SlideShare a Scribd company logo
WEBINAR
AUTHENTICATING “THINGS”
THE PITFALLS AND PROMISES
OF AUTHENTICATION IN THE CONSUMER IoT
JUNE 2016
MICHAEL THELANDER
2
3
AGENDA
1
2
3
WHAT’S SO
REVOLUTIONARY?
Industrial vs. Consumer IoT
Unexpected risks and rewards
AUTHENTICATION IN THE IoT
Authentication standards & guidelines
“Three from Three” Guidance
IF AUTHENTICATION FAILS
New and frightening hacks
What’s next?
4 YOU ARE YOUR DEVICE Your device as your proxy
WHAT’S SO
REVOLUTIONARY…
ABOUT THE INTERNET OF THINGS?
5
A MERCANTIL E REVOL UTION
Guns, cloth, iron
and beer
Slaves, gold, spices
Slaves, raw sugar,
and molasses
Whale oil, lumber, cotton,
rum and tobacco
The crown
orchestrated a
complex
global dance
that leveraged
the best
knowledge
and the most
favorable
terms
anywhere in
the world.
6
A MERCANTIL E REVOL UTION
At the top of the
pyramid, Great Britain
used these imports to
manufacture and
distribute complex
products that created
vast wealth and
power.
7
A MERCANTIL E REVOL UTION
Closer to the raw materials needed for production
Respond immediately to change
Intimate understanding ofall parts of a complex process
Organize and manage their own markets
8
That’s a bit like what’s happening
in the industrial IoT today.
9
MIC H A E L T H E LA N DE R
P R O D U C T M A R K E T I N G M A N A G E R , A U T H E N T I C A T I O N
n Manages go-to-market, launch and customer education activities for
iovation’s authentication products.
n 20 years in VP- and director-level product management and
marketing roles for technology and information security companies.
10
11
12
13
14
15
16
17
18
What about the consumer IoT?
19
TWO F ACES OF THE Io T
K E Y D I F F E R E N C E S B E T W E E N I N D U S T R I A L A N D C O N S U M E R I o T
• Security and privacy standards
and guidelines are an inherent
part of the picture
• Device lifespan can be
measured in decades
• Criticality of RTOS
• Continuity of data is a major
consideration
INDUSTRIAL IoT
• Minimal attention to security
standards and guidelines,
consumers blasé about privacy
• Device lifespan can be
measured in months
• Less-than-critical infrastructure in
most current cases
• Expected gaps in data flow
CONSUMER IoT
20
21
22
23
24
25
“The smartphone
will become the
foundational banking
tool.”
26
27
28
29
Security. Privacy.
30
“B IG DATA” B ECOMES PERSONAL
INTERNET-CONNECTED DEVICES
4.9 B in 2015
20.8 B in 2020
450%
10,000 EB in 2015
400%
40,000 EB in 2020
STORAGE REQUIRED FOR THE DATA
(One exabyte can hold 500 to 1000 times
the entire content of the Library of Congress.)
31
“B IG DATA” B ECOMES PERSONAL
10,000 EB in 2015
40,000 EB in 2020
STORAGE REQUIRED FOR THE DATA
(One exabyte can hold 500 to 1000 times
the entire content of the Library of Congress.)
= 20,800 GB
400%
32
AUTHENTICATION
IN THE IoT
34
Authentication.
35
“Hello.
It’s me”.
36
“Hello.
It’s me”.
37
“Hello.
It’s me”.
38
“Hello.
It’s me”.
39
“Hello.
It’s me”.
40
“Hello.
It’s me”.
41
42
“These technical guidelines cover remote digital authentication of human users to IT systems
over a network… However do not specifically address machine-to-machine
(such as router-to-router) authentication, or establish specific requirements for issuing
authentication credentials and authenticators to machines and servers when
they are used in authentication protocols with people.”
However do not specifically address machine-to-machine
(such as router-to-router) authentication, or establish specific requirements for issuing
authentication credentials and authenticators to machines and servers when
they are used in authentication protocols with people.”
New
v 63-3
Due
Soon
43
44
THREE F ROM THREE
G U I D A N C E F R O M T H R E E P I E C E S O F R E C E N T R E S E A R C H
45
“Others have pointed to the need to research
methods that provide context-based authentication
as a new factor in an authentication process. .”
