SlideShare a Scribd company logo
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 1
Security Requirements in IoT
Dr. Vrince Vimal
Computer Science and Engineering
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 2
Unit I 9 Hours
SecurityRequirements in IoT Architecture - Security in Enabling Technologies - Security Concerns in IoT Applications. Security
Architecture in the Internet of Things - Security Requirements in IoT - Insufficient Authentication/Authorization - Insecure Access
Control - Threats to Access Control, Privacy, and Availability - Attacks Specific to IoT. Vulnerabilities – Secrecy and Secret-Key Capacity -
Authentication/Authorization for Smart Devices - Transport Encryption – Attack & Fault trees.
Unit II 9 Hours
Cryptographic primitives and its role in IoT – Encryption and Decryption – Hashes – Digital Signatures – Random number generation –
Cipher suites– key management fundamentals – cryptographic controls built into IoT messaging and communication protocols – IoT Node
Authentication
Unit III 8 Hours
Identity lifecycle – authentication credentials – IoT IAM infrastructure – Authorization with Publish / Subscribe schemes – access control
Unit IV 6 Hours
Concerns in data dissemination – Lightweight and robust schemes for Privacy protection – Trust and Trust models for IoT – self-organizing
Things - Preventing unauthorized access
Unit V 8 Hours
Cloud services and IoT – offerings related to IoT from cloud service providers – Cloud IoT security controls – enterprise IoT cloud security
architecture – New directions in cloud enabled IoT computing.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 3
• The emerging Internet of Things (IoT) is believed to be the next
generation of the Internet.
• Easy target for Hackers as billion of devices Communicating
without human intervention.
• Intelligent sensors, wireless communication, networks, data
analysis technologies, cloud computing have been developed
• The development is in initial stages.
Introduction
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 4
• Security is significant obstacles in IoT
• It which involves the sensing of :
 Infrastructure security,
 Communication network security
 Application security
 General system security.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 5
• Security means cryptography, secure communication, and
privacy assurances.
• But for IoT Security has diverse meaning i.e.
• Data confidentiality,
• Services availability,
• Integrity,
• Antimalware,
• Information integrity,
• Privacy protection,
• Access control,
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 6
• At the lower layer of IoT (sensing layer)
 Limited computation capacity
 Limited energy supply
• At the Middle layer of IoT (network layer)
 Eavesdropping or Interception,
 Denial of service (DoS) attack.
• At the upper layer of IoT (application layer)
 Data aggregation and encryption compensates for
issues of all layers.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 7
Security Requirements
• In IoT, each connected device could be a potential doorway
into the IoT infrastructure or personal data.
• Security Concern would elevate once IoT reaches next level
of interoperability and autonomous decision making and
higher order security loopholes.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 8
Security Concerns in IoT
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 9
SECURITY REQUIREMENTS IN IoT
ARCHITECTURE
• A critical requirement of IoT is that the devices must be
interconnected.
• N/W has to acquire, process and communicate data from
real to virtual world.
• provide applications with strong security protection
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 10
• N/W must provide operational guarantees for the
IoT, which bridges the gap between the physical
devices and the virtual worlds.
• Framework should consider:
 Technical factors,
 Sensing techniques,
 Communication methods
 Network technologies
 Security protection,
 Information confidentiality,
 Transmission security,
 Privacy protection,
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 11
 Business issues,
 Business models,
 Business processes
• SoA has been successfully applied to IoT design
• The services-based application will heavily depend
on the architecture of IoT.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 12
SoA for IoT
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 13
Sensing Layer and IoT End-Nodes
For designing sensing layer of an IoT, the
main concerns are:
• Cost, size, resource, and energy
consumption
• Deployment.
• Heterogeneity.
• Communication.
• Networks.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 14
The endless variety of IoT applications poses
an equally wide variety of security challenges.
Devices authentication
Trusted devices
Leveraging the security controls and
availability of infrastructures in sensing layer.
In terms of software update
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 15
In this layer, the security concerns can be classified into two
main categories:
• The security requirements at IoT end-node: physically
;access control; authentication; nonrepudiation;
confidentiality; integrity; availability; and privacy.
• The security requirements in sensing layer: confidentiality;
data source authentication; device authentication; integrity;
availability, and timeless.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 16
Security Threats Description
Unauthorized access Due to physically capture or logic
attacked, the sensitive information at the end-nodes is captured
by the attacker.
