SlideShare a Scribd company logo
Building Secure
Connected Devices
Kedar Sovani
Who am I?
• IoT @ Marvell for 7 years
• 1st
Apple HomeKit SDK, 1st
Google Weave on μC
• Powering millions of Wi-Fi
IoT devices in the field
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Anywhere and Everywhere
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Google for the term IoT Security
Result Type I: Doomsday Hacking
Scenarios
Yes, security is a concern
• Increased surface area for attacks
• Connects to the physical world around us
• Newer and tinier hardware
• Newer developers
Courtesy: Darkreading.com
Result Type II: Buy Our Product
But How Do I Build for Security?
Secure By Design
Device Interactions #1
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Remote Access
Iot secure connected devices indicthreads
Standards!
• No home-grown security schemes
• Rely on established security standards #2
TLS
• Transport Layer Security
• Certificate-based Server Authentication
• Secure Key Exchange
• Encrypted Channel
• Certificate-based Device Authentication
• Secures Bank Transactions
Technology Advancements
• Hardware Capability
• Memory
• CPU
• Strong Software
• Many Open Source implementations
Iot secure connected devices indicthreads
Courtesy: Ars Technica
An interesting search engine
Iot secure connected devices indicthreads
Malformed Content?
• What about: malware/viruses?
• Communicate with known server
• controller by known entities
• Write protection
Iot secure connected devices indicthreads
Local Access
Iot secure connected devices indicthreads
Local Network
• Acts as a client for outside world
• router firewall
• Encrypted traffic at the MAC layer
• Requires Password/Certificate for access (explicit
delegation)
Switch Network?
• Remember AP Security
• Force physical access to reset-to-factory
New
Device
Setup?
New
Device
Setup?
Authenticate the other endpoint! #3
Authenticate the other endpoint!
Iot secure connected devices indicthreads
Compromised User
• Guest access to the network?
• Malware on user’s phone?
• Additional Cryptographic layers on top of the MAC layer
• User Management
Tradeoff
Physical Access
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Physical modification
• Change the server address/keys?
• Change the firmware?
• Trusted Boot
• Signed Firmware
• Encryption
Device Phishing
• Completely change the device?
• Device Authentication – PKI
Zarro Boogs Found!
• Firmware upgradeability
• Connectivity Bonus: evolving appliances
• Fix security vulnerabilities
• Possible attack vector 
Scrutinize #4
Iot secure connected devices indicthreads
@kedarsovani
Thank You!

More Related Content

PPT
IoT testing and quality assurance indicthreads
PPTX
IoT Best Practices: Unit Testing
PDF
Top IOT Testing Challenges Webinar with Jon Hagar
ODP
Internet Of Things
PDF
Testing IoT Apps with the Cloud
PPTX
Internet of Things and Quality Assurance
PDF
Atagg2015 iot internet of things - get ready to test the connected future ata...
PDF
A Pragmatic Reference Architecture for The Internet of Things
IoT testing and quality assurance indicthreads
IoT Best Practices: Unit Testing
Top IOT Testing Challenges Webinar with Jon Hagar
Internet Of Things
Testing IoT Apps with the Cloud
Internet of Things and Quality Assurance
Atagg2015 iot internet of things - get ready to test the connected future ata...
A Pragmatic Reference Architecture for The Internet of Things

What's hot (19)

PPT
Stc 2016 regional-round-iot testing in agile.
PDF
IoT Introduction Architecture and Applications
PPTX
Mobile and IoT testing
PPTX
IoTSummit - Introduction to IoT Hub
PPTX
PDF
Ibm_IoT_Architecture_and_Capabilities
PDF
IoT Node-Red Presentation
PPTX
Using an Open Source RESTful Backend for IoT Applications
PDF
An IoT gateway centric architecture to provide novel m2m services
PDF
Architectural Patterns in IoT Cloud Platforms
PPTX
IoT on Azure
PPTX
Demystifying Internet of Things with Azure IoT Suite
PPTX
Business Transformation with Microsoft Azure IoT
PPTX
Internet of things (IoT) with Azure
PPTX
Global Azure boot camp 2015 - Microsoft IoT Solutions with Azure
PPTX
Devising a practical approach to the Internet of Things
PPTX
Connecting IoT devices to Azure
PPTX
IoT on the Edge
PPTX
DotNetToscana - Azure IoT Hub - Il Concentratore
Stc 2016 regional-round-iot testing in agile.
IoT Introduction Architecture and Applications
Mobile and IoT testing
IoTSummit - Introduction to IoT Hub
Ibm_IoT_Architecture_and_Capabilities
IoT Node-Red Presentation
Using an Open Source RESTful Backend for IoT Applications
An IoT gateway centric architecture to provide novel m2m services
Architectural Patterns in IoT Cloud Platforms
IoT on Azure
Demystifying Internet of Things with Azure IoT Suite
Business Transformation with Microsoft Azure IoT
Internet of things (IoT) with Azure
Global Azure boot camp 2015 - Microsoft IoT Solutions with Azure
Devising a practical approach to the Internet of Things
Connecting IoT devices to Azure
IoT on the Edge
DotNetToscana - Azure IoT Hub - Il Concentratore
Ad

