XSS vulnerabilities.

IOT SECURITY GUIDE 63


4.1 SCADA System
What is SCADA?
SCADA stands for supervisory control and data acquisition, and it is a
software and hardware system that offers production facilities to:
SCADA AND IOT
Manage manufacturing processes on a local or remote level.
Data collected is monitored, acquired, and analyzed.
Human-machine interface (HMI) software allows you to
communicate directly with equipment including sensors, valves,
pumps, motors, and more.
Create a data source file to keep track of events.

SCADA is a set of computing devices (both software and hardware)


that work together to control a system. Statistical data from factory
floor devices such as pumps, valves, and transmitters are the starting
point for this component collection.
The information gathered from the field devices is subsequently sent
to a processor, such as a PLC. The information is distributed from the
CPU to a network device system.
HMIs, end-user PCs, and servers are examples of these devices.
Visualization of operator activities, such as controlling pumps and
adjusting valves, are available on the HMI and end-user computer.
This information can also be examined and used to improve plant
productivity and solve problems.

Main components of SCADA:


1. Supervisory computers: These are the backbone of the SCADA
system, collecting data on the process and sending commands to
field equipment. It contains the HMI software running on operator
workstations, as well as the computer and software responsible for
connecting with the field connection controllers, which are RTUs and
PLCs.

2. In compact SCADA systems, the supervisory computer could be a


standalone PC, and the HMI may be a part of that computer. The
master station in larger SCADA systems may have several HMIs
housed on client computers, multiple data acquisition servers,
distributed computer programs, and disaster recovery facilities.

IOT SECURITY GUIDE 64


3. Remote terminal units (RTUs): link to process sensors and actuators and are
networked to the supervisory computer system. RTUs feature embedded control
capabilities and frequently follow the IEC 61131-3 programming criteria. They can be
programmed using ladder logic, a data flow diagram, or several different languages.

4. PLCs: or programmable logic controllers, are coupled to sensors and actuators in


the process and networked to the supervisory system. PLCs often have a high-speed
link to the SCADA system in factory automation.

5. PLCs may connect directly to SCADA over a wireless link in remote applications, such
as a major water treatment facility, or they may use an RTU for communications
management. Instead of using an RTU alone, PLCs are frequently utilized for remote
sites with a significant I/O count for cost considerations.

6. The communication infrastructure connects the supervisory computer system to the


RTUs and PLCs, and it might employ best practices or manufacturer-specific
protocols. Both RTUs and PLCs regulate the process autonomously in near-real-time,
using the most recent instructions from the supervisory system.

7. The failure of the communications network does not automatically shut down the
plant's process controls, and if connections are restored, the operator can resume
monitoring and control. Certain essential systems will be equipped with dual
redundant data highways, which will be connected via multiple paths.

8. Human-machine interface (HMI): The human-machine interface (HMI) is the


supervisory system's operator window. It graphically displays plant information to
operating employees in the form of replica schematics, which are graphical
representations of the plant under management, as well as alarm and event recording
pages.

9. The HMI is connected to the SCADA supervisory computer, which feeds live data into
the replica of diagrams, warning alerts, and tracking graphs. In many setups, the HMI
serves as the operator's graphical user interface, collecting data from external devices,
creating reports, performing alarming, and sending notifications, among other things.

10. A graphical plan is usually included in the HMI package for a SCADA system, which
the operators or system maintenance people use to change the way these points are
represented in the interface.

IOT SECURITY GUIDE 65


Types of SCADA systems:
1. Monolithic SCADA Systems
2. Distributed SCADA Systems
3. Networked SCADA Systems
4. IoT SCADA Systems

1. Monolithic SCADA Systems

Minicomputers are employed in these types of systems. When standard network


services are unavailable, various systems can be developed.
These systems can be designed as stand-alone systems without any connections to
other systems. A backup mainframe can be used to collect data from all RTUs. These
first-generation systems' main activities are limited to signalling processes in crisis
situations and observing sensors.

2. Distributed SCADA Systems

SCADA systems that are distributed are referred to as second-generation systems. By


connecting to a local area network, the control functions can be distributed among
multiple systems. Real-time data and command processing can be shared to
accomplish control activities.
The scale and expense of each location are decreased in these systems, but there are
no consistent network protocols. Because the protocols were secret, few people were
aware of the SCADA system's security during installation, and this element was mainly
overlooked.

3. Networked SCADA Systems

SCADA systems that are networked are also referred to as third-generation systems.
The WAN system, which uses data lines or phones, can be used to network, and
communicate current SCADA systems.
Ethernet or fiber-optic connections can be used for data reception and transmission
nodes. This type of SCADA system employs a PLC to change and monitor the flagging
activities only when they are required.

4. SCADA Systems for the Internet of Things:


SCADA systems that are networked are also referred to as third-generation systems.
The WAN system, which uses data lines or phones, can be used to network, and
communicate current SCADA systems.
Ethernet or fiber-optic connections can be used for data reception and transmission
nodes. This type of SCADA system employs a PLC to change and monitor the flagging
activities only when they are required.

IOT SECURITY GUIDE 66


Application of SCADA Systems

SCADA networks are widely used in today's businesses to monitor and study real-time
data, control industrial operations, and connect with devices. Because SCADA systems
comprise both hardware and software, they are critical for industrial enterprises. As a
result, SCADA security is critical in industries.

SCADA Security:

SCADA security refers to the protection of SCADA networks that are built with computer
hardware. Power, oil and gas, and other SCADA networks are used by some of the
systems. Because of the importance of these networks in ensuring the security of SCADA
systems, corporate and government companies have adopted efforts to protect them.

We will look into IoT SCADA systems:

How do IoT and SCADA work together?


Whilst SCADA technologies are common in industrial systems, the Internet of Things
(IoT) offers capabilities and functions where SCADA stops off.

Because skilled hacker groups are likely to target SCADA and IIoT (Industrial Internet of
Things) technologies and their overall system architecture, they confront cybersecurity
issues. Control systems for industrial applications are also a popular target for
government-sponsored hackers, posing serious security concerns for SCADA and IoT
industrial control systems.

4.2 Cyberthreats to SCADA and IoT Systems:


SCADA systems are typically used to manage Industrial Control Systems (ICS), which in
turn manage machines and other industrial equipment in industries such as oil and gas
production, water and power utilities, pharmaceutical and medical, food service,
automobile and airliners production, and durable goods manufacturing. The same can
be said for industrial IoT networks, which are rapidly growing across a variety of
industries.

These are typically vital industries that run complicated industrial equipment networks
that span continents. If your company uses a SCADA or IoT control system, you should
be aware that cyber-attacks can come from three different directions:

Hacking groups who seek to infect your computers with ransomware.


Competitors who engage in unethical industrial espionage.
In a more sophisticated scenario, nation-state actors are wanting your sensitive
data or aim to take over your business-critical production management systems.

Other attack tactics include internet approaches and spear-phishing techniques, as well
as Trojan virus spreading via portable devices like infected USB sticks.

IOT SECURITY GUIDE 67


Typical Attack Descriptors:
Other attack channels include exploiting vulnerabilities such as: With the majority of
industrial locations having at least one remotely accessible equipment, other attack
vectors include exploiting vulnerabilities such as:

1. Using a serial interface to connect to a device.


2. For firmware, pre-set passwords or SSH keys are used.
3. Passwords in plain text are being intercepted throughout ICS networks.
4. There are no policies in place to prevent accounts from being locked out.
5. Alteration of a device's code execution cycle to gain access to sensitive data.

4.3 Protecting SCADA, IIoT and IoT Systems:


The President's Critical Infrastructure Protection Board in the United States has issued
suggestions for increasing SCADA cyber security, emphasizing the necessity of
protecting industrial control systems.

The following procedures should be included in a working cyber-security policy to


secure your SCADA, IIoT, or IoT networks:

1. Prevent unwanted access to systems and subsystems by securing the boundaries.

2. Reconfiguring all known flaws and upgrading all installed software.

3. Accessibility to fundamental networking equipment and control modules is restricted


both logically and physically.

4. Having a network connection monitoring solution in place.

5. Antivirus and firewalls should be enabled at all places where IoT networks connect to
public networks like the Internet.

6. To verify that the system files are not manipulated by an attacker, use integrity of data
checking software.

7. Implement redundant networking solutions for both hardware and software to ensure
redundancy for important components.

IOT SECURITY GUIDE 68


Security of Cloud-Assisted IoT-Based SCADA Systems: A Review of the Current State
and Future Challenges:

4.4 Challenges to Secure SCADA systems in IoT-Cloud


Environments:
Several risks in these environments could allow malware to infect SCADA systems, some
of which are described below.

1. Device inputs and data can be tampered with, detected, misplaced, or disguised
during communication since SCADA systems rely on cloud communication.

2. Network links between SCADA systems and the cloud could open backdoors into the
ICS, which attackers could subsequently exploit.

3. Cloud-based SCADA systems have the same hazards as traditional SCADA systems.

4. Because the same cloud can be accessed by multiple clients, data on the cloud is
only isolated internally.

5. Attackers can simply search and abuse SCADA systems apps that are hosted in the
cloud.

6. SCADA systems use Modbus/TCP, IEC 40, and DNP3 for control and automation, but
some of these protocols lack security.

7. Instead of proprietary solutions, SCADA systems use commercial off-the-shelf


solutions.

8. SCADA systems do not have enough security controls.

9. In IoT device operating systems, unnecessary services and default factory settings
cause setup issues.

10. Software problems in IoT device operating systems are caused by memory
corruption and weaknesses in evaluating input data.

11. Configuration issues such as parameter manipulation and lack of encryption can
occur when third-party software is utilized for IoT devices.

12. Individual cloud and external service providers have their own security flaws.

IOT SECURITY GUIDE 69


Few threats to SCADA systems in IoT-cloud context are listed
below:

1. Advanced Persistent Threats (APTs):


APTs are network attacks in which an unauthorized user uses zero-day attacks to obtain
access to a system to steal data rather than inflict damage.

2. Data Integrity:
When the original data is destroyed, data integrity is lost. This can occur through a
variety of methods, including reduced computational methods or surveillance.

3. Man-in-the-Middle (MITM) Cyberattacks:


Spoofing and sniffer attacks are two attacks that can readily be launched as a result of
a man-in-the-middle attack. A spoofing attack occurs when a software or an individual
impersonates another program or person in order to gain unauthorized access to a
system or network. In a sniffing attack, the intruder watches all of the communications
that are sent and all of the actions that are taking place.

4. Replay Attacks:
A replay attack is a network assault in which a valid message containing some valid
data is repeated; in some situations, the message may repeat itself. When a replay
attack delays messages sent to physical devices, it affects the performance of SCADA
systems and can be a major hazard.

5. Denial of Service (DoS) Attacks:


The goal of a DoS attack is to prevent the intended user from accessing a service. These
cyberattacks can be carried out in a variety of ways, including DoS and DDoS. These
attacks, at their most basic level, overburden computer resources to the point where the
machine is unable to perform its intended activities.

4.5 Best practices for securing IoT-Cloud based SCADA systems:

1. Network Segregation:
This technique introduces security tools that surround each network, effectively
segregating and monitoring network activity and preventing policy breaches.

2. Monitoring and Analysis:


The computers in SCADA systems conduct vital duties, which can make the systems
complicated. Because of the growing frequency of attacks, it is necessary to regularly
monitor and analyze the operations carried out by these computer systems.

IOT SECURITY GUIDE 70


3. Log Analysis:
Almost all computer software and devices, such as software applications, networking
equipment, applications, and other sophisticated programmable devices, keep
monitoring tools. Debugging, compliance checks, scientific examination, and intrusion
detection all rely on these logs. Many assaults can be identified and controlled using
these data. This type of log analysis is common.

4. File integrity monitoring:


File integrity analysis is conducted to ensure that some software and operating systems
are safe to use. The most commonly used verification method is cryptographic
checksums. Checksum verification methods make it simple to distinguish between
harmful (black lists) and permissible (white lists) files. Host-based IDS also supports
checksum techniques.

5. Network Traffic Analysis:


Hazardous actions can occasionally be spotted by performing network packet analysis
while monitoring the network. Behavioural or pattern analysis can also be used to detect
malicious actions. Network analysis can only detect the number of network packets or
the destination for complex malware, where the information is concealed inside covert
channels.

6. Memory Dump Analysis:


Memory dump analysis can detect both known and undiscovered harmful behaviour
within an operating system's memory. A vulnerability system can evaluate many forms
of memory dumps using modern technology. This form of analysis makes it simple to
spot hidden processes and system libraries, which aids in the detection of sophisticated
attacks and intrusions.

7. Constant Updating and Fixing:


IoT-cloud SCADA systems rely on third-party software and keeping this software up to
date is a headache. Unexpected faults in such software can lead to attackers being
able to execute arbitrary code. It's a good idea to keep up with the latest security news
and follow the best practices for updating and patching this key infrastructure software.

8. Actively Evaluating Security vulnerabilities:


The system design influences its security level to a great extent. Continuous monitoring
and vulnerability testing can readily uncover unknown flaws in cloud systems.

IOT SECURITY GUIDE 71


THE THREAT MODEL FOR IOT
The detection and development of a list of possible threats are referred
to as a threat model. Threat models can include both physical safety
and digital protection, which are inherent in cyber-physical structures.
The process of detecting essential assets and blocks involves splitting
the production phase supply chain into usable blocks and listing the
assets in those blocks.
This may include, in addition to risks of attacks, accidental events that
may affect security, safety, and efficiency as a result of errors in
managing the growing complexity of systems brought on by the
addition of IoT.
Risk evaluation methodology should measure the relative importance of
risks based on the domain's risk level and enforce actions to secure the
various stages of the supply chain. The purpose behind cyberattacks
should also be considered to identify cost-effective defences and
security controls. Furthermore, a large number of IoT components
demonstrate a lack of responsibility for the tasks they perform. This is
due to the lack of logging in most IoT devices due to hardware
limitations or extra costs. A risk assessment for the entire IoT supply
chain setup should be performed to identify components where
monitoring is needed.
While evaluating the attack vector for the product, a threat model must
be created during the design process. All threats to the product should
be rated following the CVSS guidelines, which consider the attack vector,
complexity of the attack, and probability of occurrence, among other
factors. This aids in risk prioritization and establishes a foundation for
developing a protection plan for the product.

There are several forms of threat modelling, and three factors can
differentiate them:
1. The logical object under consideration.
2. The stage of the device life cycle (for example, modelling protection
for software during its initial design versus modelling security for off-
the-shelf software that has already been implemented).
3. The threat modelling's target:
Software threat modelling, which is threat modelling conducted during
software design to minimize software vulnerabilities, is a common type of
threat modelling. For performing software threat modelling, there are
numerous proven methodologies. Another type of threat modelling is device
threat modelling, which is threat modelling conducted for operating systems
to enhance their overall protection. In comparison to software threat
modelling, device threat modelling is more informal and ad hoc.
Data-driven framework threat modelling is a subset of threat modelling
that focuses on protecting specific data types within systems.

IOT SECURITY GUIDE 72


The complex essence of defense necessitates threat modelling. Security would be
impossible to solve if it were a one-time job. Unfortunately, the attack side is ever-
changing; new weaknesses are found, new attacks are created, and new threats
emerge.
Long-term shifts occur as well—new groups of vulnerabilities are found, attacker
motives shift, and other transitions occur over time. Security controls are continually
improved and upgraded, new types of security controls are introduced, and so on.
Change is unavoidable; for example, when one class of vulnerabilities becomes well
remedied, attackers easily find another group of vulnerabilities that are not as well
minimized to exploit, and defenses adjust security measures appropriately.
Instead of relying solely on "best practice" generic guidance, data-centric device threat
modelling enables organizations to understand the security needs of each case of
interest. Best practices for operating systems and individual applications, such as
securing a web server (host) or web server apps, are now well established in
organizations. What is much more difficult for companies to handle is deciding how to
protect a specific piece of data. It is not so much that protecting data is challenging
because historically, security experts, system managers, and those in charge of
securing operating systems have concentrated on securing systems rather than data.

5.1 How to Carry out T­­hreat Modelling


Although there are numerous approaches for threat modelling, the research is usually
carried out by taking the following topics into account:

1. Definition of the system: This provides a description of the method and how it
accomplishes its goal and fulfils its use cases. Any industry-specific security criteria
and any limitations or assumptions about the system in the target market must be
taken into account.
Describe the system's lifecycle: This is a black box overview covering aspects such
as how the system is produced, designed, deployed, and how it approaches to
stop, and the various entities involved in each level.
Describe the system's fundamental operations, usually in pictorial blocks, and show
how knowledge flows from one block to another.

2. Determine the trust boundaries: Identify the security or trust limits beyond which
security within an object of study can be evaluated and define the trust relationships
between the objects. Determine the flow of knowledge through the trust boundaries.
The research must consider the method applied in its larger sense, even though it is a
black box.

3. Determine who the stakeholders are: A stakeholder is an individual, party, or


organization that assigns a monetary value to the system based on its essential
assets. The list of stakeholders is typically extracted from business protection criteria
and the system's lifecycle.

IOT SECURITY GUIDE 73


4. Determine the vital assets that must be safeguarded: Determine the properties
that must be safeguarded and the business rationale for doing so. Key properties of
assets, such as confidentiality, honesty, or availability, may be jeopardized by
attackers. Assets may be a direct target for attackers looking to hack the
infrastructure. However, some properties, such as encryption keys, can serve as
stepping stones to the system's compromise.

