SlideShare a Scribd company logo
Internet of Things Security - Multilayered
Method For End to End Data Communications
Over Cellular Networks
Prepared By:
Akash A R
OUTLINE
INTRODUCTION
ARCHTECTURAL SYSTEM DESCRIPTION
THE INTERLOCKING FUNCTIONAL ELEMENTS
 CONCLUSION
INTRODUCTION
 With the explosive growth of Internet of Things (IoT) solutions comes the greater
concern over security issues associated with the plurality of devices being
connected
 Poorly architected cellular connectivity can open the solution to potential security
issues
 A highly secured architectural solution requires a multilayered security approach
encompassing the overall architectural design for connectivity
 The multilayered methodology provides a secure wireless connection utilizing
packetized data to establish a robust connection between the IoT device and the
backend host for bidirectional communications
ARCHITECTURAL SYSTEM DESCRIPTION
 The IoT cellular device is connected to the local serving cell tower via an
encrypted radio access network
 The local tower is securely connected to the home carrier’s mobility data
center.
 The destination host is connected via a point to point encrypted link.
 The architecture provides desired security without incurring increased data
payload for security encryption
THE INTERLOCKING FUNCTIONAL ELEMENTS(1/8)
 Each security functional element available in the architecture is briefly described
here
A. SIM-BASED AUTHENTICATION AND KEY AGREEMENT
 The first critical element of the secure architecture is the subscriber
identifier module (SIM)
 The connectivity to the SIM is only through
the cellular radio module preventing the
onboard microprocessor from directly
accessing the SIM.
 Any communications with the SIM is
performed solely by the radio stack layer
built into the radio module.
 The authentication and key agreement
mechanism utilizes a secret key K which is
known only to the SIM and the Internet of
Things home carrier
THE INTERLOCKING FUNCTIONAL ELEMENTS(2/8)
B. RADIO ACCESS NETWORK ENCRYPTION
 The radio link layer between the IoT device radio module and the cellular tower is
128-bit encrypted, utilizing the key from the previous section, as part of the
standard GSM protocol for 3G and above transmissions
C. CUSTOM ACCESS POINT NAME (APN)
 The secure IoT architecture makes use of a custom APN assigned to each of
the enterprise customers deploying IoT devices.
 This custom APN is unique to the enterprise which has provisioning and
management capabilities of IoT devices.
 The custom APN allows such enterprise to give an IoT device permission to
access that Enterprise’s custom APN for the data transport.
THE INTERLOCKING FUNCTIONAL ELEMENTS(3/8)
D. PRIVATE NON-ROUTABLE TCP/IP ADDRESSING
 The non-routable IP address is preserved in the packet along the path between
the IoT radio module and the GPRS Support Node(GGSN) avoiding any type of
conversion into a public routable IP address.
 Because of the nature of the overarching architecture, the private IP addressing
schema does not route to the public Internet.
 The non-routable nature of the IP addressing that is preserved end-to-end
 Even if a malicious packet were to make its way into this secure pipe or one of
the IP packets were to “escape” the pipe, they would be immediately dropped
by the first router hop due to their non-routable IP address
THE INTERLOCKING FUNCTIONAL ELEMENTS(4/8)
E. NON-SPLIT TUNNEL ROUTING SCHEMA
 Poorly architected solutions often provision an APN to split the data
packet tunnel
 In other words, while the private data packets are directly sent to the
enterprise customers, the public destined packets are directly routed
from the mobility data center off to the public Internet.
 This breaks security methodology because now an IoT device has a
