SlideShare a Scribd company logo
Internet Of Things Security
Contents
 What’s the Internet of Things?
 Tecnologies and Applications of IoT
 Challenges and Issues in IoT
 Recent IoT Hacks
 Hardware Security in IOT
 Conclusion
What’s the Internet of Things
 From any time ,any place connectivity for anyone, we will now have connectivity for
anything!
The Internet of Things
 Internet of Things refers to the concept that the Internet is no longer just a global
network for people to communicate with one another using computers, but it is
also a platform for devices to communicate electronically with the world around
them.
 The Internet of Things, also called the Internet of Objects, refers to a wireless
network between objects, usually the network will be wireless and self-configuring,
such as household appliances.
“Internet of Objects” “Machine-to-Machine Era” “Internet of Everything”
The internet of things is a combination of:
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Tecnologies
 RFID
 WiFi IEEE 802.11
 Barcode e QR Code
 ZigBee IEEE 802.15.4
 Sensors and smartphones
Top Applications
 Traffic monitoring
 Health
 Security
 Transport and Logistics
 Daily life and domotics
Challenges and Issues
Privacy
Security
Recent IoT Hacks
What Needs to be secured?
IoT Architecture :
The Security Problems of Perception Layer Data
Information Collection and Transmission:
 The main equipment in perception layer includes RFID, zigbee, all kinds of sensors
 Sensor nodes have many varieties and high heterogeneity. They have generally
simple structure and processor. These make them could not have complex security
protection capability.
 When data are collected, the way of information transmission is basically the
wireless network transmission. The signals are exposed in the public place. If it
lacks effective protection measures, the signals will be monitored, intercepted, and
disturbed easily.
Several common kinds of attack:
 1) Node Capture: Key nodes are controlled easily by the attackers such as gateway node.
It may leaks all information, including group communication key, radio key, matching
key etc, and then threats the security of the entire network.
 2) Fake Node and Malicious Data: The attackers add a node to the system, and input
fake code or data. They stop transmitting real data. The sleep of the energy limited
node is denied. They consume precious energy of nodes, and potentially control or
destroy the entire network.
 3) SCA (Side Channel Attack): Attacker attacks encryption devices, through the side
channel leakage information in the process of the device operation, such as time
consumption, power consumption, or electromagnetic radiation.
 4) Timing Attack: By analyzing the time required for executing encryption algorithm, to
obtain key information.
Security in embedded devices
 The solution selected for security in embedded devices is always a question of
trade-off between security, flexibility, performance, power consumption and cost.
Existing Solutions to these problems are divided into three approaches:
A. Software only Approach
B. Hardware only Approach
C. Hybrid Approach
Hardware only Approach Security
 There are many existing solutions to counter different attacks.
Encryption of information is used for confidentiality.
The most popular cipher algorithms are: RSA, ECC, AES,3DES.
 Most of these algorithms and processes are very much computationally
intensive. So, we require dedicated hardware or Digital Signal Processors (DSP).
 This approach makes use of ASICs (Application Specific Integrated Circuits)
and FPGA to implement a given cryptography algorithm in hardware. This
policy allow controlling precisely the parameters energy, computation capacity
and time constraints but it is generally not optimum for the flexibility and cost
parameters. In [7] a new logic style for secure IC against differential power
analysis is presented.
Perception Layer Security Measures:
 1) RFID Security Measures:
a) Access Control: Mainly in order to prevent the user's privacy leaks, to protect the
information in the RFID tags can not be read at will. Including label failure, chip protection,
antenna energy analysis, etc.
b) Data Encryption: For the data security of RFID system, it’s very necessary to encrypt the
RFID signal using the appropriate algorithm.
 2) Wireless Sensor Network Security Measures:
a) Secret Key Algorithms: Key algorithm mainly includes symmetric key algorithm and
asymmetric keys algorithm. Asymmetric keys algorithm mainly use RAS (Rivest-Shamir-
Adleman) and ECC (Elliptic Curves Cryptography).
b) Security Routing Protocol: The efficient security routing protocol algorithm generally
uses the following mechanisms: clustering mechanism, data fusion mechanism,
Hardware security system for WLANs:
 At the end hosts, the encryption and authentication services are performed before
the data are passed to a radio card. Thus, the expensive security part is applied to
the data prior to its delivery to a low-performance processor at the wireless card.
 At the access point (AP), the increasing complexity of security protocols signifies
the need to improve the performance of network processing hardware for real-
time cryptographic processing. The cryptographic algorithms’ throughput and
delay can be improved by implementing the algorithms in specialized processors
using an application-specified integrated circuit (ASIC) solution or a field-
programmable gate array (FPGA) implementation.
 Several hardware implementations to enhance the performance of cryptographic
algorithms as AES, DES, RSA, HMAC, MD5, HASH algorithms.
Automotive Applications Security:
 Modern cars are no longer mere mechanical devices and they are dominated by a
large number of IT systems that guide a wide number of embedded systems called
Electronic Control Unit (ECU).
 ECUs relying on information received from open communication channels created
by other ECUs or even other vehicles that are not under its control leaves the doors
wide open for manipulations or misuse.
 we need a vehicular hardware security module (HSM) that enables a holistic
protection of in-vehicle ECUs and their communications.
 In order to ensure some security aspects in automotive environment, it is needed a
hardware implementation of the Advanced Encryption Standard (AES) algorithm or
any other algorithm as ECC/RSA, DES.
EVITA General Approach Microcontroller
security extension
Hardware Bluetooth Security:
 The Bluetooth security layer uses four key elements:
a Bluetooth device address, two separate key types (authentication and encryption),
and a random number generation.
 Bluetooth can implement its security layer’s key-generation mechanism and
authentication in software or hardware. Software implementation usually satisfies
user requirements, but in time-critical applications or processing-constrained
devices, a hardware implementation is preferable.
Bluetooth system hardware:
Conclusion
 The IoT is growing quickly, bringing devices such as smart meters, smart homes,
wearable electronics and a host of other applications to the attention of businesses,
governments, the general public, and hackers. Basic security flaws have been identified
in some systems, which could carry serious risks for consumers and for operators such
as utility companies.
 Hardware-based solutions developed to secure computers connected to the Internet of
People can also be used to overcome the challenges facing IoT applications, and are
quickly adapting to meet the needs of resource-constrained embedded systems.
 Embedded Security for IoT will be crucial and important with strong security
mechanisms which will prevent damages and economical losses offering new business
opportunities.
 IoT Hardware security architecture is still in its exploratory stage, so it’s facing more
severe challenges in security than expected.

