IoT Security Guide
IoT Security Guide
GUIDE
AUGUST 2 0 2 2
Table of Contents
EXECUTIVE SUMMARY 05
Key Takeaways 06
With the advent of 5G technologies, IoT technologies are set to take a giant leap
forward. 5G can support a large number of static and mobile IoT devices, which have
unique bandwidth, speed, and quality of service requirements. With these capabilities,
we will see an explosion in IoT usage and innovation. In fact, as per an IDC report, IoT is
expected to consist of more than 55 billion connected devices generating 80
Zettabytes of data by 2025. However, in addition to new opportunities, the IoT era also
introduces new attack surfaces, which are already being exploited by cybercriminals.
While IoT promises to bring efficient business results across several industry verticals,
organisations just focusing on connectivity to win the digital transformation race and
putting security in the backseat would place the entire ecosystem at risk of fraud and
attack.
The purpose of the IoT Security Guidebook is to help the budding Internet of Things
industry develop a unified knowledge of security challenges. The IoT Security
Guidebook advocates for a methodology for designing secure IoT Services that
ensures security best practices are followed throughout the service's life cycle. The
documents offer recommendations on strategies to deal with common security threats
and flaws in IoT services. It is intended to give a set of design recommendations for
developing a secure product for IoT service providers. This document will operate as
an overarching model for evaluating which features of advanced technologies or
services are significant to the developer. Once these elements, or components, have
been identified, the developer can assess the risks associated with each one and
decide how to mitigate them.
The document also underlines the Security concerns of IoT, since almost all IoT devices
can threaten personal Confidentiality and public safety through cyberattacks. A few
standard problems while tackling the security concerns include limited device
resources, fragmentation of Standards and regulations, Security Integration and Data
Privacy. The broad range of security concerns needed in IoT to enable design security,
data protection, risk analysis and other concerns are outlined. The best practices to
tackle these are by establishing secure IoT lifecycle guidelines on software and
hardware development, Implementing role separation in Application Architecture and
Supporting the establishment of IoT security strategies and Regulations.
The document also highlights the solutions among different Industries such as Huawei’s
IoT solution security architecture (the 3T + 1M framework), LTTS IoT Security Framework
and Zero trust Architecture. The document presents the key components of LTTS IoT
Security Framework and oneM2M standards and the benefits of using oneM2M.
Hardware security issues arise when the vulnerabilities at different levels are not
patched due to the lack of robust security for software and system. The document
comprehensively outlines the Embedded system Hardware and Security, and the
properties of securing an embedded system. A very minor vulnerability is required to
create an exploit, to attack an embedded system. To achieve security, a list of
properties of highly secured embedded systems is specified in the document.
A few of the Attacks involving Privacy violation and Data leakage Attacks in each of the
layers is specified. Weak authentication Attacks, firmware Hijacking, Device scan
Attacks, MITM attacks, Identity spoofing attacks, Malware injection attacks, SQL injection
attacks, and Cross-site Scripting are just a few of the attacks associated with
embedded system security and appropriate measures to prevent the attacks are
presented.
The document exemplifies SCADA (Supervisory control and data acquisition) as they
are a set of computing devices both software and hardware that work together to
control a system. The main components of SCADA involve Supervisory computers,
Remote terminal units, PLCs and Human-machine interfaces (HMI). Since SCADA
networks are widely used in today’s businesses to monitor and study real-time data,
control industrial operations and connect with devices. As these systems are critical for
industrial organizations, the need for SCADA security is essential.
The threat model for IoT involves a Risk evaluation methodology which measures the
relative importance of risk and helps organizations work on it. There are several forms
of threat modelling and also how to carry out threat modelling by determining the trust
boundaries, who the stakeholders are, the vital assets that must be safeguarded,
attack surfaces, possible future risks and threats that have been detected are
subjected to a risk assessment. Data-centric Threat modelling explains the
combination of attack and protection side details for data of interest in a structured
model that aids in vulnerability analysis, decision making, and change management in
steps.
There is a lot of research and development ensuing in IoT Security in several areas. The
key areas, their importance, technologies and challenges are described in this
document. There are two different security standards covered in this document which
are IIoT and IoXT. IIoT is used in manufacturing, supply chain monitoring, and
management. IoXT has some rules and this document explains each of them in detail.
There are IoT security standard protocols each protocol covers a different area but
shares a common base of making IoT better on a daily basis. This document explains
the importance of these protocols and how they support organizations by explaining
their working models and functionalities.
The advent of 5G will connect all the citizens virtually through machines, objects, and
devices. This document explains different technologies used in 5G, deployment and
how they changed the phase of connectivity in IoT along with the security
recommendations for 5G which explains vulnerabilities and attacks that can cause
data thefts and also how can one avoid these by following different strategies, and
security solutions to make a better 5G environment.
The threats and risks related to the Internet of Things devices, systems and
services are manifold and evolve rapidly. With a great impact on citizens'
safety, security and privacy, the threat landscape concerning the Internet of
Things is extremely wide. Hence, it is important to understand what needs to
be secured and to develop specific security measures to protect the
Internet of Things from cyber threats. Involving billions of intelligent systems
and millions of applications, IoT will drive new consumer and business
behaviours, which will demand increasingly intelligent solutions.
As per Fortune Business Insights, the projected growth of the global IoT
market by 2028 is $1,854.76 billion creating several opportunities for vendors
and companies looking to capitalize on IoT.
Elements of IoT
The following points provide an overview of the different elements that shape IoT
ecosystems, namely the Things in the IoT, intelligent decision making, sensors and
actuators, communications, and embedded systems.
DEVICE MANAGEMENT
NON-VOLATILE
CONNECTIVITY
MEMORY
(WIRED/WIRELESS)
PROCESSING
UNIT
DATALINK Bluetooth / BLW, Wi-Fi, LoRaWAN, Neul, SigFox, Z-Wave, ZigBee, USB
Wearables
Wearable technology, sometimes referred to as "wearables," is a class of electronic
devices that may be worn as accessories, attached to clothes, implanted in one’s
body, or even tattooed on the skin. The gadgets are hands-free devices with practical
applications that are powered by microprocessors and can send and receive data via
the Internet.
Wearable technology is considered an important section of IoT. Wearable devices are
more prominent in the Healthcare sector. One example is the Fitbit. It helps us in
maintaining a healthy lifestyle. It is a tracking device that helps track your sleep cycle,
calories burned and tells us how much distance you travelled. Fitbit app also helps in
viewing your key metrics such as oxygen saturation, skin temperature variation, Heart
rate variability, resting heart rate, and breathing rate.
Smart Home
A smart home is a home with computer gadgets that allow for remote administration
of appliances and systems like heating and air conditioning.
Due to IoT Home automation, home security measures have also evolved. Consumers
may use their phones to watch CCTV security footage and operate their security
systems from everywhere on the planet.
Smart Cities
Smart cities use IoT devices such as connected sensors, meters, systems, etc. to
collect and analyze data. The cities then use this data to improve public utilities and
services, infrastructure, and more.
Smart Grid
A smart grid is an electrical platform that allows for a two-way flow of electricity and
data, as well as the ability to detect and respond to changes in usage and other
concerns, thanks to digital communications technology. Smart grids are self-healing
and allow power users to have an active role in the system.
IoT can be utilized in smart meters of the grids in order to measure various metrics like
power consumption, network interoperability, etc., and also can help manage energy
performance and power consumption.
Industrial
The usage of connected systems in industrial applications like automation, monitoring
systems, and maintenance departments is termed as the Industrial IoT.
Connected Car
A connected car is a car that has an internet connection(owned), typically through a
WLAN, which enables it to share the particular internet service and also the data
associated with it, with other devices not only within the car but also outside the car.
Connected cars are linked to the network for enabling bi-directional communication
among vehicles regulating the vehicle operations for enabling quick data transmission.
Smart Retail
Smart retail is a collection of smart technologies that are intended to provide
consumers with a better, faster, and safer shopping experience. This revolution in retail
has been facilitated by a society in which virtually everyone now carries a smart
device – i.e., the smartphone.
Nowadays, consumers shop on their mobile devices and prefer products and services
which offer discounts, faster delivery and a great shopping experience. Early
adaptation of smart technologies by retailers can help them provide a seamless
customer experience and ensure brand loyalty.
Smart Farming
Smart farming is a management concept that focuses on providing the foundation for
the agricultural business to employ modern technology – such as big data, Internet of
Things (IoT), etc. It is used to track, monitor, automate, and analyze activities. Smart
farming, often known as precision agriculture, is controlled by software and monitored
by sensors.
Smart farming is becoming more important as the world's population grows, as does
the need for greater agricultural yields, the need to conserve natural resources and the
growing need for climate-smart agriculture.
An example of a smart farming application includes temperature sensors which are
used to scan the soil and control water, light, and humidity.
Connected Health
Several communication protocols are used in IoT to provide service to the network
layer. The following are some of the prominent Standard IoT communication protocols.
The data link layer within 802.11 consists of two sublayers: Logical Link Control (LLC)
and Media Access Control (MAC). 802.11 uses the same 802.2 LLC and 48-bit
addressing as other 802 LANs, allowing for very simple bridging from wireless to IEEE
wired networks, but the MAC is unique to WLANs.
NETWORK
LLC Logical Link Control Sublayer
DATA LINK
Key 1 = h
Shared Key Authentication Request
Key 1 = h
Figure 4. Shared Key Authentication
Bluetooth
There are two main protocols in the link layer, namely, Link Manager Protocol (LMP)
and Logical Link Control and Adaptation Protocol (L2CAP).
Zigbee
Zigbee is similar to Bluetooth technology with a 2.4Ghz frequency. It is a low power
personal communication network. It is cheaper and is widely used for several
applications. It is used for specific commercial and industrial applications. Its range
varies from 10-100m. The link layer characteristics of Zigbee are summarized in Table
5. Mesh networking is one of the important advantages of Zigbee technology. Zigbee
supports star or mesh network topology.