Availability The end-node stops to work since physically
captured or attacked logically
Spoofing attack With malware node, the attacker
successfully masquerades as IoT end-device, end-node, or
end-gateway by falsifying data
Selfish threat Some IoT end-nodes stop working to save
resources or andwidth to cause the failure of network
Malicious code Virus, Trojan, and junk message that can
cause software failure
DoS An attempt to make a IoT end-node resource unavailable
to its users
Transmission threats Threats in transmission, such as
interrupting, blocking, data manipulation, forgery, etc.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 17
following actions should be taken:
(1) Implement security standards for IoT and ensure all
devices are produced by meeting specific security standards.
(2) Build trustworthy data sensing system and review the
security of all devices/ components.
(3) Forensically identify and trace the source of users.
(4) Software or firmware at IoT end-node should be securely
designed.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 18
In the networking layer, the following issues
should be addressed:
• Network management technologies
including the management for
fixed, wireless, mobile networks,
• Network energy efficiency,
• Requirements of QoS,
• Technologies for mining and searching,
• Information confidentiality,
• Security and privacy.
Network Layer
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 19
The security requirements in network layer involve:
• Overall security requirements,
• Privacy leakage:
• Communication security:
• Overconnected:
• MITM attack:
• Fake network message:
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 20
The activities in service layer, conducted by following
components:
• Service discovery.
• Service composition.
• Trustworthiness management.
• Service APIs.
Service Layer
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 21
The security requirements in the service layer include:
Authorization, service authentication, group authentication,
privacy protection, integrity, security of keys, nonrepudiation,
antireplay, availability, etc.
• Privacy leakage. The main concern in this layer involves
privacy leakage and malicious location tracking.
• Service abuses. In IoT the service abuse attack involves:
i) illegal abuse of services;
ii) abuse of unsubscribed services.
• Node identify masquerade.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 22
• DoS attack.
• Replay attack, the attacker resends the data.
• Service information sniffer and manipulation.
• Repudiation in service layer, it includes the communication
repudiation and services repudiation.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 23
For the application maintenance, following security
requirements will be involved:
• Remote safe configuration.
• Software downloading and updating.
• Security patches.
• Administrator authentication.
• Unified security platform, etc.
Application Layer
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 24
In IoT in designing the security solutions, following rules
should be helpful:
a. Since most constrained IoT end-nodes work in an
unattended manner, the designer should pay more attention
to the safety of these nodes;
b. As IoT involves billions of clustering nodes, the security
solutions should be designed based on energy efficiency
schemes;
c. The light security scheme at IoT end-nodes might be
different with existing network security solutions; however, we
should design security solutions in a big enough range for all
parts in IoT.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 25
 Security in Identification and Tracking Technologies
• Due to its capability for identifying, tracing, and tracking,
the RFID system has been wide applications
SECURITY IN ENABLING
TECHNOLOGIES
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 26
In general the security features of RFID include:
• Tags/Readers collision problem Data confidentiality
• Tag-to-reader authentication
• High-assurance readers
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 27
Security in Integration of WSN and RFID
• IoT with the integration of RIFD and WSNs makes it
possible to develop IoT applications for healthcare,
decision-making of complex systems.
• The security issue in integration of RFID and WSNs
involves following challenges:
• Privacy,
• Identification and authentication,
• Communication security,
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 28
• Trust and ownership,
•
• Integration;
• User authentication.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 29
SECURITY CONCERNS IN IoT
APPLICATIONS• The IoT enables information gathering, transmitting, and
storing to be available for devices in many scenarios, which
creates or accelerates many applications such as :
• Industrial control systems,
• Retailing industry,
• Smart shelf operations,
• Healthcare,
• Food and restaurant industry,
• Logistic industry, travel
• Tourism industry, etc.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 30
To integrate the devices of sensing layer as intrinsic parts of the IoT,
effective security technology is essential to ensure security and privacy
protection in
various activities such as :
• Personal activities,
• Business processes,
• Transportations,
• Information protection.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 31
Security Concerns in SCADA Systems
• SCADA systems are generally designed as more technical-
oriented solutions often in the industrial environment.
• Following security concerns are to be concerned while
integrating SCADA with IoT:
 Authentication and access control
 Identification of SCADA vulnerabilities
 Physical security
 System recovery and backups
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 32
Security Concerns in EIS
• Enterprise information systems have played the pivotal
role in modern organizations existing as Enterprise
Resource Planning (ERP) systems which integrated
• Intraorganizational business processes and
Supply chain management systems to link
Interorganizational business processes, and Customer
Relationship Management (CRM) systems that maintain
relationships with customers
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 33
Security Architecture in the Internet of Things
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 34
• The Internet of Things (IoT) is an extension of the
Internet
• The IoT is able to connect the digital cyberspace and real
physical space.