46
1. Identity Relationship Management (IRM) replaces IAM
n Consumers and things over employees
n Internet-scale over Enterprise-scale
n Borderless over perimeter
2. Use of smartphones as a primary means of authentication in the IoT
n Context-based authentication over MFA
n Enterprise-level local authentication to IoT devices
n Single sensor for multiple authentication methods:
THREE F ROM THREE: CSA
C L O U D S E C U R I T Y A L L I A N C E – I R M A N D S M A R T P H O N E S
47
3. Leverage the security controls built into standards-based IoT protocols
THREE F ROM THREE: CSA
I o T S E C U R I T Y F O R C O N S U M E R D E V I C E S
Protocol M2M Auth Options
MQTT Username / password
CoAP
preShared Key
rawPublicKey
XMPP Multiple options
DDS
x.509 Certificates (PKI)
Tokens
Protocol M2M Auth Options
Zigbee Pre-shared keys
Bluetooth Shared key
Bluetooth LE
Connection signature
resolving key
HTTP/REST TLS or OAUTH 2
48
3. Leverage the security controls built into standards-based IoT protocols
THREE F ROM THREE: CSA
C L O U D S E C U R I T Y A L L I A N C E S U M M A R S Y G U I D A N C E O N I o T
• Low memory: works on micro-
controllers was low as 10 KiB of RAM
• Default choice of DTLS parameters
is equivalent to 3072-bit RSA keys
• CoAP integrates with XML, JSON,
CBOR, or data format of choice
• REST model integrates with typical
sites and applications
49
“No single method for peer authentication and end-to-
end data protection meets the Internet of Things (IoT)
device security and operational requirements.”
50
1. Mobile devices can be
gateways, consumers, or
IoT nodes
THREE F ROM THREE: GARTNER
I T ’ S N O T J U S T A P H O N E
51
2. Understand domains, classes of
devices, and “delegation of trust”
n Class 1: Simple sensors or actuators
n Class 2: Can perform storage or analysis,
e.g. hubs, concentrator, gateways
n Class 3: Complex devices, servers than
can act as aggregators, e.g. security
analytics
THREE F ROM THREE: GARTNER
N O T A L L D E V I C E S A R E C R E A T E D E Q U A L
52
3. Building a trust model based
on “hops”
n No hop: trust is achieved by device
authenticating to local gateway
n Single hop: Device authenticates to
gateway, and gateway to an IoT service
or application
n Multihop: Trust achieved by devices
authenticating to trust anchors
(gateways), and then the trust anchors
federate trust across all required
domains and trust models
THREE F ROM THREE: GARTNER
T R U S T M O D E L S M A T T E R
53
“Authentication is the process of verification that an
individual, entity or website is who it claims to be.”
54
1. The only guidance using three different perspectives:
n Manufacturer IoT Guidance: The goal of this section is help
manufacturers build more secure products in the Internet of Things
space.
n Developer IoT Guidance: The goal of this section is help developers
build more secure applications in the Internet of Things space.
n Consumer IoT Guidance: The goal of this section is help consumers
purchase secure products in the Internet of Things space.
THREE F ROM THREE: OWASP
I o T S E C U R I T Y G U I D A N C E I N T H R E E C A T E G O R I E S
55
2. A comprehensive framework:
n 1 IoT Framework Security
Considerations: Definitions
n 2 Edge: Framework Considerations
for Edge Component
n 3 Gateway: Framework
Considerations for Gateway
Component
n 4 Cloud: Framework Considerations
for Cloud Component
n 5 Mobile: Framework Considerations
for Mobile Component
THREE F ROM THREE: OWASP
M U L T I - P A R T S E C U R I T Y A N D P R I V A C Y F R A M E W O R K
• Communications encryption
• Storage encryption
• Strong logging
• Auto updates / versioning
• Update verification
• Cryptographic ID capabilities
• No default passwords
• Offline security features
• Configurable root trust store
• Device and owner
authentication
• Transitive ownership
capabilities
• Defensive capabilities
• Plugin or ext. verify, report,
update
• Secure M2M
• Secure Web interface
• Utilize established protocols
• Latest, updated 3rd
-party
components
• Use of hardware device
• Support MFA
• Temporal and spacial
authentication
• Tracks data from insecure
sources
• Features disabled by default
• Written in programming
languages that possess
security countermeasures
• Device monitoring and
management capabilities
2 Edge: Framework Considerations
for Edge Component
56
3. Provides a unique focus on authentication testing
THREE F ROM THREE: OWASP
F O C U S O N T E S T I N G
n Assess the solution for the use of
strong passwords where authentication
is needed
n Assess the solution for multi-user
environments and ensure it includes
functionality for role separation
n Assess the solution for Implementation
two-factor authentication where
possible
n Assess password recovery mechanisms
n Assess password recovery mechanisms
n Assess the solution for the option to
require strong passwords
n Assess the solution for the option to
force password expiration after a
specific period
n Assess the solution for the option to
change the default username and
password
57
9
1. Identity relationship
management – not
IAM – is key
2. Smartphones will be
the primary means
of authentication in
the IoT
3. Leverage built-in
security controls
4. Mobile devices will
fill multiple roles in
the IoT scheme
5. Domains & classes
drive delegation of
trust models
6. Build your trust
model based on
“hops”
7. Multiple perspectives
matter
8. Provides a
comprehensive
framework
9. Provides a unique
authentication
focus
SUMMARIZING THE “THREE F ROM THREE”
AUTHENTICATION FAIL
INTRIGUING HACKS IN THE IoT
59
60
61
YOU ARE YOUR DEVICE
YOUR TRUSTWORTHY PROXY?
