09 - IoT As Interconnection of Threats
09 - IoT As Interconnection of Threats
09 - IoT As Interconnection of Threats
as Interconnection of
Threats (IoT)
Security and Privacy in Internet of
Things
Phase of IoT
System
• The IoT requires five phases,
from data collection to data
delivery to the end users on
or off demand.
Phase I: Data collection, acquisition, perception
• The IoT analyses the data stored in the cloud Data Center
(DC)s and provides intelligent services for work and life in hard
real time.
• As well as analysing and responding to queries, the IoT also
controls things.
• There is no discrimination between a boot and a bot; the IoT
offers intelligent processing and control services to all things
equally.
Phase IV: Data transmission
• Flooding by attackers
• DDoS is flooding of malicious or incompatible packets by attackers toward the DCs.
• This kind of overload threat can be easily detected by Matchboard Profiler.
• If the attacker characteristic is found, the user can be filtered at the firewall.
• Flooding by legitimates (flash crowd)
• Flash crowd is an overload condition caused by huge numbers of
legitimate users requesting the DC resources simultaneously.
• This can be solved by buffering an excess number of requests so that
this overload condition remains live only for a certain period of time.
Flooding
• During transit from sensors, the data can be captured, modified, and forwarded to
the intended node.
• Complete data need not be modified; part of the message is sufficient to fulfil the
intention.
• Modification takes place in three ways:
• Content modification, in which part of the information has been altered
• Sequence modification, in which the data delivery has been disordered, making the message
meaningless
• Time modification, which could result in replay attack.
• For example, if an ECG report has been altered during a telemedicine diagnosis, the
patient may lose his or her life.
• Similarly, in road traffic, if the congestion or accident has not been notified to
following traffic, it could result in another disaster.
Attacks as per architecture
Attacks as per
architecture
• The IoT has not yet been
confined to a particular
architecture.
• Different vendors and
applications adopt their own
layers.
• In general, the IoT is
assumed to have four
layers: the lowest-level
perception layer or sensing
layer, the network layer, the
transmission layer, and the
application layer.
External attack
• In order to make full use of the benefits of the IoT, security issues
need to be addressed first.
• Trustworthiness of the cloud service provider is the key concern.
• Organizations deliberately offload both sensitive and insensitive data
to obtain the services.
• But they are unaware of the location where their data will be
processed or stored.
• It is possible that the provider may share this information with others,
or the provider itself may use it for malicious actions.
Ad-Hoc Wireless
Network Review
• In ad-hoc networks, each node can communicate with other
nodes, so no access point that provides access control is required.
• In ad-hoc networks the nodes in the network take care of routing.
• Routing is to find the best possible path between the source and
destination nodes to transfer data.
• All the individual nodes in an ad-hoc network maintain a routing
table, which contains the information about the other nodes.
• As the nature of the ad-hoc network is dynamic, this results in
ever-changing router tables.
• One important thing to note is that an ad-hoc network is
asymmetric by nature, meaning the path of data upload and
download between two nodes in the network may be different.
AODV
Example
• AODV is a method of routing messages between mobile
computers. It allows these mobile computers, or nodes, to
pass messages through their neighbours to nodes with
which they cannot directly communicate.
• AODV does this by discovering the routes along which
messages can be passed.
• AODV makes sure these routes do not contain loops and
tries to find the shortest route possible.
• AODV is also able to handle changes in routes and can
create new routes if there is an error.
• The diagram to the left shows a set up of four nodes on a
wireless network.
• The circles illustrate the range of communication for each
node.
• Because of the limited range, each node can only
communicate with the nodes next to it.
AODV
Example..
• Nodes you can communicate with directly are considered to
be Neighbours.
• A node keeps track of its Neighbours by listening for a
HELLO message that each node broadcast at set intervals.
• When one node needs to send a message to another node
that is not its Neighbour it broadcasts a Route Request
(RREQ) message.
• The RREQ message contains several key bits of
information: the source, the destination, the lifespan of the
message and a Sequence Number which serves as a
unique ID.
• In the example, Node 1 wishes to send a message to Node
3.
• Node 1’s Neighbours' are Nodes 2 + 4.
• Since Node 1 can not directly communicate with Node 3,
Node 1 sends out a RREQ.
• The RREQ is heard by Node 4 and Node 2.
AODV
Example..
• When Node 1’s Neighbours receive the RREQ
message they have two choices; if they know a route
to the destination or if they are the destination they
can send a Route Reply (RREP) message back to
Node 1, otherwise they will rebroadcast the RREQ to
their set of Neighbours.
• The message keeps getting rebroadcast until its
lifespan is up.
• If Node 1 does not receive a reply in a set amount of
time, it will rebroadcast the request except this time
the RREQ message will have a longer lifespan and a
new ID number.
• All of the Nodes use the Sequence Number in the
RREQ to insure that they do not rebroadcast a RREQ
• In the example, Node 2 has a route to Node 3 and
replies to the RREQ by sending out a RREP.
• Node 4 on the other hand does not have a route to
Node 3 so it rebroadcasts the RREQ.
AODV
Example..
• Sequence numbers serve as time stamps, they allow
nodes to compare how “fresh” their information on other
nodes is.
• Every time a node sends out any type of message it
increase its own Sequence number.
• Each node records the Sequence number of all the other
nodes it talks to.
• A higher Sequence numbers signifies a fresher route.
• This it is possible for other nodes to figure out which one
has more accurate information.
• In the example, Node 1 is forwarding a RREP to Node
4.
• It notices that the route in the RREP has a better
Sequence number than the route in it’s Routing List.
• Node 1 then replaces the route it currently has with the
route in the Route Reply
Wormhole attack
• Malicious nodes choose the packets and drop them out; that is,
they selectively filter certain packets and allow the rest.
• Dropped packets may carry necessary sensitive data for further
processing.
Sinkhole attack
• Eavesdropping
• An interception of network traffic to gain unauthorized access. It can result in failure of
confidentiality.
• The man in the middle attack is also a category of eavesdropping.
• The attack sets up a connection with both victims involved in a conversation, making
them believe that they are talking directly but infecting the conversation between them.
• Replay attack
• The attacker intercepts and saves old messages and then sends them later as one of
the participants to gain access to unauthorized resources.
• Back door
• The attacker gains access to the network through bypassing the control mechanisms
using a “back door,” such as a modem and asynchronous external connection.
Attacks based on components