It is not news that the Internet of things has vast potential for value
creation and is being heralded as the next phase in the hyper-digitization of our world.
IoT systems typically constitute centralized cloud systems connected
to field devices which are connected to sensors. These connected systems find application in an array of fields ranging from industrial sensor networks, medical equipment, smart homes and buildings and even critical infrastructure like process control systems or SCADA devices. While setting up a simple IoT system is now trivial, building robust systems that are secure and tamper-proof requires considering many factors. With cyber-attacks escalating, the security of Internet of things systems is a growing concern as the
impact of breaches could be financially drastic and the reputation
damage everlasting. Security concerns related to IoT are cited as key inhibitors for widespread proliferation of IoT devices particularly in infrastructure applications.
Security in IoT systems has many aspects and breaches can occur along any single point of weakness. IoT security warrants a multi-modal approach that addresses legacy, current and emerging security challenges while contending with low-cost sensors and end-points, cloud networks and mobile users all at once. Recent hacking attacks have exploited the weakest link in the IoT
architecture. For IoT, the “thing” is often the weakest spot and the
IoT system is only as secure as its weakest endpoint. Software used
to crawl the internet to identify end node vulnerabilities is easily
available online and can exploit an IoT network. A survey conducted
by 451 Research points to majority of IoT security concerns being
are around the endpoints (Figure 1)
End-nodes are thus a unique area of security concern in IoT systems. The security of end nodes cannot be optional. Designs require careful
consideration and special techniques. In this article, we focus on these aspects.
End Nodes & Compliance Classes
In devising a strategy to secure IoT nodes, it is important to keep in mind the capabilities of the end-node and the security compliance level required. End nodes can be classified into a few categories based on the any given node’s specific capabilities related to memory, communication protocol support and operating system support. The degree of support has direct implications for the security measures that must be employed. Further, security sophistication will also vary based on the end device. Table 1 delineates the end node classifications.
Understanding the true impact of a security breach – financial, safety, reputation etc. is essential to design a security scheme. To guide developers, iotsecurityfoundation.org has created security Compliance Classes based on implications of data/device breach. They are graded based on impact of a data breach on human privacy, business operations, infrastructure, and human safety. The integrity of the device, availability of the device and confidentiality of the data form the bedrock objectives for the compliance framework.
Detailed descriptions of the meaning of basic, medium and high-security objectives are here. The combination of the end-node device categories and compliance classes creates a robust structure for framing security related issues and provides guidance for developers.
End-Point IoT Security Considerations
The above definitions and terminology are the basis for considering many aspects that are involved in implementing appropriate security in
IoT end-nodes.
understand the type and nature of data being captured by the end-points. Further, knowing if any potential breach will compromise privacy/confidentiality and break regulatory requirements is important. Since the entire promise of IoT resides in making even mundane devices like a light bulb ‘smart’, careful attention needs to be paid to devices that were never before considered a security threat. A ‘light bulb’ or ‘door lock’ may have no intrinsic data but data related to their usage – on/off times etc. can be used for malicious purposes. Device developers must assess the degree of protection that can be traded off with implementation costs. Class 0 type devices rarely require Class 4 level security. Understanding which class of security objectives would be required is crucial.
devices without compromising functionality, user experience and adding cost is a tough task. Again, it is important to weigh the benefits of adding security with the cost of the breach. The level of security implemented will depend on the device class and could be through hardware and software techniques.
Balancing flexibility, future-proofing, and robustness with cost effectiveness is crucial in choosing hardware or software based mechanisms for security implementation.
Authenticating legitimate devices/users and validating network changes without human interaction is crucial. Mechanisms like verification of certificates and one-time use session keys are required for securely onboarding devices. Similarly, adding capability through remote device firmware upgrades is also a very important aspect of the security scheme. Software updates to add new features, fix security holes and keep the environment current should be done securely and only authorised software should be allowed to be installed in devices.
lead to security breaches even in impregnable security schemes. To mitigate the human factors, companies deploying or managing IoT networks/systems need robust security protocols in place. Procedures to identify, react, respond and address security breaches proactively should be pre-defined and a core response team should be identified for exceptional
circumstances.