HTTP RTP
Upper Layer Stack
IP
IEEE 802.15.4 MAC
Physical (L1)
Ethernet MAC
IEEE 802.15.4 IEEE 802.15.4
Ethernet PHY 868/915 MHz 2.4 GHz
(a) Link Layers and IP (b) Link Layer: IEEE 802.15.4 for wireless
LoRaWAN
LoRaWAN (Long Range Wide Area Network) is a wide area network protocol. It is a low
power consumption protocol that targets wide-area network (WAN) applications with
better security and mobility. It supports a large network with millions and millions of
low-power devices deployed on public networks. It is a Media Access Control (Data
Link or Network Access) protocol with some functions of the network layer also
implemented. It is developed by LoRa Alliance. In this protocol stack, multiple end
nodes (IoT devices) are connected to a gateway in Star Topology for M2M
communication.
The following standard problems have been recognized which impede the
aggregation of more reliable IoT ecosystems:
Security Integration
It is a very daunting task since the perspectives and expectations of those involved
can contradict one another. For instance, various IoT devices and systems can be built
on alternative authentication solutions, which must be integrated and interoperable.
LDAP
PEP Agent
Policy Admin Policy Engine IDP
Point
OPERATOR
REMOTE USERS
Operational
Resources
Device Edge
Device
IDoT, SFOTA, Analytics, Agent
CMD, Config, PWS
Passive Active
Figure 6. Source: "Industry 4.0: Transition to ZTA using LTTS IoT Security Framework,"
L&T Technology Services
oneM2M Standards
oneM2M is a global collaborative initiative driven by eight of the world's biggest ICT
standards management organizations. The organization’s mission is to develop a
global technological standard for standardization in the areas of security, architecture,
and API specifications for M2M and IoT applications dependent on specifications
presented by its representatives.
oneM2M project is intended to be a long-term IoT deployment solution. These unified
guidelines allow an Environment to enable a broad spectrum of applications and
products, namely smart grids, smart cities, connected vehicles, smart homes, and
healthcare. Perhaps one of oneM2M's priorities is to promote and start engaging
organizations from M2M-related market domains like automation, navigation systems,
healthcare, enterprise projects, home automation, and so on.
This is an open and accessible standard with transparent project development. At
oneM2M, you can find all the regulations, including the drafts. oneM2M reportedly has
over 200 partners involved.
oneM2M Overview
oneM2M Service Layer:
The oneM2M graded architecture describes an IoT Service Layer, which is a software
interface that sits between processing/communication hardware and IoT
applications and provides a valuable collection of features required by many IoT
systems. It facilitates safe end-to-end data/control transfer between IoT devices, as
well as authentication, authorization, and encryption.
Horizontal Architecture
The Service Layer of oneM2M is usually introduced as a software layer that sits
among IoT applications and services that allow data storage, processing, and
transport, usually on top of IP. Non-IP transports, on the other hand, are assisted by
interworking proxies. The oneM2M Service Layer delivers functionality that is usually
needed for IoT applications across various industrial sectors.
API
Data transmission requests from applications are
collected by the OS. The OS enhances and monitors
network use while still providing protection
Operating System
Functional Architecture
The oneM2M Layered Model is made up of three layers: the Application, the Common
Services, and the underlying Network Services
Application
AE AE AE
Layer
Reference Architectures
This section introduces three network topologies ("bounded," "boundaryless," and
"hybrid"), as well as an environment map and network architecture about each. The
following network topologies are briefly outlined in the subsequent lines.
A "bounded" network topology has a fixed boundary amongst network zones, which
can be deliberate or unintentional, like access points between protected networks or
even a bridge between connectivity. This architecture is especially applicable to fixed
IoT healthcare products and some portable device use cases.
A "boundaryless" network topology has no fixed operational internal network or security
safeguards. End-to-end security frameworks are thus needed. The use of the trust
boundary to ensure permitted access facilitates data security and credibility. This
topology is especially relevant to portable IoT healthcare systems and some individual
device use cases.
A "hybrid" network topology can involve a mix of network technologies and topologies,
such as bounded and boundaryless networks. This topology is especially pertinent to
portable and personal healthcare devices.
Radiology
Information
System
Image
Storage
sed
Patient ces
Records Pro ages
Im
e Healthcare
MRI Machine Usag
Operations
Scanner Management
Coolant
Levels
Coolant
Service
Provider
Machine
Status
Remote
Radiologist Service
Commands
Maintenance
Provider
Figure 9. Source: "IoT Security Reference Architecture For The Healthcare Industry,"
IoT Security Foundation (IoTSF), 2019
Figure 9 depicts multiple nested regions, with the radiology department's critical
systems residing in the innermost high integrity region. This is stored inside the
hospital's internal network and is part of a larger healthcare network. Data is also sent
to the public Internet for collaboration with external system maintenance and service
providers.
Boundaries enable strong network security services to be deployed at points of
interconnection. Boundaries often help to provide layered protection in an environment
with a wide range of devices with diverse capacities and criticalities. For instance, if a
section of a network is breached, a security gateway can fulfil the demand of critical
devices by protecting the high integrity zone and its devices with low or weak security
capacity from cyber risks.
Boundaryless Network
A Boundaryless Network illustrates the significance of services such as user
authentication and monitoring updates. This is being accompanied by an escalation in
the adoption of Web cloud infrastructure, which offers price and efficiency benefits
while optimizing IT services. Similar developments can be observed in the healthcare
industry, where there is a growing willingness to provide care to patients outside of a
conventional hospital or clinic setting by utilizing cloud computing.
Local Hospital
Network Observations
Sensors Health
Record
Blood Pressure, Information
Temperature, System
SpO 2 , Pulse Time
Time
Patient ID Vital Server
Barcode Signs
Scanner Monitor
Nurse
Mobile Devices
Configuration, Configuration
Firmware Update App
Laptop or
USB Stick
Local Wired
Connections
Figure 10 Source: "IoT Security Reference Architecture For The Healthcare Industry,"
IoT Security Foundation (IoTSF), 2019
Figure 10 depicts three separate networks – local wired or Wi-Fi, as well as public
Internet – that can link healthcare equipment such as a vital signs monitor or a nurse's
smartphone. In essence, this is a boundaryless network architecture in which
communication will occur end-to-end over the Internet while often switching between
networks. For example, the display is portable and can be connected to any
accessible Ethernet port or connected to public Wi-Fi. When "on-site," the nurse's
mobile device can be able to connect to public Wi-Fi or use a cellular link and
thereafter connect to the hospital network when operating locally.
It should be noted that not all IoT health information is transmitted over IP-based
networks. As a result, it is critical to understand how various network technologies can
interact in this environment. This topology is especially applicable to portable and
personal healthcare products with the following example architecture focusing on a
personal device use case (connected hearing aid).
Hospital
Hearing Smart Information
Hearing
Aid App Phone System
Aid
Audio
Playback
Audio
Audio
Streamer
Source Visitor
Information
Audio Playback System
Figure 11. Source: "IoT Security Reference Architecture For The Healthcare Industry,"
IoT Security Foundation (IoTSF), 2019
Figure 11 depicts a framework using three separate network technologies: IP over the
Internet, a Bluetooth Personal Area Network (PAN) with several profiles (excluding IP),
and a Body Area Network (BAN) with Near Field Magnetic Induction (NFMI). These are
depicted as three regions on the diagram. The regions in this example are used to
demonstrate the network technologies that the various appliances and services in this
hybrid network use to communicate with one another. Nevertheless, it is worth
remembering that neighbouring regions may not always have a definite boundary. The
hearing aid could be completely exposed to the PAN, and the hearing aid App may be
completely exposed to the Internet. Moreover, because there is no direct routing
between the BAN and the Internet, the hearing aid is not explicitly exposed to the
Internet, and hence this is not a truly boundaryless network architecture.
Hub Architecture
This hub reference architecture intends to deliver user-friendly centralized security
solutions for homes implementing IoT systems and technologies, particularly because
this usually involves devices from multiple manufacturers. Specifically, the design
prioritizes protection and offers a path forward with that in mind. This Hub Architecture,
in contrast to other IoT architectures, offers a more reliable and straightforward home
IoT ecosystem. By providing tools such as alarms and troubleshooting, the Hub
architecture allows home IoT administrators to easily monitor and control their IoT
environment.
It is also suggested that home IoT devices link to a dedicated IoT network rather than
the personal residence network system for added security. For example, a router can
easily and intelligently divide the home broadband into two networks: one for regular
internet usage by occupants and the other for IoT devices like LEDs and smart
assistants. The goal is to reduce the cyber threats to home IT and IoT networks by
securing home network events from IoT devices that could be used as an easy target.
Router
Wireless
AP
Firewall Hub
Figure 12. Source: "IoT Security Architecture and Policy for the Home -
a Hub Based Approach," IoT Security Foundation (IoTSF), 2018
Network Management
Lifecycle Management
Since the Hub is desired to be a vital component of the home's IoT security, it should
have robust security. This includes features like:
Potential to safely store confidential information such as roots of trust, safety
requirements for website & mobile user interfaces, along with network connections.
Auto-repair and troubleshooting abilities.
FAQ or "support" tools to assist users in the event of a breakdown or anomaly.
Strong physical characteristics to guard against adverse living conditions such as
temperature, humidity, etc.
While there are not many public resources on IoT security best practices for end-users,
some can help developers incorporate security best practices in designing IoT
technology. One such example is the IoT Security Foundation's "IoT Security
Compliance Framework". The segments of the compliance structure are related to the
Hub-based architecture below.
Firewalls
Firewalls are systems or structures that regulate the flow of traffic between networks
with varying levels of security. Firewalls will limit ICS inter-subnetwork interactions
between functional security subnetworks and applications even further. An
organization can prevent unauthorized access to the respective services and devices
within the more critical areas by using firewalls to monitor connections in these areas.
Firewalls demand regular monitoring, preservation, and recovery. Rulesets must be
checked to ensure that they are receiving proper defense in the face of constantly
evolving cyber threats. System features should be analyzed to ensure that the firewall
is collecting data and could be relied on in the event of a security breach. Real-time
management of firewalls is needed to identify and respond to cyber incidents as
quickly as possible.