• IoT is able to introduce all the vulnerabilities of the digital
world into our real world.
• The success of IoT applications and IoT infrastructure
significantly depends on the guarantee of the security and
vulnerability in the IoT.
• It is important to set up and take cyber defense seriously.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 35
SECURITY REQUIREMENTS IN IoT
• The IoT introduces large quantities of new devices that will
be deployed or embedded throughout an organization or
even within a system.
• Each connected device could be a potential doorway into
the IoT infrastructure or personal data.
• Data captured from these devices can be analyzed and
acted upon.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 36
• Security Threats in IoT will reach new levels as
interoperability, mashups, and autonomous decision-
making begin to embed complexity, security loopholes.
• The sanctity of security and privacy concerns of the IoT
are not clearly defined yet.
• loopholes might cause potential “black swan” events.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 37
• In a general framework main security requirements
are addressed from six aspects:.
IoT Data Security Challenges
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 38
• Privacy risks will arise as objects within the IoT collect and
aggregate fragments of data that relate to their service
Data Confidentiality
• Insufficient authentication/authentication
• Insecure interfaces (web, mobile, cloud, etc.)
• Lack of transport encryption
• Confidentiality preserving & Access control
Privacy
• Privacy, data protection, & information security risk
management
• Privacy by design and default
• Data protection legislation
• Traceability/profiling/unlawful processing
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 39
Trust
• Identity management system
• Insecure software/firmware
• Ensuring continuity and availability of services
• Realization of malicious attacks against IoT devices and
system
• Loss of user control/difficult in making decision
• If we model IoT as 4 Layer architecture each layer should be
able to provide access control, device authentication, data
integrity, and confidentiality in transmission, availability, and
the ability to defend IoT devices against virus and attacks.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 40
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 41
Authentication in IoT
• The soul of IoT framework is the authentication layer.
(verify identity)
• When M2M devices need access to the IoT infrastructure,
the trust relationship is initiated based on the identity of
the device.
• In human and machine interactions names, patterns
fingerprints, retina scan passwords can authenticate.
• In M2M endpoints must be fingerprinted by means that
do not require human interaction.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 42
• SSL/TLS X.509 certificate is a digital file that's usable for
Secure Sockets Layer (SSL) or Transport Layer Security
(TLS). The certificate fulfills two functions. First, the
certificate can assist with authenticating and verifying the
identity of a host or site. Second, it enables the encryption
of information exchanged via a website.
• However, in the IoT domain, many devices may not have
enough memory to store a certificate.
• IEEE - 802.1X authentication involves three parties: a
supplicant, an authenticator, and an authentication server.
• TLS/DTLS , SSH, IPSec/IKE
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 43
Authorization
• The second layer of this framework is authorization that
controls a device’s access throughout the network fabric. This
layer builds upon the core authentication layer by leveraging
the identity information of an entity.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 44
Insufficient Authentication/Authorization
• On the Internet, the users are always authenticated by
requiring a password and browsers authenticate web sites
through the SSL (secure sockets layer protocol).
• In the IoT, new devices that connected into an IoT system
should be able to authenticate itself prior to receiving or
transmitting data.
• Deeply embedded devices often do not have users sitting
behind keyboards.
• Secure storage area plays important role.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 45
• Some new threats and attack vectors that malicious actors
could take advantage of are as follows:
In IoT-based industrial control system, such as SCADA etc.,:
• Control systems, vehicles, and even the human body
(WBAN) can be accessed and manipulated causing injury or
worse.
• Healthcare providers can improperly diagnose and treat
patients based on modified health information or
manipulated sensor data.
• Intruders can gain physical access to homes or commercial
businesses through attacks against electronic, remote
controlled door lock mechanisms.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 46
Individual
• Unauthorized tracking of people’s locations can occur
through usage pattern tracking based on asset usage time
and duration.
• Unlawful surveillance through persistent remote monitoring
capabilities offered by small-scale IoT devices.
• Inappropriate profiles and categorizations of individuals
can be created through examination of network and
geographic tracking and IoT metadata.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 47
Business Area
• Inappropriate profiles and categorizations of individuals
can be created through examination of network and
geographic tracking and IoT metadata.
• Manipulation of financial transactions through
unauthorized POS and POS access.
• Monetary loss arising from the inability to provide service.
