SlideShare a Scribd company logo
Your Thing is pwnd
Security Challenges for the Internet
of Things	
  
Paul	
  Fremantle	
  
CTO	
  and	
  Co-­‐Founder,	
  WSO2	
  
@pzfreo	
  #wso2	
  #wso2con	
  
Firstly,	
  does	
  it	
  even	
  maAer?	
  
	
  
Security challenges for IoT
“Google
Hacking”
Security challenges for IoT
My	
  three	
  rules	
  for	
  IoT	
  security	
  
•  1.	
  Don’t	
  be	
  dumb	
  
•  2.	
  Think	
  about	
  what’s	
  different	
  
•  3.	
  Do	
  be	
  smart	
  
My	
  three	
  rules	
  for	
  IoT	
  security	
  
•  1.	
  Don’t	
  be	
  dumb	
  
–  The	
  basics	
  of	
  Internet	
  security	
  haven’t	
  gone	
  away	
  
•  2.	
  Think	
  about	
  what’s	
  different	
  
–  What	
  are	
  the	
  unique	
  challenges	
  of	
  your	
  device?	
  
•  3.	
  Do	
  be	
  smart	
  
–  Use	
  the	
  best	
  pracQce	
  from	
  the	
  Internet	
  
Security challenges for IoT
http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/
Security challenges for IoT
http://freo.me/1pbUmofhttp://freo.me/1pbUmof
So	
  what	
  is	
  different	
  about	
  IoT?	
  
•  The	
  fact	
  there	
  is	
  a	
  device	
  
–  Yes	
  –	
  its	
  hardware!	
  	
  
–  Ease	
  of	
  use	
  is	
  almost	
  always	
  at	
  odds	
  with	
  security	
  
•  The	
  longevity	
  of	
  the	
  device	
  
–  Updates	
  are	
  harder	
  (or	
  impossible)	
  
•  The	
  size	
  of	
  the	
  device	
  
–  CapabiliQes	
  are	
  limited	
  –	
  especially	
  around	
  crypto	
  
•  The	
  data	
  
–  OXen	
  highly	
  personal	
  
•  The	
  mindset	
  
–  Appliance	
  manufacturers	
  don’t	
  always	
  think	
  like	
  security	
  experts	
  
–  Embedded	
  systems	
  are	
  oXen	
  developed	
  by	
  grabbing	
  exisQng	
  chips,	
  designs,	
  etc	
  
Physical	
  Hacks	
  
A Practical Attack on the MIFARE Classic:
http://www.cs.ru.nl/~flaviog/publications/Attack.MIFARE.pdf
Karsten Nohl and Henryk Plotz. MIFARE, Little Security, Despite Obscurity
Security challenges for IoT
Or	
  try	
  this	
  at	
  home?	
  
hAp://freo.me/1g15BiG	
  	
  
http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-630.html
Hardware	
  recommendaQons	
  
•  Don’t	
  rely	
  on	
  obscurity	
  
	
  
Hardware	
  recommendaQons	
  
•  Don’t	
  rely	
  on	
  obscurity	
  
•  Don’t	
  rely	
  on	
  obscurity	
  
•  Don’t	
  rely	
  on	
  obscurity	
  
•  Don’t	
  rely	
  on	
  obscurity	
  
•  Don’t	
  rely	
  on	
  obscurity	
  
•  Don’t	
  rely	
  on	
  obscurity	
  
•  Don’t	
  rely	
  on	
  obscurity	
  
	
  
Hardware	
  RecommendaQon	
  #2	
  	
  
•  Unlocking	
  a	
  single	
  device	
  should	
  risk	
  only	
  that	
  
device’s	
  data	
  
The	
  Network	
  
hAp://ubertooth.sourceforge.net/	
  hAps://www.usenix.org/conference/woot13/
workshop-­‐program/presentaQon/ryan	
  
Crypto	
  on	
  small	
  devices	
  
•  PracQcal	
  ConsideraQons	
  and	
  ImplementaQon	
  Experiences	
  in	
  
Securing	
  Smart	
  Object	
  Networks	
  
–  hAp://tools.ied.org/html/draX-­‐aks-­‐crypto-­‐sensors-­‐02	
  
ROM	
  requirements	
  
ECC	
  is	
  possible	
  	
  
(and	
  about	
  fast	
  enough)	
  
Crypto	
  
Borrowed from Chris Swan:
http://www.slideshare.net/cpswan/security-protocols-in-constrained-environments/13
Won’t	
  ARM	
  just	
  solve	
  this	
  problem?	
  
Cost	
  maAers	
  
8 bits
$5 retail
$1 or less to embed
32 bits
$25 retail
$?? to embed
Another	
  opQon?	
  
SIMON	
  and	
  SPECK	
  
https://www.schneier.com/blog/archives/2013/07/simon_and_speck.html
Datagram	
  Transport	
  Layer	
  
Security	
  (DTLS)	
  
•  UDP	
  based	
  equivalent	
  to	
  TLS	
  
•  hAps://tools.ied.org/html/rfc4347	
  
Key	
  distribuQon	
  
Passwords	
  
•  Passwords	
  suck	
  for	
  humans	
  
•  They	
  suck	
  even	
  more	
  for	
  devices	
  
	
  
Security challenges for IoT
Security challenges for IoT
Security challenges for IoT
Why	
  Federated	
  IdenQty	
  for	
  Things?	
  
•  Enable	
  a	
  meaningful	
  consent	
  mechanism	
  for	
  sharing	
  of	
  device	
  data	
  
•  Giving	
  a	
  device	
  a	
  token	
  to	
  use	
  on	
  API	
  calls	
  beAer	
  than	
  giving	
  it	
  a	
  
password	
  
–  Revokable	
  
–  Granular	
  
•  May	
  be	
  relevant	
  for	
  both	
  
–  Device	
  to	
  cloud	
  
–  Cloud	
  to	
  app	
  
•  “IdenQty	
  is	
  the	
  new	
  perimeter”	
  
MQTT	
  
MQTT	
  and	
  OAuth2	
  
	
  
 	
  
An	
  	
  
Open	
  Source	
  	
  
IdenQty	
  
and	
  	
  
EnQtlement	
  
Management	
  	
  
Server	
  
	
  	
  
Apache	
  Licensed	
  
LDAP,	
  JDBC,	
  AcQve	
  Directory,	
  SCIM,	
  SPML	
  
SAML2,	
  OpenID	
  Connect,	
  WS-­‐Trust,	
  Kerberos	
  
OAuth	
  1.0/2.0,	
  XACML	
  2.0,	
  XACML	
  3.0	
  
XDAS,	
  Web	
  Console,	
  SOAP	
  Admin	
  
MulQ-­‐tenant,	
  Clusterable,	
  HA,	
  24x7	
  support	
  
39	
  
What	
  is	
  WSO2	
  IdenQty	
  Server?	
  
Other	
  WSO2	
  technology	
  to	
  help	
  you	
  
•  WSO2	
  BAM	
  –	
  monitoring	
  
•  WSO2	
  CEP	
  –	
  realQme	
  fraud	
  detecQon	
  
•  WSO2	
  API	
  Manager	
  –	
  securing	
  API	
  endpoints	
  
	
  
Real	
  Qme	
  event	
  processing	
  
Are you setting up for
the next privacy or
security breach?
Security challenges for IoT
Exemplars	
  
•  Shields	
  
•  Libraries	
  
•  Server	
  Frameworks	
  
•  Standards	
  and	
  Profiles	
  
Summary	
  
•  1.	
  Don’t	
  be	
  dumb	
  
•  2.	
  Think	
  about	
  the	
  differences	
  
•  3.	
  Be	
  smart	
  	
  
•  4.	
  Create	
  and	
  publish	
  exemplars	
  
WSO2 Reference Architecture for the Internet of Things http://freo.me/iot-ra
Thank	
  You	
  

More Related Content

PPT
IoT security (Internet of Things)
PDF
Security challenges in IoT
PPTX
Iot Security
PDF
5G Security Briefing
PDF
Will Internet of Things (IoT) be secure enough?
PDF
IOT Security
PPTX
IoT security
PPTX
IoT Security
IoT security (Internet of Things)
Security challenges in IoT
Iot Security
5G Security Briefing
Will Internet of Things (IoT) be secure enough?
IOT Security
IoT security
IoT Security

What's hot (20)

PPTX
PPTX
Iot(security)
PDF
Internet of Things (IoT) - We Are at the Tip of An Iceberg
PDF
Basics of Cyber Security
PPTX
Iot Security, Internet of Things
PDF
Cybersecurity Skills in Industry 4.0
PPTX
Introduction to IoT Security
 
PPTX
Zero Trust Network Access
PDF
Responsible AI & Cybersecurity: A tale of two technology risks
PPTX
PDF
IoT Security Challenges and Solutions
PDF
Security architecture
PPTX
IOT privacy and Security
PPTX
Ns lecture5: Introduction to Computer, Information, and Network Security.
PPT
Security Requirements in IoT Architecture
PDF
Overview of IoT and Security issues
PDF
IoT Networking
PDF
IT Security - Guidelines
Iot(security)
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Basics of Cyber Security
Iot Security, Internet of Things
Cybersecurity Skills in Industry 4.0
Introduction to IoT Security
 
Zero Trust Network Access
Responsible AI & Cybersecurity: A tale of two technology risks
IoT Security Challenges and Solutions
Security architecture
IOT privacy and Security
Ns lecture5: Introduction to Computer, Information, and Network Security.
Security Requirements in IoT Architecture
Overview of IoT and Security issues
IoT Networking
IT Security - Guidelines
Ad

Viewers also liked (20)

PPTX
IoT App Development Areas And Major Challenges
PDF
Challenges in the IoT
PPTX
Your Thing is Pwned - Security Challenges for the IoT
PDF
BUD17-104: Scripting Languages in IoT: Challenges and Approaches
PPTX
introduction to Embedded System Security
PDF
IoT Security: Problems, Challenges and Solutions
PPTX
IoT Security Risks and Challenges
PPTX
IoT - IT 423 ppt
PDF
Internet of Things security-issues
PPT
IBM BC2015 - Internet of Things - from hype to reality
PDF
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
PDF
Cybesecurity of the IoT
PPTX
Internet of Things
PDF
Highland Property Management Data Management
PPTX
Internet of thing (IoT and cloud convergence opportunitis and challenges
PDF
Big Data Analytics & IoT Challenges
PDF
Internet of Things
PPTX
Predix Analytics
PPTX
Security issues and solutions : IoT
PDF
IoT Security and Privacy Considerations
IoT App Development Areas And Major Challenges
Challenges in the IoT
Your Thing is Pwned - Security Challenges for the IoT
BUD17-104: Scripting Languages in IoT: Challenges and Approaches
introduction to Embedded System Security
IoT Security: Problems, Challenges and Solutions
IoT Security Risks and Challenges
IoT - IT 423 ppt
Internet of Things security-issues
IBM BC2015 - Internet of Things - from hype to reality
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Cybesecurity of the IoT
Internet of Things
Highland Property Management Data Management
Internet of thing (IoT and cloud convergence opportunitis and challenges
Big Data Analytics & IoT Challenges
Internet of Things
Predix Analytics
Security issues and solutions : IoT
IoT Security and Privacy Considerations
Ad

Similar to Security challenges for IoT (20)

PPTX
Your Thing is pwnd - Security Challenges for the Internet of Things
PPTX
IoT World - creating a secure robust IoT reference architecture
PPTX
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
PDF
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
PDF
IoT security zigbee -- Null Meet bangalore
PDF
Securing IoT Applications
PDF
Infosecurity.be 2019: What are relevant open source security tools you should...
PDF
The Internet of Things: We've Got to Chat
PDF
Ryan Wilson - ryanwilson.com - IoT Security
PPTX
Security challenges for internet of things
PDF
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
PPTX
How to hide your browser 0-day @ Disobey
ODP
Hacktivity2014: Virtual Machine Introspection to Detect and Protect
PPTX
BSides London 2015 - Proprietary network protocols - risky business on the wire.
PPT
Attacking Embedded Devices (No Axe Required)
PDF
Mickey pacsec2016_final
PDF
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
PPTX
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
PPTX
Securing the Internet of Things
PDF
Automated Malware Analysis and Cyber Security Intelligence
Your Thing is pwnd - Security Challenges for the Internet of Things
IoT World - creating a secure robust IoT reference architecture
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
IoT security zigbee -- Null Meet bangalore
Securing IoT Applications
Infosecurity.be 2019: What are relevant open source security tools you should...
The Internet of Things: We've Got to Chat
Ryan Wilson - ryanwilson.com - IoT Security
Security challenges for internet of things
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
How to hide your browser 0-day @ Disobey
Hacktivity2014: Virtual Machine Introspection to Detect and Protect
BSides London 2015 - Proprietary network protocols - risky business on the wire.
Attacking Embedded Devices (No Axe Required)
Mickey pacsec2016_final
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Securing the Internet of Things
Automated Malware Analysis and Cyber Security Intelligence

More from WSO2 (20)

PDF
Demystifying CMS-0057-F - Compliance Made Seamless with WSO2
PDF
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
PDF
Modern Platform Engineering with Choreo - The AI-Native Internal Developer Pl...
PDF
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
PDF
Build Smarter, Deliver Faster with Choreo - An AI Native Internal Developer P...
PDF
Platformless Modernization with Choreo.pdf
PDF
Application Modernization with Choreo for the BFSI Sector
PDF
Choreo - The AI-Native Internal Developer Platform as a Service: Overview
PDF
[Roundtable] Choreo - The AI-Native Internal Developer Platform as a Service
PPTX
WSO2Con 2025 - Building AI Applications in the Enterprise (Part 1)
PPTX
WSO2Con 2025 - Building Secure Business Customer and Partner Experience (B2B)...
PPTX
WSO2Con 2025 - Building Secure Customer Experience Apps
PPTX
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
PPTX
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
PPTX
WSO2Con 2025 - Unified Management of Ingress and Egress Across Multiple API G...
PPTX
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
PPTX
WSO2Con 2025 - Architecting Cloud-Native Applications
PDF
Mastering Intelligent Digital Experiences with Platformless Modernization
PDF
Accelerate Enterprise Software Engineering with Platformless
PDF
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
Demystifying CMS-0057-F - Compliance Made Seamless with WSO2
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
Modern Platform Engineering with Choreo - The AI-Native Internal Developer Pl...
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
Build Smarter, Deliver Faster with Choreo - An AI Native Internal Developer P...
Platformless Modernization with Choreo.pdf
Application Modernization with Choreo for the BFSI Sector
Choreo - The AI-Native Internal Developer Platform as a Service: Overview
[Roundtable] Choreo - The AI-Native Internal Developer Platform as a Service
WSO2Con 2025 - Building AI Applications in the Enterprise (Part 1)
WSO2Con 2025 - Building Secure Business Customer and Partner Experience (B2B)...
WSO2Con 2025 - Building Secure Customer Experience Apps
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
WSO2Con 2025 - Unified Management of Ingress and Egress Across Multiple API G...
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
WSO2Con 2025 - Architecting Cloud-Native Applications
Mastering Intelligent Digital Experiences with Platformless Modernization
Accelerate Enterprise Software Engineering with Platformless
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Approach and Philosophy of On baking technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Electronic commerce courselecture one. Pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Modernizing your data center with Dell and AMD
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
Teaching material agriculture food technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
KodekX | Application Modernization Development
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Approach and Philosophy of On baking technology
Chapter 3 Spatial Domain Image Processing.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Unlocking AI with Model Context Protocol (MCP)
Electronic commerce courselecture one. Pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
MYSQL Presentation for SQL database connectivity
Modernizing your data center with Dell and AMD
Understanding_Digital_Forensics_Presentation.pptx
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KodekX | Application Modernization Development
Reach Out and Touch Someone: Haptics and Empathic Computing
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Security challenges for IoT