Viewers also liked (13)

PDF
At8000 s configuracao de gerenciamento
PPTX
Analysing digipaks 3
PDF
At8000 s configurando vlan avancado
PDF
Marvell Plug Computer 3.0- David Novak (TheGadgetGUYcolumn.com)
PDF
At8000 s caracteristicas gerais
PDF
Case Study: Marvell
PDF
Real world IoT for enterprises
PPT
How Marvell Semiconductor Implemented Executive Dashboards in 17 Countries in...
PDF
At8000 s arquitetura de empilhamento
DOC
Maxim zap cv_asic_backend_04_13
PDF
ITC 2015 - Marvell Present : "Improving Quality and Yield Through Optimal+ Bi...
PDF
Summit 16: ARM Mini-Summit - NFV for the Masses - Marvell
PDF
WiFi (IEEE 802.11 WLAN) Patents for Standard Ranking
At8000 s configuracao de gerenciamento
Analysing digipaks 3
At8000 s configurando vlan avancado
Marvell Plug Computer 3.0- David Novak (TheGadgetGUYcolumn.com)
At8000 s caracteristicas gerais
Case Study: Marvell
Real world IoT for enterprises
How Marvell Semiconductor Implemented Executive Dashboards in 17 Countries in...
At8000 s arquitetura de empilhamento
Maxim zap cv_asic_backend_04_13
ITC 2015 - Marvell Present : "Improving Quality and Yield Through Optimal+ Bi...
Summit 16: ARM Mini-Summit - NFV for the Masses - Marvell
WiFi (IEEE 802.11 WLAN) Patents for Standard Ranking
Ad

Similar to Iot secure connected devices indicthreads (20)

PDF
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
PDF
Creating secure apps using the salesforce mobile sdk
PDF
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
PDF
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
PDF
The Internet of Things and You - A Developers Guide to IoT
PDF
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
PDF
Hack one iot device, break them all!
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PPSX
Geek Night 15.0 - Touring the Dark-Side of the Internet
PDF
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
PPTX
How to create a secure IoT device
PDF
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
DOCX
IoT Vulnerability Analysis and IOT In security Controls
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
Man in the Binder
PPTX
IoT World - creating a secure robust IoT reference architecture
PPTX
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
PPTX
IoT security
PPTX
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Creating secure apps using the salesforce mobile sdk
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
The Internet of Things and You - A Developers Guide to IoT
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
Hack one iot device, break them all!
IoT Security, Threats and Challenges By V.P.Prabhakaran
Geek Night 15.0 - Touring the Dark-Side of the Internet
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
How to create a secure IoT device
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
IoT Vulnerability Analysis and IOT In security Controls
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Man in the Binder
IoT World - creating a secure robust IoT reference architecture
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
IoT security
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker

More from IndicThreads (20)