5. Determine attack surfaces: An attack surface is the number of the various points
(the "attack vectors") from which an unauthorized user can communicate with the
device. Input and output ports, APIs, and computing side effects such as timing, and
power consumption, are examples of attack surfaces. As a result, the attack surface is
inextricably linked to the defense boundary. The attack surface is determined by the
threats and adversarial tools under consideration in the study.

6. Make a model of your opponent (threat actor): The adversarial model reflects the
levels of expertise, skills, and resources that an attacker might use to damage the
system's properties. These are extracted from use cases, business protection
specifications, attack surfaces, and adversaries to manipulate the device.

7. Determine possible future risks: Examine the attack surfaces, and the information
flows across the confidence boundaries defined in the device definition. For example,
the Microsoft STRIDE model can be extended to attack surfaces and the use of attack
vectors as a means of compromising an asset. In this research, knowledge of
adversarial models is important.

8. Threats that have been detected are subjected to a risk assessment: The threat's
probability must be calculated. The effect of each hazard on the system and
organization must then be calculated. These two factors are added together to
determine the overall risk of the attack.
Mitigation actions: Determine what should be done with each hazard based on the
danger. For example, it may be appropriate to reduce the threat to an acceptable
level, admit that it is not a danger, remove the feature that causes the threat, or
pass the threat to a more suitable group.
Contingency planning: Countermeasures are typically captured at two levels:
security objectives, high-level descriptive goals for mitigating threats, and
mitigations, low-level descriptive goals for mitigating threats. Security Functional
Requirements are low-level prescriptive features or design strategies that must be
introduced to achieve the mitigation specified in the security objectives.
There may be residual risks, and it may be appropriate to repeat the steps.

IOT SECURITY GUIDE 74


5.2 Data-centric Threat Modelling
Data-centric system threat modelling combines attack and protection side details for
data of interest in a structured model that aids in vulnerability analysis, decision
making, and change management.

Step-1
The first step is to classify and define the relevant system and data. The framework
and data should be strictly specified, of a specific logical collection of data on a
specific host or small group of closely related hosts and devices. If the system and
data have been identified, they must be characterized, which means comprehending
the system's operation and useful to the degree required for the organization's data-
centric system threat modelling approach. At an absolute minimum, characterization
should include the following:

The system's approved data storage locations included but not limited to:
Storage, available inside the device boundaries where data is static.
Transmission refers to all methods by which data can be transferred across
networks between system components and across system boundaries.
An execution environment in which the data is stored in a local memory during
runtime while a virtual CPU processes data.
Input like data entered using a keyboard or touchpad.
Output like data displayed on a laptop or voice confirmation.

There must be a fundamental understanding of how data moves inside the system
between approved locations. For example, a file can be generated in memory and
only written to storage when the user instructs the device. Depending on the system's
sophistication, achieving this can call for an understanding of the system's roles and
processes, users and implementation scenarios, workflows, trust expectations, and
other system-related people, systems, and technology.
Among the security objectives, certain goals are more relevant than others in many
ways. Alternatively, organizations may focus on a single target with a specific threat
model.

The people and processes who are authorized to access the data in a way that could
affect the security objectives. For example, if an enterprise has chosen anonymity as
its sole goal for a specific threat model, the approved persons and processes should
include all customers, managers, programmers, providers, and so on that are
permitted to read the data.

IOT SECURITY GUIDE 75


Step-2
The second step entails defining possible attack vectors that may be used to
undermine one or more of the established security goals for one of the authorized
data locations. If the attack vectors have been defined, it could be possible to use only
a selection of such vectors in the hazard model. While using all attack vectors is ideal,
there are often too many to solve with minimal resources. Consider the relative risk of
the attack vector being used, as well as the possible effect of a successful attack.

Step-3
The third step of the approach is defining and recording security management
changes that will help minimize the risk associated with the attack vector that is fairly
realistic to implement with each attack vector chosen in Step 2. It is important to note
that it is not mandatory to list any single applicable control, such as maintaining a
compliance program and rules, since these controls may still affect the whole
enterprise and are not usually tailored to account for a specific attack vector. Next,
approximate how effectively each chosen security control change will solve the
manipulation of each relevant attack vector.
This may be as straightforward as assigning a minimal, medium, or high level of
efficacy or as nuanced as calculating the proportion of attacks against the attack
vector that this mitigation will prevent. Whatever strategy is used, it must be consistent
through mitigations and attack vectors. Estimating the negative consequences of each
security control change is the inverse of estimating the effectiveness. Cost and
decreases in functionality, usability, and efficiency may be factors to consider. These
can be especially difficult to predict for potential mitigations reliably, so it might be
best to create very preliminary calculations using a basic low/medium/high style
scale exclusive to the organization.

Step-4
The methodology's final step is to review all the characteristics reported in the
preceding stages, which collectively form the hazard model, to aid in assessing the
efficacy and efficiency of each protection management option against the chosen
attack vectors. To assume that control should be used because it reduces risk is much
too straightforward. Security controls, in addition to the financial costs of procurement,
execution, and management/maintenance, may have a detrimental effect on
reliability, efficiency, and efficiency, among other factors. Any evaluation of security
measures should take into account all important related variables. The most difficult
aspect of hazard model research is deciding how to take all these features into
account at the same time. A specific attribute, such as annual management, can be
easily compared across attack vectors and mitigations. However, comparing the entire
set of characteristics for one attack vector to the entire set of characteristics for
another attack vector is extremely difficult.

IOT SECURITY GUIDE 76


Such comparisons, however, are crucial in deciding how risk can be cost-effectively
minimized across all attack vectors with a reasonable negative impact on the
organization's performance.
Each enterprise must decide how to compare the characteristics of each attack vector
control pair as a foundation for comparing attack vector and protection control
characteristics. One method for making these contrasts easier is to assign ratings and
weightings to each characteristic. Narrative accounts of hazard consequences, for
example, may be translated to numerical values on a three-point scale. In addition to
the low, medium, and moderate scores, three-point scales could be used for other
characteristics. Also, complex features, such as price, may be reduced to a single
scale. The company must consider the proportional weights of each characteristic in
addition to awarding ratings to each characteristic's potential values or significance
ranges. Perhaps the ability to repel attacks is regarded as much more critical than
other attributes. If this is the case, it may be communicated by doubling or tripling its
score. Similarly, the other traits should be given a multiplier that increased or
decreased their scores or kept them constant. The company will then sum up the
outcomes after applying the multipliers, yielding a relative score for each attack vector
control combination.

5.3 Why IoT Threat Modelling Matters


It is common knowledge that IoT systems lag in terms of network and information
security because of the following factors:
Lax manufacturing standards
Devices that lack the computing horsepower
Devices that lack safe storage space

If a single device is adequately protected, unsecured devices can remain in the


organization's ecosystem. This completely circumvents the complexity and breadth of
IT security departments, exposing entire networks to data breaches. These IT security
loopholes can be discovered using architecturally dependent IoT hazard modelling.
A company will quickly lose control of its IoT ecosystem attack surface if it does not
have clear IoT protection.

Architectural IoT Threat Modelling Example


IoT-based aircraft system’s vulnerability model map can be studied for the
numerically largest source of cyber threats to the aircraft, excluding IoT systems for
the time being. Upon examining these attacks, it reveals that they mainly threaten
endpoint users who use their mobile phones or laptop computers while flying. Such
risks are thus of low priority for the aircraft's defense.
Considering the IoT aircraft device threat paradigm, the risks posing the greatest
danger to the actual aircraft originate from the integrated IoT systems. These devices
are used to track and automate essential elements of the physical aircraft
environment.

IOT SECURITY GUIDE 77


The following basic threats have been described as a result of architecturally-based
IoT hazard modelling:

Action Spoofing
Device Hijack
Denial of Service
Faking the Data Source
Insecure Wi-Fi Channel
Manipulating Writable Configuration Files
Targeted Malware
Wi-Fi Jamming

5.4 Threat Modelling for Device-level Security


IoT device-level protection entails safeguarding the network at the level of specific
computers in order to provide a secure atmosphere for consumers. To create a
protection scheme that effectively safeguards the network: a device-level inspection
must be performed, as well as the detection of essential vulnerabilities that occur in
particular systems.

Threat Modelling
Features
Methods

Aids in the identification of appropriate


countermeasures
STRIDE An advanced method
Simple to use, but it takes time
Has programmed modules
Has incomplete and ambiguous documents

Aids in the identification of appropriate


countermeasures
Contributes explicitly to risk control
PASTA Encourages stakeholder engagement
Has built-in threat reduction prioritisation
Is time-consuming but has extensive
documentation

Has constructed threat reduction prioritisation


Produces reliable results when replicated
CVSS Has programmed modules
Score measurements are opaque

IOT SECURITY GUIDE 78


Threat Modelling
Features
Methods

Encourages stakeholder engagement


LINDDUN Has built-in threat reduction prioritisation
Is time-consuming but has extensive
documentation

Aids in the identification of appropriate potential


solutions
Attack Trees Produces reliable results when used repeatedly
Simple to use if you already have a detailed
understanding of the method

Helps to classify applicable countermeasures


Directly contributes to addressing risk
Persona non Grata Produces reliable results when replicated
Detects only a portion of risks

Encourages stakeholder engagement


Security cards Detects unusual threats
Produces a lot of false alarms

Has built-in threat reduction prioritisation


htMM Encourages stakeholder collaboration
Produces accurate results when replicated

Has built-in threat reduction prioritisation


Quantitative TMM Encourages stakeholder collaboration
Produces accurate results when replicated

Encourages stakeholder engagement


Detects unusual threats
Has built-in threat reduction prioritisation
Trike Encourages stakeholder collaboration
Has programmed modules
Has incomplete and ambiguous documents

IOT SECURITY GUIDE 79


Threat Modelling
Features
Methods

Encourages stakeholder engagement


Detects unusual threats
Has built-in threat reduction prioritisation
Vast Modelling Encourages stakeholder collaboration
Has programmed modules
Has incomplete and ambiguous documents
Produces accurate results when replicated

Encourages stakeholder engagement


Detects unusual threats
Has built-in threat reduction prioritisation
Encourages stakeholder collaboration
OCTAVE
Is designed with scalability in mind
Has incomplete and ambiguous documents
Produces accurate results when replicated

Table 11. Different Threat Modelling Methods

PASTA Model
The Process for Attack Simulation and Threat Analysis (PASTA) is a risk-centric threat-
modelling framework that contains seven stages, which are as follows:

Define objectives
Define technical scope
Application decomposition
Threat analysis
Vulnerability and weakness analysis
Attack modelling
Risk and impact analysis

LINDDUN Model
A LINDDUN (Linkability, Identifiability, Nonrepudiation, Detectability, Disclosure of
Information, Unawareness, Noncompliance) model focuses on privacy issues that can
be used to secure data.

IOT SECURITY GUIDE 80


LINDDUN begins with a system Data Flow Diagram that describes the system's data
flows, data stores, operations, and external entities. LINDDUN users define a threat's
applicability to the structure and create threat trees by iterating over all model
components and evaluating them from the standpoint of threat categories. It is
divided into six stages.

1. 2. 3. 4. 5. 6.
Map privacy
Recognize Threat Obtain Choose the
Define threats to
the Threat should be prevention appropriate
DFD elements
scenarios prioritised techniques PETS
in DFD

Problem Space Solution Space

Figure 18. Data-flow Diagram of LINDDUN Model

CVSS Model
The Common Vulnerability Scoring System (CVSS) captures the principal
characteristics and produces a numerical severity score. The CVSS provides users with
a common and standardized scoring system within different cyber and cyber-physical
platforms. The CVSS Model consists of three metrics, namely, Basic, Temporal, and
Environmental.

Temporal Environmental
Base Metric Group
Group Metric Group

Exploitability Impact Exploit Code Modified base


metrics metrics Maturity metrics

Remediation Confidentiality
Attack vector Confidentiality level requirement
Attack Impact Report Integrity
complexity Integrity confidence requirement
Privileges Impact Availability
required Availability requirement
User Impact
interaction Scope
Scope

Table 12. CVSS Model Metrics

IOT SECURITY GUIDE 81


Attack Trees Model
Attack Trees are diagrams that show attacks on a machine in the shape of a branch.
The attack aims to reach the tree's root through the leaves. Its tree defines each
target. As a result, the device threat analysis generates a series of attack trees.
Supervisors may create attack trees and use them to make security decisions, decide
whether networks are vulnerable to attacks, and analyze particular types of attacks.
This approach has often been used in conjunction with other methods and systems
such as STRIDE, CVSS, and PASTA in recent years.

Persona non Grata Model


Persona non Grata (PnG) is concerned with the motivations and abilities of individual
attackers. It characterizes consumers as archetypes that can abuse the machine and
forces researchers to see the system from accidental use.
PnG can aid in the visualization of threats from the opposing side and be useful in the
early stages of hazard modelling. The plan is to add a technical specialist to a
possible machine attacker and investigate the attacker's abilities, motives, and aims.
This research assists the specialist in comprehending the system's flaws from the
perspective of an attacker.

Security Cards Model


In order to promote threat-discovery operations, a deck of 42 cards is used: Human
Impact (9 cards), Adversary Motivations (13 cards), Adversary Resources (11 cards),
and Adversary Methods (11 cards) (9 cards).

Human impact Adversary's Motivations

The biosphere Access or convenience


Emotional well being Curiosity or boredom
financial well being Desire or obsession
Personal data Diplomacy or warfare
Physical well being Malice or revenge
Relationships Money
Societal well being Politics
Unusual impacts Protection
Religion
Self-promotion
World view
Unusual motivations

Table 13. Security Cards Model

IOT SECURITY GUIDE 82


Adversary's resources Adversary's Methods

Expertise Attack coverup


A future world Indirect attack
Punishment Manipulation or coercion
Inside capabilities Multiphase attack
Inside knowledge Physical attack
Money Processes
Power and influence Technological attack
Time Unusual methods
Tools
Unusual resources

Table 13. Security Cards Model

htMM (Hybrid Threat Modelling) Method


It comprises SQUARE (Security Quality Requirements Engineering Method), Security
Cards, and PnG operations. The method's focused characteristics include no false
positives, missed risks, and a clear finding independent of the person performing the
hazard modelling and being cost-effective.

The method's key steps are:


1. Identifying the device to be threat-modelled.
2. Use the Security Cards under the developer's recommendations.
3. PnGs that are impossible to occur should be removed.
4. Use the tool to help summarize the findings.
5. Maintain a systematic risk assessment process.

Quantitative TMM Model


This hybrid approach combines assault trees, STRIDE, and CVSS approaches in a
synergistic manner. It seeks to resolve a few pressing issues through threat modelling
for cyber-physical systems with complex interdependence among their components.
The first stage in the Quantitative Threat Modeling Method is to build component
attack trees for each of STRIDE's five threat groups. This behaviour demonstrates the
interdependence between attack types and low-level object attributes. Following that,
the CVSS procedure is used, and scores for the tree's components are measured.

IOT SECURITY GUIDE 83


Trike Model
Trike, like many other processes, begins with the definition of a procedure. The analyst
creates a requirement model by listing and comprehending the system's actors,
properties, planned behaviour, and laws. This move generates an actor-asset-action
matrix, with columns representing properties and rows representing actors.
Each matrix cell is divided into four segments, one for each CRUD operation. The
analyst assigns one of three values to these cells: permitted action, disallowed action,
or action with laws. Each cell has a rule tree attached to it.
A Data Flow Diagram is created after the specifications have been established. Each
variable corresponds to a group of actors and properties. The researcher iterates
through the DFD, identifying risks that fall into one of 2 groups: elevations of privilege or
denials of service. Each discovered threat is added to an attack tree as a root node.
Trike uses a five-point scale for each operation, depending on its likelihood, to
measure the risk of attacks that can impact properties through CRUD. Actors are
scored on a five-point scale based on the threats they are expected to pose to the
asset. Actors have graded on a three-dimensional scale: always, sometimes, or never,
for each move, they will take on each asset.

Vast Modelling Model


Threat Modeler, an advanced threat-modelling tool, serves as the foundation for the
Visual, Agile, and Simple Threat (VAST) Modeling process. Its scalability and reliability
enable it to be implemented across large enterprises' entire networks to deliver
actionable and consistent outcomes for various stakeholders.
Recognizing organizational gaps and challenges among development and
infrastructure teams, VAST necessitates developing two types of systems: application
threat models and operational threat models. Process-flow diagrams are used in
application hazard models to reflect the structural perspective. DFDs are used to
construct operational vulnerability models from the perspective of an intruder.

OCTAVE Model
The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
approach is a risk-based operational cybersecurity analysis and preparation method.
The OCTAVE Model is divided into three phases:
1. Create hazard profiles based on assets.
2. Determine the instability of the networks.
3. Create a defense agenda and action plans.

OCTAVE is primarily concerned with evaluating operational threats and does not
consider technical risks. Its three key components are organizational risk, security
policies, and technology.

IOT SECURITY GUIDE 84


5.5 Defining Threat Model for IoT Networks

Threat Model for Healthcare


A threat model for IoT health devices is created by adapting general threat modelling
steps such as
(a) identifying IoT device assets,
(b) identifying device access points,
(c) identifying threats.

Individuals who use or promote the use of these instruments are referred to as
stakeholders. They will also use this system to determine the security risks associated
with using some of the systems depicted in the model.
Medical practitioners may also use the framework to learn about technologies that
have been recommended for their patients' use. Researchers may also test the device
based on the kind of study they are doing.
All system information, such as device risks and ratings, will be calculated and stored
in a database. The developer will be the professional in charge of managing the
infrastructure by doing routine system changes such as installing new equipment and
risks and recalculating risk ratings.