Telephony
Firewall
Wireless Access Points Data
Controller/RTU/PC/ SED Acquisition
Server
Control System
Field Device
FIELD COMM BUS CONTROL SYSTEM LAN
Communications
Field Locations Interface External Business WWW
Communications Server DB /
Infrastructure Server Historian Security
Server
Authentication
Server
Dedicated
Backup Control Center
Comm Path
Business Comm. DMZ
CS
Firewall Web Server DMZ
DB DMZ
External
VPN Access
Security DMZ
Remote Business Peers
Telephony Authentication DMZ
Firewall
CS PBX
Business Web Applications FTP
Business eMail Wireless
Servers Servers Server
Workstations Server Access Points
CS MODEM DNS
POOL Server
Internet
Web
Server Authentication
CORPORATE LAN Server
FTP DMZ
Authentication DMZ
Wireless DMZ
This ICS architecture includes firewalls, the use of demilitarized zones, and intrusion
detection. The use of multiple demilitarized zones offers the potential to distinguish
features and access privileges and has proven to be very efficient in securing huge
architectures consisting of networks with varying operational mandates.
Introduction
It is a DoS (Denial of Device) attack that uses multiple computers or
machines to flood a targeted resource. It occurs when an attacker or
attackers attempt to make it hard or impossible for a service to
deliver by overloading it with requests to virtually anything: services,
devices, networks applications and even specific transactions within
the application. Since DDoS uses multiple systems, it will be hard to
track the source system that is causing the attack, overloading
volume is high, and due to the speed of this attack, it will be hard to
detect flooding before it is too late, and the outcome/damage is high
or sometimes even catastrophic. This attack can successfully affect
compromised devices and systems. Some of the examples of DDoS
attacks in IoT are Mirai –it is malware that infects smart devices that
run on ARC (Argonaut RISC Core) processors, turning them into a
network of remotely controlled bots or “zombies” This network of bots,
called a botnet, inflects Linux systems, Reaper – Unlike MIRAI, REAPER
majorly employs exploits that target disclosed vulnerabilities in IoT
devices. Currently, many popular router brands as well as IP cameras
and Network Attached Storage devices are affected.
Bot
Targeted
Victim
Bot
Bot
1. Device Level
Attacks like Jamming - It prevents other nodes from using the channel to
communicate by occupying the channel that they are communicating on. The military
uses jamming attacks as a tool to attack and disrupt terrorist's communications
because the open nature of wireless networks makes them vulnerable to various
attacks. This can occur when technique like RFID (radio-frequency identification) is
used to receive and send the data from IoT sensors without any human interference.
3. Application Level
Reprogramming attacks, Path-based DoS attacks are common in this layer. Mainly the
application layer, which contains basic user interfaces like smart cities, smart devices,
smart governments, etc.
1. Mitigating flooding
This defence is based on the technology of directing the harmful flood to an external
server through a mediator, with a fee-based agreement for the mediator to protect
IoT devices. This technique is used for attacks whose scale is very large.
2. Detecting intrusions
Network Traffic detection is considered one of the classical solutions to prevent DDoS
attacks in the IoT networks, which goes toward the system-level model. To prevent the
attack, it begins with capturing the attack, then defining the types of the hacker and
finally applying the defence operation that is, the sabotaged device that sends larger
than usually identified requests is disposed of, but we cannot prevent all the DDoS
attacks with this technique. The prohibition technique is considered a modern method
that works successfully for IoT devices. It has software whose mission is defencing
(SDN – Software-defined networking) its primary objective is to effectively detect and
mitigate the attack using software features, i.e., it monitors all the data transmission
received by IoT devices and sends an alter to mitigate the exploits when a suspicious
interaction is detected.
3. Blockchain defence
The blockchain mechanism is another modern defence method to protect IoT devices.
As organized records are kept in the blockchain, the IoT device is connected to servers
in a sequence. Launched applications for IoT devices are built into this blockchain, with
the status logged each time an interaction occurs between the server and IoT device.
When IoT devices are major buildings and cities, it would be better to monitor them
and protect them using blockchain.
Overview
The term hardware security refers to utilizing physical devices to protect our IoT
devices. Hardware-based security solutions boost the device’s performance and work
more efficiently. These solutions are operated on a chip, and they are enhanced well
to perform their tasks. They follow two procedures encryption and decryption, and it is
far more efficient than any other normal processor. Sensitive data such as keys and
random generators are encrypted into the hardware, which in turn will be difficult to
trace.
Implementing a hardware solution may be costly, and sometimes it requires a lot of
time and effort, but this can help to keep our sensitive data safe and assures that it
does not get leaked. Hardware security has been in more demand along with SoCs,
microprocessors, and microcontrollers. These devices can be used to check the flow of
the network traffic. Hardware security can be added as an extra layer to secure the
systems. It is very important to access and pay attention to the vulnerabilities which
are present while manufacturing as well as to the potential codes and the data on the
network.
Side-Channel Attack
It is a kind of attack in which a secure system is attacked using an insecure system, i.e.,
the system that is not secured. For example, the attackers can easily access the file if
they remove the hard drive and connect it to another pc. This is used to check
parametric behaviours, i.e., Power, Timing, and EM, to pull out the hidden data. There
are some other examples and these attacks in which we can get the data that resides
in the chip by managing and analyzing the channels, i.e., physical signals.
The information embedded in the side-channel parameters will depend on the
computation of the intermediate values while executing the crypto-algorithm and
comparing it with the inputs and secret key of the cypher. An adversary can efficiently
extract this key by observation, and he or she can achieve it with the help of a low-
cost tool in a minimal amount of time, ranging from few minutes to few hours.
Rowhammer Attack
In this attack, the values which are in the row of a memory cell are modified and thus
result in alteration of the neighbour rows. They can insert malicious codes that may
consist of kernel-level privileges. It represents a bit flip in the DRAM memory that can
result in privilege escalation or other malicious things. These types of errors can occur
in the memory because of the background radiations and neutrons.
Physical Attack
Modern PCBs typically integrate with ICs with high pin complexity and a huge number
of components with a miniature layout. Current PCBs operate at 1-10 GHz to support
high-speed data communication. Since they are more complex and have so many
layers in them, System Integrators rely on third-party designers. Counterfeiting has
become a major issue in the PCB industry. Its features can help in making
countermeasures, i.e., the JTAG infrastructure can be used for trust validation.
Research on PCB products shows that PCBs are designed in various countries. If we
rely on a third party, the PCB can be untrustworthy and have a greater degree of
vulnerability. Today’s PCB designs consist of 20 to 30 layers and embedded passive
components to minimize the form factor. This will allow an attacker to tamper with the
internal layers to modify the design or change the components.
Reverse Engineering
This is also known as backward engineering, and it is the process in which one tries
with very little insight to know how a device, process, system, or piece of software
manages to finish a task. This technique does not only deal with just making a
duplicate or modifying an artefact. It is just an analysis to reduce design features with
some amount or not much knowledge about the steps to build the system all the way
to the actual production.
The main aim is the redocumentation of legacy systems. If a competitor uses a
reverse-engineering method, the goal is not to copy it in toto. It is to perform a
competitive analysis. It is used to interface one system with another system. Knowing
about the enemy’s research by taking their data and dismantling it could yield insights
to produce the same product or result in a good countermeasure.
Mod-chip Attack
This type of attack is generally carried out by connecting wires to particular points on
a system circuit board. These Mod-chips alter the system h/w and s/w protection.
These chips consist of one or more integrated circuits joined with distinct points on
small PCBs. These are known as drive chips that affect the running of the system by
overriding security. These chips consist of a microcontroller, FPGA, or CPCD to attack
the system.
This could be prevented by removing attack points that are used by the mod-chip by
doing modifications to the PCB arrangement. LPC bus is used at the time of testing the
system. Keeping it secure by additional tamper detection and protective circuit on a
PCB.
Security Architecture Attacks
Simple mistakes in IC design can expose the IC to a lot of attacks. Vulnerabilities will
be introduced in ICs in the form of some changes such as Hardware Trojans,
backdoors, etc. Even now, many tools are not fortified with security measures. Due to
the increase in manufacturing ICs, the design houses depend on third parties with no
proper verification.
It is crucial to find weaknesses during hardware design and validation. It is nearly
impossible to fix design and architecture problems past this phase. Detecting and
fixing it at a later stage is extremely difficult and involves a much higher cost.
Crypto Acceleration
This is one of the primary forms of hardware security and secondary to hardware
defence. It is a technique that uses cryptographic functions that not only speed up the
applications but also provide hardware with systems that cannot be exploited in
software. For example, a software-based AES may cause a code injection attack, but it
is difficult to attack hardware-based AES.
Memory Encryption
Earlier, memory-related processes directly moved the data which was stored in
memory (RAM and ROM). This had the vulnerability that the unencrypted data could
be stolen. But now, there are encryption options, which ensure that even if the attacker
reads the contents of RAM or ROM, without the exact hardware, he or she cannot use
the data.
Secure Boot
Designers have introduced a method called secure boot in the processor where it
begins by running the boot code, which cannot be modified and is thus immune to
code injection attacks. After this, it checks the application which is about to be loaded
as well as the code integrity. In case the code is injected, the system will run only up to
some stage, or it will show the warning that the code injection has been found in the
system.
Trust Zone
Trust zones can help to deal with the situation if the user is not aware of whether the
code that he or she runs is malicious. There may be some CPU instructions that can be
dangerous, and they can access hardware, pointers, and critical systems. Therefore,
modern processors have certain advantages in which the OS operates on the highest
privilege and can access all the instructions, whereas, the processes that the OS
executes are put on the lower privilege. These processes cannot use sensitive data,
and hence they are less prone to attack a critical system or a processor.
Tamper Pins
Tamper pins are one of the most useful hardware features because they are difficult
to detect and prevent. Sometimes attackers have to physically remove the parts to
use the I/O, such as debugging the ports and memory. These pins can trace out the
mechanical event that has occurred, such as the opening of an enclosure. Once it is
found out, it can instruct the processors to do a specific task which consists of a
simple reboot to protect sensitive data being read. It is also used to obscure the pins
which are not visible to the attackers.
Hardware
Some well-known IP piracy
obfuscation can
threats such as reverse
help to prevent
SoC Design engineering and malicious
piracy as well as
House circuit modifications are a major
Hardware Trojan
concern.
attacks.
Side-Channel
Side-Channel Attacks resistant design
Hardware
Deployment Reverse Engineering
IP Counterfeiting obfuscation
Hardware
Authentication
Process Address
Software Software should be well- Spaces/Virtual Memory
Containerization defined, self-contained, Dockers/Containers
and Isolation and isolated. Virtualization/Hypervisor
Minimize
Code removal
Dependencies/Trusted
Network and Application
Attack Surface Computing Base
Firewalls
Reduction Minimize Codebase
Software Guard
Limited and well-defined
Extensions (SGE)
interfaces
Communication with
Implicit Distrust SSL/TLS
external sources is only
and Secure Identity and certificate
allowed after
Communication management
authentication.
