1 IoT Security
1 IoT Security
Introduction to
Security for IoT Networks
Presented by:
Dr. Neelam Dayal
Asst. Professor 1
IIITDM Jabalpur
Internet of Things
● Network of physical objects—a.k.a. "things"—that are embedded with sensors,
software, and other technologies for the purpose of connecting and exchanging data
with other devices and systems over the Internet
● “The Internet of Things (IoT) is a system of interrelated computing devices,
mechanical and digital machines, objects, animals or people that are provided with
unique identifiers and the ability to transfer data over a network without requiring
human-to-human or human-to-computer interaction.”
--Kevin Ashton
2
IoT Applications
3
Benefits of Using IoT
4
IoT Architecture
5
Why IoT Security Matters?
6
Why IoT Security Matters?
7
Why IoT Security Matters?
8
Why IoT Security Matters?
Two researchers have shown how a Tesla — and possibly other cars — can be hacked remotely without any user
interaction. They carried out the attack from a drone.
9
Why IoT Security Matters?
10
Main Challenges in IoT Security
- “Things” not secure inherently
- Usability vs. Security
- Heterogeneous nature of “Things”
- Resource constraint
- Complex supply chain dynamics
- Security cost
- Inconsistent production standards
- Poor maintenance & updates
11
Attack Vectors
Gateway
IoT device Cloud Remote Control
● Ecosystem
● Device
● Communication network
● Cloud and storage
● Mobile application
● Administrative interface
12
Attack Vector: Ecosystem
Attack Surface Vulnerability
13
Attack Vector: Device
Attack Surface Vulnerability
15
Attack Vector: Device Contd....
Attack Surface Vulnerability
16
Attack Vector: Device Contd...
Attack Surface Vulnerability
Network Traffic
● LAN
● LAN to Internet
● Short range
● Non-standard
● Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)
● Protocol fuzzing
● Replay attack
● Denial of Service Attack
18
Attack Vector: Administrative Interface
Attack Surface Vulnerability
20
Attack Vector: Mobile App and Vendor Backend API
Attack Surface Vulnerability
Mobile Application
● Implicitly trusted by device or cloud
● Username enumeration
● Account lockout
● Known default credentials
● Weak passwords
● Insecure data storage
● Transport encryption
● Insecure password recovery mechanism
● Two-factor authentication
Authentication/Autho
rization ● Authentication/Authorization related values (session key, token, cookie, etc.)
disclosure
● Reusing of session key, token, etc.
● Device to device authentication
● Device to mobile Application authentication
● Device to cloud system authentication
● Mobile application to cloud system authentication
● Web application to cloud system authentication
● Lack of dynamic authentication
Privacy
● User data disclosure
● User/device location disclosure
● Differential privacy
22
Attacker’s Approach to Tear IoT Network
• Physical Attacks: Targets deployed devices
• Sensor tampering
• Hardware tampering
• Side channel attack
• Malicious code or usb installation
• Software Attacks: Targets of software installed in sensors, collectors, gateways and cloud
• Phishing attacks
• Malware injection
• Ransomware
• Botnet
23
Physical Tampering
False data
transmission Gateway
Remote Control
Inaccurate
Decision
Smart device
24
Man-in-the Middle Attack
data transmission
Gateway
Remote Control
False
Decision
Attacker Remote Control
Cloud
intercepts
data
Smart device
Data
malformed
25
Data Sniffing
Gateway
Remote Control
26
Unauthorized Access
Gateway
Remote Control
Smart device
Log on to device
exploiting vulnerabilities
Impose False
Decision
27
Attack Server/ Cloud
Gateway
Remote Control
Smart device
28
Steal user credentials
Gateway
Remote Control
Smart device
Communicate
as remote user
29
Inject Bad Configuration
Gateway
Remote Control
Inject bad
configuration/
firmware
30
Malware injection
Gateway
Remote Control
Smart device
Inject malware
31
Top 10 IoT Vulnerabilities
1. Weak, Guessable, or Hardcoded Passwords
2. Insecure Network Services
32
Security Flaws While IoT Adoption
35
Recommendations Contd...
5. Use of insecure or outdated components
• Refrain from legacy technologies
• Ensure continuous tracking of hardware and software components
• Immediately replace any of the components that turn obsolete
6. Insufficient privacy protection
• Limit the storage of personal data on devices
• Frame a data protection policy for your organization
• Prepare an incident response plan to combat any breach of security in
the future
36
Recommendations Contd...
7. Insecure storage and transfer of data
• Ensure encryption at all levels
• Strictly utilize secure channels like HTTPS, sFTP and SSH
• Opt for one-time-use keys that aren’t stored in the device
8. Lack of device management
• Secure decommissioning, endpoint quarantine and blacklisting
• Integrate devices with asset management, bug tracking and patch
management systems
• Build an interface that is flexible and seamlessly integrates with other
systems 37
Recommendations Contd...
9. Insecure default settings
• Use only secure default settings
• Grant users permission to change default passwords
• Prompt users to change their default passwords compulsorily
10. Lack of physical hardening
• Understand how a user may modify the device
• Proactively anticipate what damages any user may inflict on the device
• Devise solutions and build an IoT device that can withstand all the possible
attacks
38
IoT Penetration Testing
39
IoT Penetration Testing Contd...
40
IoT Penetration Testing Contd...
41
IoT Penetration Testing Contd...
42
IoT Penetration Testing: Software Tools
● Screen ● Qumu
43
IoT Penetration Testing: Hardware Tools
1. Artifact Upload
2. Data extraction - Bytewalk
3. Data enrichment-
- libmagic for file type determination,
- Byte level entropy and index coincidence for determining compression or encryption
4. Data Analysis
- Search for unsafe C functions- strcpy, strcat, etc.
- Reverse engineering for code verification- Radare 2
- Static string search(password, keys, etc.)- Regex search system
- For finding known vulnerabilities- CVE Fetch service
- Crosslists program name and version numbers found in binaries- Watchdog service
45
Vulnerable Firmwares
• OWASP IoTGoat
• https://github.com/OWASP/IoTGoat
• https://github.com/praetorian-code/DVRF
• https://blog.exploitlab.net/2018/01/dvar-damn-vulnerable-arm-router.html
• ARM-X
• https://github.com/therealsaumil/armx#downloads
• https://azeria-labs.com/lab-vm-2-0/
• https://github.com/Vulcainreo/DVID 46
IoTGoat
47
IoTGoat Contd...
1. Hardcoded user credentials compiled into firmware.
○ binwalk - extract file system
○ cat - find username passwords in /etc/passwd
○ cat - find hash in /etc/shadow
○ John or hashcat - crack the hash
○ Hydra, Medusa, or Ncrack- bruteforce using username(iotgoatuser) and passwords
48
49