Identifying Threats
A vulnerability is a potential risk that exploits a system's or device's vulnerabilities in
order to gain unauthorized access or inflict damage to the system or device. Threats
can occur as a result of the actions of legitimate users of the computer or system who
have permitted access to the system, as well as unlawful or unauthorized users of the
system or device. We will use the STRIDE model, which categorizes risks into six
categories: spoofing, tampering, repudiation, information leakage, denial of service,
and privilege elevation.

Type of threats Information

Threatening to access and use another user's


Spoofing credentials, such as username and password,
without permission.

Threat behaviour aimed at altering data in


transit between two computers over an open
Tampering network, such as the Internet, and maliciously
changing/modifying persistent data, such as
persistent data in a database.

IOT SECURITY GUIDE 85


Type of threats Information

The threatening activity aimed at carrying out


Repudiation criminal activities in a system that lacks the
capacity to track them down.

Threatening action to read a file to which you


Information
have been denied access or to read information
disclosure
assets.

Threat directed at denying access to legitimate


Denial of
users, such as by briefly rendering a Web server
service
inaccessible or obsolete.

Threat designed to obtain exclusive access to


Privilege
resources in order to obtain unauthorized
Escalation
information or breach a system.

Table 14. STRIDE Model to Identify Threats

Spoofing
Email spoofing is used as a trick to share sensitive information or steal users'
credentials. Often, spoofed emails are submitted by changing the sender's name or
email address. In addition, the content of the message is often structured in such a
manner that it seems legitimate to the receiver. Countermeasures may include:
Good authentication: A strong password policy or multi-factor authentication
methods may be used to authenticate the user to the device.
Encryption: All passwords must be secured, and it must be guaranteed that no
credentials are sent over the wire in cleartext.

Tampering
An attacker tampers with data in transit or at rest. Countermeasures include:
Strong authorization: Appropriate access management systems, such as role-
based access control, must be deployed with the least privileges and division of
duties rules in place. Users must be assigned permission with the bare minimum of
rights.
Data hashing and signing: In order to ensure the validity of the data, all sensitive
data must be hashed and authenticated.
Secure communication links: The communication links between device
components must be protected by protocols that maintain message integrity and
privacy.

IOT SECURITY GUIDE 86


Repudiation
Authorized users engage in unlawful activities, and the device is unable to track
them down; other people are unable to verify this. Countermeasures include:
- Secure Audit Trails: Both confidential data and events must be logged and
registered.

Information Disclosure
Raw evidence or medical documents are being leaked. Countermeasures include:
Strong authorization: Make certain that an effective access management system is
in place and that only approved users have access to data.
Encryption: Ensure that all confidential data is encrypted (while in storage or in
transit) and that only approved users have access to it.
Safe communication links: Make certain that all communication links are protected
by protocols that ensure message security.

Denial of Service
An attacker is jamming the hospital environment. Countermeasures include:
Mitigating this type of protection risk is difficult since remedies are heavily
dependent on a variety of variables.

Elevation of Privilege
Attackers obtain access to authentication networks by masquerading as trustworthy
individuals. Countermeasures include:
A proper authorising process is needed.
The principle of least privilege requires that all permitted users have the bare
minimum of privileges and access.

Rating Identified Threats

Threats are rated using scales representing high, medium, and low. A danger ranked
as high poses a significant risk to the system or the device software programme and
must be addressed as soon as possible by introducing suitable countermeasures. A
medium-risk threat must also be tackled, but not as urgently as a high-risk threat. A
danger classified low may go unaddressed because it does not necessitate the same
level of urgency as the other two threat levels. We may use the DREAD model for
scoring.

Following the rating of the risks, a risk score is determined using the formula
Risk Score = (Damage + Reproducibility + Exploitability + Affected users +
Discoverability)/5.

IOT SECURITY GUIDE 87


Rating High Medium Low

Damage The intruder can Leak delicate Leak trivial


potential get full trust information. information.
permission,
operate as an
admin, and share
data by
subverting the
security
framework.

Reproducibility The attack can The attack can Even knowing


always be only be the security
replicated and replicated with breach, the
requires no a time frame attack is very
time. and a specific hard to repeat.
situation of
race.

Exploitability The attack A qualified The attack


might be done programmer requires a
in a short period could attack highly skilled
by a beginner and then repeat person and a
programmer. the steps. thorough
understanding
to use every
time.

Affected users All users, Non-default Very small


default setup for some proportion of
settings, users. users, darkness;
key clients. affects
anonymous
users.

IOT SECURITY GUIDE 88


Rating High Medium Low

Discoverability The attack is The vulnerability Some people


explained by the is a rare part of would need to
published facts. the product and think about the
In the most should be wrong use.
frequently used experienced by The bug is dark,
function, the only a handful of and users are
weakness is users. unlikely to
identified and is determine the
very apparent. potential for
damage.

Table 15. DREAD Model Threat Rating Scheme

Threat Model for Smart Home Devices


As a first step, look at the grid elements of the Data Flow Diagram that specifically fall
within the domain. They are shown as complicated systems.

The following table, for example, indicates including the Smart Meter instance as a
complex mechanism with three data stores and the related data flows. As a result, the
smart home pattern instance's instantiated feature "Energy Meter" is described in the
Data Flow Diagram as a dynamic mechanism called Energy Meter. The data stores
Energy Meter Keystore, Energy Meter Application Data, and Energy Meter Measurement
Data. The second move is to consider elements inside the smart home essential from
a security standpoint but cannot be aggressively modified because third parties
supply them. They are represented as foreign bodies within the smart house.

All elements introduced in this stage must be segregated from those added in Step 1
using privilege boundaries. The explanation for this is that there are many players in
the smart house. We examine the smart home's key elements typically supplied by a
single party and associated subcontractors, such as energy providers and meter point
operators. The level of confidence for parts that cannot be actively handled is
separate from items that communicate within the smart home but are supplied by
external, diverse parties. For example, the Smart TV, a component of the smart house,
communicates with other components but is not included in the definition because an
external vendor supplies it. As a result, it is added as a distinct external body
distinguished by a privilege boundary.

The third move is to include the grid components, which are not part of the smart
home but are also essential for stability.

IOT SECURITY GUIDE 89


We add the generic DFD with generic placeholders for the elements within the smart
home and do not yet replace them with the instantiations indicated in the preceding
table.

The items within the smart home supplied by third parties, on the other hand, are
shown as external actors and will remain so in the study. All of these elements will be
replaced by their instantiations at a later stage. The fourth step is to apply the smart
grid pattern instance's grid element connections to the DFD and the grid elements that
are not part of the smart house. Essentially, each grid element connection part of the
scope is associated with at least one data flow. A grid element connection is included
in the scope if at least one connected grid element is included. If it is unidirectional, it
is mapped to a single data flow. Otherwise, it is associated with two data flows.

Home energy

management
system

Home Smart
Gateway Appliances

Smart
meter

Figure 19. Data Flow Diagram (DFD) for Smart Home Devices

Refinement of the Initial DFD


The initial DFD, as modelled in Steps 1–4, can be refined further if necessary. In order to
refine properties, data stores can be broken up, or core processes can be introduced.
For instance, we added the process of Internet Routing to the DFD depicted above. The
distilled assets' representation corresponds to the asset template outlined in Step 4.
The Prosumer's contact with the EMS on his or her property. The Data Flow Diagram
already captures certain facets of defense, which aids in identifying potential
properties. Any part has a cryptographic Keystore, which stores any cryptographic
information required for message signing and communication channel security. Billing
data and consumer profile data, as well as personally identifiable information, are
represented.

IOT SECURITY GUIDE 90


Identify Entry Points and Analyze Vulnerabilities
From the standpoint of an intruder, the properties listed in the preceding phases are
important targets. Different entry points should be established with all properties in
mind. Entry points describe a certain vulnerability that can be abused, resulting in an
attack tree extending from the entry point to one or more properties. The diagram
above depicts the various entry points. It should be remembered that entry points are
elicited while the protection assumptions of each particular asset described in the
refined asset specifications are taken into account.

If an aspect is a possible entry point, it depends on the attackers, their various


motivations, and their skills. In this stage, various attacker classifications can be used.
Within and outside the smart house, an exemplary range of expert attackers, including
network and software attackers, is selected. Future studies may include a thorough
examination of all attacker models, both physical and social engineering adversaries.

Network attackers are adversaries that have active access to a target network and
can successfully eavesdrop and manipulate its communications. They have minimal
computing power, time, and financial resources. They may be either registered users
or external adversaries. It is assumed that they cannot break any cryptographic
challenges, nor are they able to penetrate physical locks nor break software security
measures.

Software attackers, on the other hand, are able to analyze, reverse engineer and
compromise software systems. They are not capable of interfering in network traffic,
nor are they able to penetrate physical security. They have limited computational
capabilities, time as well as financial resources and can be both an authorized
member of the system or an external adversary. To achieve alternative entry points,
we apply high-level logic to each dynamic process to determine if the above intruder
types will enter this specific process or not. If we cannot rule out the risk of an attacker
gaining access to the mechanism in question, it's classified as a general entry point.

Further, for each step that has been assigned as a general entry point, we optimize the
entry point & decide whether one of the possible attackers has the ability to
manipulate each data flow from or to this process. If at least one attacker has access
to the data flow in question, we mark it as an entry point. An attacker can choose
individual entry points based on the properties he wishes to compromise.

Vulnerabilities and potential risks can be extracted from the elicitation of properties
and entry points. This is accomplished in the next step by mapping entry points to
properties and categorizing them using the STRIDE categorization. STRIDE refers to the
following actions taken by an attacker: Spoofing is the act of tampering with data or
code. Repudiation refers to the reasonable denial of having taken action, information

IOT SECURITY GUIDE 91


leakage of access-restricted data, and denial-of-service attacks. When an attacker's
privileges are elevated, he or she enjoys greater capability and administrative
authority.

Asset Smart Meter

The calculation of the Smart meter affects billing,


Reasoning energy storage, energy forecasts for each
segment and third-party value-added services.

The smart meter partly relies on the Home


External
Gateway to send accounting data to the Energy
dependency
Management System.

Security The Home Gateway and the link are secure and
assumptions trustworthy.

The MPO does not collect data on the Prosumer's


energy use. The Smart Meter does not permit
contact with the Prosumer. The energy
Security notes
management system acquires Billing data. The
intelligent meter does not permit remote power
shutdown.

Billing data, encryption keys and communication


Contains assets
with others Message Verification.

Asset Home Gateway

Internal and external connectivity via the Smart


Home is dependent on the Home Gateway (HG).
The HG cannot receive the billing data of the
Reasoning smart meter, control the actions of Smart
Appliance and neither send and receive Billing
Data feedback nor respond to demand-side
management events without HG.

External The Home Gateway must be properly accessible


dependency and configured by the supplier.

IOT SECURITY GUIDE 92


Asset Home Gateway

Proper configuration means that IP addresses of


Security
the endpoint are right, authentication is enforced,
assumptions
and data transmission privacy is sufficient.

The Home Gateway must be properly accessible


Security notes
and configured by the supplier.

The MPO must be informed of misconduct.


Contains assets
Home Area Network Communication Keys.

Asset Profile Data, Billing Data

Personally, Identifiable Information (PII) such as


details on the profile (name, address, birthday)
Reasoning
and Billing data provides a thorough insight into
the PII's customs and affections.

Billing data is based on the accuracy of the


External
smart meter. Billing data aggregates are subject
dependency
to aggregation.

Security The measurements of the smart meter are


assumptions precise. Algorithms are safe to aggregate.

Security notes Physically stable, the cryptographic Keystore.

Table 16. Security Assumptions of Smart Home Assets

IOT SECURITY GUIDE 93


RESEARCH AND DEVELOPMENT 6.1 Introduction
There is a lot of Research and Development happening in IoT Security in
several areas, such as Authentication, Authorization, Encryption, etc. The
key research areas and the reasons why they are important are
described in this section.

Even before receiving or transmitting data, device authentication must


be triggered when the asset is added to the network for the first time.
Embedded devices need not wait for users to enter the passwords
needed to access the network, but they must be correctly identified
before authorization can take place. Similar to how the user
authentication mechanism allows a user to access the corporate
network with a user- name and a password, machine authentication
allows devices to access the network with a pair of credentials stored in
a secure storage area. These authentication mechanisms are mostly
referred to as Device-to-device (D2D) authentication, where
authentication credentials are exchanged through a Machine-to-
machine (M2M) channel. The resource-constrained design of IoT
devices encourages lightweight approaches to maintain a sufficient
degree of transmission performance. As a result, embedding a proper
authentication protocol via circumspect design is critical from both a
security and a transmission standpoint.

6.2 Confidentiality

Confidentiality is the blocking of access to non-public material when more


than two parties have agreed to it. For example, the information on glucose
readings a wireless glucometer sends to an automated insulin pump in a body
area network must be safeguarded. Patient safety demands that the data
should be safely stored and encrypted against unintentional or malicious
tampering. There must be a verification mechanism to connect to a legitimate
glucometer (and receive data from it) rather than an unauthorized device.
Proof of authorization certifies that a peer has the right to both coordinate with
another peer and perform a specific action. In this case, a glucometer should
allow data requests from an insulin pump and not from any other device;
additionally, both the glucometer and the pump must be made by the same
company. Also, the reset of the glucometer sensor should be carried out if the
insulin pump has the appropriate authorization level.

IOT SECURITY GUIDE 94


What is Encryption?
Encryption is a means of securing the integrity of data. Encryption turns data, such as
a folder or spreadsheet, into an unintelligible, scrambled file. Encryption preserves data
by scrambling it and rendering it unreadable before the correct cypher and key are
used to decode it. A cypher is a method of scrambling data using a mathematical
algorithm.
The most significant barrier to encrypting applications is the device's simplicity, such
as sensors. Furthermore, there could be a conflict in terms of the product's usability.
However, to protect the anonymity and security of users, it could be worthwhile to
enforce lightweight encryption in smartphones.
The network layer is the focus of current studies on encryption-based strategies for
maintaining secrecy.

Encryption to protect data at rest in motion and in use


States of the Data
There are three different states of data, they are:
1. At Rest
2. In Transit
3. In Use

1. At Rest: If the data is at rest, then it means that it is located in media like files/flash
drives/hard disks etc. and it(data) is not accessed.

2. In Transit: If the data is in transit, it means that it is moving from one location to
another. It can take place through many means like messaging/emails etc.

3. In Use: When the data is accessed by a user, then, we can say that the data is in
use.

Protection of the data


A. Protection of data ‘At Rest’:
One of the major ways to protect the data at rest is by different modes of encryption.
The various useful modes of encryption are:

1. Full disk encryption: With this, the user has an advantage, the data can be accessed
by the user with the login credentials, yet, we cannot protect the data once it is
extracted from the device.

2. File-level encryption: Here, each file is protected. So, one must have the public key to
access it.

3. Database Encryption: This allows for encryption and decryption in real-time.


However, it protects the data only when it is at rest.

IOT SECURITY GUIDE 95


4. Protection through Digital Rights Management (IRM): Here, permissions will be given
to the user, and the one who has full access can make the necessary changes to the
file.

5. MDM (Mobile Device Management): This is the most useful when the mobile device
is lost, we can control the access to applications on it.

6. DLPs (Data Leak Prevention): This allows for locating data in a network repository.
However, it is protected only until the data is in the organization.

7. CASB (Cloud Access Security Brokers): We can give/deny access to anyone with
this. The file is protected as long as it is in the cloud.

B. Protection of data ‘At Transit’:


Let us see the various ways to protect data in transit:

1. Email encryption: With tools such as PKI (Public Key Infrastructure), we can encrypt
an email. With PKI, we can have a private key for ourselves as well as a public key for
everyone else to access.

2. Managed File Transfer (MFT): This is the best way to secure transferring files. The file
will be in a platform with an expiration date and one can open the link (if provided
only) to access the docs.

3. DLP: This allows to spot malicious activities like sending (data in transit) data
outside the organization and blocking it.

4. CASB: If one tries to download data that she/he is not given access to, this can
block him/her from doing so.

5. In-transit protection with digital rights: We can protect data ‘in transit’ like
forwarding/replying to emails.

C. Protection of data ‘In Use’:


To protect the data in use, controls should normally be put in place “before” accessing
the content. For example, through:

1. Identity management tools: This concerns with the user, we can see who is
accessing the file and when.

2. Conditional Access or Role-Based Access Control (RBAC) tools: Allows data access
to the user based on his/her role and up to what extent they need access.

3. Through digital rights protection or IRM: We can deny access to the user once
he/she has gained the access to the file (the user cannot edit if we don't want
him/her to).

IOT SECURITY GUIDE 96


Challenges of Data Protection
A. At Rest:
1. There can be different copies of the data, they need protection too.

2. In mobile phones, sensitive data can be usually managed by many and we can't do
anything about it as yet.

3. With cloud storage, because the key is in the hands of the provider and not the
organization, we may lose control over it.

4. We need to make sure we have all the required security policies/patents, and not
miss any in order to avoid complications.

B. In Transit:
1. There are many means of communication and we need to protect each of them
separately. This is the same with the cloud too, there are simply too many cloud
applications to protect.

2. Control at the receiving end: We almost can’t control the receiving end because
they have the access to the file and may decrypt it.

3. With the DLPs and the CASBs we have to be very clear about what we are protecting,
and this is not always possible (based upon the organization).