More Related Content

PPTX
Internet of things ppt
PPTX
Hardware Security
PPTX
Internet of Things (IoT) - IK
PPTX
Internet of things
PPTX
Internet of Things: state of the art
PPTX
what is Internet of things(iot) & how does it work
PPTX
Applications of IOT (internet of things)
PPTX
Internet of things
Internet of things ppt
Hardware Security
Internet of Things (IoT) - IK
Internet of things
Internet of Things: state of the art
what is Internet of things(iot) & how does it work
Applications of IOT (internet of things)
Internet of things

What's hot (20)

PPTX
IOT privacy and Security
PPT
IoT security (Internet of Things)
PPTX
4. Internet of Things - Reference Model and Architecture
PPT
Internet Of Things
PPTX
Components of IOT Implementation
PDF
Internet of things (IOT) connects physical to digital
PPTX
Edge computing
PPTX
Data enrichment
PDF
IoT Security Elements
PDF
Internet of Things (IoT) and Big Data
PPTX
Internet of things (IoT)
PDF
Introduction to IoT
PPTX
Internet of Things (IOT)
PPTX
IoT Cloud architecture
PPTX
Iot presentation
PPTX
Internet of Things
PDF
Top Technology Trends in IoT for 2022
PPT
Introduction to internet of things
IOT privacy and Security
IoT security (Internet of Things)
4. Internet of Things - Reference Model and Architecture
Internet Of Things
Components of IOT Implementation
Internet of things (IOT) connects physical to digital
Edge computing
Data enrichment
IoT Security Elements
Internet of Things (IoT) and Big Data
Internet of things (IoT)
Introduction to IoT
Internet of Things (IOT)
IoT Cloud architecture
Iot presentation
Internet of Things
Top Technology Trends in IoT for 2022
Introduction to internet of things
Ad

Viewers also liked (18)