63
“Hello.
It’s me”.
64
“Hello.
It’s me”.
65
66
BIOMETRICS
IP ADDRESS JAILBROKEN
OR ROOTED
GEO LOCATION
ASSOCIATIONSSECURITY RISK
67
n MD5 Hash of the full font list
n Random sample of 15 fonts
n Flash SharedObjects not writable
n Flash socket 843 based ip (real IP)
n Boolean indicator: flash took longer
than expected to execute
n Accepted Char Sets in HTTP header
n Accepted languages in HTTP header
n Browser user agent comment string
n Browser name / OS / Ver / language
n Cookie writes excluded
n Boolean indicator, javascript enabled
n Count of fonts in the full list
n Flash 3-part version (16.0.0)
n Flash 4-part version (16.0.0.305)
n List of browser plugins
n JavaScript screen resolution
n Simbar toolbar GUID from HTTP hdr
n Timezone offset in minutes
n ... and more
n WiFi (or Bluetooth) MAC Address
n Network configuration
n iOS Device Model
n Battery level / AC mode
n Device orientation
n File system size
n Physical memory
n CPU Type / Count /Speed
n Number attached accessories
n Has proximity sensor?
n Screen brightness and resolution
n System uptime
n iOS Device Name (MD5 Hash)
n OS Name and/or version
n Device advertising UUID
n Kernel version
n iCloud Ubiquity Token
n Application Vendor UUID /name/vers
n Locale language / currency code
n … and 100s more
n Model and Device Model
n Build.DEVICE & Build.HARDWARE
n Build.HOST & Build.ID
n Manufacturer
n Build.PRODUCT & Build.TIME
n Network Operator ID & Name
n Sim Operator ID & Country
n System Uptime in Seconds
n Is the device plugged in
n CPU Type
n Physical memory
n Unique build fingerprint of app
n Android SDK Level
n Android Build Number (DISPLAY)
n Android Device System Version
n Detected attempt at hiding root detect
n Kernel Version (was AKV)
n Android Locale Country Code
n Desktop Wallpaper Hash
n … and 100s more
DEVICE-BASED AUTHENTICATION
THE USER’S DEVICE AS A ROBUST, INVISIBLE SECOND FACTOR
Web Device Print iOS SDK Android SDK
68
Q&A
CONTACT US
www.iovation.com
twitter.com/iovation

More Related Content

PPTX
Security and Authentication of Internet of Things (IoT) Devices
PDF
Identity for IoT: An Authentication Framework for the IoT
PPTX
IDENTITY IN THE WORLD OF IOT
PDF
1 importance of light weight authentication in iot
PPTX
Internet of Things: Identity & Security with Open Standards
PDF
The Future of Authentication for IoT
PPTX
Iot Security
PPTX
IoT Security: Cases and Methods [CON5446]
Security and Authentication of Internet of Things (IoT) Devices
Identity for IoT: An Authentication Framework for the IoT
IDENTITY IN THE WORLD OF IOT
1 importance of light weight authentication in iot
Internet of Things: Identity & Security with Open Standards
The Future of Authentication for IoT
Iot Security
IoT Security: Cases and Methods [CON5446]

What's hot (20)

PDF
IoT security fresh thinking 2017 sep 9
PPTX
Security for iot and cloud aug 25b 2017
PPTX
A survey in privacy and security in Internet of Things IOT
PDF
IoT Security Challenges and Solutions
PPTX
IoT Security
PPTX
IoT Security Risks and Challenges
PPTX
IoT Security: Cases and Methods
PDF
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
PPTX
IoT Security Briefing FBI 07 23-2017 final
PPTX
security and privacy-Internet of things
PPTX
IoT Security Training, IoT Security Awareness 2019
PPTX
Internet of Things Security
PDF
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
PDF
IoT security and privacy: main challenges and how ISOC-OTA address them
PDF
Will Internet of Things (IoT) be secure enough?