Summary
Certain algorithms, such as the Advanced Encryption Standard (AES) and block
cypher protect secrecy. Compressed Sensing (CS) has recently been introduced as a
way to minimize the volume of data to transmit while still making it computationally
safer to overcome the overlapping need for compression and privacy.
Symmetric and asymmetric lightweight IoT encryption algorithms are designed to
achieve effective end-to-end communication by consuming minimal resources.

ETSI's Initiatives
In the upcoming years, ETSI (The European Telecommunication Standards Institute)
will concentrate on Radio Equipment Directive (RED) and certification schemes to
improve confidentiality and preserve customer privacy. To achieve these objectives,
ETSI has considered activating the following articles under RED:

Radio equipment does not harm or misuse network functioning and its resources.
Radio equipment has protections to ensure that subscribers' personal data and
privacy are secure.

Certain features that ensure fraud protection are supported by the radio encryption
directive.

IOT SECURITY GUIDE 97


6.3 Authentication and Access Control
Introduction
Device authentication must get switched on as soon as the asset is added to the
network, even before receiving data. Dedicated computer system devices need not
wait for the user to provide a password to access the network. They need to be
identified correctly before the authentication process occurs. The user authentication
mechanisms will allow the user to know the network with username and password.
These authentication mechanisms are referred to as Device-to-device (D2D)
authentication. The other mechanism is a machine authentication mechanism that
allows the device to access the network with the credentials stored in a secure storage
area. Here the authentication credentials are exchanged through a Machine-to-
machine (M2M) channel. The IoT devices encouraged lightweight approaches to
maintain a sufficient performance transmission and improve the battery-operated
devices' operating time. As a result, embedding a proper authentication protocol via
circumspect design is critical from both a security and a transmission standpoint.
Access Control (AC) is the method of selective restriction of access to a place or
other resource, while access management describes the process. Consuming, joining,
or using are all words that can describe the process of accessing. Permission to
access a resource is called authorization. Access control is the next step of
authentication; there is no data security without authentication and access control.
Access control assigns access privileges to various directory users and allows for the
specification of appropriate credentials.
Authentication and access control are both step-by-step processes. Both
authentication and access control must have high-security priority.

Research and Development

IoT

CHARACTERSTICS CHALLENGES IN TECHNOLOGIES


AUTHENTICATION

- Low power - Complexity of designs - GSM


devices - Interaction policies - Zigbee
- Requires media - Security, Privacy, Trust - Bluetooth
independence Management - 3G-5G networks
- Contextual - Update & Security
information Management
- Battery Operated - Public key
Cryptographic
Authentication
Method
- Privacy and
Performance

Figure 20. IoT R&D Overview

IOT SECURITY GUIDE 98


Cloud Database Compromise
The Cloud Database provides authentication, confidentiality, data secrecy, and other
security properties like integrity, correctness, and availability. It is assumed that the
attacker has read-only access to all the databases and the RAM of the physical
machines. More or less, the attacker cannot modify the queries or the encrypted data
but will be able to read and publish the sensitive data from the database. This threat is
getting increasingly important in today's internet because of the flourishing of third-
party clouds.

Low Resource and Low Power Devices


Low resource devices may lack the CPU and memory to perform the computation to
encrypt and decrypt exchanged data. When a device essentially loses power, it can no
longer function usually. This essentially constitutes a denial of service. An assault on
machines with small energy reserves that causes their energy reserves to be used up
prematurely is a common form of attack. For example, a common strategy to
conserve power is for devices to enter various power-saving modes, e.g., various sleep
and hibernation modes. A "sleep deprivation attack" is the most dangerous attack
where the intruder prevents the device from entering its energy-saving mode. The
victim nodes are bombarded with valid requests in a barrage attack. This threat is
growing because these devices are increasing in today's world.

Updates and Security Management


Once the device is operational, it receives security patches and software updates.
When rolling out security patches, the service provider or the device administrator
must be authenticated by the device, such as that it does not consume bandwidth or
should not compromise functionality or security. In the same way, as HMD global
sends updates to their Android Mobile users, IoT products need software updates and
security fixes, but their functional protection is compromised due to their restricted
bandwidth and connectivity. These devices are dependent on security patches that
are available to protect them against the vulnerabilities of the attackers. Keeping an
eye on the future, as the number of devices grows, the speed of releasing updates will
increase, and this needs active human intervention in the processing of the automated
updates over the air. Exception activity will be handled and executed by automated
human presence rather than handling and processing each update as soon as it
arrives. If there is Human intervention in between the update process, then there are
many chances of vulnerabilities.

Data Theft and Authentication


Health IoT, smart appliances, and similar devices collect a lot of data regarding their
users. Users usually have no power over how this information is processed and
distributed. In order to steal user data, an attacker may hack IoT devices.

IOT SECURITY GUIDE 99


Public-key Cryptographic Authentication Method
In an IoT device, there are two keys: a Public key and a Private key. A private key is
impossible to get anywhere. But the public key is stored in the device. Technically, the
real challenge is to initiate a secure connection between the Two IoT devices. This IoT
device connection is called a Public key cryptographic authentication method. This
method ensures the IoT device receives the public key that belongs to the intended
communication channel and the peer IoT device is trusted. In reality, an IoT device
may need to connect with various other IoT devices. It is tough to build robust security,
as the hardware and the software differences between the various devices make it
hard to develop a solution that would apply in every case. To add to the problem,
manufacturers and creators of IoT devices often skip developing a security solution for
their products to save money.

Trusted Communication
Trust is important in communication. Many IoT gadgets send messages to the network
without encryption. This is one of the most critical security issues the industry is facing.
It is high time that all the companies ensure encryption of the highest level among
their cloud services and devices. If an attacker notices any flaws in the encryption,
authorization, and authentication, he can access the cloud data through some
methods. It is tough to detect a DDoS attack before it is launched, and hence the IoT
market requires more effective and efficient DoS detection solutions.

Vulnerability Scanning
Vulnerability testing examines a computer's or network's possible exploit points to
identify security gaps. A vulnerability scan identifies and classifies flaws in devices,
networks, and communications infrastructure and predicts and suggests robust
countermeasures. Security attacks are aimed at identifying flaws in target devices
based on their software version and open services. This data can be used to launch
targeted attacks against specific hosts.

Challenges in IoT Authentication


In an IoT device, there are two keys: a Public key and a Private key. A Private key is
impossible to get anywhere but from selected trusted parties. But the public key is
stored in the device. Technically, the real challenge is to initiate a secure connection
between two IoT devices. This IoT device connection uses a Public-key cryptographic
authentication method. This method is to ensure that the Public key received by the IoT
device belongs to the intended communication channel and the peer IoT device is
trusted. In reality, an IoT device is meant to interconnect with various other IoT devices.
It is tough to build strong security, as the hardware and the software differences
between the various devices make it hard to come up with a solution that would apply
in every case. Adding to this difficulty, manufacturers, and developers of IoT devices
often do not develop a security solution for their product to reduce costs.

IOT SECURITY GUIDE 100


IoT

Characteristics Challenges Technologies used

Low power Complexity of


GSM
devices design

Requires media Interaction


Zigbee
independence policies

Contextual Security, Privacy,


Bluetooth
information Trust management

Battery operated Updates and Security


3G-5G networks
devices management

Public key
cryptographic
authentication
method

Privacy and
Performance

Figure 21. IoT Characteristics, Challenges and Technologies used

6.4 Identity Management


The importance of Identity and Access Management (IAM) in an Internet of Things
system is supreme. IAM focuses on identifying individuals and controls their access to
data (like sensitive data, non-sensitive data, or device data). IAM also assists with
identifying computers and handling user access to files, thus preventing unauthorized
access, data breaches and harmful practices.

Modifications to Suit IoT Systems


Current Identity and Access Management (IAM) solutions in IoT are limited in their
ability to store identities and entities on a large scale. As a consequence of this
restriction, there are no device integration layers for IoT-based applications. Hence,
there is no proper method to discover and manage IoT identities. In a conventional IAM
system, the standard approach provides restricted access based on an expected
function rather than the least privileged access. As a result, authentication from the
same device may provide different access capabilities based on the user role. IAM
systems for IoT identity and access management systems need to include Machine-
to-Machine (M2M) entities as well. The Regular IAM platforms will need to be updated
or modified to suit the requirements of IoT systems.

IOT SECURITY GUIDE 101


M2M Communication
Machine-to-machine, or M2M communication, refers to any technology that allows
networked computers to share data and execute activities without human intervention.
The existing identity and access management systems provide secure, integrated
data management from different devices and systems. Advanced security and trust
management technologies, such as usage control, will, in the future, control
autonomous data exchanges between various organizations.

Privacy Through Data Usage Control is an extension of traditional access control


concepts. Future data usage control technologies will add labelling and tracking data
similar to various systems processes to traditional concepts. Fine-granular usage
restrictions will be defined to enforce privacy properties over large data sets while still
running learning algorithms and analytics. The advantage of data usage control is
that it allows users to control their data usage even when others manage it. It also
meets the legal requirements in many jurisdictions (General Data Protection
Regulation [GDPR] in the European Union).

Expectations in Upcoming IAM Solutions


The future IoT system implementations will need to control data exposure locally and
interface with various other systems while maintaining end-to-end privacy
guarantees. To be found in a series of related and heterogeneous devices, IoT devices
use an Identity Management approach. Similarly, an IP address will identify a region in
IoT, but each entity within that region has its unique address.

IOT SECURITY GUIDE 102


For the maintenance of the IoT security standards, first and foremost, the

IOT SECURITY STANDARDS


security features must be suitable for the device’s design and purpose.
In other words, the system should not be required to protect functions it
lacks.

The following sub-sections outline standards in some key areas.

7.1 Industrial Internet of Things (IIoT)


The Industrial Internet of Things (IIoT) translates to interconnected
sensors, instruments, and other networked devices with industrial
applications on computers, such as manufacturing and energy
management.

IoT and IIoT principles are based on the availability, intelligence, and
connectivity of devices. The only distinction between the two is how
they are used in general. Although IoT is most widely associated with
consumer applications, IIoT is used in manufacturing, supply chain
monitoring, and management.

IIoT Standards
Several national committees and standards organizations are
designing, prototyping, and fostering IIoT/smart manufacturing
solutions standards. These organizations help businesses reach
consensus and ensure the standards are freely accessible to those
who choose to use them. There are various bodies like IEC, ANSI, and
ETSI that provide leading standards.

For instance, B&R Industrial Automation uses the following standards:


The Open Edge Connectivity includes Modbus and MQTT
(Messaging Query Telemetry Transport).
Ethernet, RS485.

IEEE standards are also used for IIoT applications in addition to these
well-known ones. There are some internet standards also that some
companies use, like ISA-95, which are also security standards.

IOT SECURITY GUIDE 103


IoXt: Internet of Secure things
The IoXt Alliance aims to increase consumer trust in Internet of Things products by
establishing multi-stakeholder, regional, coordinated, and standardized security and
privacy standards, product enforcement programs, and public disclosure of those
requirements and programs.

The IoXt Security Pledge has eight simple rules:


1. The product should not have a default password; instead, it will require unique

security credentials to operate.
2. The manufacturer is responsible for properly securing all product interfaces.
3. Product protection should be based on open, peer-reviewed methods and solid,

validated, and updatable algorithms.
4. The manufacturer’s default security settings for the product must be acceptable.
5. Only signed product would support software updates.
6. The manufacturer must act quickly to enforce security updates regularly.
7. The manufacturer must establish a vulnerability monitoring program to resolve

challenges as soon as possible.
8. The vendor must be open about the length of time it would take to provide security

updates.

Now, let us look into each of them in detail.


1. No universal passwords
One of the security flaws in connected devices is universal passwords. Very few people
change their device’s default password, making it easy for attackers to exchange
password lists and gain access to people’s homes. Every computer should, in theory,
have a factory-programmed password that is exclusive to it. A sticker or QR code on the
computer may be used to share this password with the user. When a sticker is not
available or usable, the product can require a new password to be entered immediately
after system installation. This password should, in theory, be complicated to guess.
The primary purpose of banning universal passwords is to prevent remote attackers
from guessing a product’s password, let alone controlling all units of a given system
model. This means that each new computer would either come with its unique
password or enable the user to create a password before the device can run. It is nearly
impossible for a fresh-out-of-the-box device to be remotely breached.

2. Secured Interfaces
Linked devices can interact with one another to create product interactions in the home.
Consider how your smart light bulbs interact with your remote control. Because of this
interconnectivity, all sensitive interfaces that could be accessed and attacked remotely
should be protected from breach, alteration, and monitoring. As a result, all product
interfaces must be adequately protected. Not all devices are created or used in the
same way because not all of them have the same attack surface.
At the very least, all devices must be protected against remote attack. Furthermore,
some devices may be shielded from local attacks. Internal chip-to-chip interfaces may
be protected in products where local attacks are a concern.

IOT SECURITY GUIDE 104


Stable boot or other memory integrity checks can also be used to secure the memory
interface. Encryption and authentication are needed for all sensitive interfaces. This
theory allows consumer product manufacturers to enforce “secure by design” measures
to better protect a device against product interfaces given the device type and
intended use.

3. Proven cryptography
Strong, established, updatable cryptography employing open, peer-reviewed
methodologies and algorithms is required for product security.
Cryptography is a community-driven industry that requires freedom and community
strength to flourish. Participants in the IoXt Security Pledge promise that their product's
security will be based on verified and standardized cryptography. Wherever possible,
appropriate cryptographic security approaches and algorithms that have been well
researched, proven, evaluated, and standardized should be used instead of proprietary
algorithms. Along with increasing interoperability and consumer choice, open standards
are inherently safer than proprietary implementations because they not only offer their
expertise, best practices, and work to the technology, but they also evaluate the security
practices and test against vulnerabilities regularly. This enables open standards to be
developed with security in mind and to develop swiftly, as well as to be resilient to
emerging security threats.

4. Security by default
A consumer has a fair expectation that a new product would include adequate security
protection. There is an option to turn off security in a device to download a third-party,
potentially insecure app. Contrary to Apps from the authorized App Store, where
applications are audited and protected. However, to begin with, there should be no
requirements to make the system safe. One can enable higher levels of protection, such
as preventing a child from making in-app transactions via their phone, just the way
lower-than-default levels of security can be chosen. What is crucial is that there’s a
standard level of protection that comes with the system. This theory ensures that goods
are adequately protected when purchased. Although the customer can increase or
decrease this degree of protection, the manufacturer would not leave the consumer
unprotected by design.

5. Signed software updates


Only signed software updates should be supported by the product.
While all goods must be updatable, it's also important that these updated images be
reliable. To prevent tampering during deployment, a manufacturer must
cryptographically sign the updated images. Unsigned updates must not be used since
they may be fraudulent. Injecting updated code into a device, on the other hand, poses
a security risk because attackers may use this path to turn a device into some kind of
bot. As a result, the manufacturer's updated images must be cryptographically signed.
Furthermore, all updated images must be validated by the product before they can be
used. Signed software updates safeguard all connected devices from remote attackers,
which is a typical need and a necessity for all connected devices.

IOT SECURITY GUIDE 105


Secure boot defends against local attacks in which the adversary has physical access
to the product. This principle assures that a device will only receive software upgrades
that have been properly identified.

6. Automatically applied updates


The manufacturer will work swiftly to implement security upgrades as they become
available. The manufacturer will automatically issue a fix to the product if a security
vulnerability is discovered. There will be no need for user interaction.
Is it time to replace your security camera? That's a question no consumer should ever
have to ask. To put it another way, a user shouldn't have to be the device's administrator.
They shouldn't have to be a security specialist to make sure updates are installed
correctly and swiftly.
Any upgrades or severe security flaws should be addressed without the need for user
interaction. As a result, the manufacturer will automatically apply security patches as
they become available. Because not all products can be distributed immediately, an
update may be delayed slightly.
A connected car's brake system, for example, may only be updated after the vehicle is
parked; doing any sooner may jeopardize driver safety. Alternatively, because many
connected devices are spread across wide geographical locations, a manufacturer can
opt to roll out a security update region by region to avoid peak data traffic on their
networks. In other circumstances, products may be traveling through the supply chain
and would be updated once they are linked to the web for the first time.
This approach assures that when consumers buy a connected product, it will be
automatically protected and updated for the rest of its life, and these security upgrades
will be implemented as quickly as feasible.

7. Vulnerability reporting program


The manufacturer must establish a vulnerability monitoring program to resolve
challenges as soon as possible.
As part of a vulnerability disclosure policy, all companies offering internet-connected
products and services must give a public point of contact for security researchers and
others to report issues. Vulnerabilities should be addressed as soon as humanly
possible.
When something wrong happens with a product or its services, who do you call a
consumer— or even a researcher? Whom should you contact, and how can you be sure
they've gotten your feedback and are taking action?
The device manufacturer or service provider must operate a vulnerability disclosure
program that lets users, organizations, and researchers, to let them communicate their
security concerns and even share new security techniques. An initiative like this will be
established to allow newly discovered vulnerabilities to be responsibly disclosed and, if
necessary, addressed quickly. Companies can use this principle to listen to their
customers and industry developers. By providing a channel for direct communication
and accountability, having a vulnerability reporting policy improves customer security
care.