path to the public Internet that is not under the control of the
enterprise customer.
THE INTERLOCKING FUNCTIONAL ELEMENTS(5/8)
F. POINT TO POINT DATA TRANSPORT BETWEEN CELLULAR CARRIER AND HOST
 The point-to-point connection between the mobility data center and the destination
host may take the form of an IPsec VPN tunnel
 By combining the two functional elements provided by the custom APN and IPsec
VPN tunnel, it is possible to establish a closed secure pipe
G. NO DIRECT DEVICE TO DEVICE COMMUINICATION
 Direct communication of IoT decices through the carrier’s data center would not
leave a record or footprint in the customer’s router or backend host system.
 In other words, the devices may be chatting back and forth without the enterprise
customer having record of or seeing the M2M device traffic
 Unable to probe the traffic for malicious behavior.
THE INTERLOCKING FUNCTIONAL ELEMENTS(6/8)
H. DESTINATION HOST ROUTER MONITORING
 All data packets to and from the IoT device passes through the enterprise
customer’s router
 Deep packet inspection at the customer’s router can detect in real-time that
abnormal data behavior is occurring from the IoT devices, which may indicate
fraudulent or malicious activity
 By delivering every packet through the customer enterprise router, the
customer’s host data center has a holistic view of all traffic coming from and
going to the IoT devices
 This can forensically detect if fraudulent behavior is or has occurred.
THE INTERLOCKING FUNCTIONAL ELEMENTS(7/8)
I. SIM TOOLKIT IMEI VALIDATION AND ALERTING
 The SIM being a secure storage location either has received a copy of its allowed
connected device’s IMEI or discovers it upon first power up.
 This allowable IMEI(s) are held in nonvolatile memory within the SIM and upon
subsequent power ups the SIM makes the same request of the radio module it is
attached to and compares the delivered IMEI to the stored IMEI within the SIM.
 If the two match, then the SIM assumes that it is in the equipment that it was intended
to be in as the equipment serial number matches the securely held permissioned serial
number of the hardware.
 If the SIM detects a different IMEI, it can assume that malicious behavior has occurred
and that someone has removed the physical SIM from the trusted device
THE INTERLOCKING FUNCTIONAL ELEMENTS(8/8)
 The device manufacturer creates a secure hashing algorithm within the device processor’s firmware
that is keyed from a hardware serial number that renders a unique 4digit number
 At time of assembly, the SIM associated with the device is programed into the locked state with the
unique 4 digit code as the unlock key.
 At power up or reset, the SIM requests the unlock code via the radio interface to the device
processor.
 The firmware runs the hashing algorithm to produce the 4 digit unlock code and passes to the
SIM.If the code matches the SIM’s then the SIM is enabled for operation.
 If the pin does not match after 3 attempts, the SIM is rendered unusable or blocked.
 This prevents a SIM from being removed from an IoT device and inserted into a consumer phone.
K. PIN LOCKING OF SIM
J. SIM TOOLKIT IMEI ALERTING
 The SIM alerts the host mobility data center that a mismatch has occurred upon power
up and the carrier can then take immediate steps to disable the SIM or prevent dataflow
from occurring until the issue is investigated
CONCLUSION
 This paper has set forth a multi-tiered solution for securely establishing end-to-end
TCP/IP based Internet of Things communications over cellular-based networks.
 This methodology consists of standards based interlocking functional elements
deployed in a securely architected carrier network providing a secure end to end
communications channel for Internet of Things devices and applications.
THANK YOU

