SlideShare a Scribd company logo
THIS TIME IT’S PERSONAL
Why Security and the IoT is Different
Justin Grammens, Lab 651
Fear of the Internet of Things
What We’ll Cover
• About Me
• What is the Internet of Things
• What’s the big deal?
• Example security exploits
• Anti-Patterns that should guarded against
• Emerging security techniques
About Me
• Software Engineer for 20+ years
• Serial Entrepreneur
• Cofounder of Lab 651& IoT Fuse
• Adjunct Professor at University of Saint Thomas teaching IoT
• Publisher of IoT Weekly News
• Excited for the next wave of connected things!
What is the Internet of Things?
Formal: The Internet of things (IoT) is the network of physical
devices, vehicles, home appliances, and other items
embedded with electronics, software, sensors, actuators, and
network connectivity which enable these objects to connect
and exchange data.
Practical: The physical world becoming one big information
system. We are moving from Internet of Computers (IoC) to IoT.
It should actually be called “Things on the Internet”.
IoC vs IoT…
What’s the Big Deal?
1. Massive Changes in Scale
2. Impact on the Physical World
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
Security Needs to Be
Addressed at Each Level
Security of IoT vs IoC
• IoT has both information attacks and physical tampering
• Nearly all use wireless communications
• “Denial of sleep” attacks to kill battery
• Devices are expected to run with low power
• Operating systems may not support sophisticated security approaches
• Often not easily updatable and no screen / user interface
• It’s not the massive, but smaller scale attacks are more worrisome
IoT vs IoC – Personal Data
• Estimated that the average household generates ~2TB of data a year, by 2020
expected to be 10TB of personal data.
• Researchers found that Vizio & Samsung T.V’s send data to 3rd parties are
have known vulnerabilities to listen into your home or what you watch
• FitBit can tell if you are active or not when you say you are
• Police used a woman’s Fitbit to discount a story of assault
• Tesla using data logs to disprove claims by automotive reviewers
• Things are becoming personal…
Hacking Devices “Broken Hearts” episode, Homeland, 2012
Yeah, but is this actually
possible?
Source: https://www.theverge.com/2017/8/30/16230048/fda-abbott-
pacemakers-firmware-update-cybersecurity-hack
Find Open Devices
Open Camera
This is new, but is it?
Mirai Botnet
• Malware infecting IP cameras,
routers & DVR players
• Infected between more than
600,000 devices
• Started by 3 college students
• Some countries in Africa were
taken offline
• Could have affected more than
185 million devices *
* Source: http://www.newsweek.com/mirai-botnet-
brought-down-internet-was-minecraft-stunt-747806
Owlet Baby Monitor
• Monitor your baby’s heartrate &
oxygen level
• Base station creates a
completely open WiFi
• Anyone in range could
• Send data to another
network/server
• Disable alerts
• Nest camera had similar exploit
Jeep Hack
• In 2015 security researchers
hacked a Jeep to take control of
the vehicle
• Used cellular network and the
devices Controller Area Network
(CAN)Bus
• Chrysler recalled 1.4 million
vehicles to fix this issue
Anti-Patterns
• Doing too much
• Just because you can run a full Linux OS, should you?
• Consider your end user – do they need root access?
• Input validation and buffer overflows need to be checked
• Bugs
• Integer overflows
• Race conditions
• Memory corruption
Anti-Patterns
• Weak encryption
• Service Passwords
• No authentication
• Default credentials that are easily discoverable
• Permanent credentials ( for support ), never changeable
• Failure to allow for revocation of credential or privilege
• Failure to allow for delegation of privilege to another legitimate party (forces work
arounds)
• Unclear instructions or defaults to the device be online, rather than opt in
Anti-Patterns
• No Authentication
• CAN bus how communication happens within an automobile. Never designed
for connections over the internet.
• Default Credentials
• EURECOM found 100,000 internet facing IoT devices with default passwords
• Permanent Credentials
• ComfortLink thermostat set root passwords that could not be changed. Finally
fixed after 2 years
Online Trust Alliance – IoT Rules
• Default passwords must be prompted to be reset or changed on first use
• All users must adhere to SSL best practices using industry standards
• All device sites and cloud services must use HTTPS encryption
• Manufacturers must conduct penetration testing of devices, applications and
services
• Manufacturers must have remediation plans when vulnerabilities are found
• All updates, patches, revision must be signed and verified
• Manufactures must provide a mechanism for the transfer of ownership
Emerging IoT Security Techniques
• TPM ( Trusted Platform Module ) – Cryptographic keys burned into devices
as it’s produced
• Two factor (or more) authentication
• Location based as verification
• Using a paired device (smartwatch) as access control
• Only send the data that you need and nothing more
Emerging IoT Security Techniques
• Where possible, say no to big data backends
• Forbes reports more than 112 million records spilled in 2015
• More than a petabyte (1015 bytes) of data accidentally exposed online
• New York Times reported that $50 million stolen from over 100,000 people using
“Get Transcripts” service from the IRS
• Instead - use concepts from Distributed Computing Systems
• Store data close to the person
• Provide time based access and deletion
Data Type Best Location for Data Consequences If Data Is Lost,
or the Network Is
Compromised or Disrupted
Sensitive/personal data On a personal device such as
a phone, laptop, backup
hard drive, or home computer
Loss of employment; public
humiliation; bullying or social
isolation, which could
potentially lead to suicide
Medical data On a local device that can
be shared with medical
professionals on a timed clock
Blackmailing; loss of
employment
Business data (e.g., LinkedIn
profile)
On publicly accessible servers
(shared)
N/A (this data was created
with the intention of sharing it)
Home automation system On a local network within the
home without access to a
larger network
Loss of access to or control of
lights, thermostats, or other
home systems
Credit: Calm Technology, Amber Case
Summary
• The world of connected devices ( IoT ) is still an emerging field
• Data available will become increasing personal and unfiltered
• As with prior technology changes:
• The IoT ( and mistakes ) will happen whether we like it or not
• Apply many of the same security practices from the IoC
• Leverage distributed computing and best practices for data storage
• Always provide mechanisms for updates
Thank You
Justin Grammens
justin@lab651.com
Links:
http://lab651.com
http://iotfuse.com
http://iotweeklynews.com