PDF
The 5 elements of IoT security
PDF
Internet of Things - Privacy and Security issues
PDF
Hardware, and Trust Security: Explain it like I’m 5!
PDF
Internet of Things Security Patterns
PDF
Security in the Internet of Things
PPTX
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
PDF
Hardware Based Security
PDF
Hardware Security Modules: Critical to Information Risk Management
PDF
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
PDF
CyberSecurity_for_the_IoT
PPTX
IT Innovation Crisis: Getting to the Culture of Yes
PDF
Radical Roadmapping - Creating Synchronized Agile Product and Technology Road...
PPTX
Automatski - The Internet of Things - Security Standards
PPTX
The Internet of Security Things (A Story about Change)
PPTX
APrIGF 2015: Security and the Internet of Things
PDF
MinnowBoard MAX: Open Source Hardware 64-bit x86 Single Board Computer
PPTX
Roadmunk tpma presentation oct 27_2016
PPTX
Onion model for roadmapping
The 5 elements of IoT security
Internet of Things - Privacy and Security issues
Hardware, and Trust Security: Explain it like I’m 5!
Internet of Things Security Patterns
Security in the Internet of Things
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Hardware Based Security
Hardware Security Modules: Critical to Information Risk Management
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
CyberSecurity_for_the_IoT
IT Innovation Crisis: Getting to the Culture of Yes
Radical Roadmapping - Creating Synchronized Agile Product and Technology Road...
Automatski - The Internet of Things - Security Standards
The Internet of Security Things (A Story about Change)
APrIGF 2015: Security and the Internet of Things
MinnowBoard MAX: Open Source Hardware 64-bit x86 Single Board Computer
Roadmunk tpma presentation oct 27_2016
Onion model for roadmapping
Ad

Similar to Internet of things security "Hardware Security" (20)

PPT
Smart Grid Cyber Security
PDF
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
PPTX
Cyber security
PPTX
Iot Security
PDF
1678 1683
PDF
1678 1683
PDF
Robust Cyber Security for Power Utilities
PPTX
Vishwanath rakesh ece 561
PPT
Yared Hankins Wireless Key
PDF
ICC Networking Data Security
PDF
ICC Networking Data Security
PDF
Secured authentication of radio-frequency identification system using PRESENT...
PDF
Nt1310 Unit 6 Powerpoint
PDF
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
PDF
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
PPTX
Iot(security)
PDF
IRJET - Cryptographic Communication between Two ESP32 Devices
PDF
IRJET- Enhanced SIT Algorithm for Embedded Systems
PPTX
Chapter-2 Internet of Things.pptx
PDF
wns-unit-1-i-need-a-notes-that-has-to-be-useful-for-preparing-my-sem-examinat...
Smart Grid Cyber Security
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Cyber security
Iot Security
1678 1683
1678 1683
Robust Cyber Security for Power Utilities
Vishwanath rakesh ece 561
Yared Hankins Wireless Key
ICC Networking Data Security
ICC Networking Data Security
Secured authentication of radio-frequency identification system using PRESENT...
Nt1310 Unit 6 Powerpoint
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Iot(security)
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET- Enhanced SIT Algorithm for Embedded Systems
Chapter-2 Internet of Things.pptx
wns-unit-1-i-need-a-notes-that-has-to-be-useful-for-preparing-my-sem-examinat...

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
Teaching material agriculture food technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
A Presentation on Artificial Intelligence
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Cloud computing and distributed systems.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
Teaching material agriculture food technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced methodologies resolving dimensionality complications for autism neur...
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
A Presentation on Artificial Intelligence
“AI and Expert System Decision Support & Business Intelligence Systems”
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Building Integrated photovoltaic BIPV_UPV.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
Cloud computing and distributed systems.
Reach Out and Touch Someone: Haptics and Empathic Computing

Internet of things security "Hardware Security"