IOT SECURITY GUIDE 106


8. Security expiration date
Usually, consumers look for the manufacturer's warranty whenever they purchase a
product. Similarly, consumers must make themselves aware of the warranty support
period and the nature of security updates tied to the product when it comes to product
security. Manufacturers shall ensure transparency about the warranty period of
providing security updates. The duration of the manufacturer's security coverage will be
clearly stated. Some companies may give extended security warranties to mitigate the
continued engineering cost, while others may provide products with a lower warranty at
lesser prices. The consumer has the choice to make an informed purchasing decision
regardless of the model the manufacturer chooses. This avoids confusion among
consumers about the course of security updates, thus allowing transparency about how
long a device receives security support.

7.2 IoT Security Standards Protocols


IoT network protocols are used to link devices over a network. These are the
communication protocols that are most commonly used on the internet. End-to-end
communication protocol within the network’s domain is possible with IoT network
protocols. Let us look at the road to designing these protocols.

National Institute of Standards and Technology (NIST)


The National Institute of Standards and Technology (NIST) is a non-regulatory body of
the United States Department of Commerce specializing in physical sciences. Its
purpose is to encourage industrial productivity and innovation. It was formed on March
3, 1901.

NIST for Cybersecurity


The Cybersecurity Framework is a set of guidelines for private sector businesses to
adopt to be better equipped to find, detect, and react to cyber-attacks. It was
developed by the National Institute of Standards and Technology, which is part of the US
Commerce Department.
The challenge is aimed to promote device and data protection across business sectors
and at scale in the Internet of Things (IoT) community. NIST is involved in a variety of IoT
and IoT-related projects.

IOT SECURITY GUIDE 107


IoT work IoT-Related work

Technical Needs
Cybersecurity Framework
Lightweight Encryption
Cybersecurity Framework profile
Advanced networking
for Manufacturing
Cybersecurity for Cyber Physical
National Vulnerability Database
System
Security of Interactive and Automated
System BLE Bluetooth
Access Management Using Secure Shell (SSH)
RFIF Security Guidelines
Digital Identity Guidelines
Guide to Industrial Control System
Security Content Automation Protocol
(ICS) Security
(SCAP) Standards and Guidelines
Cyber Threat Information Sharing
Specific Uses Supply Chain Risk Management
Connected Transportation Cloud security
Smart Cities
Cybersecurity for Smart Grid System
Wireless Medical Infusion Pumps

Figure 22. NIST Involvement in IoT & IoT-related Projects

NIST organized an Internet of Things Colloquium, engaging participants from business,


academia, and government to hear from the community to better understand the
overall danger, protection, and privacy threat environment and what NIST can do to help
these areas.

The following are the Cybersecurity and Privacy Risks of the Internet of Things (IoT).
Three high-level risk reduction priorities can be applied to cybersecurity and privacy
threats for IoT devices:

1. Ensure the safety of your unit.


In other terms, prevent a system from being used to carry out attacks, such as
eavesdropping on network traffic or breaching other devices on the same network. This
objective applies to all IoT products.

2. Ensure the safety of data.


Protect data, including personally identifiable information (PII), obtained by, stored on,
processed by, or transmitted to or from the IoT device’s confidentiality, integrity, and/or
availability. Except for those without any data that needs to be protected, this target
applies to all IoT devices.

3. Ensure that individuals’ data is protected.


Beyond the threats handled by computer and data security safeguards, protect
individuals’ privacy affected by PII processing. This target extends to all IoT devices that
process personally identifiable information (PII) or directly or indirectly affect individuals.

IOT SECURITY GUIDE 108


Transducer Capabilities Interface Capabilities Supporting Capabilities
This includes Sensing and This includes Human, This includes cybersecurity
Actuation Application and Network and Privacy Capabilities
Interface

Figure 23. IoT Device Capabilities

The above figure depicts the IoT device capabilities. The following are some of the
considerations for Cybersecurity and Privacy Risks:

Consideration 1:
Many Internet of Things (IoT) devices communicate with the real world in ways that
traditional IT devices do not. IoT devices’ interactions with the physical world can have
several implications for cybersecurity and privacy.

Consideration 2:
Device Management, Monitoring, and Access Features. Many IoT devices are difficult to
reach, control, or track in the same way the traditional IT devices are.

Consideration 3:
Capability in Cybersecurity and Privacy Availability, performance, and effectiveness are
essential factors. IoT devices have different cybersecurity and privacy features than
traditional IT devices regarding availability, performance, and effectiveness.

The following section explains the Proposals for Mitigating Cybersecurity and Privacy
Threats:

Adjusting Organizational Policies and Processes


Organizations should ensure that their cybersecurity and privacy policies and processes
resolve the issues that arise during the lifecycle of IoT devices. To prevent uncertainty
and misunderstanding, organizations should clearly define their IoT scope. This is
especially critical for companies that may be subject to laws and regulations that define
IoT differently.
Organizations can also ensure that their cybersecurity, supply chain, and privacy risk
management systems account for IoT. The following are examples of this:

1. Identifying which devices are capable of being connected to the internet of things:
If it is not apparent, have processes to decide whether a product that is about to
be procured or has already been procured is an IoT device.

IOT SECURITY GUIDE 109


2. Identifying the various forms of IoT devices: Understand the various types of IoT

devices in use and the features and functions that each type supports.
3. Identifying the dangers of IoT devices: It’s essential to understand the digital

environment in which the IoT devices are deployed rather than assessing risks for

IoT devices in isolation. Attaching an actuator to one physical system, for example,

can have a somewhat different effect on risks than attaching the same actuator to

another physical system.
4. Choosing whether to accept, refuse, mitigate, share, or transfer the risk by
accepting, avoiding, limiting, sharing, or transferring it. All risk reduction techniques
for traditional IT do not fit well for IoT.

Using Up-to-Date Risk Mitigation Techniques


An organization's cybersecurity and privacy risk mitigation practices require substantial
changes because of the sheer number of IoT devices and the variety of IoT device types.
Most companies have hundreds of traditional IT machines, such as desktops, tablets,
servers, smartphones, switches, and firewalls. Traditional IT devices of the same kind
usually have similar capabilities.
Most laptops, for example, have similar data storage and processing capacities, as well
as human user interface and network interface capabilities, as well as supporting
features like centralized management. With some customizations for specific devices
and system models, organizations can decide how to handle risk for each of the
hundreds of traditional IT device models.
The single-purpose design of most IoT devices enables most companies to have many
types of IoT devices than traditional IT devices. With so many different types of IoT
devices, organizations have to figure out how to handle risk.
Capabilities differ significantly between IoT system types. One lacks data storage and
centralized control capabilities, and another has multiple sensors and actuators, utilizing
the local and remote data storage and processing capabilities and being connected to
multiple internal and external networks simultaneously.
Furthermore, an enterprise may need to decide how to handle risk not only by system
type but also by device use. The intended usage of a system could mean that one
security goal, such as honesty, is more critical than another, such as confidentiality,
necessitating different risk mitigation mechanisms.

ENISA (European Union Agency for Cybersecurity)


ENISA (European Union Agency for Cybersecurity), founded on March 13, 2004, to
contribute to EU cyber policy, improve the trustworthiness of ICT goods, infrastructure,
and processes through cybersecurity certification schemes, collaborate with Member
States and EU bodies, and assist Europe in dealing with daily cyber challenges.

Broad Attack Floor


The threats and risks associated with IoT devices and networks are numerous and
rapidly evolving. Since IoT is heavily dependent on collecting, sharing, and processing
vast volumes of data from several sources, including sensitive information and the fact
that the data collection and processing are not always transparent to the users, these
IoT devices pose an imminent risk and danger to citizens' health, safety, and privacy the
threat landscape is changing.

IOT SECURITY GUIDE 110


There are significant technological and limited capabilities in an IoT device regarding
computing, memory, and power. Hence implementing traditional security practices
might be a challenge and will demand significant reengineering.
Security issues are compounded by the fact that IoT is associated with a rich, varied,
and vast ecosystem encompassing aspects such as computers, communications,
interfaces, and people rather than a set of individual devices.

Segregation of Rules and Requirements


The inconsistent and sluggish implementation of standards and regulations to direct IoT
security measures and best practices and the constant proliferation of new
technologies exacerbate related concerns.

Widespread Adoption
In addition to commercial IoT implementations, recent developments have seen Critical
Infrastructures (CIs) transition to Smart Infrastructures by layering IoT on top of legacy
infrastructures.
Due to potentially conflicting opinions and expectations from all interested stakeholders,
security integration in these networks is difficult. Different authentication solutions, for
example, can be used by different IoT devices and systems, which must be integrated
and made interoperable.
Actuators operate in the real environment, and thus, safety concerns are very important
in IoT. As the recent cybersecurity attacks on connected cars have shown, security
threats can become safety challenges.

Reduced Cost
Because of the widespread adoption of IoT and the advanced functionalities it provides
in various critical industries, there is potential for substantial cost savings by using
features such as data flows, advanced tracking, and integration, to name a few. On the
other hand, it is frequently the case that the low cost of IoT devices and systems has
consequences regarding security.

Inadequate Technical Skillset


Since this is a relatively new domain, people are scarce with the necessary skillset and
experience in IoT cybersecurity.

System Enhancements
Applying security updates to IoT devices is exceedingly difficult due to the user
interfaces' unique nature, which precludes conventional update mechanisms. Securing
such mechanisms is a difficult task in and of itself, particularly when considering Over-
The-Air updates.

Unprotected Computing
Since IoT products face greater “time to market” pressure than other domains, attempts
to improve security and privacy by design are constrained. As a result, IoT product
developers prioritize functionality and usability over protection due to financial
constraints.

IOT SECURITY GUIDE 111


In the event of a security incident, the lack of a clear assignment of liabilities may lead to
ambiguities and conflicts, particularly given the broad and complex supply chain
involved in IoT. Furthermore, the issue of how to handle protection if several parties share
a single component remains unanswered. Another big concern is ensuring
accountability.

Authentication Encryption
Authorisation Integrity
Access Control Secure communication
Availability Non repudiation

Devices Communications Cloud Platform, Use Cases


Backend and
Services

Sensors & Analytics &


PAN, LAN, etc. Web-based services
Actuators visualisation

Gateway Database & storage Transport

Embedded systems Device management Energy Healthcare


Smartphones, Tablets Process automation
Centralised controls Rules Engine
Wireless Devices Decision System

Smart Mobile
Home payments

Figure 24. IoT High-level Reference Model

IOT SECURITY GUIDE 112


The image above shows the IoT high-level reference model. It's important to remember
that we are not attempting to create a new IoT architecture or reference model. In
contrast, by analyzing current such initiatives, we hope to abstract their fundamental
elements to classify the properties to be covered consistently and systematically.
Furthermore, in the sense of the IoT ecosystem, the horizontal aspect of protection
should be emphasized. There are many security issues to consider, including
authentication, availability, resilience, authorization processes, and the use of encryption
to maintain data confidentiality both at rest and in transit.

The following are a few of the security precautions and best practices:
1. Security mechanisms for information system security risk identification, regulation,
quality assurance, criteria and audit, and human resource security are included in
information system security governance and risk management.
2. Ecosystem Management: This includes safeguards such as ecosystem mapping and
relationships
3. Security mechanisms for system configuration, asset protection, system isolation,
traffic filtering, and cryptography are all part of the IT Security Architecture.
4. Protection for administration accounts and administration information systems are
included in IT security administration.
5. Security mechanisms for authentication, verification, and access rights are used in
identity and access management.
6. Protection controls for IT security maintenance procedures and remote access are
included in IT security maintenance.
7. Physical and environmental safety is also essential.
8. Security mechanisms for monitoring, tracking, and log correlation and analysis are all
included in detection.
9. Security protocols for information system security incident investigation and response
and incident reporting are included in computer security incident management.
10. Consistency of Operations: This section covers security measures for business
continuity and disaster recovery.
11. Security measures for the crisis management agency and mechanisms are used in
crisis management.

Categories
These security domains divide security measures into categories based on where they
are used in an IoT ecosystem. Apart from their intended usage, each protection
measure may be classified according to its nature: regulations that must be considered
when designing products, organizational measures aimed at the company and
employees that the organization must implement, etc.
As a result, the established IoT baseline protection measures are presented in three
segments:

Policies
The first group of security initiatives consists of policies that are aimed at improving
information security in general. These should be relevant for the activities of the
organization and provide well-documented material. Following are some security best
practices that have been established in this context.

IOT SECURITY GUIDE 113


Organizational, People and Process Management
Organizational criteria for information management must be in place in all companies.
Their personnel practices must encourage good protection, ensure process
management, and safely operate data in the organization's practices. Contractors and
suppliers should be held responsible and accountable for the roles being considered.

1. End-of-life assistance
2. Relationships with third parties
3. Solutions with a track record
4. Risks and/or accidents in security are managed
5. Human Resource Management Security Policies and Training

Technical Measures
1. Management of trust and honesty
2. Security and privacy are strong defaults
3. Compliance and data protection
4. Security and dependability of the system
5. Guaranteed Updates to software/firmware
6. Authentication
7. Access control systems also protect physical and environmental protection
8. Cryptography
9. Communication that is safe and secure
10. Guaranteed networks and interfaces
11. Input and output security are also essential
12. Observation
13. Monitoring

Recommendations
Recommendations for Securing IoT at a High Level

ID DESCRIPTION

1 Promote harmonization of IoT security initiatives and regulations

2 Raise awareness for the need for IoT cybersecurity

3 Define secure software/hardware development lifecycle guidelines for IoT

4 Achieve consensus for interoperability across the IoT ecosystem

5 Foster economic and administrative incentives for IoT security

6 Establishment of secure IoT products/service lifecycle management

7 Clarify liability among IoT stakeholders

Figure 25. Recommendations to enhance IoT protection at a high-level

IOT SECURITY GUIDE 114


Ensure that IoT Protection Initiatives and Guidelines are Consistent
There is a need to resolve the existing inconsistency of IoT protection protocols,
initiatives, specifications, and other schemes. The definition of a list of best practices and
recommendations for IoT protection and privacy, which can be used as a baseline for
the implementation and deployment of IoT systems in the market, is a first and
important step in the right direction (for example, reports from AIOTI and ECSO).
In terms of standardization, it is worth noting that the concept of standard is valued and
accepted by the industry, but different groups of stakeholders have different R&D chains,
which inherently leads to fragmentation. The recommendation is to define a collection of
IoT practices, protocols, and security criteria consistent across Europe to combat
fragmentation.
The Commission should facilitate this process, and the ENISA report should serve as a
starting point for related efforts. Following that, each sector should develop its own set of
practices, guidelines, and criteria for its own needs, based on the unique context and risk
factors that each sector entails.

Exercise Influence On the Importance of IoT Safety


Cybersecurity is a disadvantage and is a cost for all parties concerned. As a result, it is
critical that these stakeholders have a clear understanding of the risks and challenges
they face and how to safeguard and defend themselves. Raising awareness is therefore
important, and efforts to do so are strongly encouraged.
Industry-wide security education and training are required, including state-of-the-
art expertise, best practices, reference architectures, and the availability of building
blocks, methodologies, and resources for stable IoT systems.
To make informed decisions when purchasing IoT devices and systems, end-users
and consumers must be trained. Campaigns to raise awareness about IoT
protection are therefore critical, not only to maintain a basic level of cyber hygiene
for the security of the “Things” that they have purchased or are running but also to
maintain a basic level of cyber hygiene for the security of the “Things” that they have
purchased or are operating.
The developer community needs to be more mindful of the importance of adopting
cross-vertical security standards rather than being bound to a single industry.
Corporate IoT protection training is also useful and should be sought.

Establish IoT Hardware/Software Development Lifecycle Guidelines and make


sure they are Stable
IoT product and solution developers, suppliers, and providers should integrate and adopt
a stable Software Development Lifecycle (SSDLC) for their offerings and incorporate
related processes into their operations. Security must be applied analytically, at the
application stage, and in the SDLC.
By default, and security and privacy by design, security and privacy are natural
foundation cornerstones of IoT security. Applying these principles in various contexts,
each with its own set of characteristics is difficult.
The cyber risk in IoT is context-dependent (i.e., based on the use case), and protection
and privacy by design criteria should be applied with this consideration in mind.

IOT SECURITY GUIDE 115


Adopting such values for the IoT environment can be aided by following relevant policies
from other, more developed IT industries.
Safe-by-design hackathons and the use of best practice cookbooks for IoT protection
will improve developers' perceptions of using security and privacy by default and by
design principles. Developers may use the lessons learned from such activities to apply
corresponding strategies to their projects and goods when it comes to businesses.

Obtain Interoperability Agreement throughout the IoT Ecosystem


Because of the IoT ecosystem's broad-scale penetration, long and complex supply
chains, and various involved stakeholders, the topic of interoperability is extremely
important. As a result, ensuring and encouraging interoperability of IoT devices,
platforms, frameworks, and security practices is an important aspect of IoT security that
should be encouraged.
The following are some suggestions that help in this direction:
1. Start encouraging the use of security-aware open interoperability systems.
2. Ensure that the security of interoperability systems is transparent.
3. Promote security interoperability labs and testbeds that are open and available.

Encourage IoT Protection by Financial and Administrative Benefits


Lack of protection affects business continuity, which is true even for IoT, fueled by R&D
(Research & Development) and a hurry to get goods and services to market. In this
regard, business continuity can be seen as a justification for investing in cybersecurity
solutions.
Consequently, the market potential for cybersecurity is somewhat poor due to a lack of
customer awareness of cybersecurity's added value. Consumer participation is
important, and it should be encouraged further. Development planning campaigns
should be introduced to increase and maintain said awareness, which would inevitably
necessitate additional mechanisms. The competitive advantage is primarily based on
time to market rather than security to the market for IoT. This balance should be shifted
so that a certain degree of protection and privacy is encouraged before market
deployment.