• Vandalism, theft, or destruction of IoT assets that are
deployed in remote locations and lack physical security
controls.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 48
Ability to Access the IoT
• Ability to gain unauthorized access to IoT edge devices to
manipulate data by taking advantage of the challenges related
to updating software and firmware of embedded devices.
• Ability to gain unauthorized access to the Enterprise network
by compromising IoT edge devices and taking advantage of
trust relationships.
• Ability to create botnets by compromising large quantities of
IoT edge devices.
• Ability to impersonate IoT devices by gaining access to
keying material held in devices that rely up on software-based
trust stores.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 49
INSECURE ACCESS CONTROL
• Authorization frameworks for computer networks and
online services are role based. First, the identity of the user
is established and then his or her access privileges are
determined from the user’s role within an organization.
• E.g., RADIUS-Remote-Authentication Dial-In User Service.
• LDAP (Lightweight Directory Access Protocol)
• Role-Based Access Control Systems
• Access Control List-Based Systems
• Capability-Based Access
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 50
THREATS TO ACCESS CONTROL, PRIVACY,
AND AVAILABILITY
To secure devices access layer before users are at risk, following
actions should be taken:
(1)Implement security standards for IoT and ensure all devices
are produced by meeting specific security standards;
(2)Build trustworthy data sensing system and review the security
of all devices/components;
(3) Forensically identify and trace the source of users;
(4) Software or firmware at IoT end-node should be securely
designed.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 51
Security Threats and Vulnerabilities at IoT End-Node
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 52
ATTACKS SPECIFIC TO IoT
IoT applications might be subjected to most types of network
attacks, including :
Actually, more specific attacks to IoT have been emerged in
recently. Attackers can intercept or change the behavior of
smart home devices in many ways.
• Either by physical access
• Remote location
• Eavesdropping,
• Data modification
• Identity spoofing,
• Password-based attacks,
• DOS attack,
• Man-in-the-middle,
• Compromised-key attack,
• Sniffer attack
• Application layer attack
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 53
SECRECY AND SECRET-KEY CAPACITY
• The standardization of IoT is still an open issue.
• Available cryptography is designed at the application layer
without regard to the imperfections of the lower layer.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 54
IoT in Health care
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 55
One way Authentication
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 56
Mutual Authentication
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 57
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 58

More Related Content

PPTX
IoT Enabling Technologies
PPTX
Introduction to IoT Security
 
PPTX
Types of optical fiber
PPTX
Chapter_1.pptx
PPTX
Security in IoT
PPTX
security and privacy-Internet of things
PPT
8086 micro processor
PPTX
AI-UNIT 1 FINAL PPT (1).pptx
IoT Enabling Technologies
Introduction to IoT Security
 
Types of optical fiber
Chapter_1.pptx
Security in IoT
security and privacy-Internet of things
8086 micro processor
AI-UNIT 1 FINAL PPT (1).pptx

What's hot (20)

PDF
Overview of IoT and Security issues
PPTX
IoT Security
PPTX
Iot(security)
PPT
IoT security (Internet of Things)
PDF
Security challenges in IoT
PPTX
Wireless network security
PDF
Cryptography and Network Lecture Notes
PPTX
Security services and mechanisms
PPTX
Challenges and application of Internet of Things
PPTX
cryptography ppt free download
PPTX
Network Security
PPTX
Introduction to Cryptography
PDF
IoT Security: Problems, Challenges and Solutions
PPTX
Cyber Security in AI (Artificial Intelligence)
PDF
20 Latest Computer Science Seminar Topics on Emerging Technologies
PPTX
Zero Trust Model
PPTX
Key management
PPTX
Cryptography.ppt
PPTX
Iot Security
Overview of IoT and Security issues
IoT Security
Iot(security)
IoT security (Internet of Things)
Security challenges in IoT
Wireless network security
Cryptography and Network Lecture Notes
Security services and mechanisms
Challenges and application of Internet of Things
cryptography ppt free download
Network Security
Introduction to Cryptography
IoT Security: Problems, Challenges and Solutions
Cyber Security in AI (Artificial Intelligence)
20 Latest Computer Science Seminar Topics on Emerging Technologies
Zero Trust Model
Key management
Cryptography.ppt
Iot Security
Ad

Similar to Security Requirements in IoT Architecture (20)

PPTX
A_Review_on_Security_Challenges_in_Internet_of.pptx
PDF
assignment help experts
PDF
sample assignment
PDF
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
PDF
Cybersecurity in the Age of IoT - Skillmine
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PDF
How To Evaluate the Strengths and Weaknesses of Security and Privacy in IoT D...