  • 2. Contents  What’s the Internet of Things?  Tecnologies and Applications of IoT  Challenges and Issues in IoT  Recent IoT Hacks  Hardware Security in IOT  Conclusion
  • 3. What’s the Internet of Things  From any time ,any place connectivity for anyone, we will now have connectivity for anything!
  • 4. The Internet of Things  Internet of Things refers to the concept that the Internet is no longer just a global network for people to communicate with one another using computers, but it is also a platform for devices to communicate electronically with the world around them.  The Internet of Things, also called the Internet of Objects, refers to a wireless network between objects, usually the network will be wireless and self-configuring, such as household appliances. “Internet of Objects” “Machine-to-Machine Era” “Internet of Everything”
  • 5. The internet of things is a combination of:
  • 10. Tecnologies  RFID  WiFi IEEE 802.11  Barcode e QR Code  ZigBee IEEE 802.15.4  Sensors and smartphones
  • 11. Top Applications  Traffic monitoring  Health  Security  Transport and Logistics  Daily life and domotics
  • 14. What Needs to be secured?
  • 16. The Security Problems of Perception Layer Data Information Collection and Transmission:  The main equipment in perception layer includes RFID, zigbee, all kinds of sensors  Sensor nodes have many varieties and high heterogeneity. They have generally simple structure and processor. These make them could not have complex security protection capability.  When data are collected, the way of information transmission is basically the wireless network transmission. The signals are exposed in the public place. If it lacks effective protection measures, the signals will be monitored, intercepted, and disturbed easily.
  • 17. Several common kinds of attack:  1) Node Capture: Key nodes are controlled easily by the attackers such as gateway node. It may leaks all information, including group communication key, radio key, matching key etc, and then threats the security of the entire network.  2) Fake Node and Malicious Data: The attackers add a node to the system, and input fake code or data. They stop transmitting real data. The sleep of the energy limited node is denied. They consume precious energy of nodes, and potentially control or destroy the entire network.  3) SCA (Side Channel Attack): Attacker attacks encryption devices, through the side channel leakage information in the process of the device operation, such as time consumption, power consumption, or electromagnetic radiation.  4) Timing Attack: By analyzing the time required for executing encryption algorithm, to obtain key information.
  • 18. Security in embedded devices  The solution selected for security in embedded devices is always a question of trade-off between security, flexibility, performance, power consumption and cost. Existing Solutions to these problems are divided into three approaches: A. Software only Approach B. Hardware only Approach C. Hybrid Approach
  • 19. Hardware only Approach Security  There are many existing solutions to counter different attacks. Encryption of information is used for confidentiality. The most popular cipher algorithms are: RSA, ECC, AES,3DES.  Most of these algorithms and processes are very much computationally intensive. So, we require dedicated hardware or Digital Signal Processors (DSP).  This approach makes use of ASICs (Application Specific Integrated Circuits) and FPGA to implement a given cryptography algorithm in hardware. This policy allow controlling precisely the parameters energy, computation capacity and time constraints but it is generally not optimum for the flexibility and cost parameters. In [7] a new logic style for secure IC against differential power analysis is presented.
  • 20. Perception Layer Security Measures:  1) RFID Security Measures: a) Access Control: Mainly in order to prevent the user's privacy leaks, to protect the information in the RFID tags can not be read at will. Including label failure, chip protection, antenna energy analysis, etc. b) Data Encryption: For the data security of RFID system, it’s very necessary to encrypt the RFID signal using the appropriate algorithm.  2) Wireless Sensor Network Security Measures: a) Secret Key Algorithms: Key algorithm mainly includes symmetric key algorithm and asymmetric keys algorithm. Asymmetric keys algorithm mainly use RAS (Rivest-Shamir- Adleman) and ECC (Elliptic Curves Cryptography). b) Security Routing Protocol: The efficient security routing protocol algorithm generally uses the following mechanisms: clustering mechanism, data fusion mechanism,
  • 21. Hardware security system for WLANs:  At the end hosts, the encryption and authentication services are performed before the data are passed to a radio card. Thus, the expensive security part is applied to the data prior to its delivery to a low-performance processor at the wireless card.  At the access point (AP), the increasing complexity of security protocols signifies the need to improve the performance of network processing hardware for real- time cryptographic processing. The cryptographic algorithms’ throughput and delay can be improved by implementing the algorithms in specialized processors using an application-specified integrated circuit (ASIC) solution or a field- programmable gate array (FPGA) implementation.  Several hardware implementations to enhance the performance of cryptographic algorithms as AES, DES, RSA, HMAC, MD5, HASH algorithms.
  • 22. Automotive Applications Security:  Modern cars are no longer mere mechanical devices and they are dominated by a large number of IT systems that guide a wide number of embedded systems called Electronic Control Unit (ECU).  ECUs relying on information received from open communication channels created by other ECUs or even other vehicles that are not under its control leaves the doors wide open for manipulations or misuse.  we need a vehicular hardware security module (HSM) that enables a holistic protection of in-vehicle ECUs and their communications.  In order to ensure some security aspects in automotive environment, it is needed a hardware implementation of the Advanced Encryption Standard (AES) algorithm or any other algorithm as ECC/RSA, DES.
  • 23. EVITA General Approach Microcontroller security extension
  • 24. Hardware Bluetooth Security:  The Bluetooth security layer uses four key elements: a Bluetooth device address, two separate key types (authentication and encryption), and a random number generation.  Bluetooth can implement its security layer’s key-generation mechanism and authentication in software or hardware. Software implementation usually satisfies user requirements, but in time-critical applications or processing-constrained devices, a hardware implementation is preferable.
  • 26. Conclusion  The IoT is growing quickly, bringing devices such as smart meters, smart homes, wearable electronics and a host of other applications to the attention of businesses, governments, the general public, and hackers. Basic security flaws have been identified in some systems, which could carry serious risks for consumers and for operators such as utility companies.  Hardware-based solutions developed to secure computers connected to the Internet of People can also be used to overcome the challenges facing IoT applications, and are quickly adapting to meet the needs of resource-constrained embedded systems.  Embedded Security for IoT will be crucial and important with strong security mechanisms which will prevent damages and economical losses offering new business opportunities.  IoT Hardware security architecture is still in its exploratory stage, so it’s facing more severe challenges in security than expected.