Set up a Stable IoT Product/Service Lifecycle Management System


Security is crucial over the entire lifecycle of an IoT product or service. Design,
development, testing, manufacturing, deployment, maintenance, end-of-support, and
end-of-life are examples of these phases (i.e., decommissioning). It is recommended
that unique, focused, and security systems frameworks should be identified for all these
steps.
Additionally, security procedures must be applied correctly. Fundamental security
specifications and building blocks must be defined to be available within each process
to achieve this.

IOT SECURITY GUIDE 116


Ensure that all the IoT Stakeholders are on the wage when it comes to the
Liabilities
According to the expert interviews, one of the most critical issues to consider when
considering IoT is a liability. It is especially crucial in the IoT domain since the cyber-
physical nature of IoT connects and links protection and safety. It is necessary to resolve
the issue of liability.
The issue of who bears responsibility for the IoT ecosystem's various stakeholders, such
as developers, suppliers, providers, retailers, aftermarket support operators, third-party
providers, and end-users, to name a few, is a complex one.
The questions of liability must be discussed in light of European and national regulations
and case law; where holes in the law are found, they should be filled.

ETSI
The European Telecommunications Standards Institute (ETSI) is an autonomous, non-
profit standardization organization in information and communications. ETSI is a non-
profit organization that promotes developing and testing global technological standards
for ICT-enabled systems, software, and services. It was founded in 1988.

IoT Standardization
Smart objects generate vast amounts of data. This information must be safely handled,
interpreted, transferred, and stored. True interoperability between devices and
applications requires widely agreed standards and protocols, which can only be
achieved by standardization.
The application of standards:
1. Ensures cost-effective and interoperable solutions
2. Allows up a range of possibilities
3. Enables the industry to achieve its maximum potential

ETSI: Cybersecurity for Consumer IoT: Provisions


Consumer IoT
The Consumer Internet of things refers to the thousands of physical-digital devices now
available, including smartphones, wearables, fashion products, and an increasing range
of smart home appliances. All IoT system passwords have to be different and cannot be
reset to a company reference value. Many IoT devices are sold with universal default
usernames and passwords (such as “admin, admin”). This has been the cause of a slew
of IoT security problems, and it is time to put an end to it. It is recommended to
implement best practices when it comes to passwords and other authentication
methods. The protection of a device can be further enhanced by providing a unique ID.
As part of an approach that focuses on policy, companies that offer internet-connected
products and services should provide a public point of contact for security researchers
and others to report issues. Threats should be addressed as soon as possible.
As part of the product protection lifecycle, companies can continuously search for,
detect, and correct security vulnerabilities in the goods and services they offer,
manufacture, have made, and operate.

IOT SECURITY GUIDE 117


All operating systems in consumer IoT devices ought to be upgradable in a safe
manner. The responsible agency, such as the manufacturer or service provider,
should notify the customer that an upgrade is needed. When software components
are updateable, they should always be updated regularly.

Inside services and on computers, credentials and data must be stored safely.
Device programs with hard-coded passwords are not to be used. Hard-coded
usernames and passwords in software can easily be discovered by reverse
engineering of computers and applications. Users want products to fulfil their needs
while still being resistant to encryption attacks. On the other hand, the
appropriateness of security controls and encryption is determined by various
variables, including the use of context.

Close any software that is not in use and any network ports that are not in use.
Hardware does not reveal access to assault unnecessarily (e.g., open serial access,
ports, or test points). If software resources are not used, they should not be available.
The functionality required for the service/device to work should be kept to a
minimum. Software should be run with as little access as possible.

Safe boot mechanisms, which call for a hardware root of confidence, should verify
the software on IoT devices. The system should notify the user and/or the
administrator if an unauthorized change to the program is detected. Also, it should
not connect to any networks other than those used to perform the alerting feature.

If an IoT system senses a problem with its program, it can notify the appropriate
party. Devices can be set to administration mode in certain cases; for example, a
thermostat in a room can be set to user mode, preventing other settings from being
changed.

Consumers must be given explicit and transparent details about how their data is
used, by whom, and for what purposes by computer and service manufacturers and
service providers. This includes advertisers and other third parties that may be
involved.

Where their use or other relying systems need it, resilience should be built into IoT
devices and services, taking into account the risk of data network and power
outages. In the event of a network outage, IoT networks should stay operational and
locally available as far as possible and should restore cleanly in the event of a power
outage.

If telemetry data, such as utilization and measurement data, is obtained from IoT
devices and services, these should be checked for security flaws. As telemetry data
is obtained from IoT devices and utilities, personal data should be processed as little
as possible and anonymized.

IOT SECURITY GUIDE 118


Personal data can be conveniently deleted from devices and services when
ownership is transferred, when the customer wishes to uninstall it, when the consumer
wishes to withdraw service from the system, and/or when the consumer wishes to
dispose of the device.

IoT devices sometimes lose value and are recycled or discarded. Consumers should
be given mechanisms that enable them to maintain control of their data removed
from services, computers, and applications. When a customer requests that all their
data must be deleted, they also expect the service provider to delete any backup
copies they might have.

IIoT system installation and maintenance should take just a few steps and adhere to
security best practices for usability. Consumers should also be given instructions on
how to set up their computers safely. By properly addressing ambiguity and bad
design in user interfaces, security problems caused by customer frustration or
misconfiguration can be minimized and removed. Validation is required for data input
via user interfaces and data transmission via Application Programming Interfaces
(APIs) or between network services and devices.

Falsely formatted data or code transmitted through various types of interfaces may
cause systems to malfunction. Attackers often use automated tools to exploit
potential holes and vulnerabilities due to failure to validate data.

7.3 GSMA: Global System for Mobile Communications


The GSM Association (popularly referred to as "the GSMA" or "Global System for Mobile
Communications, originally Groupe Special Mobile) is a trade association that
represents mobile network operators around the world. The GSMA was established in
1995 as the 'GSM MoU Association' to assist and promote cellular network operators that
use the GSM standard.

GSMA IoT Security Guidelines

IoT Service Ecosystems


The GSM Association (popularly referred to as "the GSMA" or "Global System for Mobile
Communications, originally Groupe Special Mobile) is a trade association that
represents mobile network operators around the world. The GSMA was established in
1995 as the 'GSM MoU Association' to assist and promote cellular network operators that
use the GSM standard.

IOT SECURITY GUIDE 119


The Service Model
Billing Tier Application Tier Database Tier

Billing Server Application Proxy Server Database Server


Server

Authentication Tier Service Front-End Tier Network Tier

Authentication Mobile Cellular Base


Server Proxy Server
Server Information Station

Automotive IoT
Endpoint

Figure 26. The Service Model

The Security Model


Regardless of the topology or technologies used to construct an application
architecture, security in Service Endpoint environments can be built using standard
infrastructure, techniques, and policies. The Service Ecosystem can be broken down into
components to understand it better. Individually, these components must be protected
but using similar methods.
Consider the components that create a simple service that can handle queries and
send responses from end to endpoints, partners, and users. The following levels should
be included in this model, but not confined to:

A Web Service Tier


An Application Server Tier
A Database Tier, An Authentication Tier
A Network Tier
Third-party Application Tiers, such as a Billing Tier

IOT SECURITY GUIDE 120


Billing Tier Application Tier Database Tier

Billing Server Application Server Proxy Server Database Server

Authentication Tier Web Service Front-End Tier Network Tier

Authentication Mobile Cellular Base


Server Proxy Server
Server Information Station

Automotive IoT
User Smart Phone
Endpoint

Figure 27. The Security Model

Network Infrastructure Attack


From a network perspective, attackers trying to penetrate the Service Endpoint would
assume flaws in the way organizations interact and vulnerabilities in services exposed
by service access points.
The Man-in-the-Middle (MITM) attack is the most common form of attack in this model.
This attack assumes that the communications channel has no peer authentication, one-
sided peer authentication, or broken shared authentication.

Original Network Path

Router Client
Server
Manipulated Network Path

Adversary

Figure 28. Network Infrastructure Attack

IOT SECURITY GUIDE 121


These attacks are difficult to carry out because they necessitate access to networking
infrastructure within an organization, in the core Internet infrastructure between an
organization and its partners or Endpoint Ecosystem, or near Endpoints.
Single endpoint attacks are limited to that endpoint or the community of endpoints
accessible in that physical place. Border Gateway Protocol (BGP) hijacking, targeting a
core router, or exploiting the Domain Name Service (DNS) infrastructure are common
attacks against core internet infrastructure.
This model is simple to overcome using secure communication, forward secrecy, and
suitable cryptographic protocols and algorithms, regardless of which form of attack is
used.

Cloud or Container Infrastructure Attacks


These attacks need a privileged location on the Cloud or Container infrastructure. If an
attacker can penetrate a Cloud service network, they can gain access to hosts running
guest Virtual Machine (VM) systems.
Another Cloud or Container infrastructure attack assumes that the attacker controls a
Virtual Machine (VM) on the same physical server as the target VM. The adversary may
then use a variety of methods to attack other virtual machines on a physical server.

Guest VM Guest VM Guest VM

Host

PHYSICAL CLOUD SERVER


Figure 29. Cloud or Container Infrastructure Attack

Application Service Attack


Although discussions of application execution architecture are largely beyond the reach
of this paper, it is important to remember that this layer is the most vulnerable to attack.
Attackers can switch away from network infrastructure attacks to the application if the
Service Ecosystem is configured correctly, as recommended in this document.
The application is the most complicated part of any product or service, and it always
has the ability for an adversary to obtain power across several layers of technology.

IOT SECURITY GUIDE 122


Privacy
Although partner products are built to ingest data/metrics or other user-centric
components to add value to the overall framework, the level of protection introduced by
the partner can never be guaranteed. Rather than simply passing data to a third party, it
is important to assess what types of information should be shared.
While contracts and insurance clauses can reduce legal responsibility, consumers can
be lost due to a third party's failure. Rather than risking a business loss, a company can
assess third-party engineering teams to see what degree of protection they employ in
their infrastructure, software, and APIs.

Malicious Objects
Third-party systems are intended to provide customers with information, either plain or
with multimedia. Advertising is one obvious way to do this. The structure of various types
of files is complex, making it difficult for software to parse them correctly. Advertising
networks are hence a facile medium for spreading malware.
Content Delivery Networks (CDNs) are also possible malware distribution channels.
Malware can be transmitted by any device that provides complex multimedia types or
bundles of code (web or executable) to render dynamic content.
As a result, the company must assess the various types of technical offerings distributed
across a given channel. The company must determine what is acceptable and what is
excessive to pass on to their customers.
For example, an advertising firm might want to send Java code to client systems via an
IoT company's proxy service application. The company must determine if client systems
operating in specific environments are more vulnerable to Java technology attacks. If
this is verified, the company may decide to ban Java while allowing other technologies,
such as Hypertext Mark-up Language (HTML), to pass.
There is no single standard way to ensure the end-protection users since malware
comes in various ways, including polymorphous file types to Adobe Flash, Java, and
multimedia exploits. An easy solution would be for the engineering team to impose a
policy regarding which innovations should be used over their platforms and how they
would affect their customers. Monitoring subsystems and sandboxes may be
implemented to ensure that any object made on a client device is less vulnerable to
abuse.

Authentication and Authorization


There are several great ways to share technology across networks. Engineers must
ensure that technology does not unwittingly consume credentials that could be used to
misuse permissions that were not explicitly given to a third-party service.
A few platform APIs allow restricting permissions to a class that the user either accepts
or rejects. This helps the user to customize the experience to meet their unique privacy
requirements. If the platform is unable to have granular security permissions, it can
specify which technologies it needs.
The technical team must request that their partners permit granular permissions to
ensure that revocation of a service does not unintentionally allow a window of disclosure
of that user's data to resume even after the subscription is discontinued.

IOT SECURITY GUIDE 123


False Positives and False Negatives
Although monitoring and logging systems are excellent ways to supplement an
established security system, they must be thoroughly scrutinized for false positives and
negatives since these systems only interpret data from different ecosystems within an
IoT product or service and are not created by the technical department.
However, they may not be able to tell whether an adversarial incident is taking place.
Consequently, the IT and engineering teams must see if a suspicious incident is, in fact,
the result of malicious activity. This would reduce the chance that the control team will
deny a legitimate user access to the system.
Engineers must also be vigilant when modelling data acquired through analogue
channels. False positives and false negatives may have serious implications if the
application fails to adequately determine the best course of action if the acquired data
cannot be completely trusted. This is particularly true in ecosystems where data must
be processed at extremely high rates.

7.4 one M2M & IoT


The organization's mission is to establish a global technological standard for
interoperability for Machine-to-machine and IoT technologies based on criteria
submitted by its members.
In the IoT environment, oneM2M technology is eliminating fragmentation. It is a long-
term solution for IoT implementation because it is independent of the connectivity- or
protocol technologies used for transport.
The oneM2M architecture describes an IoT Service Layer, a vendor-neutral software
Middleware that sits between processing and communication hardware and IoT
applications and provides a collection of functions typically required by IoT applications.
The oneM2M Service Layer provides case-independent functions.
CSFs (Common Service Layer Functions) from oneM2M include the following:
User and application awareness
User and program authentication and authorization
End-to-end data security
Remote provisioning and service activation
Device management
Connectivity setup and data transfer scheduling
The functions mentioned above are provided by the oneM2M common service layer, are
exposed, and regulated by IoT applications through globally standardized vendor-
independent and uniform APIs.

IOT SECURITY GUIDE 124


8.1 Introduction
5G is coming to connect all the citizens virtually through machines, objects,
and devices. This upcoming technology aims to ensure that this medium
delivers high speed of data, less latency, more reliability, increased
availability, and provides an enhanced experience for the users. The fast
5G - FIFTH GENERATION
and efficient performances will help to connect with the new industries.

8.2 Features of 5G

100 times more Virtually zero


devices latency

Quick response 10 Gbit/s of


time speed

Features of 5G

Very high Wide range of


capacity application

More Choices for


Pervasive
upgrading the
Connectivity
software

Figure 30. 5G Features

The features and their usage are way behind what human beings think.
With vast speed, it is sufficient to change the definition of mobile phone
usability. With advanced features, our smartphones will be parallel to the
laptop. We can use broadband internet facility, wider multimedia
options, connectivity, and high-quality sound, and HD videos can be
sent through another phone with no trade-off. This will help the
government to conduct any advanced courses and to supply the
materials online.

IOT SECURITY GUIDE 125


8.3 Technologies used in 5G
5G network is based on OFDM (Orthogonal frequency-division multiplexing), which
modulates different signals across various channels to minimise interference. The 5G
OFDM works in the same way as the 4G LTE (Long term evolution) does. OFDM is the
process of encoding digital information on multiple carrier frequencies. Moreover, the
new 5G NR air interface will increase the strength of OFDM so that it can provide a high
degree of flexibility. In this way, many people can access 5G for different use cases.
5G will bring wider bandwidths by expanding spectrum resources from 3 GHz used for
4G-LTE to 100 GHz and beyond. 5G can be operated in both lower bands (sub-6 GHz)
and mm Wave (24GHz and up) which will help in bringing extreme capacity. 5G is
deployed to deliver faster and supports expanding into new services such as mission-
critical communications and connecting IoT.

8.4 Deployment of 5G
Beyond mobile operators, 5G is used for private networks with applications in Industrial
IoT, enterprise networking, and critical communications. The 5G NR is launched
depending upon the 4G LTE infrastructures pairing before ripening with the 5G core
network. In the past two years, there is an association that stated that in 88 countries,
224 operators that have demonstrated, are training or testing, or have the license to
conduct trials on 5G technologies are developing 5G technologies, or that they have
announced the launch of 5G services. The first country to do so is South Korea in April.
When they launched this service, brands like Samsung, Ericsson, and Nokia have used
carriers except LGU Plus. Among all the brands mentioned above, Samsung is the one
who has launched the highest supply of 5G in South Korea by shipping 53000 base
stations out of 86000 base stations implemented. Apart from these, there are other
countries as well in which 5G radio hardware and 5G systems are implemented/used.
Those are Altiostar, Cisco, Fiberhome, Huawei, Qualcomm, and ZTE.

8.5 5G Devices
In the 5G IoT chipset, there are four commercial chipsets and one commercial platform,
with more launches coming soon. In March 2020, the first 5G smartphone was released.
Due to its more advanced features, it is very expensive. In the US, it is around 1000
dollars compared to the Samsung Galaxy s10, which is about 750 dollars. In the same
month, the Nokia company introduced the Nokia 8.3 5G, which claims that it has a wide
range of 5G compatibility than other phones released. And in October, Apple
introduced their first-ever 5G connected iPhone 12 and iPhone 12 pro.

8.6 Frequencies of 5G
The new frequencies are defined for 5G devices. The specification is divided into two
frequency bands, FR1 (below 6GHz) and FR2 (mm Wave).
Frequency range 1 (<6GHz): The maximum channel bandwidth given to FR1 is 100 MHz
due to its scarcity of continuous spectrum in this crowded frequency range. The range
of the band is 3.3-4.2 GHz.

IOT SECURITY GUIDE 126


Frequency range 2 (>24GHz): The minimum channel given to FR2 is 50 GHz, and the
maximum is 400 GHz, with two-channel aggregation supported in 3GPP release 15. The
higher the frequency, the greater will be the data-transfer speed.