  • 1. Your Thing is pwnd Security Challenges for the Internet of Things   Paul  Fremantle   CTO  and  Co-­‐Founder,  WSO2   @pzfreo  #wso2  #wso2con  
  • 2. Firstly,  does  it  even  maAer?    
  • 6. My  three  rules  for  IoT  security   •  1.  Don’t  be  dumb   •  2.  Think  about  what’s  different   •  3.  Do  be  smart  
  • 7. My  three  rules  for  IoT  security   •  1.  Don’t  be  dumb   –  The  basics  of  Internet  security  haven’t  gone  away   •  2.  Think  about  what’s  different   –  What  are  the  unique  challenges  of  your  device?   •  3.  Do  be  smart   –  Use  the  best  pracQce  from  the  Internet  
  • 12. So  what  is  different  about  IoT?   •  The  fact  there  is  a  device   –  Yes  –  its  hardware!     –  Ease  of  use  is  almost  always  at  odds  with  security   •  The  longevity  of  the  device   –  Updates  are  harder  (or  impossible)   •  The  size  of  the  device   –  CapabiliQes  are  limited  –  especially  around  crypto   •  The  data   –  OXen  highly  personal   •  The  mindset   –  Appliance  manufacturers  don’t  always  think  like  security  experts   –  Embedded  systems  are  oXen  developed  by  grabbing  exisQng  chips,  designs,  etc  
  • 13. Physical  Hacks   A Practical Attack on the MIFARE Classic: http://www.cs.ru.nl/~flaviog/publications/Attack.MIFARE.pdf Karsten Nohl and Henryk Plotz. MIFARE, Little Security, Despite Obscurity
  • 15. Or  try  this  at  home?   hAp://freo.me/1g15BiG    
  • 17. Hardware  recommendaQons   •  Don’t  rely  on  obscurity    
  • 18. Hardware  recommendaQons   •  Don’t  rely  on  obscurity   •  Don’t  rely  on  obscurity   •  Don’t  rely  on  obscurity   •  Don’t  rely  on  obscurity   •  Don’t  rely  on  obscurity   •  Don’t  rely  on  obscurity   •  Don’t  rely  on  obscurity    
  • 19. Hardware  RecommendaQon  #2     •  Unlocking  a  single  device  should  risk  only  that   device’s  data  
  • 22. Crypto  on  small  devices   •  PracQcal  ConsideraQons  and  ImplementaQon  Experiences  in   Securing  Smart  Object  Networks   –  hAp://tools.ied.org/html/draX-­‐aks-­‐crypto-­‐sensors-­‐02  
  • 24. ECC  is  possible     (and  about  fast  enough)  
  • 25. Crypto   Borrowed from Chris Swan: http://www.slideshare.net/cpswan/security-protocols-in-constrained-environments/13
  • 26. Won’t  ARM  just  solve  this  problem?  
  • 27. Cost  maAers   8 bits $5 retail $1 or less to embed 32 bits $25 retail $?? to embed
  • 29. SIMON  and  SPECK   https://www.schneier.com/blog/archives/2013/07/simon_and_speck.html
  • 30. Datagram  Transport  Layer   Security  (DTLS)   •  UDP  based  equivalent  to  TLS   •  hAps://tools.ied.org/html/rfc4347  
  • 32. Passwords   •  Passwords  suck  for  humans   •  They  suck  even  more  for  devices    
  • 36. Why  Federated  IdenQty  for  Things?   •  Enable  a  meaningful  consent  mechanism  for  sharing  of  device  data   •  Giving  a  device  a  token  to  use  on  API  calls  beAer  than  giving  it  a   password   –  Revokable   –  Granular   •  May  be  relevant  for  both   –  Device  to  cloud   –  Cloud  to  app   •  “IdenQty  is  the  new  perimeter”  
  • 39.     An     Open  Source     IdenQty   and     EnQtlement   Management     Server       Apache  Licensed   LDAP,  JDBC,  AcQve  Directory,  SCIM,  SPML   SAML2,  OpenID  Connect,  WS-­‐Trust,  Kerberos   OAuth  1.0/2.0,  XACML  2.0,  XACML  3.0   XDAS,  Web  Console,  SOAP  Admin   MulQ-­‐tenant,  Clusterable,  HA,  24x7  support   39   What  is  WSO2  IdenQty  Server?  
  • 40. Other  WSO2  technology  to  help  you   •  WSO2  BAM  –  monitoring   •  WSO2  CEP  –  realQme  fraud  detecQon   •  WSO2  API  Manager  –  securing  API  endpoints    
  • 41. Real  Qme  event  processing  
  • 42. Are you setting up for the next privacy or security breach?
  • 44. Exemplars   •  Shields   •  Libraries   •  Server  Frameworks   •  Standards  and  Profiles  
  • 45. Summary   •  1.  Don’t  be  dumb   •  2.  Think  about  the  differences   •  3.  Be  smart     •  4.  Create  and  publish  exemplars  
  • 46. WSO2 Reference Architecture for the Internet of Things http://freo.me/iot-ra