The above, when considered at design and implementation time of IoT systems, can go a long way in ensuring that the right end-node security scheme is implemented while optimising for cost effective and security requirements.
Modes for Implementing IoT End-Node Security
Several mechanisms are available to robustly address the considerations outlined in the prior sections. Practitioners have many choices for
implementing security measures in all aspects of the IoT system. The below list compiles a few of these mechanisms.
the device. Attacks could be physical (probing), measurement of heat/electromagnetic radiations, or attempts to reverse engineer. Since electronic circuits emit heat and electromagnetic signatures, it is possible for an attacker to deduce information about data being processed without knowledge of the actual structure of the circuitry itself. Hardware-based tamper detection is robust and allows for defensive actions when attempts to read data or physically break into the device are detected. Tamper detect features also prevents reverse engineering by storing and processing device private keys in a secure environment.
data, passwords and other sensitive data. Using encryption ensures this data is safe from hackers. Further, keys used for encryption should be stored in a secure location as data can be decrypted if an attacker reads out the keys. Many hardware
approaches are available to afford secure and protected memory for storing encryption keys.
modes establish a trust relationship with the system and allow the appropriate access. IoT systems, however, require methods that do not involve human interaction and often involve mechanisms like verification of certificates and one-time use session keys for AES encryption. Random number generators
for one-time session key and a two-step authentication
process usually results in highest security. Authentication can be implemented using both hardware and software-based approaches.
Starting with an implicitly trusted component, every other component is authenticated before being executed. A secure boot scheme adds cryptographic checks to each stage of the boot process. This process checks the integrity of all of the software images that are executed and protects against unauthorized or maliciously modified software. Cryptographic
protocols such as AES, RSA2048 or ECC521 are typically applied in IoT systems. A unique signature is generated and is saved in the device along with the device binary. Using the device’s public key, the signature and the authenticity/integrity of the code can be verified on power-up, enabling secure booting.
errors.
At the manufacturing stage, secure firmware programming enables IoT device makers to reliably and securely program authorized firmware and also protect the firmware from being modified, pirated or installed on any cloned hardware. Using a hardware security module (HSM) during programming of production-level firmware to generate OEM product
certificates, securely manage and store keys and provide tamper-detect alerts is essential for secure manufacturing.
Summary
Security of IoT systems has been noted as a key inhibitor of the widespread proliferation of the internet of things. End node IoT devices are vulnerable to many threats. To understand and apply good end node security models, a standards-based classification of security levels and device types is needed. In addition, several factors including – protection scope, potential impact of a security breach, types of security levels
needed, commissioning and upgrade models and overall security protocols and processes need careful consideration by practitioners (Figure 2). Once the right security needs, protocols and procedures are defined, designers and developers can unitize a variety tools and approaches
to design and implement robust systems.
References
IoT Security Compliance Framework.
https://iotsecurityfoundation.org/wp-content/uploads/2016/12/IoT-Security-Compliance-Framework.pdf
Security Requirements for Embedded Devices – What is Really Needed?
https://www.iconlabs.com/prod/security-requirements-embedded-devices-%E2%80%93-what-really-needed
Embedded Hardware Security for IoT Applications
Security Considerations Based on Classification of IoT Device Capabilities
https://www.thinkmind.org/index.php?view=article&articleid=service_computation_2017_2_10_10008
• Increase in opportunities predicted for high-speed optical transceivers and miniaturized connectivity solutions to address…
Rebellions Selects Alphawave Semi's Multiprotocol Chiplet Solutions To Deliver Breakthrough Performance in Generative AI workloads…
Valeo, a leading automotive technology company, and ROHM Semiconductor, a major semiconductor and electronic component…
Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) introduces the EiceDRIVER™ Power 2EP1xxR family of…
Next level monitoring precision of particulate matter, temperature, humidity, and total volatile organic compounds (TVOCs)…
Plans to Deliver Advanced Threat Intelligence within its Attack Surface and Third-Party Risk Solutions Bitsight,…