PDF
Unauthorized Access Detection in IoT using Canary Token Algorithm
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PPTX
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
PPT
IoT Security by Sanjay Kumar
PDF
Security in IoT
IoT security fresh thinking 2017 sep 9
Security for iot and cloud aug 25b 2017
A survey in privacy and security in Internet of Things IOT
IoT Security Challenges and Solutions
IoT Security
IoT Security Risks and Challenges
IoT Security: Cases and Methods
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IoT Security Briefing FBI 07 23-2017 final
security and privacy-Internet of things
IoT Security Training, IoT Security Awareness 2019
Internet of Things Security
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
IoT security and privacy: main challenges and how ISOC-OTA address them
Will Internet of Things (IoT) be secure enough?
Unauthorized Access Detection in IoT using Canary Token Algorithm
IoT Security, Threats and Challenges By V.P.Prabhakaran
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
IoT Security by Sanjay Kumar
Security in IoT
Ad

Viewers also liked (10)

PDF
Delegation-based Authentication and Authorization for the IP-based IoT
PPTX
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
PDF
40 IOT Innovations which are changing life
PDF
IoT: LoRa and Java on the PI
PDF
Intro Lora - Makers.ID Meetup
PDF
PEM1: Device Authentication in IIOT ( Predix Transform 2016)
PDF
IoT Security: Problems, Challenges and Solutions
PDF
LoRa and NB-IoT
PPTX
IoT - IT 423 ppt
PDF
Internet of Things
Delegation-based Authentication and Authorization for the IP-based IoT
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
40 IOT Innovations which are changing life
IoT: LoRa and Java on the PI
Intro Lora - Makers.ID Meetup
PEM1: Device Authentication in IIOT ( Predix Transform 2016)
IoT Security: Problems, Challenges and Solutions
LoRa and NB-IoT
IoT - IT 423 ppt
Internet of Things
Ad

Similar to AuthentiThings: The Pitfalls and Promises of Authentication in the IoT (20)

PPTX
Security in IoT
DOCX
Security and Privacy considerations in Internet of Things
PDF
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
PDF
RISE OF THE MACHINES: IRM IN AN IOT WORLD
DOCX
Addressing security and privacy in io t ecosystem v0.4
PDF
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
PDF
Securing the Internet of Things
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
IoT – Breaking Bad
PPTX
Security issues and solutions : IoT
PDF
Security Aspects in IoT - A Review
PPTX
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx
PPTX
IoT_Implemented
PDF
Internet of things (IoT) Architecture Security Analysis
PDF
A survey on secure communication protocols for io t systems
PDF
IoT Security and Privacy Considerations
PPTX
Security challenges for internet of things
PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
PDF
March 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Security in IoT
Security and Privacy considerations in Internet of Things
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
RISE OF THE MACHINES: IRM IN AN IOT WORLD
Addressing security and privacy in io t ecosystem v0.4
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
Securing the Internet of Things
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
IoT – Breaking Bad
Security issues and solutions : IoT
Security Aspects in IoT - A Review
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx
IoT_Implemented
Internet of things (IoT) Architecture Security Analysis
A survey on secure communication protocols for io t systems
IoT Security and Privacy Considerations
Security challenges for internet of things
Technology & Policy Interaction Panel at Inform[ED] IoT Security
March 2021: Top 10 Read Articles in Network Security and Its Applications
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies

More from TransUnion (20)

PPTX
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
PPTX
A New Imperative: Global Privacy and Data Strategies
PPTX
The Business Imperative for Identity, Trust and Data Stewardship
PPTX
2020 i gaming report webinar
PPTX
Financial services report webinar v4
PPTX
Webinar: Roll Out the VIP Path to Play
PPT
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PPT
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
PPTX
How Confused.com and iovation Fight Ghost Broking
PPTX
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
PDF
The Insurance Digital Revolution Has a Fraud Problem
PPTX
PSD2: The Advent of the New Payments Market in Europe
PPTX
How E-Commerce Providers Can Remove ATO from Their Carts
PPTX
2019 iovation Gambling Industry Report Highlights
PPTX
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
PPTX
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
PPTX
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
PPTX
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
PPTX
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
PPTX
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
A New Imperative: Global Privacy and Data Strategies
The Business Imperative for Identity, Trust and Data Stewardship
2020 i gaming report webinar
Financial services report webinar v4
Webinar: Roll Out the VIP Path to Play
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
How Confused.com and iovation Fight Ghost Broking
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
The Insurance Digital Revolution Has a Fraud Problem
PSD2: The Advent of the New Payments Market in Europe
How E-Commerce Providers Can Remove ATO from Their Carts
2019 iovation Gambling Industry Report Highlights
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Approach and Philosophy of On baking technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
Teaching material agriculture food technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Cloud computing and distributed systems.