More Related Content

PPTX
Deep Learning with TensorFlow
PPTX
Speaking at John Carrol University on the Internet of Things
PPTX
NDC Minnesota 2019 - Fundamentals of Azure IoT
PDF
Harness the Power of Microsoft Azure
 
PPTX
Performance trends and alerts with ThingSpeak IoT
PPT
Scripting Things - Creating the Internet of Things with Perl
PPTX
IoT introduction
PDF
Patterns and challenges of cloud native adoption
Deep Learning with TensorFlow
Speaking at John Carrol University on the Internet of Things
NDC Minnesota 2019 - Fundamentals of Azure IoT
Harness the Power of Microsoft Azure
 
Performance trends and alerts with ThingSpeak IoT
Scripting Things - Creating the Internet of Things with Perl
IoT introduction
Patterns and challenges of cloud native adoption

What's hot (20)

PDF
How cloud native is adopted and what’s coming next
PPTX
Secure Networking in Big Data Environments
PDF
Supercharged graph visualization for cyber security
PDF
Visualizing NoSQL databases as networks
PPTX
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
PDF
Internet of Things introduction
PDF
Machine Learning for the Sensored Internet of Things
PPTX
IoT - Life at the Edge
PDF
Intel Lightning Talk
PPTX
Towards a Threat Hunting Automation Maturity Model
PDF
Fighting cybersecurity threats with Apache Spot
PDF
Cisco Paris DevNet Hackathon slideshow - Intro
PPTX
Iot Workshop Columbus
PDF
Insights into the Internet of Things
PPTX
Data, Big Data and real time analytics for Connected Devices
PPTX
Visualizing the neo4j graph database with key lines
PPTX
SplunkLive! Customer Presentation – UMCP
PDF
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
PDF
An open-source testbed for IoT systems
PPTX
IoT Workshop Louisville
How cloud native is adopted and what’s coming next
Secure Networking in Big Data Environments
Supercharged graph visualization for cyber security
Visualizing NoSQL databases as networks
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
Internet of Things introduction
Machine Learning for the Sensored Internet of Things
IoT - Life at the Edge
Intel Lightning Talk
Towards a Threat Hunting Automation Maturity Model
Fighting cybersecurity threats with Apache Spot
Cisco Paris DevNet Hackathon slideshow - Intro
Iot Workshop Columbus
Insights into the Internet of Things
Data, Big Data and real time analytics for Connected Devices
Visualizing the neo4j graph database with key lines
SplunkLive! Customer Presentation – UMCP
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
An open-source testbed for IoT systems
IoT Workshop Louisville
Ad

Similar to This Time, It’s Personal: Why Security and the IoT Is Different (20)

PPTX
IoT -Internet of Things
PDF
IoT, Security & the Path to a Solution
PDF
Simon Harrison RWE - Chain of Things 010616 final
PDF
The bad, the ugly and the weird about IoT
PPTX
Assign 1_8812814ctm.pptx
PDF
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
PPTX
All The Things: Security, Privacy & Safety in a World of Connected Devices
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
PPTX
Security In an IoT World
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PPTX
IoT and the industrial Internet of Things - june 20 2019
PPTX
Iot(security)
PPTX
Internet & iot security
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PPTX
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
PDF
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
PDF
[TestWarez 2017] Securing the Internet of Things
IoT -Internet of Things
IoT, Security & the Path to a Solution
Simon Harrison RWE - Chain of Things 010616 final
The bad, the ugly and the weird about IoT
Assign 1_8812814ctm.pptx
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
All The Things: Security, Privacy & Safety in a World of Connected Devices
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Security In an IoT World
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT and the industrial Internet of Things - june 20 2019
Iot(security)
Internet & iot security
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
[TestWarez 2017] Securing the Internet of Things
Ad

More from Justin Grammens (16)