More Related Content

PPT
Tv news-reporting
PPTX
Principles-of-Scriptwriting.pptx
PDF
Bolstering the security of iiot applications – how to go about it
PDF
RISE OF THE MACHINES: IRM IN AN IOT WORLD
PDF
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
PDF
Secure Channel Communication between IOT Devices and Computers
PDF
ErichFicker_FinalDraft_28Mar16_Hardcopy
PPTX
Module_I.pptxadsdDSSSSSSSSSSSSSSSSUGGGGGGGGGGGGG
Tv news-reporting
Principles-of-Scriptwriting.pptx
Bolstering the security of iiot applications – how to go about it
RISE OF THE MACHINES: IRM IN AN IOT WORLD
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
Secure Channel Communication between IOT Devices and Computers
ErichFicker_FinalDraft_28Mar16_Hardcopy
Module_I.pptxadsdDSSSSSSSSSSSSSSSSUGGGGGGGGGGGGG

Similar to Internet of things security multilayered method for end to end data communications over cellular networks (20)

PPTX
Security issues and solutions : IoT
PDF
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
PPTX
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
PDF
E-Toll Payment Using Azure Cloud
PDF
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
PDF
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
PDF
76 s201917
PPTX
Unit & Ubiquitous IoT for securing cyberentities
PDF
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
PPTX
Atal io t introduction
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
A new algorithm to enhance security against cyber threats for internet of thi...
PDF
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
PDF
2 cyber security challenges in io t
PPTX
Internet of things .pptx [repaired]
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PDF
Bridgera enterprise IoT security
PDF
A survey on Internet of Things (IoT) security : Challenges and Current status
PDF
Securing the Internet of Things
PDF
Security in IoT
Security issues and solutions : IoT
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
E-Toll Payment Using Azure Cloud
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
76 s201917
Unit & Ubiquitous IoT for securing cyberentities
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
Atal io t introduction
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
A new algorithm to enhance security against cyber threats for internet of thi...
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
2 cyber security challenges in io t
Internet of things .pptx [repaired]
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Bridgera enterprise IoT security
A survey on Internet of Things (IoT) security : Challenges and Current status
Securing the Internet of Things
Security in IoT
Ad

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Approach and Philosophy of On baking technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Cloud computing and distributed systems.
Chapter 3 Spatial Domain Image Processing.pdf
Review of recent advances in non-invasive hemoglobin estimation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation_ Review paper, used for researhc scholars
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Mobile App Security Testing_ A Comprehensive Guide.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectral efficient network and resource selection model in 5G networks
Approach and Philosophy of On baking technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
MYSQL Presentation for SQL database connectivity
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
cuic standard and advanced reporting.pdf
sap open course for s4hana steps from ECC to s4
Cloud computing and distributed systems.
Ad

Internet of things security multilayered method for end to end data communications over cellular networks