PPTX
Assign 1_8812814ctm.pptx
PDF
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
PPTX
IoT, Data Analytics and Big Data Security.pptx
PDF
Internet of Things IoT Security Perspective
PDF
IRJET - Cyber Security Threats and Measures in Context with IoT
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
Io t security defense in depth charles li v1 20180425c
PDF
Security and Privacy Big Challenges in Internet of things
PDF
Security Issues in IoT-Based Environments
PDF
Security Issues in IoT-Based Environments
PDF
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
A_Review_on_Security_Challenges_in_Internet_of.pptx
assignment help experts
sample assignment
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
Cybersecurity in the Age of IoT - Skillmine
IoT Security, Threats and Challenges By V.P.Prabhakaran
How To Evaluate the Strengths and Weaknesses of Security and Privacy in IoT D...
Assign 1_8812814ctm.pptx
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IoT, Data Analytics and Big Data Security.pptx
Internet of Things IoT Security Perspective
IRJET - Cyber Security Threats and Measures in Context with IoT
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Io t security defense in depth charles li v1 20180425c
Security and Privacy Big Challenges in Internet of things
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
Ad

More from Vrince Vimal (11)

PDF
PDF
Intro to wireless sensor network
PPTX
GPS Orbits
PPTX
GPS processing techniques & some applications
PPTX
Gps measurements
PPT
Equalisation, diversity, coding.
PPTX
Cellular concepts
PPTX
Basics of gps ii
PPTX
Basics of gps 1
PPTX
Small scale fading and multipath measurements
PPTX
Large scale path loss 1
Intro to wireless sensor network
GPS Orbits
GPS processing techniques & some applications
Gps measurements
Equalisation, diversity, coding.
Cellular concepts
Basics of gps ii
Basics of gps 1
Small scale fading and multipath measurements
Large scale path loss 1

Recently uploaded (20)

PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
DOCX
573137875-Attendance-Management-System-original
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Well-logging-methods_new................
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Geodesy 1.pptx...............................................
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
573137875-Attendance-Management-System-original
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Mechanical Engineering MATERIALS Selection
Internet of Things (IOT) - A guide to understanding
Operating System & Kernel Study Guide-1 - converted.pdf
CH1 Production IntroductoryConcepts.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Well-logging-methods_new................
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
Lesson 3_Tessellation.pptx finite Mathematics
Arduino robotics embedded978-1-4302-3184-4.pdf
Foundation to blockchain - A guide to Blockchain Tech
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Geodesy 1.pptx...............................................
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf

Security Requirements in IoT Architecture

  • 1. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 1 Security Requirements in IoT Dr. Vrince Vimal Computer Science and Engineering
  • 2. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 2 Unit I 9 Hours SecurityRequirements in IoT Architecture - Security in Enabling Technologies - Security Concerns in IoT Applications. Security Architecture in the Internet of Things - Security Requirements in IoT - Insufficient Authentication/Authorization - Insecure Access Control - Threats to Access Control, Privacy, and Availability - Attacks Specific to IoT. Vulnerabilities – Secrecy and Secret-Key Capacity - Authentication/Authorization for Smart Devices - Transport Encryption – Attack & Fault trees. Unit II 9 Hours Cryptographic primitives and its role in IoT – Encryption and Decryption – Hashes – Digital Signatures – Random number generation – Cipher suites– key management fundamentals – cryptographic controls built into IoT messaging and communication protocols – IoT Node Authentication Unit III 8 Hours Identity lifecycle – authentication credentials – IoT IAM infrastructure – Authorization with Publish / Subscribe schemes – access control Unit IV 6 Hours Concerns in data dissemination – Lightweight and robust schemes for Privacy protection – Trust and Trust models for IoT – self-organizing Things - Preventing unauthorized access Unit V 8 Hours Cloud services and IoT – offerings related to IoT from cloud service providers – Cloud IoT security controls – enterprise IoT cloud security architecture – New directions in cloud enabled IoT computing.
  • 3. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 3 • The emerging Internet of Things (IoT) is believed to be the next generation of the Internet. • Easy target for Hackers as billion of devices Communicating without human intervention. • Intelligent sensors, wireless communication, networks, data analysis technologies, cloud computing have been developed • The development is in initial stages. Introduction
  • 4. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 4 • Security is significant obstacles in IoT • It which involves the sensing of :  Infrastructure security,  Communication network security  Application security  General system security.