Software applications
Secure Software Type and memory-safe
and OS Kernel shall be
Development, Build languages
compiled and configured
options and OS Build Parameters
with the available
configurations Kernel Configuration
security options enabled.
Hardware Layer
The whole medium used for storage is encrypted by using FDE (Full-Disk Encryption). It
encrypts all the information, including hidden files such as OS temporary files and
swap space. The benefit is that the file cannot leak. But if the drive is unencrypted, it
can expose the boot records.
We manage our FDEs within the medium peripheral called SED (Self-Encrypting
Device). Nowadays, these devices are common in every laptop shop. The advantage
is that no new or minimal software is written to make use of the data-protection
facilities. If self-encrypting storage media is possible, it is the best alternative because
of its easy use and excellent performance, and it can hide the storage encryption key
from the main application and memory.
Application Layer
After doing all the above steps, at last, applications can add their data protection by
using underlying file-system encryption features or a custom implementation. E.g., an
audit logging device can encrypt its audit records before calling the standard file
system output functions. For volume, file, or application-level data protection,
developers can make separate keys for these groups of data instead of a single key
for the entire system.
Secure Process
If we want to go down the route of Secure Boot, the surrounding processes should
be well prepared and secure. Keys leaking out of the production environment can
result in exfiltration.
Strong Encryption
The encryption should be very strong. It is very easy to generate weak keys and is a
common problem. The algorithms should be up to date.
Code Checking
The remaining code in the bootloader, OS, and other software should be well written
for Secure Boot, and make sure it lacks security holes to make Secure Boot
meaningful.
Authenticate Anywhere
For proper security, we have to authenticate the code as much as we can and
make sure that it follows the practices made for the libraries. Securing the process
depends on how the keys are generated and stored.
Proper Authentication
It is very important to ensure that the code is genuinely performing the secure Boot.
We can even move from a secure piece of code to an arbitrary location in memory
to continue with the execution. It is essential to ensure that the code authenticates
the next step of the code to maintain its security.
1. Malware 1. MITM
2. Brute-forcing 2. DNS poisoning 1. Power Analysis
access 3. DDoS 2. Timing Attacks
3. Memory-buffer 4. Session 3. Electro-
overflow hijacking magnetic
4. Web-server 5. Signal analysis
exploits jamming
Best practices are defined to reduce these attacks. Developers need to be thorough
with the industry standards for embedded software development and learn effective
measures and practices before coding. The below figure defines 11 best practices, and
each is divided into subparts that can make our protection even more reliable at all
development stages, from design to support.
Design and software
configuration
4. Restrict memory
Release and support allocation
5. Create partitions
6. Implement access
control
7. Secure communication
channels
If we are able to specify our programming language, we can remove all classes of
software vulnerability in the code. Properly following the code practices, secure build
options, and modifying the end system to maximize the security, there is less chance
for the possible attacks to compromise most parts of the system.
Mishandling a user’s password, social security numbers, and other private information
can compromise user privacy and is often illegal. Privacy violations occur when private
user information enters the application, and the data is written to an external location
such as the console, file system, or network. Physical or electronic data leakage is the
unauthorized transmission of data within an organization to an external recipient.
Examples of such attacks are Cross-Site Scripting (XSS, refer to the subsection on
page 58), Eavesdropping, Phishing attacks, Node capture (tampering), Wormhole
attack, Backdoors, and exploits. The following table will describe the attacks in each of
the three layers in an IoT device with its countermeasures.
Link-layer encryption,
Physical Layer Eavesdropping
key-pre-distribution
Tamper resistance
Node capture hardware, disabling JTAG
and/or protecting bootstrap
loader, camouflaging
Location-based keys,
Network Layer Wormhole
centralized computing
Interactions; Impersonation;
Application Level Constraints; Malware;
Environment; Insider.
Human.
Firmware Hijacking
If firmware updates downloaded by an IoT device are not checked to make sure they
originate from a legitimate source, an attacker can hijack the device and download
malicious software.
Man-in-the-middle Attack
The attacker over the internet intercepts the communication between the two nodes.
They obtain sensitive information by eavesdropping.
Measures
The first step in preventing a SQL injection attack is by knowing the vulnerable
applications by either self-imposing the attacks or by using penetration tools
available online, which help the user to identify the vulnerabilities present in an
application.
5. PLCs may connect directly to SCADA over a wireless link in remote applications, such
as a major water treatment facility, or they may use an RTU for communications
management. Instead of using an RTU alone, PLCs are frequently utilized for remote
sites with a significant I/O count for cost considerations.
7. The failure of the communications network does not automatically shut down the
plant's process controls, and if connections are restored, the operator can resume
monitoring and control. Certain essential systems will be equipped with dual
redundant data highways, which will be connected via multiple paths.
9. The HMI is connected to the SCADA supervisory computer, which feeds live data into
the replica of diagrams, warning alerts, and tracking graphs. In many setups, the HMI
serves as the operator's graphical user interface, collecting data from external devices,
creating reports, performing alarming, and sending notifications, among other things.
10. A graphical plan is usually included in the HMI package for a SCADA system, which
the operators or system maintenance people use to change the way these points are
represented in the interface.
SCADA systems that are networked are also referred to as third-generation systems.
The WAN system, which uses data lines or phones, can be used to network, and
communicate current SCADA systems.
Ethernet or fiber-optic connections can be used for data reception and transmission
nodes. This type of SCADA system employs a PLC to change and monitor the flagging
activities only when they are required.
SCADA networks are widely used in today's businesses to monitor and study real-time
data, control industrial operations, and connect with devices. Because SCADA systems
comprise both hardware and software, they are critical for industrial enterprises. As a
result, SCADA security is critical in industries.
SCADA Security:
SCADA security refers to the protection of SCADA networks that are built with computer
hardware. Power, oil and gas, and other SCADA networks are used by some of the
systems. Because of the importance of these networks in ensuring the security of SCADA
systems, corporate and government companies have adopted efforts to protect them.
Because skilled hacker groups are likely to target SCADA and IIoT (Industrial Internet of
Things) technologies and their overall system architecture, they confront cybersecurity
issues. Control systems for industrial applications are also a popular target for
government-sponsored hackers, posing serious security concerns for SCADA and IoT
industrial control systems.
These are typically vital industries that run complicated industrial equipment networks
that span continents. If your company uses a SCADA or IoT control system, you should
be aware that cyber-attacks can come from three different directions:
Other attack tactics include internet approaches and spear-phishing techniques, as well
as Trojan virus spreading via portable devices like infected USB sticks.
5. Antivirus and firewalls should be enabled at all places where IoT networks connect to
public networks like the Internet.
6. To verify that the system files are not manipulated by an attacker, use integrity of data
checking software.
7. Implement redundant networking solutions for both hardware and software to ensure
redundancy for important components.
1. Device inputs and data can be tampered with, detected, misplaced, or disguised
during communication since SCADA systems rely on cloud communication.
2. Network links between SCADA systems and the cloud could open backdoors into the
ICS, which attackers could subsequently exploit.
3. Cloud-based SCADA systems have the same hazards as traditional SCADA systems.
4. Because the same cloud can be accessed by multiple clients, data on the cloud is
only isolated internally.
5. Attackers can simply search and abuse SCADA systems apps that are hosted in the
cloud.
6. SCADA systems use Modbus/TCP, IEC 40, and DNP3 for control and automation, but
some of these protocols lack security.
9. In IoT device operating systems, unnecessary services and default factory settings
cause setup issues.
10. Software problems in IoT device operating systems are caused by memory
corruption and weaknesses in evaluating input data.
11. Configuration issues such as parameter manipulation and lack of encryption can
occur when third-party software is utilized for IoT devices.
12. Individual cloud and external service providers have their own security flaws.
2. Data Integrity:
When the original data is destroyed, data integrity is lost. This can occur through a
variety of methods, including reduced computational methods or surveillance.
4. Replay Attacks:
A replay attack is a network assault in which a valid message containing some valid
data is repeated; in some situations, the message may repeat itself. When a replay
attack delays messages sent to physical devices, it affects the performance of SCADA
systems and can be a major hazard.
1. Network Segregation:
This technique introduces security tools that surround each network, effectively
segregating and monitoring network activity and preventing policy breaches.
There are several forms of threat modelling, and three factors can
differentiate them:
1. The logical object under consideration.
2. The stage of the device life cycle (for example, modelling protection
for software during its initial design versus modelling security for off-
the-shelf software that has already been implemented).
3. The threat modelling's target:
Software threat modelling, which is threat modelling conducted during
software design to minimize software vulnerabilities, is a common type of
threat modelling. For performing software threat modelling, there are
numerous proven methodologies. Another type of threat modelling is device
threat modelling, which is threat modelling conducted for operating systems
to enhance their overall protection. In comparison to software threat
modelling, device threat modelling is more informal and ad hoc.
Data-driven framework threat modelling is a subset of threat modelling
that focuses on protecting specific data types within systems.
1. Definition of the system: This provides a description of the method and how it
accomplishes its goal and fulfils its use cases. Any industry-specific security criteria
and any limitations or assumptions about the system in the target market must be
taken into account.
Describe the system's lifecycle: This is a black box overview covering aspects such
as how the system is produced, designed, deployed, and how it approaches to
stop, and the various entities involved in each level.
Describe the system's fundamental operations, usually in pictorial blocks, and show
how knowledge flows from one block to another.
2. Determine the trust boundaries: Identify the security or trust limits beyond which
security within an object of study can be evaluated and define the trust relationships
between the objects. Determine the flow of knowledge through the trust boundaries.
The research must consider the method applied in its larger sense, even though it is a
black box.
5. Determine attack surfaces: An attack surface is the number of the various points
(the "attack vectors") from which an unauthorized user can communicate with the
device. Input and output ports, APIs, and computing side effects such as timing, and
power consumption, are examples of attack surfaces. As a result, the attack surface is
inextricably linked to the defense boundary. The attack surface is determined by the
threats and adversarial tools under consideration in the study.