  • 1. Internet of Things Security - Multilayered Method For End to End Data Communications Over Cellular Networks Prepared By: Akash A R
  • 2. OUTLINE INTRODUCTION ARCHTECTURAL SYSTEM DESCRIPTION THE INTERLOCKING FUNCTIONAL ELEMENTS  CONCLUSION
  • 3. INTRODUCTION  With the explosive growth of Internet of Things (IoT) solutions comes the greater concern over security issues associated with the plurality of devices being connected  Poorly architected cellular connectivity can open the solution to potential security issues  A highly secured architectural solution requires a multilayered security approach encompassing the overall architectural design for connectivity  The multilayered methodology provides a secure wireless connection utilizing packetized data to establish a robust connection between the IoT device and the backend host for bidirectional communications
  • 4. ARCHITECTURAL SYSTEM DESCRIPTION  The IoT cellular device is connected to the local serving cell tower via an encrypted radio access network  The local tower is securely connected to the home carrier’s mobility data center.  The destination host is connected via a point to point encrypted link.  The architecture provides desired security without incurring increased data payload for security encryption
  • 5. THE INTERLOCKING FUNCTIONAL ELEMENTS(1/8)  Each security functional element available in the architecture is briefly described here A. SIM-BASED AUTHENTICATION AND KEY AGREEMENT  The first critical element of the secure architecture is the subscriber identifier module (SIM)  The connectivity to the SIM is only through the cellular radio module preventing the onboard microprocessor from directly accessing the SIM.  Any communications with the SIM is performed solely by the radio stack layer built into the radio module.  The authentication and key agreement mechanism utilizes a secret key K which is known only to the SIM and the Internet of Things home carrier
  • 6. THE INTERLOCKING FUNCTIONAL ELEMENTS(2/8) B. RADIO ACCESS NETWORK ENCRYPTION  The radio link layer between the IoT device radio module and the cellular tower is 128-bit encrypted, utilizing the key from the previous section, as part of the standard GSM protocol for 3G and above transmissions C. CUSTOM ACCESS POINT NAME (APN)  The secure IoT architecture makes use of a custom APN assigned to each of the enterprise customers deploying IoT devices.  This custom APN is unique to the enterprise which has provisioning and management capabilities of IoT devices.  The custom APN allows such enterprise to give an IoT device permission to access that Enterprise’s custom APN for the data transport.
  • 7. THE INTERLOCKING FUNCTIONAL ELEMENTS(3/8) D. PRIVATE NON-ROUTABLE TCP/IP ADDRESSING  The non-routable IP address is preserved in the packet along the path between the IoT radio module and the GPRS Support Node(GGSN) avoiding any type of conversion into a public routable IP address.  Because of the nature of the overarching architecture, the private IP addressing schema does not route to the public Internet.  The non-routable nature of the IP addressing that is preserved end-to-end  Even if a malicious packet were to make its way into this secure pipe or one of the IP packets were to “escape” the pipe, they would be immediately dropped by the first router hop due to their non-routable IP address
  • 8. THE INTERLOCKING FUNCTIONAL ELEMENTS(4/8) E. NON-SPLIT TUNNEL ROUTING SCHEMA  Poorly architected solutions often provision an APN to split the data packet tunnel  In other words, while the private data packets are directly sent to the enterprise customers, the public destined packets are directly routed from the mobility data center off to the public Internet.  This breaks security methodology because now an IoT device has a path to the public Internet that is not under the control of the enterprise customer.
  • 9. THE INTERLOCKING FUNCTIONAL ELEMENTS(5/8) F. POINT TO POINT DATA TRANSPORT BETWEEN CELLULAR CARRIER AND HOST  The point-to-point connection between the mobility data center and the destination host may take the form of an IPsec VPN tunnel  By combining the two functional elements provided by the custom APN and IPsec VPN tunnel, it is possible to establish a closed secure pipe G. NO DIRECT DEVICE TO DEVICE COMMUINICATION  Direct communication of IoT decices through the carrier’s data center would not leave a record or footprint in the customer’s router or backend host system.  In other words, the devices may be chatting back and forth without the enterprise customer having record of or seeing the M2M device traffic  Unable to probe the traffic for malicious behavior.
  • 10. THE INTERLOCKING FUNCTIONAL ELEMENTS(6/8) H. DESTINATION HOST ROUTER MONITORING  All data packets to and from the IoT device passes through the enterprise customer’s router  Deep packet inspection at the customer’s router can detect in real-time that abnormal data behavior is occurring from the IoT devices, which may indicate fraudulent or malicious activity  By delivering every packet through the customer enterprise router, the customer’s host data center has a holistic view of all traffic coming from and going to the IoT devices  This can forensically detect if fraudulent behavior is or has occurred.
  • 11. THE INTERLOCKING FUNCTIONAL ELEMENTS(7/8) I. SIM TOOLKIT IMEI VALIDATION AND ALERTING  The SIM being a secure storage location either has received a copy of its allowed connected device’s IMEI or discovers it upon first power up.  This allowable IMEI(s) are held in nonvolatile memory within the SIM and upon subsequent power ups the SIM makes the same request of the radio module it is attached to and compares the delivered IMEI to the stored IMEI within the SIM.  If the two match, then the SIM assumes that it is in the equipment that it was intended to be in as the equipment serial number matches the securely held permissioned serial number of the hardware.  If the SIM detects a different IMEI, it can assume that malicious behavior has occurred and that someone has removed the physical SIM from the trusted device
  • 12. THE INTERLOCKING FUNCTIONAL ELEMENTS(8/8)  The device manufacturer creates a secure hashing algorithm within the device processor’s firmware that is keyed from a hardware serial number that renders a unique 4digit number  At time of assembly, the SIM associated with the device is programed into the locked state with the unique 4 digit code as the unlock key.  At power up or reset, the SIM requests the unlock code via the radio interface to the device processor.  The firmware runs the hashing algorithm to produce the 4 digit unlock code and passes to the SIM.If the code matches the SIM’s then the SIM is enabled for operation.  If the pin does not match after 3 attempts, the SIM is rendered unusable or blocked.  This prevents a SIM from being removed from an IoT device and inserted into a consumer phone. K. PIN LOCKING OF SIM J. SIM TOOLKIT IMEI ALERTING  The SIM alerts the host mobility data center that a mismatch has occurred upon power up and the carrier can then take immediate steps to disable the SIM or prevent dataflow from occurring until the issue is investigated
  • 13. CONCLUSION  This paper has set forth a multi-tiered solution for securely establishing end-to-end TCP/IP based Internet of Things communications over cellular-based networks.  This methodology consists of standards based interlocking functional elements deployed in a securely architected carrier network providing a secure end to end communications channel for Internet of Things devices and applications.