PDF
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectroscopy.pptx food analysis technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Approach and Philosophy of On baking technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Understanding_Digital_Forensics_Presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
Teaching material agriculture food technology
Programs and apps: productivity, graphics, security and other tools
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Weekly Chronicles - August'25 Week I
MIND Revenue Release Quarter 2 2025 Press Release
Cloud computing and distributed systems.
Electronic commerce courselecture one. Pdf

AuthentiThings: The Pitfalls and Promises of Authentication in the IoT

  • 1. WEBINAR AUTHENTICATING “THINGS” THE PITFALLS AND PROMISES OF AUTHENTICATION IN THE CONSUMER IoT JUNE 2016 MICHAEL THELANDER
  • 2. 2
  • 3. 3 AGENDA 1 2 3 WHAT’S SO REVOLUTIONARY? Industrial vs. Consumer IoT Unexpected risks and rewards AUTHENTICATION IN THE IoT Authentication standards & guidelines “Three from Three” Guidance IF AUTHENTICATION FAILS New and frightening hacks What’s next? 4 YOU ARE YOUR DEVICE Your device as your proxy
  • 5. 5 A MERCANTIL E REVOL UTION Guns, cloth, iron and beer Slaves, gold, spices Slaves, raw sugar, and molasses Whale oil, lumber, cotton, rum and tobacco The crown orchestrated a complex global dance that leveraged the best knowledge and the most favorable terms anywhere in the world.
  • 6. 6 A MERCANTIL E REVOL UTION At the top of the pyramid, Great Britain used these imports to manufacture and distribute complex products that created vast wealth and power.
  • 7. 7 A MERCANTIL E REVOL UTION Closer to the raw materials needed for production Respond immediately to change Intimate understanding ofall parts of a complex process Organize and manage their own markets
  • 8. 8 That’s a bit like what’s happening in the industrial IoT today.
  • 9. 9 MIC H A E L T H E LA N DE R P R O D U C T M A R K E T I N G M A N A G E R , A U T H E N T I C A T I O N n Manages go-to-market, launch and customer education activities for iovation’s authentication products. n 20 years in VP- and director-level product management and marketing roles for technology and information security companies.
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. 18 What about the consumer IoT?
  • 19. 19 TWO F ACES OF THE Io T K E Y D I F F E R E N C E S B E T W E E N I N D U S T R I A L A N D C O N S U M E R I o T • Security and privacy standards and guidelines are an inherent part of the picture • Device lifespan can be measured in decades • Criticality of RTOS • Continuity of data is a major consideration INDUSTRIAL IoT • Minimal attention to security standards and guidelines, consumers blasé about privacy • Device lifespan can be measured in months • Less-than-critical infrastructure in most current cases • Expected gaps in data flow CONSUMER IoT
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. 25 “The smartphone will become the foundational banking tool.”
  • 26. 26
  • 27. 27
  • 28. 28
  • 30. 30 “B IG DATA” B ECOMES PERSONAL INTERNET-CONNECTED DEVICES 4.9 B in 2015 20.8 B in 2020 450% 10,000 EB in 2015 400% 40,000 EB in 2020 STORAGE REQUIRED FOR THE DATA (One exabyte can hold 500 to 1000 times the entire content of the Library of Congress.)