Editor's Notes

  • #14: by using a $20 toolkit called CAN Hacking Tool (CHT), hackers can hack your Smart Cars, giving entire control of your car to an attacker from windows and headlights to its steering and brakes. Now a new research carried out on the Tesla Smart car has proved that the hackers are able to remotely locate or unlock the Tesla Motors Inc. electric vehicles, just by cracking a six-character password using traditional hacking techniques. Dubbed the “red-button attack”, this man-in-the-middle hack could be used to intercept data – including sound and pictures – and use the stream to takeover apps being shown on the TV, letting hackers post to your Facebook, for example.
  • #22: DES This is the 'Data Encryption Standard'. This is a cipher that operates on 64-bit blocks of data, using a 56-bit key. It is a 'private key' system. Further Details on the DES Algorithm RSA RSA is a public-key system designed by Rivest, Shamir, and Adleman. Further Details on the RSA Algorithm HASH A 'hash algorithm' is used for computing a condensed representation of a fixed length message/file. This is sometimes known as a 'message digest', or a 'fingerprint'.. MD5 MD5 is a 128 bit message digest function. It was developed by Ron Rivest. Further Details on the MD5 Algorithm AES This is the Advanced Encryption Standard (using the Rijndael block cipher) approved by NIST. SHA-1 SHA-1 is a hashing algorithm similar in structure to MD5, but producing a digest of 160 bits (20 bytes).Because of the large digest size, it is less likely that two different messages will have the same SHA-1 message digest. For this reason SHA-1 is recommended in preference to MD5. HMAC HMAC is a hashing method that uses a key in conjunction with an algorithm such as MD5 or SHA-1. Thus one can refer to HMAC-MD5 and HMAC-SHA1.
  • #23: In order to reliably enforce the security of software security mechanisms, the application of hardware security modules (HSM) is one eective countermeasure as HSMs: { protect software security measures by acting as trusted security anchor, { securely generate, store, and process security-critical material shielded from any potentially malicious software, { restrict the possibilities of hardware tampering attacks by applying eective tamper-protection measures, { accelerate security measures by applying specialized cryptographic hardware, { reduce security costs on high volumes by applying highly optimized special circuitry instead of costly general purpose hardware. Unfortunately, there are currently no automotive-capable HSMs available The HSM was especially designed for protecting e-safety applications such as emergency break based on communications between vehicles (V2V) or emergency call based on communications between vehicles and (trac) infrastructures (V2I). Our Contributions and Paper Outline.