PPTX
Http2 is here! And why the web needs it
ODP
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
PPT
Go Programming Language - Learning The Go Lang way
PPT
Building Resilient Microservices
PPT
App using golang indicthreads
PDF
Building on quicksand microservices indicthreads
PDF
How to Think in RxJava Before Reacting
PPT
Functional Programming Past Present Future
PDF
Harnessing the Power of Java 8 Streams
PDF
Building & scaling a live streaming mobile platform - Gr8 road to fame
PPTX
Internet of things architecture perspective - IndicThreads Conference
PDF
Cars and Computers: Building a Java Carputer
PPTX
Scrap Your MapReduce - Apache Spark
PPT
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
PPTX
Speed up your build pipeline for faster feedback
PPT
Unraveling OpenStack Clouds
PPTX
Digital Transformation of the Enterprise. What IT leaders need to know!
PDF
Architectural Considerations For Complex Mobile And Web Applications
PPTX
Functional Programming With Lambdas and Streams in JDK8
PDF
Changing application demands: What developers need to know
Http2 is here! And why the web needs it
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Go Programming Language - Learning The Go Lang way
Building Resilient Microservices
App using golang indicthreads
Building on quicksand microservices indicthreads
How to Think in RxJava Before Reacting
Functional Programming Past Present Future
Harnessing the Power of Java 8 Streams
Building & scaling a live streaming mobile platform - Gr8 road to fame
Internet of things architecture perspective - IndicThreads Conference
Cars and Computers: Building a Java Carputer
Scrap Your MapReduce - Apache Spark
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
Speed up your build pipeline for faster feedback
Unraveling OpenStack Clouds
Digital Transformation of the Enterprise. What IT leaders need to know!
Architectural Considerations For Complex Mobile And Web Applications
Functional Programming With Lambdas and Streams in JDK8
Changing application demands: What developers need to know

Recently uploaded (20)

PPTX
Operating System Processes_Scheduler OSS
PPT
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
PPTX
Lecture-3-Computer-programming for BS InfoTech
PPTX
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
PDF
Dynamic Checkweighers and Automatic Weighing Machine Solutions
PDF
How NGOs Save Costs with Affordable IT Rentals
PDF
PPT Determiners.pdf.......................
PPTX
了解新西兰毕业证(Wintec毕业证书)怀卡托理工学院毕业证存档可查的
PPT
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
PPTX
Fundamentals of Computer.pptx Computer BSC
PPTX
02fdgfhfhfhghghhhhhhhhhhhhhhhhhhhhh.pptx
PPTX
udi-benefits-ggggggggfor-healthcare.pptx
PPTX
kvjhvhjvhjhjhjghjghjgjhgjhgjhgjhgjhgjhgjhgjh
PDF
Layer23-Switch.com The Cisco Catalyst 9300 Series is Cisco’s flagship stackab...
PPTX
DEATH AUDIT MAY 2025.pptxurjrjejektjtjyjjy
PPTX
quadraticequations-111211090004-phpapp02.pptx
PDF
YKS Chrome Plated Brass Safety Valve Product Catalogue
PPTX
figurative-languagepowerpoint-150309132252-conversion-gate01.pptx
PDF
Cableado de Controladores Logicos Programables
PPTX
PROGRAMMING-QUARTER-2-PYTHON.pptxnsnsndn
Operating System Processes_Scheduler OSS
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
Lecture-3-Computer-programming for BS InfoTech
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
Dynamic Checkweighers and Automatic Weighing Machine Solutions
How NGOs Save Costs with Affordable IT Rentals
PPT Determiners.pdf.......................
了解新西兰毕业证(Wintec毕业证书)怀卡托理工学院毕业证存档可查的
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
Fundamentals of Computer.pptx Computer BSC
02fdgfhfhfhghghhhhhhhhhhhhhhhhhhhhh.pptx
udi-benefits-ggggggggfor-healthcare.pptx
kvjhvhjvhjhjhjghjghjgjhgjhgjhgjhgjhgjhgjhgjh
Layer23-Switch.com The Cisco Catalyst 9300 Series is Cisco’s flagship stackab...
DEATH AUDIT MAY 2025.pptxurjrjejektjtjyjjy
quadraticequations-111211090004-phpapp02.pptx
YKS Chrome Plated Brass Safety Valve Product Catalogue
figurative-languagepowerpoint-150309132252-conversion-gate01.pptx
Cableado de Controladores Logicos Programables
PROGRAMMING-QUARTER-2-PYTHON.pptxnsnsndn

Iot secure connected devices indicthreads

Editor's Notes

  • #22: Mention that direct access to the device is protected by the gateway/firewall man in the middle - read/modify traffic replay - open door lock dns spoof - redirect to malicious server
  • #27: Talk about user-association challenges, TLS, authorized APIs OLA Money example
  • #32: From an attacker’s point of view, attack vector limited to being near each device and then exploiting the vulnerability
  • #35: From an attacker’s point of view, attack vector limited to being near each device and then exploiting the vulnerability