SlideShare a Scribd company logo
Debunking IoT Security Myths 
© Cumulocity GmbH 2014 
André Eickler
Overview 
• What is Cumulocity? 
• What is the Internet of Things (IoT)? 
• What security challenges are there? 
• What common myths are there? 
• What you can do! 
© Cumulocity GmbH 2014
What is Cumulocity? 
Where do we come from? 
• Started 2010 as Nokia Networks product line. 
• Independent company since 2012. 
• Originally targeted to the very security-aware telco industry. 
What do we do? 
• Cloud service to fundamentally reduce the complexity of deploying 
Internet of Things solutions. 
• Pay-as-you-grow starting from €1/device/month. 
© Cumulocity GmbH 2014
What is Cumulocity? 
© Cumulocity GmbH 2014
What is the Internet of Things? 
Asset + Device + Application 
© Cumulocity GmbH 2014
What security challenges are there? 
IoT devices are where your assets are. 
• Limited physical control over device and network connection. 
• “Data center distributed all over the country.” 
IoT devices are extremely heterogeneous. 
• Little standardization, thousands of manufacturers and platforms. 
• “BYOD to the max.” 
IoT devices come in billions. 
• … at least if the analysts are right. 
• Great target for dDoS. 
© Cumulocity GmbH 2014
What security challenges are there? 
IoT devices may control the physical world. 
• Production plants, cars, wheel chairs, … 
• Extremely attractive target for attacks. 
IoT business cases often rely on cheap devices. 
• Low-end devices make communication security difficult. 
• Often no remote patching or upgrade facility. 
• Mobile M2M tariffs are counted by the KB, SSL/VPN overhead 
unwanted. 
© Cumulocity GmbH 2014
What common myths are there? 
Actual issues are no surprise to security experts, but … 
• They are not viewed from the context of IoT. 
• They are misunderstood even by renowned publishers. 
© Cumulocity GmbH 2014
© Cumulocity GmbH 2014 
IPSO Power Control 
c’t 09/13, p.98 
Myth #1: The “thing” must be a server
Myth #1: The “thing” must be a server 
© Cumulocity GmbH 2014 
Device is Server Device is Client 
Security Very High Risk No open port => lower 
Optimal for Actuators Sensors 
Data sharing By device 
(not in mobile!) 
By server 
Data Access 
& Scaling 
Difficult to 
impossible 
Easy and cheap 
Addressing Static IP Dynamic & Private IP 
Consequence 
Requires VPN 
Requires Device Push
Myth #2: A VPN solution is enough for security 
© Cumulocity GmbH 2014
Myth #2: A VPN solution is enough for security 
• Industrial-level attacks often come from insiders – IoT is just a new 
dimension. 
• IoT devices are often unattended and a VPN setup may be used as 
entry point into the corporate network. 
• Mobile IoT devices can be still attacked through SMS (reconfiguration, 
redirection, DoS). 
• VPN causes expensive overhead on mobile, customers complain 
about an extra 10-90 MB of traffic per month. 
© Cumulocity GmbH 2014
Myth #3: My protocol is better! 
© Cumulocity GmbH 2014
What you can do! 
Translate your security practices to the IoT world. I.e., 
• Check physical security. 
– USB/serial/LAN ports on devices in public places? 
– Tamper sensors included? 
• Check network security. 
– Switch off SMS on the device or use a secure SMS service. 
– Switch off local/web element managers. 
– Replace standard/static passwords. 
• Check application security. 
– Validate device protocol. Use device only as client to a secure IoT 
service with individual credentials. 
© Cumulocity GmbH 2014
What you can do! 
Don’t reinvent the wheel, pick an IoT middleware … 
© Cumulocity GmbH 2014 
https://cumulocity.com

More Related Content

PDF
Internet of Things
PPTX
Internet of things basics
PDF
Top 10 reasons your IoT project will fail
PDF
Iot 1906 - approaches for building applications with the IBM IoT cloud
PPTX
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
PDF
“Machine Learning for the Real World: What is Acceptable Accuracy, and How Ca...
PDF
People Counting: Internet of Things in Motion at JavaOne 2013
PDF
Session 1908 connecting devices to the IBM IoT Cloud
Internet of Things
Internet of things basics
Top 10 reasons your IoT project will fail
Iot 1906 - approaches for building applications with the IBM IoT cloud
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
“Machine Learning for the Real World: What is Acceptable Accuracy, and How Ca...
People Counting: Internet of Things in Motion at JavaOne 2013
Session 1908 connecting devices to the IBM IoT Cloud

What's hot (20)

PDF
Foster your business with the cloud - Webinar for MSPs
PDF
M2M Scenario
PDF
IBM_BHTelecom_Cloud_Orchestrator
PDF
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
PDF
Real World IoT Architecture Use Cases
PPT
Gen-i: Business Continuity considering reputation, security and virtualisation
PDF
OSGi and Java in Industrial IoT
PDF
Carousel Industries
PDF
Simplify Internet of Things with an Intelligent Gateway
PDF
Ibm ai in cognitive era
PDF
Developing Interoperable Components for an Open IoT Foundation
PDF
L’IoT industriale e i vantaggi competitivi della trasformazione digitale
PPTX
Siyavuyisa Township Networks 2011
PPTX
The Rise of Communications-as-a-Service (CaaS)
PDF
Building IoT Mashups for Industry 4.0 with Eclipse Kura and Kura Wires
PDF
Internet of Things
PDF
IBM Global Technology Services
PDF
Intimate Things: How Wearables Are Changing The Internet of Things
PDF
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - Jasper
PPTX
#bluemixdrone is at Southbank for the IBM Service Advisory Exchange
Foster your business with the cloud - Webinar for MSPs
M2M Scenario
IBM_BHTelecom_Cloud_Orchestrator
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Real World IoT Architecture Use Cases
Gen-i: Business Continuity considering reputation, security and virtualisation
OSGi and Java in Industrial IoT
Carousel Industries
Simplify Internet of Things with an Intelligent Gateway
Ibm ai in cognitive era
Developing Interoperable Components for an Open IoT Foundation
L’IoT industriale e i vantaggi competitivi della trasformazione digitale
Siyavuyisa Township Networks 2011
The Rise of Communications-as-a-Service (CaaS)
Building IoT Mashups for Industry 4.0 with Eclipse Kura and Kura Wires
Internet of Things
IBM Global Technology Services
Intimate Things: How Wearables Are Changing The Internet of Things
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - Jasper
#bluemixdrone is at Southbank for the IBM Service Advisory Exchange
Ad

Similar to Debunking IoT Security Myths (20)

PPTX
IoT security
PDF
IoT – Breaking Bad
PDF
The Internet of Things – Good, Bad or Just Plain Ugly?
PDF
iot-bringing-trust-to-iot[1]
PDF
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
PDF
IoT and the implications on business IT architecture and security
PDF
Security in IoT
PDF
Y20151003 IoT 資訊安全_趨勢科技分享
PDF
Internet of Things Security Patterns
PDF
Internet of Things - A Different Kind of Scary v2
PDF
Cybersecurity in the Age of IoT - Skillmine
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
Kijiji 160616
PPTX
Spirent: The Internet of Things: The Expanded Security Perimeter
PPTX
A Wake-Up Call for IoT
PPTX
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx
PDF
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
PPTX
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
PDF
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
IoT security
IoT – Breaking Bad
The Internet of Things – Good, Bad or Just Plain Ugly?
iot-bringing-trust-to-iot[1]
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IoT and the implications on business IT architecture and security
Security in IoT
Y20151003 IoT 資訊安全_趨勢科技分享
Internet of Things Security Patterns
Internet of Things - A Different Kind of Scary v2
Cybersecurity in the Age of IoT - Skillmine
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Kijiji 160616
Spirent: The Internet of Things: The Expanded Security Perimeter
A Wake-Up Call for IoT
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
Ad

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
Approach and Philosophy of On baking technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
KodekX | Application Modernization Development
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Empathic Computing: Creating Shared Understanding
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Encapsulation theory and applications.pdf
Encapsulation_ Review paper, used for researhc scholars
Agricultural_Statistics_at_a_Glance_2022_0.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Modernizing your data center with Dell and AMD
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KodekX | Application Modernization Development
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Empathic Computing: Creating Shared Understanding
Unlocking AI with Model Context Protocol (MCP)
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Encapsulation theory and applications.pdf

Debunking IoT Security Myths

  • 1. Debunking IoT Security Myths © Cumulocity GmbH 2014 André Eickler
  • 2. Overview • What is Cumulocity? • What is the Internet of Things (IoT)? • What security challenges are there? • What common myths are there? • What you can do! © Cumulocity GmbH 2014
  • 3. What is Cumulocity? Where do we come from? • Started 2010 as Nokia Networks product line. • Independent company since 2012. • Originally targeted to the very security-aware telco industry. What do we do? • Cloud service to fundamentally reduce the complexity of deploying Internet of Things solutions. • Pay-as-you-grow starting from €1/device/month. © Cumulocity GmbH 2014
  • 4. What is Cumulocity? © Cumulocity GmbH 2014
  • 5. What is the Internet of Things? Asset + Device + Application © Cumulocity GmbH 2014
  • 6. What security challenges are there? IoT devices are where your assets are. • Limited physical control over device and network connection. • “Data center distributed all over the country.” IoT devices are extremely heterogeneous. • Little standardization, thousands of manufacturers and platforms. • “BYOD to the max.” IoT devices come in billions. • … at least if the analysts are right. • Great target for dDoS. © Cumulocity GmbH 2014
  • 7. What security challenges are there? IoT devices may control the physical world. • Production plants, cars, wheel chairs, … • Extremely attractive target for attacks. IoT business cases often rely on cheap devices. • Low-end devices make communication security difficult. • Often no remote patching or upgrade facility. • Mobile M2M tariffs are counted by the KB, SSL/VPN overhead unwanted. © Cumulocity GmbH 2014
  • 8. What common myths are there? Actual issues are no surprise to security experts, but … • They are not viewed from the context of IoT. • They are misunderstood even by renowned publishers. © Cumulocity GmbH 2014
  • 9. © Cumulocity GmbH 2014 IPSO Power Control c’t 09/13, p.98 Myth #1: The “thing” must be a server
  • 10. Myth #1: The “thing” must be a server © Cumulocity GmbH 2014 Device is Server Device is Client Security Very High Risk No open port => lower Optimal for Actuators Sensors Data sharing By device (not in mobile!) By server Data Access & Scaling Difficult to impossible Easy and cheap Addressing Static IP Dynamic & Private IP Consequence Requires VPN Requires Device Push
  • 11. Myth #2: A VPN solution is enough for security © Cumulocity GmbH 2014
  • 12. Myth #2: A VPN solution is enough for security • Industrial-level attacks often come from insiders – IoT is just a new dimension. • IoT devices are often unattended and a VPN setup may be used as entry point into the corporate network. • Mobile IoT devices can be still attacked through SMS (reconfiguration, redirection, DoS). • VPN causes expensive overhead on mobile, customers complain about an extra 10-90 MB of traffic per month. © Cumulocity GmbH 2014
  • 13. Myth #3: My protocol is better! © Cumulocity GmbH 2014
  • 14. What you can do! Translate your security practices to the IoT world. I.e., • Check physical security. – USB/serial/LAN ports on devices in public places? – Tamper sensors included? • Check network security. – Switch off SMS on the device or use a secure SMS service. – Switch off local/web element managers. – Replace standard/static passwords. • Check application security. – Validate device protocol. Use device only as client to a secure IoT service with individual credentials. © Cumulocity GmbH 2014
  • 15. What you can do! Don’t reinvent the wheel, pick an IoT middleware … © Cumulocity GmbH 2014 https://cumulocity.com