  • 5. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 5 • Security means cryptography, secure communication, and privacy assurances. • But for IoT Security has diverse meaning i.e. • Data confidentiality, • Services availability, • Integrity, • Antimalware, • Information integrity, • Privacy protection, • Access control,
  • 6. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 6 • At the lower layer of IoT (sensing layer)  Limited computation capacity  Limited energy supply • At the Middle layer of IoT (network layer)  Eavesdropping or Interception,  Denial of service (DoS) attack. • At the upper layer of IoT (application layer)  Data aggregation and encryption compensates for issues of all layers.
  • 7. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 7 Security Requirements • In IoT, each connected device could be a potential doorway into the IoT infrastructure or personal data. • Security Concern would elevate once IoT reaches next level of interoperability and autonomous decision making and higher order security loopholes.
  • 8. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 8 Security Concerns in IoT
  • 9. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 9 SECURITY REQUIREMENTS IN IoT ARCHITECTURE • A critical requirement of IoT is that the devices must be interconnected. • N/W has to acquire, process and communicate data from real to virtual world. • provide applications with strong security protection
  • 10. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 10 • N/W must provide operational guarantees for the IoT, which bridges the gap between the physical devices and the virtual worlds. • Framework should consider:  Technical factors,  Sensing techniques,  Communication methods  Network technologies  Security protection,  Information confidentiality,  Transmission security,  Privacy protection,
  • 11. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 11  Business issues,  Business models,  Business processes • SoA has been successfully applied to IoT design • The services-based application will heavily depend on the architecture of IoT.
  • 12. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 12 SoA for IoT
  • 13. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 13 Sensing Layer and IoT End-Nodes For designing sensing layer of an IoT, the main concerns are: • Cost, size, resource, and energy consumption • Deployment. • Heterogeneity. • Communication. • Networks.
  • 14. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 14 The endless variety of IoT applications poses an equally wide variety of security challenges. Devices authentication Trusted devices Leveraging the security controls and availability of infrastructures in sensing layer. In terms of software update
  • 15. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 15 In this layer, the security concerns can be classified into two main categories: • The security requirements at IoT end-node: physically ;access control; authentication; nonrepudiation; confidentiality; integrity; availability; and privacy. • The security requirements in sensing layer: confidentiality; data source authentication; device authentication; integrity; availability, and timeless.
  • 16. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 16 Security Threats Description Unauthorized access Due to physically capture or logic attacked, the sensitive information at the end-nodes is captured by the attacker. Availability The end-node stops to work since physically captured or attacked logically Spoofing attack With malware node, the attacker successfully masquerades as IoT end-device, end-node, or end-gateway by falsifying data Selfish threat Some IoT end-nodes stop working to save resources or andwidth to cause the failure of network Malicious code Virus, Trojan, and junk message that can cause software failure DoS An attempt to make a IoT end-node resource unavailable to its users Transmission threats Threats in transmission, such as interrupting, blocking, data manipulation, forgery, etc.
  • 17. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 17 following actions should be taken: (1) Implement security standards for IoT and ensure all devices are produced by meeting specific security standards. (2) Build trustworthy data sensing system and review the security of all devices/ components. (3) Forensically identify and trace the source of users. (4) Software or firmware at IoT end-node should be securely designed.
  • 18. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 18 In the networking layer, the following issues should be addressed: • Network management technologies including the management for fixed, wireless, mobile networks, • Network energy efficiency, • Requirements of QoS, • Technologies for mining and searching, • Information confidentiality, • Security and privacy. Network Layer
  • 19. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 19 The security requirements in network layer involve: • Overall security requirements, • Privacy leakage: • Communication security: • Overconnected: • MITM attack: • Fake network message:
  • 20. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 20 The activities in service layer, conducted by following components: • Service discovery. • Service composition. • Trustworthiness management. • Service APIs. Service Layer
  • 21. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 21 The security requirements in the service layer include: Authorization, service authentication, group authentication, privacy protection, integrity, security of keys, nonrepudiation, antireplay, availability, etc. • Privacy leakage. The main concern in this layer involves privacy leakage and malicious location tracking. • Service abuses. In IoT the service abuse attack involves: i) illegal abuse of services; ii) abuse of unsubscribed services. • Node identify masquerade.
  • 22. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 22 • DoS attack. • Replay attack, the attacker resends the data. • Service information sniffer and manipulation. • Repudiation in service layer, it includes the communication repudiation and services repudiation.