  • 31. 31 “B IG DATA” B ECOMES PERSONAL 10,000 EB in 2015 40,000 EB in 2020 STORAGE REQUIRED FOR THE DATA (One exabyte can hold 500 to 1000 times the entire content of the Library of Congress.) = 20,800 GB 400%
  • 32. 32
  • 41. 41
  • 42. 42 “These technical guidelines cover remote digital authentication of human users to IT systems over a network… However do not specifically address machine-to-machine (such as router-to-router) authentication, or establish specific requirements for issuing authentication credentials and authenticators to machines and servers when they are used in authentication protocols with people.” However do not specifically address machine-to-machine (such as router-to-router) authentication, or establish specific requirements for issuing authentication credentials and authenticators to machines and servers when they are used in authentication protocols with people.” New v 63-3 Due Soon
  • 43. 43
  • 44. 44 THREE F ROM THREE G U I D A N C E F R O M T H R E E P I E C E S O F R E C E N T R E S E A R C H
  • 45. 45 “Others have pointed to the need to research methods that provide context-based authentication as a new factor in an authentication process. .”
  • 46. 46 1. Identity Relationship Management (IRM) replaces IAM n Consumers and things over employees n Internet-scale over Enterprise-scale n Borderless over perimeter 2. Use of smartphones as a primary means of authentication in the IoT n Context-based authentication over MFA n Enterprise-level local authentication to IoT devices n Single sensor for multiple authentication methods: THREE F ROM THREE: CSA C L O U D S E C U R I T Y A L L I A N C E – I R M A N D S M A R T P H O N E S
  • 47. 47 3. Leverage the security controls built into standards-based IoT protocols THREE F ROM THREE: CSA I o T S E C U R I T Y F O R C O N S U M E R D E V I C E S Protocol M2M Auth Options MQTT Username / password CoAP preShared Key rawPublicKey XMPP Multiple options DDS x.509 Certificates (PKI) Tokens Protocol M2M Auth Options Zigbee Pre-shared keys Bluetooth Shared key Bluetooth LE Connection signature resolving key HTTP/REST TLS or OAUTH 2
  • 48. 48 3. Leverage the security controls built into standards-based IoT protocols THREE F ROM THREE: CSA C L O U D S E C U R I T Y A L L I A N C E S U M M A R S Y G U I D A N C E O N I o T • Low memory: works on micro- controllers was low as 10 KiB of RAM • Default choice of DTLS parameters is equivalent to 3072-bit RSA keys • CoAP integrates with XML, JSON, CBOR, or data format of choice • REST model integrates with typical sites and applications
  • 49. 49 “No single method for peer authentication and end-to- end data protection meets the Internet of Things (IoT) device security and operational requirements.”
  • 50. 50 1. Mobile devices can be gateways, consumers, or IoT nodes THREE F ROM THREE: GARTNER I T ’ S N O T J U S T A P H O N E
  • 51. 51 2. Understand domains, classes of devices, and “delegation of trust” n Class 1: Simple sensors or actuators n Class 2: Can perform storage or analysis, e.g. hubs, concentrator, gateways n Class 3: Complex devices, servers than can act as aggregators, e.g. security analytics THREE F ROM THREE: GARTNER N O T A L L D E V I C E S A R E C R E A T E D E Q U A L
  • 52. 52 3. Building a trust model based on “hops” n No hop: trust is achieved by device authenticating to local gateway n Single hop: Device authenticates to gateway, and gateway to an IoT service or application n Multihop: Trust achieved by devices authenticating to trust anchors (gateways), and then the trust anchors federate trust across all required domains and trust models THREE F ROM THREE: GARTNER T R U S T M O D E L S M A T T E R
  • 53. 53 “Authentication is the process of verification that an individual, entity or website is who it claims to be.”
