1. European Union Agency for Network and Information Security
Introduction to IoT security
Christina Skouloudi, Apostolos Malatras | ENISA IoT Security team
ENISA-FORTH NIS Summer School| 26.09.2018
3. 3
• Round table
• Intro & ENISA’s efforts on IoT
• IoT 101
• Intro and definition
• Ecosystem (including assets and components)
• IoT platforms
• IoT protocols
• IoT Security
• Challenges
• Threats
• Attack scenarios
• Case-study: BLE Security
• LAB
Day 1
4. 4
Positioning ENISA activities
POLICY
Support MS & COM in
Policy implementation
Harmonisation across EU
CAPACITY
Hands on activities
EXPERTISE
Recommendations
Independent Advice
5. 5
Horizontal and vertical Studies
Expert Groups
Validation Workshops
Conferences
Summer School
ENISA’s efforts on IoT Security
7. 7
IoT security in sectors
• Understand threats & assets
• Consider context of use
• Highlight security good
practices in specific sectors
• Provide recommendations to
enhance cyber security
• Expert groups
8. 8
• Baseline Security Recommendations for IoT
• Map existing IoT security initiatives
• Address the problem holistically engaging
with wider community
• Utilize sectorial knowhow
• Provide horizontal cybersecurity
recommendations and security measures
• One stop shop for IoT cybersecurity
in Europe
ENISA and IoT cybersecurity
https://enisa.europa.eu/iot
13. 13
Sensor
element that allows to monitor the environment
and the context on which IoT systems operate
• accelerometers
• temperature sensors
• pressure sensors
• light sensors
• acoustic sensors
sensors can measure defined physical, chemical or biological indicators, and on
the digital level, they collect information about the network and applications
15. 15
Actuator
the entity responsible for moving or controlling a system
or mechanism.
an actuator operates in the reverse direction of a sensor;
it takes an electrical input and turns it into physical action.
16. 16
Sensor + Actuator + ..
Structure of an IoT embedded system
• medical implants
• wearables (smart watches)
• connected lights
• smart thermostats
18. 18
Everything becomes connected
Business side
• “Everything connected” hype
- Competitors do IoT, hence we must do
IoT
- Competitors don’t do IoT, let’s be the
first one!
• Financial gains
• New business models and
opportunities
• Advanced data collection and
processing
40. 40
• IoT botnet
• IoT devices used for DDoS attacks
Based on a real life example
41. 41
No device is fully secured
• Reliance on third-party components, hardware and
software
• Dependency on networks and external services
• Design of IoT/connected devices
• Vulnerabilities in protocols
• Security by design NOT the norm.
IoT security is currently limited
• Investments on security are limited
• Functionalities before security
• Real physical threats with risks on health and safety
• No legal framework for liabilities
Why IoT security matters?
Cyber
System
Physical
System
42. 42
• Very large attack surface and widespread deployment
• Limited device resources
• Lack of standards and regulations
• Safety and security process integration
• Security by design not a top priority
• Lack of expertise
• Applying security updates
• Insecure development
• Unclear liabilities
IoT Security – Main challenges
47. 47
• Attacks over the entire IoT ecosystem
• Sensors/actuators
- E.g. draining the battery of pacemakers
• Communications
- E.g. intercepting Bluetooth LE communication
• Decision making (data integrity, etc.)
- E.g. modification of messages to modify smart car
behavior
• Information privacy
- E.g. smart toys exploited to eavesdrop on children
Many ways to attack IoT
53. 53
• What we are exposing on the internet
• Online scanners
• The use of shodan, and the many grey areas.
• Who is a potential target of these kind of scanners?
• Are shodan results an indicator of potential attacks and more
sophisticated version of current attacks? (eg. Mirai evolved to
target specific ports – why?)
What to understand
55. 55
Study Mirai code on github:
https://github.com/jgamblin/Mirai-Source-Code
Code of a Botnet
56. 56
• AIOTI High Level Architecture functional model
• FP7-ICT – IoT-A Architectural reference model
• NIST Network of Things (NoT)
• ITU-T IoT reference model39
• ISO/IEC CD 30141 Internet of Things Reference Architecture
• ISACA Conceptual IoT Architecture
• oneM2M Architecture Model
• IEEE P2413 - Standard for an Architectural Framework
IoT Security Architectures