  • 23. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 23 For the application maintenance, following security requirements will be involved: • Remote safe configuration. • Software downloading and updating. • Security patches. • Administrator authentication. • Unified security platform, etc. Application Layer
  • 24. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 24 In IoT in designing the security solutions, following rules should be helpful: a. Since most constrained IoT end-nodes work in an unattended manner, the designer should pay more attention to the safety of these nodes; b. As IoT involves billions of clustering nodes, the security solutions should be designed based on energy efficiency schemes; c. The light security scheme at IoT end-nodes might be different with existing network security solutions; however, we should design security solutions in a big enough range for all parts in IoT.
  • 25. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 25  Security in Identification and Tracking Technologies • Due to its capability for identifying, tracing, and tracking, the RFID system has been wide applications SECURITY IN ENABLING TECHNOLOGIES
  • 26. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 26 In general the security features of RFID include: • Tags/Readers collision problem Data confidentiality • Tag-to-reader authentication • High-assurance readers
  • 27. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 27 Security in Integration of WSN and RFID • IoT with the integration of RIFD and WSNs makes it possible to develop IoT applications for healthcare, decision-making of complex systems. • The security issue in integration of RFID and WSNs involves following challenges: • Privacy, • Identification and authentication, • Communication security,
  • 28. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 28 • Trust and ownership, • • Integration; • User authentication.
  • 29. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 29 SECURITY CONCERNS IN IoT APPLICATIONS• The IoT enables information gathering, transmitting, and storing to be available for devices in many scenarios, which creates or accelerates many applications such as : • Industrial control systems, • Retailing industry, • Smart shelf operations, • Healthcare, • Food and restaurant industry, • Logistic industry, travel • Tourism industry, etc.
  • 30. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 30 To integrate the devices of sensing layer as intrinsic parts of the IoT, effective security technology is essential to ensure security and privacy protection in various activities such as : • Personal activities, • Business processes, • Transportations, • Information protection.
  • 31. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 31 Security Concerns in SCADA Systems • SCADA systems are generally designed as more technical- oriented solutions often in the industrial environment. • Following security concerns are to be concerned while integrating SCADA with IoT:  Authentication and access control  Identification of SCADA vulnerabilities  Physical security  System recovery and backups
  • 32. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 32 Security Concerns in EIS • Enterprise information systems have played the pivotal role in modern organizations existing as Enterprise Resource Planning (ERP) systems which integrated • Intraorganizational business processes and Supply chain management systems to link Interorganizational business processes, and Customer Relationship Management (CRM) systems that maintain relationships with customers
  • 33. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 33 Security Architecture in the Internet of Things
  • 34. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 34 • The Internet of Things (IoT) is an extension of the Internet • The IoT is able to connect the digital cyberspace and real physical space. • IoT is able to introduce all the vulnerabilities of the digital world into our real world. • The success of IoT applications and IoT infrastructure significantly depends on the guarantee of the security and vulnerability in the IoT. • It is important to set up and take cyber defense seriously.
  • 35. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 35 SECURITY REQUIREMENTS IN IoT • The IoT introduces large quantities of new devices that will be deployed or embedded throughout an organization or even within a system. • Each connected device could be a potential doorway into the IoT infrastructure or personal data. • Data captured from these devices can be analyzed and acted upon.
  • 36. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 36 • Security Threats in IoT will reach new levels as interoperability, mashups, and autonomous decision- making begin to embed complexity, security loopholes. • The sanctity of security and privacy concerns of the IoT are not clearly defined yet. • loopholes might cause potential “black swan” events.
  • 37. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 37 • In a general framework main security requirements are addressed from six aspects:. IoT Data Security Challenges
  • 38. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 38 • Privacy risks will arise as objects within the IoT collect and aggregate fragments of data that relate to their service Data Confidentiality • Insufficient authentication/authentication • Insecure interfaces (web, mobile, cloud, etc.) • Lack of transport encryption • Confidentiality preserving & Access control Privacy • Privacy, data protection, & information security risk management • Privacy by design and default • Data protection legislation • Traceability/profiling/unlawful processing
  • 39. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 39 Trust • Identity management system • Insecure software/firmware • Ensuring continuity and availability of services • Realization of malicious attacks against IoT devices and system • Loss of user control/difficult in making decision • If we model IoT as 4 Layer architecture each layer should be able to provide access control, device authentication, data integrity, and confidentiality in transmission, availability, and the ability to defend IoT devices against virus and attacks.
  • 40. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 40
  • 41. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 41 Authentication in IoT • The soul of IoT framework is the authentication layer. (verify identity) • When M2M devices need access to the IoT infrastructure, the trust relationship is initiated based on the identity of the device. • In human and machine interactions names, patterns fingerprints, retina scan passwords can authenticate. • In M2M endpoints must be fingerprinted by means that do not require human interaction.