  • 54. 54 1. The only guidance using three different perspectives: n Manufacturer IoT Guidance: The goal of this section is help manufacturers build more secure products in the Internet of Things space. n Developer IoT Guidance: The goal of this section is help developers build more secure applications in the Internet of Things space. n Consumer IoT Guidance: The goal of this section is help consumers purchase secure products in the Internet of Things space. THREE F ROM THREE: OWASP I o T S E C U R I T Y G U I D A N C E I N T H R E E C A T E G O R I E S
  • 55. 55 2. A comprehensive framework: n 1 IoT Framework Security Considerations: Definitions n 2 Edge: Framework Considerations for Edge Component n 3 Gateway: Framework Considerations for Gateway Component n 4 Cloud: Framework Considerations for Cloud Component n 5 Mobile: Framework Considerations for Mobile Component THREE F ROM THREE: OWASP M U L T I - P A R T S E C U R I T Y A N D P R I V A C Y F R A M E W O R K • Communications encryption • Storage encryption • Strong logging • Auto updates / versioning • Update verification • Cryptographic ID capabilities • No default passwords • Offline security features • Configurable root trust store • Device and owner authentication • Transitive ownership capabilities • Defensive capabilities • Plugin or ext. verify, report, update • Secure M2M • Secure Web interface • Utilize established protocols • Latest, updated 3rd -party components • Use of hardware device • Support MFA • Temporal and spacial authentication • Tracks data from insecure sources • Features disabled by default • Written in programming languages that possess security countermeasures • Device monitoring and management capabilities 2 Edge: Framework Considerations for Edge Component
  • 56. 56 3. Provides a unique focus on authentication testing THREE F ROM THREE: OWASP F O C U S O N T E S T I N G n Assess the solution for the use of strong passwords where authentication is needed n Assess the solution for multi-user environments and ensure it includes functionality for role separation n Assess the solution for Implementation two-factor authentication where possible n Assess password recovery mechanisms n Assess password recovery mechanisms n Assess the solution for the option to require strong passwords n Assess the solution for the option to force password expiration after a specific period n Assess the solution for the option to change the default username and password
  • 57. 57 9 1. Identity relationship management – not IAM – is key 2. Smartphones will be the primary means of authentication in the IoT 3. Leverage built-in security controls 4. Mobile devices will fill multiple roles in the IoT scheme 5. Domains & classes drive delegation of trust models 6. Build your trust model based on “hops” 7. Multiple perspectives matter 8. Provides a comprehensive framework 9. Provides a unique authentication focus SUMMARIZING THE “THREE F ROM THREE”
  • 59. 59
  • 60. 60
  • 61. 61
  • 62. YOU ARE YOUR DEVICE YOUR TRUSTWORTHY PROXY?
  • 65. 65
  • 66. 66 BIOMETRICS IP ADDRESS JAILBROKEN OR ROOTED GEO LOCATION ASSOCIATIONSSECURITY RISK
  • 67. 67 n MD5 Hash of the full font list n Random sample of 15 fonts n Flash SharedObjects not writable n Flash socket 843 based ip (real IP) n Boolean indicator: flash took longer than expected to execute n Accepted Char Sets in HTTP header n Accepted languages in HTTP header n Browser user agent comment string n Browser name / OS / Ver / language n Cookie writes excluded n Boolean indicator, javascript enabled n Count of fonts in the full list n Flash 3-part version (16.0.0) n Flash 4-part version (16.0.0.305) n List of browser plugins n JavaScript screen resolution n Simbar toolbar GUID from HTTP hdr n Timezone offset in minutes n ... and more n WiFi (or Bluetooth) MAC Address n Network configuration n iOS Device Model n Battery level / AC mode n Device orientation n File system size n Physical memory n CPU Type / Count /Speed n Number attached accessories n Has proximity sensor? n Screen brightness and resolution n System uptime n iOS Device Name (MD5 Hash) n OS Name and/or version n Device advertising UUID n Kernel version n iCloud Ubiquity Token n Application Vendor UUID /name/vers n Locale language / currency code n … and 100s more n Model and Device Model n Build.DEVICE & Build.HARDWARE n Build.HOST & Build.ID n Manufacturer n Build.PRODUCT & Build.TIME n Network Operator ID & Name n Sim Operator ID & Country n System Uptime in Seconds n Is the device plugged in n CPU Type n Physical memory n Unique build fingerprint of app n Android SDK Level n Android Build Number (DISPLAY) n Android Device System Version n Detected attempt at hiding root detect n Kernel Version (was AKV) n Android Locale Country Code n Desktop Wallpaper Hash n … and 100s more DEVICE-BASED AUTHENTICATION THE USER’S DEVICE AS A ROBUST, INVISIBLE SECOND FACTOR Web Device Print iOS SDK Android SDK
  • 68. 68
  • 69. Q&A