8.7 5G and IoT


For IoT devices, having 5G is essential as it will help us in having the large capacity for a
fast-working network to serve the connectivity. It will expand the frequencies that can
transform the cellular data digitally. The wider 5G spectrum will increase the overall
bandwidth for additional devices to connect. The 5G with IoT will also enhance in other
fields which are Augmented Reality and Virtual Reality. The ultra-low latency will
improve the AR/VR experience and open possibilities in businesses, education, etc.
This will not only enhance technological growth but also supports 22 million jobs around
the world. We can expect this job growth from transport digitisation, manufacturing,
agriculture, and other industries as well. We can also include construction sites, mines,
oil derricks etc. These will greatly benefit from ultra-fast data transmissions to the time-
sensitive nature of their outcome.
5G can bring advancements in smart industries. Going deeply through, IoT with 5G can
run analysis on instantaneous virtual traffic, improving security, public safety, and
enabling remote surgery if possible.
5G will act as a base for the full potential of IoT. 5G devices will play a huge role in our
lives and evolve communications in business and industrial environments. With 5G's
entry, the operators have to work not only on evolving the network but also on adding
new opportunities to transform their businesses. Operators have achieved success in
Phones, tablets, and computers; now, they have to implement innovative models to
connect cars, meters, machine sensors, and consumer electronics. Today, most of the
IoT revenues come from connectivity, but after five years, the revenue will also come
from services, apps, and platforms.

Opportunities and Benefits for Enterprise


The enterprise segment will be the biggest source of the incremental 5G revenues for
mobile operators. 5G will bring specific capabilities and flexibilities to provide services
for customers from different enterprises. 5G cellular connections will bring more
benefits than earlier 4G technologies. The difference between 4G and 5G will depend
upon the latency. 5G can provide low latency which will be an advantage for
manufacturing industries. In cities, 5G will play a major role in delivering an enhanced
traffic management system by connecting traffic lights to IoT devices and sensors. 5G
smart meters will help in reducing energy consumption.

5G and IoT Interconnection


5G is important as it can improve the range of IoT applications. Recent history
states that 70% of the companies will spend around $1.2 billion on connectivity
solutions. New businesses and start-ups need IoT devices with better performance
criteria to provide security, low latency, wireless coverage and so on.

IOT SECURITY GUIDE 127


In the coming stages, the LTE and 5G technologies will develop new connectivity
interfaces for IoT applications. This technology will also bring Radio Access
technologies (RAT), smart antennas, and making use of high frequencies by altering
or re-altering the networks. The 5G enabled devices will help connect a large
number of IoT devices to supply more wireless services in the market, which will
boost rapid economic and social development.
By using heterogeneous gadgets through consistent availability, IoT can alter and
associate the global world. The idea of IoT has drawn consideration of the
researchers to guarantee that wearables, sensors, clothes, watches, smartphones,
tablets, etc are associated with a typical interface to interact with each other. The
5G mobile devices can guarantee those huge devices and new services, for
example, enhanced multiple broadband (emBB), massive Machine-type
Communications (mMTC), critical communications, and network operations are
well upheld. It is believed that effective pre-requisites such as low latency, high
versatility to empower a huge number of gadgets, etc., to clients will strengthen the
utilization of the 5G system for IoT devices.
Researchers stated that the future 5G mobile devices have to provide massive
organization for IoT with billions of articles and sensors that will be a worldwide
representation of the current scenario and help in the arrangement of basic
utilisation of IoT cases that requires constant responses and automated dynamic
procedures across various fields that include Vehicle-to-Infrastructure (V2I), high-
speed motion, Vehicle-to-Vehicle (V2V), and process control system. In addition,
there are some other upgrades presented in M2M and NB-IoT systems as described
in the current 3GPP release-14 for cellular IoT, being the primary standards for 5G.
The 3GPP standards are working to ensure that upgrades of KPI are installed into
existing 4G systems, and also, the 5Gs should be developed from the very beginning
to limit the cost of the growing new networks. For further advancement of IoT, it is
suggested to create a context-aware congestion control (CACC) scheme for
lightweight-based CoAP/UDP IoT network as a multi-target function that will speed
up the exponential progress of the pattern of the conceived 5G networks for MTC
application.
The 5G portable broadband pre-requisites are not yet defined. The innovation,
investigation, and advancements have just begun, and somewhere in the range of
5G can be accessed rapidly. In 2020, businesses can use the 5G devices, and IoT
applications will be conveyed wherever with portable broadband innovation. Along
with that, the big data produced by IoT applications will turn into a standard, and
the cloud will be a great extent used to figure, store and virtualize arrange
capabilities. The basic system foundation will embrace Software-defined Networking
(SDN) to eliminate capital and operational cost.
Four factors distinguish 5G connectivity from its predecessors. Those are:

1. Connected devices
2. Fast and intelligent networks
3. Back-end services
4. Extremely low latency

IOT SECURITY GUIDE 128


The factors mentioned above will help enable a connected and interactive world with
many applications. That includes mobile broadband, AI, machine-to-machine
communications, and advanced digital services.

In the context of 5G device utilization in the healthcare industry, the connected


people will help others to get quality care by improvement in treatment and
diagnostics, and within a period, the businesses and consumers will have a strong
bond with these devices. This will result in high-quality medical care in real-time
and at an affordable cost. They expect to bring patients close to a Sci-fi concept of
digital integration than ever before.
For example, it is possible to transmit information to doctors through an electronic
medium and based on that, the doctor will advise on diagnosis and treatment. It is
the best method to reduce cost, and we can save time as well. There is no need to
visit a doctor’s office or hospital in case of a medical problem. Some routine visits
can be attended at a distance, offering patients a greater alternative to
conventional care.
Sensors and monitors can also play a part in this. Remote devices will help patients
based in isolated areas to access top medical assistance. Due to the current
situation that the world is facing, video conferencing will be a great choice to bring
high-quality health care to several under-served communities.

Internet
Big Data
of Things

5G Mobile Broadband
and Telecom Networks

SDN Cloud

Figure 31. 5G Mobile Broadband & Telecom Networks

IOT SECURITY GUIDE 2021 129


Based on the above figure, IoT will act as a gateway and transport network for IoT
applications. Some of the technologies are listed to enable this interconnection
between 5G and IoT.
1. Wi-Fi
2. Bluetooth
3. Zigbee
4. LoRaWAN
5. Z-Wave
The IoT is in high demand as the number of devices is increasing and will reach 3.2
billion in the year 2023.
Implementing a 5G network in it is one of the biggest news due to the following
reasons:
Data-Transfer Speeds:
To boost any commercial sector, IoT plays a huge role, and with the 5G implementation,
it will significantly increase the speed of data transfer. Based on the gathered data, 5G
will work ten times faster than any other current LTE networks.

Greater Network Reliability:


In addition to its increase in speed, 5G networks provide more stable connections to
work efficiently. A reliable and stable network connection is necessary for any IoT
device, especially for locks, security cams, and other monitoring systems that rely on
real-time updates.

IoT Testing Advice:


Discovering testing advice is good. It can help execute a better test result for the IoT
projects to prepare well for the current and future IoT projects. To make a testing
advance, two steps are required:
1. Expand Test Coverage:
IoT tests require extensive testing coverage. The ability of an IoT to work with a variety of
new and old smartphones and tablets is crucial to its commercial viability. It's difficult to
create an IoT that works effectively across a number of mobile operating systems and
devices with varied hardware components due to fragmentation. As a result, it's critical
to test on a variety of devices or configurations in order to detect issues caused by
fragmentation.
2. Test From All Angles:
Secondly, to identify bugs that affect both the IoT device and its corresponding
software (most likely a mobile app), testing must be conducted from various angles.
Functionalities and usability must also be tested to gain an accurate report of
connectivity quality (object to software, software to object, and behavior in case of
interactions).

Test Bluetooth and Wi-Fi Connections:


The final step is to connect to or join the IoT to any mobile or other smart devices. First,
check whether the IoT device can connect to other devices with the help of a Bluetooth
connection and Wi-Fi networks.

IOT SECURITY GUIDE 130


Connected and remaining connected to an IoT device is difficult. If any bug occurs, it
may cause problems while communicating and sharing data. To avoid this, it is
essential to perform tests on IoT’s ability to connect to other devices.

8.8 Security Recommendations for 5G


5G networks will bolster a host of critical functions, including smart electric grids,
intelligent machines, and military communications. But it is very difficult to criticise 5G
network infrastructure from a non-critical sort. As companies and individuals become
more dependent on this network, they become more vulnerable to the theft of sensitive
data traversing the network, attacks on the functioning devices that cause disruptions
or the attack that degrades the network itself. 5G networks will expand the number and
scale of potential vulnerabilities, incentives are increased for malicious actors to exploit
these vulnerabilities, and making it difficult to detect malicious cyber activity.
One threat is the manipulation of equipment in the core network. For example, a piece
of equipment is installed known as a "Backdoor" that allows interception and redirection
of data or sabotage of critical systems. This occurs even if continuous tests are passed
because the manufacturer will regularly send updates to the equipment. Such a threat
can bypass front-end security measures such as inspecting source codes or
equipment for backdoors and other vulnerabilities. Firstly, the core network functions will
be in the cloud depending on the AI to manage complexity and network resource
allocation. On such AI systems, hackers can get into these algorithms, and they can
manipulate them accordingly.
On the edge, security is even more complicated. Backdoors are installed in the mobile
base stations that will intercept or manipulate the data from one or more access points
in the Radio Access Network (RAN). It won't be easy to trace such kind of activity. For
example, if we copy the data, the base stations will operate normally only. The device
that connects to 5G can itself pose cyber threats. In 2016, major internet activities were
shut down as hackers hijacked low-cost chips in security cameras and digital video
recorders (DVR) to take down multiple internet domains. The IoT architecture that is
designed with web technologies increases the opportunities and consequences of such
attacks.
The complexity of ensuring the 5G security and reliability requires a multi-layered
strategy that consists of technical measures, regular adjustments, legal liability regime,
diplomacy, research in investments, and cybersecurity skill training. From the technical
point of view, networks require built-in resiliency that will help them isolate and
withstand any single device's exploitation. They should have to use multiple vendors
also if possible.
Regulatory policies should mainly focus on market incentives and transparency. The
improved legal liability scheme is also necessary to improve private-sector
cybersecurity. Such standards can exist with the other programs that will encourage the
private sectors to share cyber-threat information with the federal government. The
supply-chain risk management efforts are a key asset to it. Countries such as the US
take some measures to protect their national information in 5G infrastructure. It should
be available for innovation-driving investment to find out how they have made it a
technology leader.

IOT SECURITY GUIDE 131


There are some strategies that we have to follow for a better 5G environment:
1. Meeting Consumers' Expectations
As the communication providers are switching to 5G, consumers' expectations are
rising immensely. Analysis of 5G network experience has mainly focused on 5G speeds
and availability by measuring the independent network measurements. In addition to
that, we have to also see how the early adopters perceive the 5G network experience.

2. State of Consumer 5G
The demand for 5G is rapidly growing as the consumers now understand how much
they are aware of the technology. But there is a large inconsistency across the globe in
terms of knowledge and intention to upgrade 5G.

3. The 5G Knowledge Gap


Consumer awareness of 5G potential remains high. However, marketing technologies
that are using high technologies now are somewhat lagging in understanding the value
of 5G, device capabilities and offering. If the value of 5G technology has been better
marketed, then the consumers who have already owned 5G-ready smartphones could
have already got an upgraded 5G plan.
The service providers can adapt to it very quickly to provide a secure foundation. The
initial 5G development started in the city centre, which was their main focus and the
downtown areas required capacity augmentation and consumer perception. For
example, in the UK, consumers have connected to the 5G network for around 1.5 times
longer than those who stay in the suburban area. By improving the consumer
perception, 5G availability will increase the likelihood by at least five times.

4. 5G needs more innovation


Consumers are highly satisfied with the 5G network performance, but they desire if 5G
can give some innovative services for them. Some countries such as South Korea,
Japan, China, and Taiwan are able to offer services for current 4G LTE networks, but at
the same time, they are unable to implement them in 5G. They are still developing
these services for 5G, which stops consumers from migrating to 5G.

8.9 Challenges in 5G
From a user perspective, privacy concerns centre around location tracking, identity, and
other personal data. 4G has a larger network area since the signal is transmitted from
a single cellular tower, 5G cellular networks have a small coverage area, and hence the
signal strength is not good as 4G. When a user connects to a 5G network, the network
can trace their location, and can even determine that the user is situated in which
building. The threats such as using incorrect information to cause harm called security
information attacks can find out the users' location. Whether the user is inside or
outside, the 5G antennas can trace their location precisely.
With respect to identity, International Mobile Security Identifier (IMSI) attacks can reveal
the identity of mobile subscribers. By grabbing the IMSI of the subscriber's device, the
attacker can intercept the mobile traffic to monitor an individual's activity.

IOT SECURITY GUIDE 132


Even though the attacker can see the outgoing messages or calls, they still can not see
what the message is about. After the individual leaves that attack, the attackers can still
monitor past or future calls or messages.
Data collection is also one of the major issues for 5G users. Virtually all smartphone
apps require personal information before or during installation. Application developers
rarely describe where it is stored and what kind of data is going to be used. 5G does
not contain any physical boundary and uses cloud-based data storage. The 5G users
cannot protect or control their user data present in the cloud environment. Each country
has its own data privacy policies, and this is seriously taken if and when the data is
stored in the cloud of a different country.

8.10 Solutions for 5G


5G services should follow a privacy-by-design approach that is service-oriented and
should preserve privacy. Mobile operators should follow a hybrid-based cloud
approach where the sensitive information is stored locally, and less sensitive data is
stored in the cloud. In this way, the operators can have access and control over their
data, and they can decide where and with whom they want to share with.
Location-based privacy requires anonymity-based techniques where the user's true
identity will be hidden. Before sending a message to a location-based provider, the
message should be in an encrypted format. This will reduce the quality of the location,
and it can protect the privacy of the location.
To prevent IMSI attacks, mobile operators can use Temporary Mobile Subscription
Identity (TMSI). In TMSI, each mobile device is assigned to a random TMSI that is
changed by the network at regular intervals. This will make the task difficult to identify
mobile subscribers, and it will prevent them from getting eavesdropped on the radio
interface.

8.11 Security Solutions for 5G with IoT


While 5G has been a conversational topic for many years, it is now becoming a global
reality. Recently Verizon has expanded its 5G Ultra-Wideband services in various cities
across the US. Samsung also announced that they introduced 5G devices, the Galaxy
A51 5G and A71 5G. Soon, other Communication Service Providers (CSP) and smart
manufacturers will follow this, and before we get to know, the 5G will completely disrupt
connectivity, especially IoT connectivity. According to the Cisco report, by 2022, the 5G
broadband (10 to 20 times faster than current 4G networks) will enable 12 billion
mobile-ready devices and IoT connections compared to 9 billion in 2017. Combining
higher bandwidth and low latency is a major challenge. It will indeed allow new use
cases such as vehicle-to-vehicle and telemedicine; we should keep in mind that it can
pose several security threats such as ransomware and botnet, among others. As the
5G network bandwidth and latency give rise to additional threat vectors within CSPs
and hackers are getting more sophisticated in their attacks, real-time threat detection
is vital. However, the current end-point security solutions that protect our devices such
as smartphones and laptops fall short when it comes to securing IoT devices such as
surveillance cameras and digital signatures.

IOT SECURITY GUIDE 2021 133


For such cases, we have to implement network-based security solutions.
Virtualized 5G networks offer a platform for a range of new services that can be
delivered through the network with no need for installation or upgrade from the
subscriber. A security solution that works at a network level can compromise IoT attacks
against malware and botnet attacks by performing behavioural analysis on the network
traffic to identify and block the infections. Network-based solutions also perform remote
remediation of suspect devices that block communications with bot command and
control servers and other malicious servers. These network-based services can be
provisioned and managed by the CSP to provide customers with an additional layer of
in-line security for their IoT devices. CSPs can also enable services through a self-care
portal through which communication behaviour analysis can be performed on a
comprehensive IoT device. This portal will also provide traffic intelligence and control.
The increasing availability of IoT widely increases the threat landscape, and 5G will only
further their security vulnerabilities as it powers new IoT devices. For that, the CSPs and
customers must work together to protect their network plane to defend existing and
new IoT connections from new and even more advanced attacks.

8.12 Ways customers can be prepared when prone to 5G


security issues:
1. Use devices that are compliant with industry requirements:
Select IoT devices with built-in security features that satisfy NIST requirements and
provide protection, detection, and mitigation.

2. Use a zero-trust policy:


Firewalls are no longer sufficient. Customers should adopt a zero-trust security
approach. Nothing should be taken for granted. Everything, especially gadgets, should
be double-checked.

3. Use virtualization to your advantage:


Customers can deploy security policies throughout their environment more rapidly with
virtualized security controls, and automated remediation can help reduce attacks.

4. Take the help of a managed security service provider:


There is rapid innovation, complexity and change in 5G which results in rapid change
and innovation in the security threats. Therefore, trust your Managed Security Service
Provider (MSSP) to come up with new solutions.

5. Always have a security first mentality:


Always be alerted and report to security officials if you feel that anything is wrong. The
objective is to manage the situation in such a way that harm is limited and recovery
time and expenses are minimized. Therefore, learning about incident-response can be
very helpful.