  • 42. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 42 • SSL/TLS X.509 certificate is a digital file that's usable for Secure Sockets Layer (SSL) or Transport Layer Security (TLS). The certificate fulfills two functions. First, the certificate can assist with authenticating and verifying the identity of a host or site. Second, it enables the encryption of information exchanged via a website. • However, in the IoT domain, many devices may not have enough memory to store a certificate. • IEEE - 802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. • TLS/DTLS , SSH, IPSec/IKE
  • 43. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 43 Authorization • The second layer of this framework is authorization that controls a device’s access throughout the network fabric. This layer builds upon the core authentication layer by leveraging the identity information of an entity.
  • 44. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 44 Insufficient Authentication/Authorization • On the Internet, the users are always authenticated by requiring a password and browsers authenticate web sites through the SSL (secure sockets layer protocol). • In the IoT, new devices that connected into an IoT system should be able to authenticate itself prior to receiving or transmitting data. • Deeply embedded devices often do not have users sitting behind keyboards. • Secure storage area plays important role.
  • 45. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 45 • Some new threats and attack vectors that malicious actors could take advantage of are as follows: In IoT-based industrial control system, such as SCADA etc.,: • Control systems, vehicles, and even the human body (WBAN) can be accessed and manipulated causing injury or worse. • Healthcare providers can improperly diagnose and treat patients based on modified health information or manipulated sensor data. • Intruders can gain physical access to homes or commercial businesses through attacks against electronic, remote controlled door lock mechanisms.
  • 46. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 46 Individual • Unauthorized tracking of people’s locations can occur through usage pattern tracking based on asset usage time and duration. • Unlawful surveillance through persistent remote monitoring capabilities offered by small-scale IoT devices. • Inappropriate profiles and categorizations of individuals can be created through examination of network and geographic tracking and IoT metadata.
  • 47. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 47 Business Area • Inappropriate profiles and categorizations of individuals can be created through examination of network and geographic tracking and IoT metadata. • Manipulation of financial transactions through unauthorized POS and POS access. • Monetary loss arising from the inability to provide service. • Vandalism, theft, or destruction of IoT assets that are deployed in remote locations and lack physical security controls.
  • 48. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 48 Ability to Access the IoT • Ability to gain unauthorized access to IoT edge devices to manipulate data by taking advantage of the challenges related to updating software and firmware of embedded devices. • Ability to gain unauthorized access to the Enterprise network by compromising IoT edge devices and taking advantage of trust relationships. • Ability to create botnets by compromising large quantities of IoT edge devices. • Ability to impersonate IoT devices by gaining access to keying material held in devices that rely up on software-based trust stores.
  • 49. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 49 INSECURE ACCESS CONTROL • Authorization frameworks for computer networks and online services are role based. First, the identity of the user is established and then his or her access privileges are determined from the user’s role within an organization. • E.g., RADIUS-Remote-Authentication Dial-In User Service. • LDAP (Lightweight Directory Access Protocol) • Role-Based Access Control Systems • Access Control List-Based Systems • Capability-Based Access
  • 50. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 50 THREATS TO ACCESS CONTROL, PRIVACY, AND AVAILABILITY To secure devices access layer before users are at risk, following actions should be taken: (1)Implement security standards for IoT and ensure all devices are produced by meeting specific security standards; (2)Build trustworthy data sensing system and review the security of all devices/components; (3) Forensically identify and trace the source of users; (4) Software or firmware at IoT end-node should be securely designed.
  • 51. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 51 Security Threats and Vulnerabilities at IoT End-Node
  • 52. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 52 ATTACKS SPECIFIC TO IoT IoT applications might be subjected to most types of network attacks, including : Actually, more specific attacks to IoT have been emerged in recently. Attackers can intercept or change the behavior of smart home devices in many ways. • Either by physical access • Remote location • Eavesdropping, • Data modification • Identity spoofing, • Password-based attacks, • DOS attack, • Man-in-the-middle, • Compromised-key attack, • Sniffer attack • Application layer attack
  • 53. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 53 SECRECY AND SECRET-KEY CAPACITY • The standardization of IoT is still an open issue. • Available cryptography is designed at the application layer without regard to the imperfections of the lower layer.
  • 54. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 54 IoT in Health care
  • 55. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 55 One way Authentication
  • 56. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 56 Mutual Authentication
  • 57. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 57
  • 58. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 58