6. Make a model of your opponent (threat actor): The adversarial model reflects the
levels of expertise, skills, and resources that an attacker might use to damage the
system's properties. These are extracted from use cases, business protection
specifications, attack surfaces, and adversaries to manipulate the device.
7. Determine possible future risks: Examine the attack surfaces, and the information
flows across the confidence boundaries defined in the device definition. For example,
the Microsoft STRIDE model can be extended to attack surfaces and the use of attack
vectors as a means of compromising an asset. In this research, knowledge of
adversarial models is important.
8. Threats that have been detected are subjected to a risk assessment: The threat's
probability must be calculated. The effect of each hazard on the system and
organization must then be calculated. These two factors are added together to
determine the overall risk of the attack.
Mitigation actions: Determine what should be done with each hazard based on the
danger. For example, it may be appropriate to reduce the threat to an acceptable
level, admit that it is not a danger, remove the feature that causes the threat, or
pass the threat to a more suitable group.
Contingency planning: Countermeasures are typically captured at two levels:
security objectives, high-level descriptive goals for mitigating threats, and
mitigations, low-level descriptive goals for mitigating threats. Security Functional
Requirements are low-level prescriptive features or design strategies that must be
introduced to achieve the mitigation specified in the security objectives.
There may be residual risks, and it may be appropriate to repeat the steps.
Step-1
The first step is to classify and define the relevant system and data. The framework
and data should be strictly specified, of a specific logical collection of data on a
specific host or small group of closely related hosts and devices. If the system and
data have been identified, they must be characterized, which means comprehending
the system's operation and useful to the degree required for the organization's data-
centric system threat modelling approach. At an absolute minimum, characterization
should include the following:
The system's approved data storage locations included but not limited to:
Storage, available inside the device boundaries where data is static.
Transmission refers to all methods by which data can be transferred across
networks between system components and across system boundaries.
An execution environment in which the data is stored in a local memory during
runtime while a virtual CPU processes data.
Input like data entered using a keyboard or touchpad.
Output like data displayed on a laptop or voice confirmation.
There must be a fundamental understanding of how data moves inside the system
between approved locations. For example, a file can be generated in memory and
only written to storage when the user instructs the device. Depending on the system's
sophistication, achieving this can call for an understanding of the system's roles and
processes, users and implementation scenarios, workflows, trust expectations, and
other system-related people, systems, and technology.
Among the security objectives, certain goals are more relevant than others in many
ways. Alternatively, organizations may focus on a single target with a specific threat
model.
The people and processes who are authorized to access the data in a way that could
affect the security objectives. For example, if an enterprise has chosen anonymity as
its sole goal for a specific threat model, the approved persons and processes should
include all customers, managers, programmers, providers, and so on that are
permitted to read the data.
Step-3
The third step of the approach is defining and recording security management
changes that will help minimize the risk associated with the attack vector that is fairly
realistic to implement with each attack vector chosen in Step 2. It is important to note
that it is not mandatory to list any single applicable control, such as maintaining a
compliance program and rules, since these controls may still affect the whole
enterprise and are not usually tailored to account for a specific attack vector. Next,
approximate how effectively each chosen security control change will solve the
manipulation of each relevant attack vector.
This may be as straightforward as assigning a minimal, medium, or high level of
efficacy or as nuanced as calculating the proportion of attacks against the attack
vector that this mitigation will prevent. Whatever strategy is used, it must be consistent
through mitigations and attack vectors. Estimating the negative consequences of each
security control change is the inverse of estimating the effectiveness. Cost and
decreases in functionality, usability, and efficiency may be factors to consider. These
can be especially difficult to predict for potential mitigations reliably, so it might be
best to create very preliminary calculations using a basic low/medium/high style
scale exclusive to the organization.
Step-4
The methodology's final step is to review all the characteristics reported in the
preceding stages, which collectively form the hazard model, to aid in assessing the
efficacy and efficiency of each protection management option against the chosen
attack vectors. To assume that control should be used because it reduces risk is much
too straightforward. Security controls, in addition to the financial costs of procurement,
execution, and management/maintenance, may have a detrimental effect on
reliability, efficiency, and efficiency, among other factors. Any evaluation of security
measures should take into account all important related variables. The most difficult
aspect of hazard model research is deciding how to take all these features into
account at the same time. A specific attribute, such as annual management, can be
easily compared across attack vectors and mitigations. However, comparing the entire
set of characteristics for one attack vector to the entire set of characteristics for
another attack vector is extremely difficult.
Action Spoofing
Device Hijack
Denial of Service
Faking the Data Source
Insecure Wi-Fi Channel
Manipulating Writable Configuration Files
Targeted Malware
Wi-Fi Jamming
Threat Modelling
Features
Methods
PASTA Model
The Process for Attack Simulation and Threat Analysis (PASTA) is a risk-centric threat-
modelling framework that contains seven stages, which are as follows:
Define objectives
Define technical scope
Application decomposition
Threat analysis
Vulnerability and weakness analysis
Attack modelling
Risk and impact analysis
LINDDUN Model
A LINDDUN (Linkability, Identifiability, Nonrepudiation, Detectability, Disclosure of
Information, Unawareness, Noncompliance) model focuses on privacy issues that can
be used to secure data.
1. 2. 3. 4. 5. 6.
Map privacy
Recognize Threat Obtain Choose the
Define threats to
the Threat should be prevention appropriate
DFD elements
scenarios prioritised techniques PETS
in DFD
CVSS Model
The Common Vulnerability Scoring System (CVSS) captures the principal
characteristics and produces a numerical severity score. The CVSS provides users with
a common and standardized scoring system within different cyber and cyber-physical
platforms. The CVSS Model consists of three metrics, namely, Basic, Temporal, and
Environmental.
Temporal Environmental
Base Metric Group
Group Metric Group
OCTAVE Model
The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
approach is a risk-based operational cybersecurity analysis and preparation method.
The OCTAVE Model is divided into three phases:
1. Create hazard profiles based on assets.
2. Determine the instability of the networks.
3. Create a defense agenda and action plans.
OCTAVE is primarily concerned with evaluating operational threats and does not
consider technical risks. Its three key components are organizational risk, security
policies, and technology.
Individuals who use or promote the use of these instruments are referred to as
stakeholders. They will also use this system to determine the security risks associated
with using some of the systems depicted in the model.
Medical practitioners may also use the framework to learn about technologies that
have been recommended for their patients' use. Researchers may also test the device
based on the kind of study they are doing.
All system information, such as device risks and ratings, will be calculated and stored
in a database. The developer will be the professional in charge of managing the
infrastructure by doing routine system changes such as installing new equipment and
risks and recalculating risk ratings.
Identifying Threats
A vulnerability is a potential risk that exploits a system's or device's vulnerabilities in
order to gain unauthorized access or inflict damage to the system or device. Threats
can occur as a result of the actions of legitimate users of the computer or system who
have permitted access to the system, as well as unlawful or unauthorized users of the
system or device. We will use the STRIDE model, which categorizes risks into six
categories: spoofing, tampering, repudiation, information leakage, denial of service,
and privilege elevation.
Spoofing
Email spoofing is used as a trick to share sensitive information or steal users'
credentials. Often, spoofed emails are submitted by changing the sender's name or
email address. In addition, the content of the message is often structured in such a
manner that it seems legitimate to the receiver. Countermeasures may include:
Good authentication: A strong password policy or multi-factor authentication
methods may be used to authenticate the user to the device.
Encryption: All passwords must be secured, and it must be guaranteed that no
credentials are sent over the wire in cleartext.
Tampering
An attacker tampers with data in transit or at rest. Countermeasures include:
Strong authorization: Appropriate access management systems, such as role-
based access control, must be deployed with the least privileges and division of
duties rules in place. Users must be assigned permission with the bare minimum of
rights.
Data hashing and signing: In order to ensure the validity of the data, all sensitive
data must be hashed and authenticated.
Secure communication links: The communication links between device
components must be protected by protocols that maintain message integrity and
privacy.
Information Disclosure
Raw evidence or medical documents are being leaked. Countermeasures include:
Strong authorization: Make certain that an effective access management system is
in place and that only approved users have access to data.
Encryption: Ensure that all confidential data is encrypted (while in storage or in
transit) and that only approved users have access to it.
Safe communication links: Make certain that all communication links are protected
by protocols that ensure message security.
Denial of Service
An attacker is jamming the hospital environment. Countermeasures include:
Mitigating this type of protection risk is difficult since remedies are heavily
dependent on a variety of variables.
Elevation of Privilege
Attackers obtain access to authentication networks by masquerading as trustworthy
individuals. Countermeasures include:
A proper authorising process is needed.
The principle of least privilege requires that all permitted users have the bare
minimum of privileges and access.
Threats are rated using scales representing high, medium, and low. A danger ranked
as high poses a significant risk to the system or the device software programme and
must be addressed as soon as possible by introducing suitable countermeasures. A
medium-risk threat must also be tackled, but not as urgently as a high-risk threat. A
danger classified low may go unaddressed because it does not necessitate the same
level of urgency as the other two threat levels. We may use the DREAD model for
scoring.
Following the rating of the risks, a risk score is determined using the formula
Risk Score = (Damage + Reproducibility + Exploitability + Affected users +
Discoverability)/5.
The following table, for example, indicates including the Smart Meter instance as a
complex mechanism with three data stores and the related data flows. As a result, the
smart home pattern instance's instantiated feature "Energy Meter" is described in the
Data Flow Diagram as a dynamic mechanism called Energy Meter. The data stores
Energy Meter Keystore, Energy Meter Application Data, and Energy Meter Measurement
Data. The second move is to consider elements inside the smart home essential from
a security standpoint but cannot be aggressively modified because third parties
supply them. They are represented as foreign bodies within the smart house.
All elements introduced in this stage must be segregated from those added in Step 1
using privilege boundaries. The explanation for this is that there are many players in
the smart house. We examine the smart home's key elements typically supplied by a
single party and associated subcontractors, such as energy providers and meter point
operators. The level of confidence for parts that cannot be actively handled is
separate from items that communicate within the smart home but are supplied by
external, diverse parties. For example, the Smart TV, a component of the smart house,
communicates with other components but is not included in the definition because an
external vendor supplies it. As a result, it is added as a distinct external body
distinguished by a privilege boundary.
The third move is to include the grid components, which are not part of the smart
home but are also essential for stability.
The items within the smart home supplied by third parties, on the other hand, are
shown as external actors and will remain so in the study. All of these elements will be
replaced by their instantiations at a later stage. The fourth step is to apply the smart
grid pattern instance's grid element connections to the DFD and the grid elements that
are not part of the smart house. Essentially, each grid element connection part of the
scope is associated with at least one data flow. A grid element connection is included
in the scope if at least one connected grid element is included. If it is unidirectional, it
is mapped to a single data flow. Otherwise, it is associated with two data flows.
Home energy
management
system
Home Smart
Gateway Appliances
Smart
meter
Figure 19. Data Flow Diagram (DFD) for Smart Home Devices
Network attackers are adversaries that have active access to a target network and
can successfully eavesdrop and manipulate its communications. They have minimal
computing power, time, and financial resources. They may be either registered users
or external adversaries. It is assumed that they cannot break any cryptographic
challenges, nor are they able to penetrate physical locks nor break software security
measures.
Software attackers, on the other hand, are able to analyze, reverse engineer and
compromise software systems. They are not capable of interfering in network traffic,
nor are they able to penetrate physical security. They have limited computational
capabilities, time as well as financial resources and can be both an authorized
member of the system or an external adversary. To achieve alternative entry points,
we apply high-level logic to each dynamic process to determine if the above intruder
types will enter this specific process or not. If we cannot rule out the risk of an attacker
gaining access to the mechanism in question, it's classified as a general entry point.
Further, for each step that has been assigned as a general entry point, we optimize the
entry point & decide whether one of the possible attackers has the ability to
manipulate each data flow from or to this process. If at least one attacker has access
to the data flow in question, we mark it as an entry point. An attacker can choose
individual entry points based on the properties he wishes to compromise.
Vulnerabilities and potential risks can be extracted from the elicitation of properties
and entry points. This is accomplished in the next step by mapping entry points to
properties and categorizing them using the STRIDE categorization. STRIDE refers to the
following actions taken by an attacker: Spoofing is the act of tampering with data or
code. Repudiation refers to the reasonable denial of having taken action, information
Security The Home Gateway and the link are secure and
assumptions trustworthy.
6.2 Confidentiality
1. At Rest: If the data is at rest, then it means that it is located in media like files/flash
drives/hard disks etc. and it(data) is not accessed.
2. In Transit: If the data is in transit, it means that it is moving from one location to
another. It can take place through many means like messaging/emails etc.
3. In Use: When the data is accessed by a user, then, we can say that the data is in
use.
1. Full disk encryption: With this, the user has an advantage, the data can be accessed
by the user with the login credentials, yet, we cannot protect the data once it is
extracted from the device.
2. File-level encryption: Here, each file is protected. So, one must have the public key to
access it.
5. MDM (Mobile Device Management): This is the most useful when the mobile device
is lost, we can control the access to applications on it.
6. DLPs (Data Leak Prevention): This allows for locating data in a network repository.
However, it is protected only until the data is in the organization.
7. CASB (Cloud Access Security Brokers): We can give/deny access to anyone with
this. The file is protected as long as it is in the cloud.
1. Email encryption: With tools such as PKI (Public Key Infrastructure), we can encrypt
an email. With PKI, we can have a private key for ourselves as well as a public key for
everyone else to access.
2. Managed File Transfer (MFT): This is the best way to secure transferring files. The file
will be in a platform with an expiration date and one can open the link (if provided
only) to access the docs.
3. DLP: This allows to spot malicious activities like sending (data in transit) data
outside the organization and blocking it.
4. CASB: If one tries to download data that she/he is not given access to, this can
block him/her from doing so.
5. In-transit protection with digital rights: We can protect data ‘in transit’ like
forwarding/replying to emails.
1. Identity management tools: This concerns with the user, we can see who is
accessing the file and when.
2. Conditional Access or Role-Based Access Control (RBAC) tools: Allows data access
to the user based on his/her role and up to what extent they need access.
3. Through digital rights protection or IRM: We can deny access to the user once
he/she has gained the access to the file (the user cannot edit if we don't want
him/her to).
2. In mobile phones, sensitive data can be usually managed by many and we can't do
anything about it as yet.
3. With cloud storage, because the key is in the hands of the provider and not the
organization, we may lose control over it.
4. We need to make sure we have all the required security policies/patents, and not
miss any in order to avoid complications.
B. In Transit:
1. There are many means of communication and we need to protect each of them
separately. This is the same with the cloud too, there are simply too many cloud
applications to protect.
2. Control at the receiving end: We almost can’t control the receiving end because
they have the access to the file and may decrypt it.
3. With the DLPs and the CASBs we have to be very clear about what we are protecting,
and this is not always possible (based upon the organization).
Summary
Certain algorithms, such as the Advanced Encryption Standard (AES) and block
cypher protect secrecy. Compressed Sensing (CS) has recently been introduced as a
way to minimize the volume of data to transmit while still making it computationally
safer to overcome the overlapping need for compression and privacy.
Symmetric and asymmetric lightweight IoT encryption algorithms are designed to
achieve effective end-to-end communication by consuming minimal resources.
ETSI's Initiatives
In the upcoming years, ETSI (The European Telecommunication Standards Institute)
will concentrate on Radio Equipment Directive (RED) and certification schemes to
improve confidentiality and preserve customer privacy. To achieve these objectives,
ETSI has considered activating the following articles under RED:
Radio equipment does not harm or misuse network functioning and its resources.
Radio equipment has protections to ensure that subscribers' personal data and
privacy are secure.
Certain features that ensure fraud protection are supported by the radio encryption
directive.
IoT
Trusted Communication
Trust is important in communication. Many IoT gadgets send messages to the network
without encryption. This is one of the most critical security issues the industry is facing.
It is high time that all the companies ensure encryption of the highest level among
their cloud services and devices. If an attacker notices any flaws in the encryption,
authorization, and authentication, he can access the cloud data through some
methods. It is tough to detect a DDoS attack before it is launched, and hence the IoT
market requires more effective and efficient DoS detection solutions.
Vulnerability Scanning
Vulnerability testing examines a computer's or network's possible exploit points to
identify security gaps. A vulnerability scan identifies and classifies flaws in devices,
networks, and communications infrastructure and predicts and suggests robust
countermeasures. Security attacks are aimed at identifying flaws in target devices
based on their software version and open services. This data can be used to launch
targeted attacks against specific hosts.
Public key
cryptographic
authentication
method
Privacy and
Performance
IoT and IIoT principles are based on the availability, intelligence, and
connectivity of devices. The only distinction between the two is how
they are used in general. Although IoT is most widely associated with
consumer applications, IIoT is used in manufacturing, supply chain
monitoring, and management.
IIoT Standards
Several national committees and standards organizations are
designing, prototyping, and fostering IIoT/smart manufacturing
solutions standards. These organizations help businesses reach
consensus and ensure the standards are freely accessible to those
who choose to use them. There are various bodies like IEC, ANSI, and
ETSI that provide leading standards.
IEEE standards are also used for IIoT applications in addition to these
well-known ones. There are some internet standards also that some
companies use, like ISA-95, which are also security standards.
2. Secured Interfaces
Linked devices can interact with one another to create product interactions in the home.
Consider how your smart light bulbs interact with your remote control. Because of this
interconnectivity, all sensitive interfaces that could be accessed and attacked remotely
should be protected from breach, alteration, and monitoring. As a result, all product
interfaces must be adequately protected. Not all devices are created or used in the
same way because not all of them have the same attack surface.
At the very least, all devices must be protected against remote attack. Furthermore,
some devices may be shielded from local attacks. Internal chip-to-chip interfaces may
be protected in products where local attacks are a concern.
3. Proven cryptography
Strong, established, updatable cryptography employing open, peer-reviewed
methodologies and algorithms is required for product security.
Cryptography is a community-driven industry that requires freedom and community
strength to flourish. Participants in the IoXt Security Pledge promise that their product's
security will be based on verified and standardized cryptography. Wherever possible,
appropriate cryptographic security approaches and algorithms that have been well
researched, proven, evaluated, and standardized should be used instead of proprietary
algorithms. Along with increasing interoperability and consumer choice, open standards
are inherently safer than proprietary implementations because they not only offer their
expertise, best practices, and work to the technology, but they also evaluate the security
practices and test against vulnerabilities regularly. This enables open standards to be
developed with security in mind and to develop swiftly, as well as to be resilient to
emerging security threats.
4. Security by default
A consumer has a fair expectation that a new product would include adequate security
protection. There is an option to turn off security in a device to download a third-party,
potentially insecure app. Contrary to Apps from the authorized App Store, where
applications are audited and protected. However, to begin with, there should be no
requirements to make the system safe. One can enable higher levels of protection, such
as preventing a child from making in-app transactions via their phone, just the way
lower-than-default levels of security can be chosen. What is crucial is that there’s a
standard level of protection that comes with the system. This theory ensures that goods
are adequately protected when purchased. Although the customer can increase or
decrease this degree of protection, the manufacturer would not leave the consumer
unprotected by design.
Technical Needs
Cybersecurity Framework
Lightweight Encryption
Cybersecurity Framework profile
Advanced networking
for Manufacturing
Cybersecurity for Cyber Physical
National Vulnerability Database
System
Security of Interactive and Automated
System BLE Bluetooth
Access Management Using Secure Shell (SSH)
RFIF Security Guidelines
Digital Identity Guidelines
Guide to Industrial Control System
Security Content Automation Protocol
(ICS) Security
(SCAP) Standards and Guidelines
Cyber Threat Information Sharing
Specific Uses Supply Chain Risk Management
Connected Transportation Cloud security
Smart Cities
Cybersecurity for Smart Grid System
Wireless Medical Infusion Pumps
The following are the Cybersecurity and Privacy Risks of the Internet of Things (IoT).
Three high-level risk reduction priorities can be applied to cybersecurity and privacy
threats for IoT devices:
The above figure depicts the IoT device capabilities. The following are some of the
considerations for Cybersecurity and Privacy Risks:
Consideration 1:
Many Internet of Things (IoT) devices communicate with the real world in ways that
traditional IT devices do not. IoT devices’ interactions with the physical world can have
several implications for cybersecurity and privacy.
Consideration 2:
Device Management, Monitoring, and Access Features. Many IoT devices are difficult to
reach, control, or track in the same way the traditional IT devices are.
Consideration 3:
Capability in Cybersecurity and Privacy Availability, performance, and effectiveness are
essential factors. IoT devices have different cybersecurity and privacy features than
traditional IT devices regarding availability, performance, and effectiveness.
The following section explains the Proposals for Mitigating Cybersecurity and Privacy
Threats:
1. Identifying which devices are capable of being connected to the internet of things:
If it is not apparent, have processes to decide whether a product that is about to
be procured or has already been procured is an IoT device.
Widespread Adoption
In addition to commercial IoT implementations, recent developments have seen Critical
Infrastructures (CIs) transition to Smart Infrastructures by layering IoT on top of legacy
infrastructures.
Due to potentially conflicting opinions and expectations from all interested stakeholders,
security integration in these networks is difficult. Different authentication solutions, for
example, can be used by different IoT devices and systems, which must be integrated
and made interoperable.
Actuators operate in the real environment, and thus, safety concerns are very important
in IoT. As the recent cybersecurity attacks on connected cars have shown, security
threats can become safety challenges.
Reduced Cost
Because of the widespread adoption of IoT and the advanced functionalities it provides
in various critical industries, there is potential for substantial cost savings by using
features such as data flows, advanced tracking, and integration, to name a few. On the
other hand, it is frequently the case that the low cost of IoT devices and systems has
consequences regarding security.
System Enhancements
Applying security updates to IoT devices is exceedingly difficult due to the user
interfaces' unique nature, which precludes conventional update mechanisms. Securing
such mechanisms is a difficult task in and of itself, particularly when considering Over-
The-Air updates.
Unprotected Computing
Since IoT products face greater “time to market” pressure than other domains, attempts
to improve security and privacy by design are constrained. As a result, IoT product
developers prioritize functionality and usability over protection due to financial
constraints.
Authentication Encryption
Authorisation Integrity
Access Control Secure communication
Availability Non repudiation
Smart Mobile
Home payments
The following are a few of the security precautions and best practices:
1. Security mechanisms for information system security risk identification, regulation,
quality assurance, criteria and audit, and human resource security are included in
information system security governance and risk management.
2. Ecosystem Management: This includes safeguards such as ecosystem mapping and
relationships
3. Security mechanisms for system configuration, asset protection, system isolation,
traffic filtering, and cryptography are all part of the IT Security Architecture.
4. Protection for administration accounts and administration information systems are
included in IT security administration.
5. Security mechanisms for authentication, verification, and access rights are used in
identity and access management.
6. Protection controls for IT security maintenance procedures and remote access are
included in IT security maintenance.
7. Physical and environmental safety is also essential.
8. Security mechanisms for monitoring, tracking, and log correlation and analysis are all
included in detection.
9. Security protocols for information system security incident investigation and response
and incident reporting are included in computer security incident management.
10. Consistency of Operations: This section covers security measures for business
continuity and disaster recovery.
11. Security measures for the crisis management agency and mechanisms are used in
crisis management.
Categories
These security domains divide security measures into categories based on where they
are used in an IoT ecosystem. Apart from their intended usage, each protection
measure may be classified according to its nature: regulations that must be considered
when designing products, organizational measures aimed at the company and
employees that the organization must implement, etc.
As a result, the established IoT baseline protection measures are presented in three
segments:
Policies
The first group of security initiatives consists of policies that are aimed at improving
information security in general. These should be relevant for the activities of the
organization and provide well-documented material. Following are some security best
practices that have been established in this context.
1. End-of-life assistance
2. Relationships with third parties
3. Solutions with a track record
4. Risks and/or accidents in security are managed
5. Human Resource Management Security Policies and Training
Technical Measures
1. Management of trust and honesty
2. Security and privacy are strong defaults
3. Compliance and data protection
4. Security and dependability of the system
5. Guaranteed Updates to software/firmware
6. Authentication
7. Access control systems also protect physical and environmental protection
8. Cryptography
9. Communication that is safe and secure
10. Guaranteed networks and interfaces
11. Input and output security are also essential
12. Observation
13. Monitoring
Recommendations
Recommendations for Securing IoT at a High Level
ID DESCRIPTION
ETSI
The European Telecommunications Standards Institute (ETSI) is an autonomous, non-
profit standardization organization in information and communications. ETSI is a non-
profit organization that promotes developing and testing global technological standards
for ICT-enabled systems, software, and services. It was founded in 1988.
IoT Standardization
Smart objects generate vast amounts of data. This information must be safely handled,
interpreted, transferred, and stored. True interoperability between devices and
applications requires widely agreed standards and protocols, which can only be
achieved by standardization.
The application of standards:
1. Ensures cost-effective and interoperable solutions
2. Allows up a range of possibilities
3. Enables the industry to achieve its maximum potential
Inside services and on computers, credentials and data must be stored safely.
Device programs with hard-coded passwords are not to be used. Hard-coded
usernames and passwords in software can easily be discovered by reverse
engineering of computers and applications. Users want products to fulfil their needs
while still being resistant to encryption attacks. On the other hand, the
appropriateness of security controls and encryption is determined by various
variables, including the use of context.
Close any software that is not in use and any network ports that are not in use.
Hardware does not reveal access to assault unnecessarily (e.g., open serial access,
ports, or test points). If software resources are not used, they should not be available.
The functionality required for the service/device to work should be kept to a
minimum. Software should be run with as little access as possible.
Safe boot mechanisms, which call for a hardware root of confidence, should verify
the software on IoT devices. The system should notify the user and/or the
administrator if an unauthorized change to the program is detected. Also, it should
not connect to any networks other than those used to perform the alerting feature.
If an IoT system senses a problem with its program, it can notify the appropriate
party. Devices can be set to administration mode in certain cases; for example, a
thermostat in a room can be set to user mode, preventing other settings from being
changed.
Consumers must be given explicit and transparent details about how their data is
used, by whom, and for what purposes by computer and service manufacturers and
service providers. This includes advertisers and other third parties that may be
involved.
Where their use or other relying systems need it, resilience should be built into IoT
devices and services, taking into account the risk of data network and power
outages. In the event of a network outage, IoT networks should stay operational and
locally available as far as possible and should restore cleanly in the event of a power
outage.
If telemetry data, such as utilization and measurement data, is obtained from IoT
devices and services, these should be checked for security flaws. As telemetry data
is obtained from IoT devices and utilities, personal data should be processed as little
as possible and anonymized.
IoT devices sometimes lose value and are recycled or discarded. Consumers should
be given mechanisms that enable them to maintain control of their data removed
from services, computers, and applications. When a customer requests that all their
data must be deleted, they also expect the service provider to delete any backup
copies they might have.
IIoT system installation and maintenance should take just a few steps and adhere to
security best practices for usability. Consumers should also be given instructions on
how to set up their computers safely. By properly addressing ambiguity and bad
design in user interfaces, security problems caused by customer frustration or
misconfiguration can be minimized and removed. Validation is required for data input
via user interfaces and data transmission via Application Programming Interfaces
(APIs) or between network services and devices.
Falsely formatted data or code transmitted through various types of interfaces may
cause systems to malfunction. Attackers often use automated tools to exploit
potential holes and vulnerabilities due to failure to validate data.
Automotive IoT
Endpoint
Automotive IoT
User Smart Phone
Endpoint
Router Client
Server
Manipulated Network Path
Adversary
Host
Malicious Objects
Third-party systems are intended to provide customers with information, either plain or
with multimedia. Advertising is one obvious way to do this. The structure of various types
of files is complex, making it difficult for software to parse them correctly. Advertising
networks are hence a facile medium for spreading malware.
Content Delivery Networks (CDNs) are also possible malware distribution channels.
Malware can be transmitted by any device that provides complex multimedia types or
bundles of code (web or executable) to render dynamic content.
As a result, the company must assess the various types of technical offerings distributed
across a given channel. The company must determine what is acceptable and what is
excessive to pass on to their customers.
For example, an advertising firm might want to send Java code to client systems via an
IoT company's proxy service application. The company must determine if client systems
operating in specific environments are more vulnerable to Java technology attacks. If
this is verified, the company may decide to ban Java while allowing other technologies,
such as Hypertext Mark-up Language (HTML), to pass.
There is no single standard way to ensure the end-protection users since malware
comes in various ways, including polymorphous file types to Adobe Flash, Java, and
multimedia exploits. An easy solution would be for the engineering team to impose a
policy regarding which innovations should be used over their platforms and how they
would affect their customers. Monitoring subsystems and sandboxes may be
implemented to ensure that any object made on a client device is less vulnerable to
abuse.
8.2 Features of 5G
Features of 5G
The features and their usage are way behind what human beings think.
With vast speed, it is sufficient to change the definition of mobile phone
usability. With advanced features, our smartphones will be parallel to the
laptop. We can use broadband internet facility, wider multimedia
options, connectivity, and high-quality sound, and HD videos can be
sent through another phone with no trade-off. This will help the
government to conduct any advanced courses and to supply the
materials online.
8.4 Deployment of 5G
Beyond mobile operators, 5G is used for private networks with applications in Industrial
IoT, enterprise networking, and critical communications. The 5G NR is launched
depending upon the 4G LTE infrastructures pairing before ripening with the 5G core
network. In the past two years, there is an association that stated that in 88 countries,
224 operators that have demonstrated, are training or testing, or have the license to
conduct trials on 5G technologies are developing 5G technologies, or that they have
announced the launch of 5G services. The first country to do so is South Korea in April.
When they launched this service, brands like Samsung, Ericsson, and Nokia have used
carriers except LGU Plus. Among all the brands mentioned above, Samsung is the one
who has launched the highest supply of 5G in South Korea by shipping 53000 base
stations out of 86000 base stations implemented. Apart from these, there are other
countries as well in which 5G radio hardware and 5G systems are implemented/used.
Those are Altiostar, Cisco, Fiberhome, Huawei, Qualcomm, and ZTE.
8.5 5G Devices
In the 5G IoT chipset, there are four commercial chipsets and one commercial platform,
with more launches coming soon. In March 2020, the first 5G smartphone was released.
Due to its more advanced features, it is very expensive. In the US, it is around 1000
dollars compared to the Samsung Galaxy s10, which is about 750 dollars. In the same
month, the Nokia company introduced the Nokia 8.3 5G, which claims that it has a wide
range of 5G compatibility than other phones released. And in October, Apple
introduced their first-ever 5G connected iPhone 12 and iPhone 12 pro.
8.6 Frequencies of 5G
The new frequencies are defined for 5G devices. The specification is divided into two
frequency bands, FR1 (below 6GHz) and FR2 (mm Wave).
Frequency range 1 (<6GHz): The maximum channel bandwidth given to FR1 is 100 MHz
due to its scarcity of continuous spectrum in this crowded frequency range. The range
of the band is 3.3-4.2 GHz.
1. Connected devices
2. Fast and intelligent networks
3. Back-end services
4. Extremely low latency
Internet
Big Data
of Things
5G Mobile Broadband
and Telecom Networks
SDN Cloud
2. State of Consumer 5G
The demand for 5G is rapidly growing as the consumers now understand how much
they are aware of the technology. But there is a large inconsistency across the globe in
terms of knowledge and intention to upgrade 5G.
8.9 Challenges in 5G
From a user perspective, privacy concerns centre around location tracking, identity, and
other personal data. 4G has a larger network area since the signal is transmitted from
a single cellular tower, 5G cellular networks have a small coverage area, and hence the
signal strength is not good as 4G. When a user connects to a 5G network, the network
can trace their location, and can even determine that the user is situated in which
building. The threats such as using incorrect information to cause harm called security
information attacks can find out the users' location. Whether the user is inside or
outside, the 5G antennas can trace their location precisely.
With respect to identity, International Mobile Security Identifier (IMSI) attacks can reveal
the identity of mobile subscribers. By grabbing the IMSI of the subscriber's device, the
attacker can intercept the mobile traffic to monitor an individual's activity.
3. www.cloudflare.com/learning/ddos/what-is-a-ddos-attack
4. https://ieeexplore.ieee.org/document/9096818
6. https://www.cloudflare.com/en-in/learning/ddos/glossary/mirai-botnet/
7. https://success.trendmicro.com/solution/1118928-new-rapidly-growing-iot-botnet-
reaper#collapseTwo
9. https://www.researchgate.net/publication/335676455_IOT_Malware_An_Analysis
_of_IOT_Device_Hijacking
10. M.A. Crossman and H.Liu, ”Two-factor authentication through near field
communication,” in 2016 IEEE Symposium on Technologies for Homeland security,
HST 2016,2016.
11. https://affinity-it-security.com/what-is-weak-authentication/
12. https://www.researchgate.net/publication/329140617_An_Overview_of_Potential_
Authentication_Threats_and_Attacks_on_Internet_of_ThingsIoT_A_Focus_on_S
mart_Home_Applications
15. https://www.logsign.com/blog/10-steps-to-prevent-man-in-the-middle-attacks/
16. https://www.kaspersky.com/resource-center/threats/ip-spoofing
17. https://www.acunetix.com/blog/articles/injection-attacks/
19. W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, “A pairwise key
predistribution scheme for wireless sensor networks,” ACM Transactions on
Information and System Security (TISSEC), vol. 8, no. 2, pp. 228–258, 2005
20. K. Sharma and M. Ghose, “Wireless sensor networks: An overview on its security
threats,” IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs, pp. 42–45,
2010.
22. https://www.acunetix.com/blog/articles/injection-attacks/
23. https://platform.keesingtechnologies.com/malware-attacks/
24. N. Provos, M. A. Rajab, and P. Mavrommatis, “Cybercrime 2.0: When the Cloud
Turns Dark,” ACM Communications, Vol. 52, No. 4, pp. 42–47, 2009
25. Researchers Demo Cloud Security Issue With Amazon AWS Attack, October 2011.
26. https://www.esecurityplanet.com/threats/how-to-prevent-sql-injection-attacks/
27. https://portswigger.net/web-security/cross-site-scripting
31. Lin H, Bergmann N. Iot privacy and security challenges for smart home
environments. Information. 2016;7(3):44.
35. https://vimeo.com/530802011
36. https://www.samsung.com/in/support/tv-audio-video/what-is-voice-
recognition-feature-in-smart-tv/
37. https://ccm.net/faq/40606-samsung-smart-tv-how-to-enable-motion-control
38. https://mensgear.net/what-is-smart-tv-best-capabilities/
39. https://www.download.p4c.philips.com/files/5/55pfl8007k_12/55pfl8007k_12_dfu
_eng.pdf
40. https://help.fitbit.com/manuals/manual_sense_en_US.pdf
41. https://www.databreachtoday.com/fitbit-hack-what-are-lessons-a-8793
42. https://www.checkpoint.com/cyber-hub/cloud-security/what-is-a-virtual-
firewall/
43. https://securityledger.com/2020/11/security-holes-opened-back-door-to-tcl-
android-smart-tvs/
44. https://en.wikipedia.org/wiki/Smart_TV
45. https://www.welivesecurity.com/2018/10/01/protecting-your-smart-tv/
46. http://www.owlapps.net/owlapps_apps/articles?id=522938&lang=en
47. https://www.venafi.com/blog/traditional-cryptographic-attacks-what-history-
can-teach-us
48. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8027141
49. https://fardapaper.ir/mohavaha/uploads/2019/06/Fardapaper-Current-
research-on-Internet-of-Things-IoT-security-A-survey.pdf
50. https://vimeo.com/536329417
51. https://www.sailpoint.com/identity-library/7-best-practices-for-identity-access-
management/
52. https://searchsecurity.techtarget.com/definition/Advanced-Encryption-
Standard#:~:text=The%20Advanced%20Encryption%20Standard%20(AES,cybersecur
ity%20and%20electronic%20data%20protection.
55. 5G Security and Privacy – A Research Roadmap by Elisa Bertino, Syed Rafiul
Hussain and Omar, National Science Foundation under Grant No. 1734706
56. Internet of things: Vision, applications and research challenges, Elsevier, Ad Hoc
Networks by Daniele Miorandi a, ⇑, Sabrina Sicari b, Francesco De Pellegrini a,
Imrich Chlamtac 2012
58. On the features and challenges of security and privacy in distributed internet of
things by Elsevier, Computer Networks, Rodrigo Roman a, ⇑, Jianying Zhou a,
Javier Lopez b 2013
59. Security for the Internet of Things: A Survey of Existing Protocols and Open
Research issues by IEEE Communications Surveys & Tutorials, Jorge Granjal,
Edmundo Monteiro and Jorge Sá Silva 2015
60. An Extensible and Effective Anonymous Batch Authentication Scheme for Smart
Vehicular Networks, UTC from IEEE Xplore by Jing Zhang, Hong Zhong, Jie Cui,
Yan Xu, and Lu Liu 2020
61. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the
Art and Future Challenges by IEEE Access, ANAM SAJID, HAIDER ABBAS, AND
KASHIF SALEEM 2016
63. Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy
Risks by NIST, Katie Boeckl Michael Fagan William Fisher Naomi Lefkovitz
Katerina N. Megas Ellen Nadeau Danna Gabel O’Rourke Ben Piccarreta Karen
Scarfone 2019
64. Security, Privacy and Trust for Smart Mobile Internet of Things (M-IoT), IEEE
Access by VISHAL SHARMA, ILSUN YOU, KARL ANDERSSON, FRANCESCO PALMIERI,
MUBASHIR HUSAIN REHMANI, AND JAEDEOK LIM6 2020
65. Security Protocols for IoT by, Research Gate by J. Cynthia, H. Parveen Sultana, M.
N. Saroja and J. Senthil 2019
68. Internet of Things for Measuring Human Activities in Ambient Assisted Living
and e-Health by Research Gate, Amine Rghioui, Sandra Sendra, Jaime Lloret,
Abedlmajid Oumnad
69. On the features and challenges of security and privacy in distributed internet of
things, Elsevier, Computer Networks by Rodrigo Roman a, ⇑, Jianying Zhou a,
Javier Lopez b 2013
70. An Extensible and Effective Anonymous Batch Authentication Scheme for Smart
Vehicular Networks, UTC from IEEE Xplore by Jing Zhang, Hong Zhong, Jie Cui,
Yan Xu, and Lu Liu 2020
71. Security, Privacy and Trust for Smart Mobile Internet of Things (M-IoT), by IEEE
Access, VISHAL SHARMA, ILSUN YOU, KARL ANDERSSON, FRANCESCO PALMIERI,
MUBASHIR HUSAIN REHMANI, AND JAEDEOK LIM6 2020
72. https://platform.keesingtechnologies.com/malware-attacks/
73. N. Provos, M. A. Rajab, and P. Mavrommatis, “Cybercrime 2.0: When the Cloud
Turns Dark,” ACM Communications, Vol. 52, No. 4, pp. 42–47, 2009.
74. Researchers Demo Cloud Security Issue With Amazon AWS Attack, October 2011.
75. https://www.esecurityplanet.com/threats/how-to-prevent-sql-injection-attacks/
76. https://portswigger.net/web-security/cross-site-scripting
77. https://www.elastic.co/blog/ten-process-injection-techniques-technical-survey-
common-and-trending-process
78. https://searchsecurity.techtarget.com/definition/malware
79. https://www.thalesgroup.com/en/markets/digital-identity-and-
security/iot/inspired/smart-cities
80. https://www.businessinsider.com/iot-smart-city-
technology#:~:text=Smart%20cities%20use%20IoT%20devices,utilities%20and%20serv
ices%2C%20and%20more
81. https://www.smartgrid.gov/the_smart_grid/smart_grid.html
82. https://www.digiteum.com/iot-smart-grid-
technology/#:~:text=Smart%20grid%20IoT%20technology%20is,efficiency%20in%20th
e%20supply%20chain.&text=Adopt%20automated%20metering%20to%20monitor,ma
ximize%20the%20use%20of%20renewables.
84. https://www.acko.com/car-guide/connected-cars-features-benefits/
85. https://www.einfochips.com/blog/faqs-on-automotive-iot/
86. https://www.netguru.com/blog/smart-retail-solutions-that-change
87. https://www.lntinfotech.com/digital-transformation/internet-of-things/smart-
supply-chain/
88. https://www.investopedia.com/terms/w/wearable-technology.asp
89. https://internetofthingsagenda.techtarget.com/definition/smart-farming
90. https://blogs.idc.com/2021/01/06/future-of-industry-ecosystems-shared-data-
and-insights/