IOT SECURITY GUIDE 134


References
1. https://www.csoonline.com/article/3222095/ddos-explained-how-denial-of-
service-attacks-are-evolving.html

2. What is a DDoS Attack? 2019, [online] Available:

3. www.cloudflare.com/learning/ddos/what-is-a-ddos-attack

4. https://ieeexplore.ieee.org/document/9096818

5. K. Sonar and H. Upadhyay, "A survey: DDOS attack on Internet of Things",


International Journal of Engineering Research and Development, vol. 10, no. 11, pp.
58-63, 2014.

6. https://www.cloudflare.com/en-in/learning/ddos/glossary/mirai-botnet/

7. https://success.trendmicro.com/solution/1118928-new-rapidly-growing-iot-botnet-
reaper#collapseTwo

8. M. E. Ahmed and H. Kim, "DDoS attack mitigation in Internet of Things using


software defined networking", 2017 IEEE Third International Conference on Big
Data Computing Service and Applications (BigDataService), 2017.

9. https://www.researchgate.net/publication/335676455_IOT_Malware_An_Analysis
_of_IOT_Device_Hijacking

10. M.A. Crossman and H.Liu, ”Two-factor authentication through near field
communication,” in 2016 IEEE Symposium on Technologies for Homeland security,
HST 2016,2016.

11. https://affinity-it-security.com/what-is-weak-authentication/

12. https://www.researchgate.net/publication/329140617_An_Overview_of_Potential_
Authentication_Threats_and_Attacks_on_Internet_of_ThingsIoT_A_Focus_on_S
mart_Home_Applications

13. I. Andrea, C. Chrysostomou and G. Hadjichristofi, “Internet of Things: Security


vulnerabilities and challenges,” 2015 IEEE Symposium on Computers and
Communication (ISCC), pp.180-187, Larnaca, 2015.

14. K. Zeng, K. Govindan, and P. Mohapatra, “Non-cryptographic authentication and


identification in wireless networks [security and privacy in emerging wireless
networks],” IEEE Wireless Communications, vol. 17, no. 5, 2010.

15. https://www.logsign.com/blog/10-steps-to-prevent-man-in-the-middle-attacks/

16. https://www.kaspersky.com/resource-center/threats/ip-spoofing

17. https://www.acunetix.com/blog/articles/injection-attacks/

IOT SECURITY GUIDE 135


18. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and
countermeasures,” Ad hoc networks, vol. 1, no. 2, pp. 293–315, 2003.

19. W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, “A pairwise key
predistribution scheme for wireless sensor networks,” ACM Transactions on
Information and System Security (TISSEC), vol. 8, no. 2, pp. 228–258, 2005

20. K. Sharma and M. Ghose, “Wireless sensor networks: An overview on its security
threats,” IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs, pp. 42–45,
2010.

21. Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Location-based compromise-tolerant


security mechanisms for wireless sensor networks,” IEEE Journal on selected
areas in communications, vol. 24, no. 2, pp. 247–260, 2006

22. https://www.acunetix.com/blog/articles/injection-attacks/

23. https://platform.keesingtechnologies.com/malware-attacks/

24. N. Provos, M. A. Rajab, and P. Mavrommatis, “Cybercrime 2.0: When the Cloud
Turns Dark,” ACM Communications, Vol. 52, No. 4, pp. 42–47, 2009

25. Researchers Demo Cloud Security Issue With Amazon AWS Attack, October 2011.

26. https://www.esecurityplanet.com/threats/how-to-prevent-sql-injection-attacks/

27. https://portswigger.net/web-security/cross-site-scripting

28. CaoM,WangL,XuH,ChenD,LouC,ZhangN,ZhuY,QinZ. Sec-d2d: a secure and


lightweight d2d communication system with multiple sensors. IEEE Access.
2019;7:33759–70.
29. Hao P, Wang X, Shen W. A collaborative PHY-aided tech- nique for end-to-end
iot device authentication. IEEE Access. 2018;6:42279–93.

30. SN Computer Science (2020) 1:193 https://doi.org/10.1007/s42979-020-00201-3

31. Lin H, Bergmann N. Iot privacy and security challenges for smart home
environments. Information. 2016;7(3):44.

32. Fernandes E, Paupore J, Rahmati A, Simionato D, Conti M, Prakash A. Flowfence:


practical data protection for emerging IoT application frameworks. In: 25th
{USENIX} security symposium ({USENIX} Security 16); 2016. p. 531–48.

33. R. Mortier, J. Zhao, J. Crowcroft, L. Wang, Q. Li, H. Haddadi, Y. Amar, A. Crabtree, J.


Colley, T. Lodge, T. Brown, D. McAuley, and C. Greenhalgh, “Personal data
management with the databox: What’s inside the box?” in Proceedings of the
2016 ACM Workshop on Cloud- Assisted Networking. ACM, 2016, pp. 49–54.

IOT SECURITY GUIDE 136


34. Alcaide, E. Palomar, J. Montero-Castillo, A. Ribagorda, Anonymous
authentication for privacy-preserving iot target- driven applications, Comput.
Secur. 37 (2013) 111–123.

35. https://vimeo.com/530802011

36. https://www.samsung.com/in/support/tv-audio-video/what-is-voice-
recognition-feature-in-smart-tv/

37. https://ccm.net/faq/40606-samsung-smart-tv-how-to-enable-motion-control

38. https://mensgear.net/what-is-smart-tv-best-capabilities/

39. https://www.download.p4c.philips.com/files/5/55pfl8007k_12/55pfl8007k_12_dfu
_eng.pdf

40. https://help.fitbit.com/manuals/manual_sense_en_US.pdf

41. https://www.databreachtoday.com/fitbit-hack-what-are-lessons-a-8793

42. https://www.checkpoint.com/cyber-hub/cloud-security/what-is-a-virtual-
firewall/

43. https://securityledger.com/2020/11/security-holes-opened-back-door-to-tcl-
android-smart-tvs/
44. https://en.wikipedia.org/wiki/Smart_TV

45. https://www.welivesecurity.com/2018/10/01/protecting-your-smart-tv/

46. http://www.owlapps.net/owlapps_apps/articles?id=522938&lang=en

47. https://www.venafi.com/blog/traditional-cryptographic-attacks-what-history-
can-teach-us

48. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8027141

49. https://fardapaper.ir/mohavaha/uploads/2019/06/Fardapaper-Current-
research-on-Internet-of-Things-IoT-security-A-survey.pdf

50. https://vimeo.com/536329417

51. https://www.sailpoint.com/identity-library/7-best-practices-for-identity-access-
management/

52. https://searchsecurity.techtarget.com/definition/Advanced-Encryption-
Standard#:~:text=The%20Advanced%20Encryption%20Standard%20(AES,cybersecur
ity%20and%20electronic%20data%20protection.

53. 5G Security: Analysis of Threats and Solutions by Center for Industrial


Information Technology (CENIIT), Ijaz Ahmad∗, Tanesh Kumar † , Madhusanka
Liyanage‡ ,

IOT SECURITY GUIDE 137


54. 5G Security: Forward Thinking Huawei White Paper by Huawei Technologies

55. 5G Security and Privacy – A Research Roadmap by Elisa Bertino, Syed Rafiul
Hussain and Omar, National Science Foundation under Grant No. 1734706

56. Internet of things: Vision, applications and research challenges, Elsevier, Ad Hoc
Networks by Daniele Miorandi a, ⇑, Sabrina Sicari b, Francesco De Pellegrini a,
Imrich Chlamtac 2012

57. On Physical-Layer Identification of Wireless Devices, DOI by BORIS DANEV,


DAVIDE ZANETTI, and SRDJAN CAPKUN 2012

58. On the features and challenges of security and privacy in distributed internet of
things by Elsevier, Computer Networks, Rodrigo Roman a, ⇑, Jianying Zhou a,
Javier Lopez b 2013

59. Security for the Internet of Things: A Survey of Existing Protocols and Open
Research issues by IEEE Communications Surveys & Tutorials, Jorge Granjal,
Edmundo Monteiro and Jorge Sá Silva 2015

60. An Extensible and Effective Anonymous Batch Authentication Scheme for Smart
Vehicular Networks, UTC from IEEE Xplore by Jing Zhang, Hong Zhong, Jie Cui,
Yan Xu, and Lu Liu 2020

61. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the
Art and Future Challenges by IEEE Access, ANAM SAJID, HAIDER ABBAS, AND
KASHIF SALEEM 2016

62. Internet of Things: State-of-the-art, Challenges, Applications, and Open Issues,


International Journal of Intelligent Computing Research (IJICR) by Hany F.
Atlam, Robert J. Walters, Gary B. Wills

63. Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy
Risks by NIST, Katie Boeckl Michael Fagan William Fisher Naomi Lefkovitz
Katerina N. Megas Ellen Nadeau Danna Gabel O’Rourke Ben Piccarreta Karen
Scarfone 2019

64. Security, Privacy and Trust for Smart Mobile Internet of Things (M-IoT), IEEE
Access by VISHAL SHARMA, ILSUN YOU, KARL ANDERSSON, FRANCESCO PALMIERI,
MUBASHIR HUSAIN REHMANI, AND JAEDEOK LIM6 2020

65. Security Protocols for IoT by, Research Gate by J. Cynthia, H. Parveen Sultana, M.
N. Saroja and J. Senthil 2019

66. Internet of Things: State-of-the-art, Challenges, Applications, and Open Issues


by International Journal of Intelligent Computing Research (IJICR), Hany F.
Atlam, Robert J. Walters, Gary B. Wills

IOT SECURITY GUIDE 138


67. Security Protocols for IoT, Research Gate by J. Cynthia, H. Parveen Sultana, M. N.
Saroja and J. Senthil 2019

68. Internet of Things for Measuring Human Activities in Ambient Assisted Living
and e-Health by Research Gate, Amine Rghioui, Sandra Sendra, Jaime Lloret,
Abedlmajid Oumnad

69. On the features and challenges of security and privacy in distributed internet of
things, Elsevier, Computer Networks by Rodrigo Roman a, ⇑, Jianying Zhou a,
Javier Lopez b 2013

70. An Extensible and Effective Anonymous Batch Authentication Scheme for Smart
Vehicular Networks, UTC from IEEE Xplore by Jing Zhang, Hong Zhong, Jie Cui,
Yan Xu, and Lu Liu 2020

71. Security, Privacy and Trust for Smart Mobile Internet of Things (M-IoT), by IEEE
Access, VISHAL SHARMA, ILSUN YOU, KARL ANDERSSON, FRANCESCO PALMIERI,
MUBASHIR HUSAIN REHMANI, AND JAEDEOK LIM6 2020

72. https://platform.keesingtechnologies.com/malware-attacks/

73. N. Provos, M. A. Rajab, and P. Mavrommatis, “Cybercrime 2.0: When the Cloud
Turns Dark,” ACM Communications, Vol. 52, No. 4, pp. 42–47, 2009.

74. Researchers Demo Cloud Security Issue With Amazon AWS Attack, October 2011.

75. https://www.esecurityplanet.com/threats/how-to-prevent-sql-injection-attacks/

76. https://portswigger.net/web-security/cross-site-scripting

77. https://www.elastic.co/blog/ten-process-injection-techniques-technical-survey-
common-and-trending-process

78. https://searchsecurity.techtarget.com/definition/malware

79. https://www.thalesgroup.com/en/markets/digital-identity-and-
security/iot/inspired/smart-cities

80. https://www.businessinsider.com/iot-smart-city-
technology#:~:text=Smart%20cities%20use%20IoT%20devices,utilities%20and%20serv
ices%2C%20and%20more

81. https://www.smartgrid.gov/the_smart_grid/smart_grid.html

82. https://www.digiteum.com/iot-smart-grid-
technology/#:~:text=Smart%20grid%20IoT%20technology%20is,efficiency%20in%20th
e%20supply%20chain.&text=Adopt%20automated%20metering%20to%20monitor,ma
ximize%20the%20use%20of%20renewables.

IOT SECURITY GUIDE 139


83. https://www.digi.com/blog/post/what-is-industrial-iot-definition-use-cases

84. https://www.acko.com/car-guide/connected-cars-features-benefits/

85. https://www.einfochips.com/blog/faqs-on-automotive-iot/

86. https://www.netguru.com/blog/smart-retail-solutions-that-change

87. https://www.lntinfotech.com/digital-transformation/internet-of-things/smart-
supply-chain/

88. https://www.investopedia.com/terms/w/wearable-technology.asp

89. https://internetofthingsagenda.techtarget.com/definition/smart-farming

90. https://blogs.idc.com/2021/01/06/future-of-industry-ecosystems-shared-data-
and-insights/

IOT SECURITY GUIDE 140


Abbreviations
AC Access Control
AE Application Entity
AES Advanced Encryption Standard
AGA American Gas Association
AIoT Artificial Intelligence of Things
AP Access Point
API Application programming interface
APIs Application Programming Interfaces
APTs Advanced Persistent Threats
ARC Argonaut RISC Core
BAN Body Area Network
BGP Border Gateway Protocol
BLE Bluetooth Low Energy
CACC Context-Aware Congestion Control
CAD Computer-Aided Design
CAN Control Area Network
CASB Cloud Access Security Brokers
CDNs Content Delivery Networks
C-ITS Cooperative Intelligent Transport Systems
COAs Ciphertext Only Attacks
CPCD Co-Processor Communication Daemon
CPS Cyber-Physical Systems
CS Compressed Sensing
CSFs Common Service Layer Functions
CSMA/CD Collision Detection
CSP Communication Service Providers
CSSP Control Systems Security Program
CVSS Common Vulnerability Scoring System
D2D Device to Device
DCS Distributed Control Systems
DDoS Distributed-Denial-of-Service

IOT SECURITY GUIDE 141


DFD Data Flow Diagram
DICE Device Identifier Composition Engine
DLPs Data Leak Prevention
DMZ Demilitarized Zone
DNS Domain Name Service
DoS Denial-of-Service
DTLS Datagram Transport Layer Security
DVR Digital Video Recorders
E2E End-to-End
ECSO European Cyber Security Organization
EM Electromagnetic Compatibility
EmBB Enhanced Multiple Broadband
ENISA European Union Agency for Cybersecurity
ETSI European Telecommunications Standards Institute
FDE Full-Disk Encryption
FOTA Firmware Over-the-Air
FPGA Field Programmable Gate Arrays
FR Frequency range
GDPR General Data Protection Regulation
GSM Global System for Mobile
HG Home Gateway
HMI Human-Machine Interface
HMIS Homeless Management Information System
HSCD Hardware-Software Co-Design
HTML Hypertext Mark-up Language
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol Secure
IaaS Infrastructure as a Service
IAM Identity and access management
ICMP Internet Control Message Protocol
ICS Industrial Control System

IOT SECURITY GUIDE 142


ICT Information and Communications Technology
IDS Intrusion Detection System
IMSI International Mobile Security Identifier
IoT Internet of Things
IoTSF IoT Security Compliance Framework
IoXt Internet of Secure things
IP Internet Protocol
IRM Information Right Management/Digital Rights Management
IV Initialization Vector
KPAs Known Plaintext Attacks
L2CAP Logical Link Control and Adaptation Protocol
LAN Local Area Network
LINDDUN Likability, Identifiability, Nonrepudiation, Detectability,
Disclosure of Information, Unawareness, Noncompliance
LLC Logical Link Control
LMP Link Manager Protocol
LoRaWAN Long Range Wide Area Network
LPC Low Pin Count
LPWA Low Power Wide Area Network
LPWAN Low-Power Wireless Personal Area Networks
LTE Long term evolution
LTTS L&T Technology Services
M2M Machine-to-Machine
MAC Media Access Control
MTC Machine Type Communication
MC Mobile Computing
MDM Mobile Device Management
MFT Managed File Transfer
MITM Man-in-the-Middle
MMTC Massive Machine-Type Communications
MQTT Messaging Query Telemetry Transport

IOT SECURITY GUIDE 143


MSSP Managed Security Service Provider
NFMI Near Field Magnetic Induction
NIST National Institute of Standards and Technology
NR New Radio
NSE Network Services Entity
OFDM Orthogonal Frequency-Division Multiplexing
OSI Open Systems Interconnection
PaaS Platform as a Service
PAN Personal Area Network
PASTA Process for Attack Simulation and Threat Analysis
PC Pervasive Computing
PCB Printed Circuit Board
PII Personally Identifiable Information
PLC Programmable Logic Controller
PnG Persona non Grata
QR Quick Response
R&D Research & Development
RAM Random Access Memory
RAN Radio Access Network
RAT Radio Access technologies
RBAC Role-Based Access Control or Conditional Access
RED Radio Equipment Directive
RTUs Remote Terminal Units
RFID Radio Frequency Identification
ROM Read-Only Memory
RTOS Real-Time Operating System
SaaS Software as a Service
SCADA Supervisory Control and Data Acquisition
SCAP Security Context Automation Protocol
SDN Software-Defined Networking
SED Self-Encrypting Device
SoCs System on a Chip

IOT SECURITY GUIDE 144


SQUARE Security Quality Requirements Engineering Method
SDLC Software Development Life Cycle
SSDLC Secure Software Development Life Cycle
SSH Secure Shell
TLC Technology Life Cycle
TMSI Temporary Mobile Subscription Identity
TPM Trusted Platform Module
V2I Vehicle-to-Infrastructure
V2V Vehicle-to-Vehicle
VM Virtual Machine
VPN Virtual Private Network
WAN Wide Area Network
WEP Wired Equivalent Privacy
Wi-Fi Wireless Fidelity
WLAN Wireless Local Area Network
WPA Wi-Fi Protected Access
WSN Wireless Sensor Networks
ZT Zero Trust
ZTA Zero Trust Architecture

IOT SECURITY GUIDE 145

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy