SlideShare a Scribd company logo
ON-BOARDING IN THE
IOT – A REPORT CARD
Paul Madsen
Senior Technical Architect
Ping Identity (The Identity Division of Vista
Equity)
Copyright © 2014 Ping Identity Corp. All rights reserved.
1
Onboarding, process of
provisioning a client with
credentials for accessing
a network resource and
assigning appropriate
permissions Copyright © 2014 Ping Identity Corp. All rights reserved.
2
Flavours of onboarding in Smart Home
• Device to Device
– E.g Getting a device onto home wifi
• User(Device) to Device
– E.g. Getting house guest onto home wifi
• Device to Application
– Binding a device to a cloud account
• Application to Application
– Assigning a web app permissions to access
API data
Copyright © 2014 Ping Identity Corp. All rights reserved.
3
Copyright © 2014 Ping Identity Corp. All rights reserved.
4
Desired qualities
•Security – must not leak credentials nor
create opportunity for MITM to insert
themselves into process
•Usable – intuitive, learnable & consistent
•Granularity – associated permissions
should be constrained beyond y/n
•Interoperability – proprietary doesn’t scale
(nor enable consistency)
Copyright © 2014 Ping Identity Corp. All rights reserved.
5
Device to Device
Copyright © 2014 Ping Identity Corp. All rights reserved.
6
Copyright © 2014 Ping Identity Corp. All rights reserved.
7
Copyright © 2014 Ping Identity Corp. All rights reserved.
8
WiFi Provisioning mechanisms
• Device hotspot
• WPS Push Button
• Apple Wireless Accessory
Configuration (WAC)
• TI SmartConfig
• OOB, eg BLE, BlinkUp, NFC
Copyright © 2014 Ping Identity Corp. All rights reserved.
9
Insecure
• Lifx bulb creates its own WiFi
AP in order to collect creds of
house WiFi
• If turned on/off 5 times, bulb
resets & creates a new
hotspot
• If attacker creates their own
hotspot at same time, user
can be phished into providing
wifi creds
Proprietary
Copyright © 2014 Ping Identity Corp. All rights reserved.
11
• TI SmartConfig app
provisions SSID credentials
to specialized CC3000 chip
• App encodes credentials as
length of UDP packets
• CC3000 can see the
encrypted packets and their
sizes.
• Chip can decode SSID &
pwd– even from encrypted
packets
Weird….
Copyright © 2014 Ping Identity Corp. All rights reserved.
12
• ElectricImp BlinkUp app
transmits wifi creds by
rapidly flashing light pulses
on the device’s screen
• Light flashes picked up by
optical sensor on device
• Wifi creds decoded and
network joined
Report card
Copyright © 2014 Ping Identity Corp. All rights reserved.
13
Security Usability Granularity Interoperab
ility
Device to
Device
C- B- D D
User(Devic
e) to Device
Device to
Application
Application
to
Application
User (Device) to
Device
Copyright © 2014 Ping Identity Corp. All rights reserved.
14
Copyright © 2014 Ping Identity Corp. All rights reserved.
15
Copyright © 2014 Ping Identity Corp. All rights reserved.
16
Google OnHub password sharing
Copyright © 2014 Ping Identity Corp. All rights reserved.
17
Authorization features
Copyright © 2014 Ping Identity Corp. All rights reserved.
18
But
•Current authz constraint &
automation mechanisms are
defined in terms of the device
•Doesn’t adequately account for
shared devices
•Should instead manage the
combination of the user & the
device (ie relationship)
Copyright © 2014 Ping Identity Corp. All rights reserved.
19
Copyright © 2014 Ping Identity Corp. All rights reserved.
20
Password anti-pattern (in the small)
•Discourages strong wifi
passwords
•No granularity of
authorizations
•Phishable
•Difficult to revoke permissions
Copyright © 2014 Ping Identity Corp. All rights reserved.
21
Copyright © 2014 Ping Identity Corp. All rights reserved.
22
Report card
Copyright © 2014 Ping Identity Corp. All rights reserved.
23
Security Usability Granularity Interoperab
ility
Device to
Device
C- B- D D
User(Devic
e) to Device
C- B+ C B-
Device to
Application
Application
to
Application
Device to Application
Copyright © 2014 Ping Identity Corp. All rights reserved.
24
Two fold• How to
– bind a specific device to an
existing account at an IoT
provider
– Issue that device with a
credential that can be used
to authenticate to a cloud
endpoint
Copyright © 2014 Ping Identity Corp. All rights reserved.
25
Current model
Copyright © 2014 Ping Identity Corp. All rights reserved.
26
Devi
ce
Serve
r
Serve
r
x.509 (or key
pair)
pwd
A new anti-pattern?
•Normal challenges of lifecycle
management of certs, ie PKI
•Can’t support shared devices
•Doesn’t inhibit correlation
Copyright © 2014 Ping Identity Corp. All rights reserved.
27
Authentication Chain
Copyright © 2014 Ping Identity Corp. All rights reserved.
28
Attestation
keys
Device
generated
keys
Signed
device keys
User creds
Tokens
Report card
Copyright © 2014 Ping Identity Corp. All rights reserved.
29
Security Usability Granularity Interoperab
ility
Device to
Device
C- B- D D
User(Devic
e) to Device
C- B+ C B
Device to
Application
C B D D
Application
to
Application
Application to
Application
Copyright © 2014 Ping Identity Corp. All rights reserved.
30
Good news
Copyright © 2014 Ping Identity Corp. All rights reserved.
31
Cautionary tale
• OAuth 2.0 is not a
silver bullet
• Doesn’t guarantee
appropriate
permissions/scopes
• Authz to ‘close’ door
should not necessarily
mean authz to ‘open
door’
Copyright © 2014 Ping Identity Corp. All rights reserved.
32
Report card
Copyright © 2014 Ping Identity Corp. All rights reserved.
33
Security Usability Granularity Interoperab
ility
Device to
Device
C- B- D D
User(Devic
e) to Device
C- B+ C B
Device to
Application
C B D D
Application
to
Application
B+ B+ B- A-
Copyright © 2014 Ping Identity Corp. All rights reserved.
34
Time to graduate
Problem is using
primary credentials
(certs, device keys,
passwords) where
secondary (tokens) are
more appropriateCopyright © 2014 Ping Identity Corp. All rights reserved.
35
Copyright © 2014 Ping Identity Corp. All rights reserved.
36
Need to apply
delegated authz model
to all flavours of Smart
Home onboarding (and
not just app to app)
Copyright © 2014 Ping Identity Corp. All rights reserved.
37
What do we need
• OAuth AS capabilities in routers/hubs
– Emerging authz features in routers a first step?
• Bindings of delegated authz model to
constrained IoT protocols
– a la IEF ACE WG
– NAPPS TA?
• Intuitive & usable authz ceremonies
– App-based
– Voice? Amazon Echo et al
Copyright © 2014 Ping Identity Corp. All rights reserved.
38
Copyright © 2014 Ping Identity Corp. All rights reserved.
39
THANKS
@paulmadsen
Copyright © 2014 Ping Identity Corp. All rights reserved.
40

More Related Content

PDF
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
PPTX
CIS 2013 Ping Identity Chalktalk
PDF
Managing Mobile Business Insecurities
PPT
You Can't Spell Enterprise Security without MFA
PPT
Identity-Defined Privacay & Security for Internet of Things
PDF
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
PPTX
IDENTITY IN THE WORLD OF IOT
PDF
Dissecting internet of things by avinash sinha
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
CIS 2013 Ping Identity Chalktalk
Managing Mobile Business Insecurities
You Can't Spell Enterprise Security without MFA
Identity-Defined Privacay & Security for Internet of Things
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
IDENTITY IN THE WORLD OF IOT
Dissecting internet of things by avinash sinha

What's hot (20)

PDF
Security in the Internet of Things
PPTX
Iot top 10 vulnerabilities and misconceptions 2016
PDF
Shining a Light on Shadow Devices
PPTX
IoT Security Risks and Challenges
PPTX
Security for iot and cloud aug 25b 2017
PPTX
IoT Security Middleware: evaluating the threats and protecting against them
PPTX
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
PDF
Iot Security and Privacy at Scale
PPTX
IoT Security: Cases and Methods [CON5446]
PDF
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
PPTX
IoT security presented in Ada's List Conference
PPTX
Iot(security)
PPTX
IoT Security: Cases and Methods
PDF
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
PDF
IOT Security
PPT
IoT security (Internet of Things)
PPT
How BYOD Will Shape Wireless Network Security in 2012
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PPTX
Internet of Things (IoT) Security
PDF
Internet of Things: Challenges and Issues
Security in the Internet of Things
Iot top 10 vulnerabilities and misconceptions 2016
Shining a Light on Shadow Devices
IoT Security Risks and Challenges
Security for iot and cloud aug 25b 2017
IoT Security Middleware: evaluating the threats and protecting against them
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Iot Security and Privacy at Scale
IoT Security: Cases and Methods [CON5446]
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
IoT security presented in Ada's List Conference
Iot(security)
IoT Security: Cases and Methods
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
IOT Security
IoT security (Internet of Things)
How BYOD Will Shape Wireless Network Security in 2012
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Internet of Things (IoT) Security
Internet of Things: Challenges and Issues
Ad

Viewers also liked (11)

PDF
ARM CoAP Tutorial
PDF
2017 Event Technology Landscape
PPTX
Event management system india
PDF
Event management software market teaser
PDF
IoTivity 오픈소스 기술
PDF
(2015년 상반기) HTML5 및 Hybrid app 최신 동향
PPTX
Event management business plan
PPT
Event Planning Business Plan
PPT
Event Management
PPTX
Marketing plan of event management corporation
PPT
Event management
ARM CoAP Tutorial
2017 Event Technology Landscape
Event management system india
Event management software market teaser
IoTivity 오픈소스 기술
(2015년 상반기) HTML5 및 Hybrid app 최신 동향
Event management business plan
Event Planning Business Plan
Event Management
Marketing plan of event management corporation
Event management
Ad

Similar to Onboarding in the IoT (20)

PPTX
Neudesic IoT HIMSS Healthcare
PPTX
Catalyst 2015: Patrick Harding
PPTX
Connecting The Real World With The Virtual World
PPTX
Defining Advanced AAA Policies for Access Networks
PPTX
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
PDF
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
PDF
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
PDF
DIRECTORY CIS 2015 - Eric Fazendin
PPTX
Internet of Things: Identity & Security with Open Standards
PDF
Identity for IoT: An Authentication Framework for the IoT
PDF
CIS14: Securing the Internet of Things with Open Standards
PDF
Who’s Knocking? Identity for APIs, Web and Mobile
PDF
APIsecure 2023 - For flex(ibility) sake, modernize your legacy APIs!, Topher ...
PPTX
Mobile Device Mismanagement
PDF
Ryan Wilson - ryanwilson.com - IoT Security
PDF
cACCESS_ZTNA PRODUCT CATALOGUE IN THE FILE.pdf
PDF
Implementing the 5 Pillars of IT Security for MQTT
PPTX
PDF
FIDO, Federation and the Internet of Things
PDF
[CLASS 2014] Palestra Técnica - Michael Firstenberg
Neudesic IoT HIMSS Healthcare
Catalyst 2015: Patrick Harding
Connecting The Real World With The Virtual World
Defining Advanced AAA Policies for Access Networks
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
DIRECTORY CIS 2015 - Eric Fazendin
Internet of Things: Identity & Security with Open Standards
Identity for IoT: An Authentication Framework for the IoT
CIS14: Securing the Internet of Things with Open Standards
Who’s Knocking? Identity for APIs, Web and Mobile
APIsecure 2023 - For flex(ibility) sake, modernize your legacy APIs!, Topher ...
Mobile Device Mismanagement
Ryan Wilson - ryanwilson.com - IoT Security
cACCESS_ZTNA PRODUCT CATALOGUE IN THE FILE.pdf
Implementing the 5 Pillars of IT Security for MQTT
FIDO, Federation and the Internet of Things
[CLASS 2014] Palestra Técnica - Michael Firstenberg

More from Paul Madsen (12)

PPTX
Native application Single SignOn
PPTX
BYOD - it's an identity thing
PPTX
Madsen byod-csa-02
PPTX
A recipe for standards-based Cloud IdM
PPTX
Saas webinar-dec6-01
PPTX
Jan19 scim webinar-04
PPTX
Mobile Native OAuth Decision Framework
PDF
Gluecon oauth-03
PPT
Proxying Assurance between OpenID & SAML
PPT
DIWD Concordia
PPT
Oauth 01
PDF
Iiw2007b Madsen 01
Native application Single SignOn
BYOD - it's an identity thing
Madsen byod-csa-02
A recipe for standards-based Cloud IdM
Saas webinar-dec6-01
Jan19 scim webinar-04
Mobile Native OAuth Decision Framework
Gluecon oauth-03
Proxying Assurance between OpenID & SAML
DIWD Concordia
Oauth 01
Iiw2007b Madsen 01

Recently uploaded (20)

PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
Digital Literacy And Online Safety on internet
PPTX
Funds Management Learning Material for Beg
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Internet___Basics___Styled_ presentation
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Testing WebRTC applications at scale.pdf
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
Introduction to Information and Communication Technology
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPT
tcp ip networks nd ip layering assotred slides
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
QR Codes Qr codecodecodecodecocodedecodecode
Digital Literacy And Online Safety on internet
Funds Management Learning Material for Beg
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Internet___Basics___Styled_ presentation
The Internet -By the Numbers, Sri Lanka Edition
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Tenda Login Guide: Access Your Router in 5 Easy Steps
Module 1 - Cyber Law and Ethics 101.pptx
Testing WebRTC applications at scale.pdf
Introuction about WHO-FIC in ICD-10.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Introduction to Information and Communication Technology
Decoding a Decade: 10 Years of Applied CTI Discipline
tcp ip networks nd ip layering assotred slides
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf

Onboarding in the IoT

  • 1. ON-BOARDING IN THE IOT – A REPORT CARD Paul Madsen Senior Technical Architect Ping Identity (The Identity Division of Vista Equity) Copyright © 2014 Ping Identity Corp. All rights reserved. 1
  • 2. Onboarding, process of provisioning a client with credentials for accessing a network resource and assigning appropriate permissions Copyright © 2014 Ping Identity Corp. All rights reserved. 2
  • 3. Flavours of onboarding in Smart Home • Device to Device – E.g Getting a device onto home wifi • User(Device) to Device – E.g. Getting house guest onto home wifi • Device to Application – Binding a device to a cloud account • Application to Application – Assigning a web app permissions to access API data Copyright © 2014 Ping Identity Corp. All rights reserved. 3
  • 4. Copyright © 2014 Ping Identity Corp. All rights reserved. 4
  • 5. Desired qualities •Security – must not leak credentials nor create opportunity for MITM to insert themselves into process •Usable – intuitive, learnable & consistent •Granularity – associated permissions should be constrained beyond y/n •Interoperability – proprietary doesn’t scale (nor enable consistency) Copyright © 2014 Ping Identity Corp. All rights reserved. 5
  • 6. Device to Device Copyright © 2014 Ping Identity Corp. All rights reserved. 6
  • 7. Copyright © 2014 Ping Identity Corp. All rights reserved. 7
  • 8. Copyright © 2014 Ping Identity Corp. All rights reserved. 8
  • 9. WiFi Provisioning mechanisms • Device hotspot • WPS Push Button • Apple Wireless Accessory Configuration (WAC) • TI SmartConfig • OOB, eg BLE, BlinkUp, NFC Copyright © 2014 Ping Identity Corp. All rights reserved. 9
  • 10. Insecure • Lifx bulb creates its own WiFi AP in order to collect creds of house WiFi • If turned on/off 5 times, bulb resets & creates a new hotspot • If attacker creates their own hotspot at same time, user can be phished into providing wifi creds
  • 11. Proprietary Copyright © 2014 Ping Identity Corp. All rights reserved. 11 • TI SmartConfig app provisions SSID credentials to specialized CC3000 chip • App encodes credentials as length of UDP packets • CC3000 can see the encrypted packets and their sizes. • Chip can decode SSID & pwd– even from encrypted packets
  • 12. Weird…. Copyright © 2014 Ping Identity Corp. All rights reserved. 12 • ElectricImp BlinkUp app transmits wifi creds by rapidly flashing light pulses on the device’s screen • Light flashes picked up by optical sensor on device • Wifi creds decoded and network joined
  • 13. Report card Copyright © 2014 Ping Identity Corp. All rights reserved. 13 Security Usability Granularity Interoperab ility Device to Device C- B- D D User(Devic e) to Device Device to Application Application to Application
  • 14. User (Device) to Device Copyright © 2014 Ping Identity Corp. All rights reserved. 14
  • 15. Copyright © 2014 Ping Identity Corp. All rights reserved. 15
  • 16. Copyright © 2014 Ping Identity Corp. All rights reserved. 16
  • 17. Google OnHub password sharing Copyright © 2014 Ping Identity Corp. All rights reserved. 17
  • 18. Authorization features Copyright © 2014 Ping Identity Corp. All rights reserved. 18
  • 19. But •Current authz constraint & automation mechanisms are defined in terms of the device •Doesn’t adequately account for shared devices •Should instead manage the combination of the user & the device (ie relationship) Copyright © 2014 Ping Identity Corp. All rights reserved. 19
  • 20. Copyright © 2014 Ping Identity Corp. All rights reserved. 20
  • 21. Password anti-pattern (in the small) •Discourages strong wifi passwords •No granularity of authorizations •Phishable •Difficult to revoke permissions Copyright © 2014 Ping Identity Corp. All rights reserved. 21
  • 22. Copyright © 2014 Ping Identity Corp. All rights reserved. 22
  • 23. Report card Copyright © 2014 Ping Identity Corp. All rights reserved. 23 Security Usability Granularity Interoperab ility Device to Device C- B- D D User(Devic e) to Device C- B+ C B- Device to Application Application to Application
  • 24. Device to Application Copyright © 2014 Ping Identity Corp. All rights reserved. 24
  • 25. Two fold• How to – bind a specific device to an existing account at an IoT provider – Issue that device with a credential that can be used to authenticate to a cloud endpoint Copyright © 2014 Ping Identity Corp. All rights reserved. 25
  • 26. Current model Copyright © 2014 Ping Identity Corp. All rights reserved. 26 Devi ce Serve r Serve r x.509 (or key pair) pwd
  • 27. A new anti-pattern? •Normal challenges of lifecycle management of certs, ie PKI •Can’t support shared devices •Doesn’t inhibit correlation Copyright © 2014 Ping Identity Corp. All rights reserved. 27
  • 28. Authentication Chain Copyright © 2014 Ping Identity Corp. All rights reserved. 28 Attestation keys Device generated keys Signed device keys User creds Tokens
  • 29. Report card Copyright © 2014 Ping Identity Corp. All rights reserved. 29 Security Usability Granularity Interoperab ility Device to Device C- B- D D User(Devic e) to Device C- B+ C B Device to Application C B D D Application to Application
  • 30. Application to Application Copyright © 2014 Ping Identity Corp. All rights reserved. 30
  • 31. Good news Copyright © 2014 Ping Identity Corp. All rights reserved. 31
  • 32. Cautionary tale • OAuth 2.0 is not a silver bullet • Doesn’t guarantee appropriate permissions/scopes • Authz to ‘close’ door should not necessarily mean authz to ‘open door’ Copyright © 2014 Ping Identity Corp. All rights reserved. 32
  • 33. Report card Copyright © 2014 Ping Identity Corp. All rights reserved. 33 Security Usability Granularity Interoperab ility Device to Device C- B- D D User(Devic e) to Device C- B+ C B Device to Application C B D D Application to Application B+ B+ B- A-
  • 34. Copyright © 2014 Ping Identity Corp. All rights reserved. 34
  • 35. Time to graduate Problem is using primary credentials (certs, device keys, passwords) where secondary (tokens) are more appropriateCopyright © 2014 Ping Identity Corp. All rights reserved. 35
  • 36. Copyright © 2014 Ping Identity Corp. All rights reserved. 36
  • 37. Need to apply delegated authz model to all flavours of Smart Home onboarding (and not just app to app) Copyright © 2014 Ping Identity Corp. All rights reserved. 37
  • 38. What do we need • OAuth AS capabilities in routers/hubs – Emerging authz features in routers a first step? • Bindings of delegated authz model to constrained IoT protocols – a la IEF ACE WG – NAPPS TA? • Intuitive & usable authz ceremonies – App-based – Voice? Amazon Echo et al Copyright © 2014 Ping Identity Corp. All rights reserved. 38
  • 39. Copyright © 2014 Ping Identity Corp. All rights reserved. 39
  • 40. THANKS @paulmadsen Copyright © 2014 Ping Identity Corp. All rights reserved. 40

Editor's Notes

  • #4: What these all share is the concept of 1) provisioning credentials to some client/actor and 2) constraining the privileges assigned to that client/actor
  • #37: If you do the authentication piece of onboarding wrong, you can’t do the authorization piece right. Shaky foundation Fundamental problem is relying on primary credentials for authentication to applications/resources instead of secondary credentials