PDF
Scope Creep - Damned if I Do, Damned if I Don't
PDF
Looking into the Future: Using Google's Prediction API
PDF
The Internet of Things - What It Is, Where Its Headed and Its Applications
PDF
Internet of Things: What It Is, Where's Headed and Its Applications
PDF
Collaborative Learning - The Role Communities Play in IoT
PDF
Internet of Things: What it is, where it is going and how it is being applied.
PDF
Arduino, Open Source and The Internet of Things Landscape
PDF
Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...
PDF
Physical Computing Using Go and Arduino
PDF
The State of Arduino and IoT
PDF
Android Minnebar
PDF
Android TCJUG
PDF
Voice Enabled Applications
PDF
Android Intro
PDF
Adhearsion and Telegraph Framework Presentation
PDF
Asterisk-Java Framework Presentation
Scope Creep - Damned if I Do, Damned if I Don't
Looking into the Future: Using Google's Prediction API
The Internet of Things - What It Is, Where Its Headed and Its Applications
Internet of Things: What It Is, Where's Headed and Its Applications
Collaborative Learning - The Role Communities Play in IoT
Internet of Things: What it is, where it is going and how it is being applied.
Arduino, Open Source and The Internet of Things Landscape
Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...
Physical Computing Using Go and Arduino
The State of Arduino and IoT
Android Minnebar
Android TCJUG
Voice Enabled Applications
Android Intro
Adhearsion and Telegraph Framework Presentation
Asterisk-Java Framework Presentation

Recently uploaded (20)

PPTX
1. Introduction to Computer Programming.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Hybrid model detection and classification of lung cancer
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Mushroom cultivation and it's methods.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Getting Started with Data Integration: FME Form 101
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
1. Introduction to Computer Programming.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Heart disease approach using modified random forest and particle swarm optimi...
A comparative study of natural language inference in Swahili using monolingua...
Chapter 5: Probability Theory and Statistics
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
TLE Review Electricity (Electricity).pptx
Hybrid model detection and classification of lung cancer
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Mushroom cultivation and it's methods.pdf
Programs and apps: productivity, graphics, security and other tools
Getting Started with Data Integration: FME Form 101
Unlocking AI with Model Context Protocol (MCP)
Univ-Connecticut-ChatGPT-Presentaion.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Building Integrated photovoltaic BIPV_UPV.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
DP Operators-handbook-extract for the Mautical Institute

This Time, It’s Personal: Why Security and the IoT Is Different

  • 1. THIS TIME IT’S PERSONAL Why Security and the IoT is Different Justin Grammens, Lab 651
  • 2. Fear of the Internet of Things
  • 3. What We’ll Cover • About Me • What is the Internet of Things • What’s the big deal? • Example security exploits • Anti-Patterns that should guarded against • Emerging security techniques
  • 4. About Me • Software Engineer for 20+ years • Serial Entrepreneur • Cofounder of Lab 651& IoT Fuse • Adjunct Professor at University of Saint Thomas teaching IoT • Publisher of IoT Weekly News • Excited for the next wave of connected things!
  • 5. What is the Internet of Things? Formal: The Internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to connect and exchange data. Practical: The physical world becoming one big information system. We are moving from Internet of Computers (IoC) to IoT. It should actually be called “Things on the Internet”.
  • 6. IoC vs IoT… What’s the Big Deal? 1. Massive Changes in Scale 2. Impact on the Physical World
  • 9. Security Needs to Be Addressed at Each Level
  • 10. Security of IoT vs IoC • IoT has both information attacks and physical tampering • Nearly all use wireless communications • “Denial of sleep” attacks to kill battery • Devices are expected to run with low power • Operating systems may not support sophisticated security approaches • Often not easily updatable and no screen / user interface • It’s not the massive, but smaller scale attacks are more worrisome
  • 11. IoT vs IoC – Personal Data • Estimated that the average household generates ~2TB of data a year, by 2020 expected to be 10TB of personal data. • Researchers found that Vizio & Samsung T.V’s send data to 3rd parties are have known vulnerabilities to listen into your home or what you watch • FitBit can tell if you are active or not when you say you are • Police used a woman’s Fitbit to discount a story of assault • Tesla using data logs to disprove claims by automotive reviewers • Things are becoming personal…
  • 12. Hacking Devices “Broken Hearts” episode, Homeland, 2012
  • 13. Yeah, but is this actually possible?
  • 17. This is new, but is it?
  • 18. Mirai Botnet • Malware infecting IP cameras, routers & DVR players • Infected between more than 600,000 devices • Started by 3 college students • Some countries in Africa were taken offline • Could have affected more than 185 million devices * * Source: http://www.newsweek.com/mirai-botnet- brought-down-internet-was-minecraft-stunt-747806
  • 19. Owlet Baby Monitor • Monitor your baby’s heartrate & oxygen level • Base station creates a completely open WiFi • Anyone in range could • Send data to another network/server • Disable alerts • Nest camera had similar exploit
  • 20. Jeep Hack • In 2015 security researchers hacked a Jeep to take control of the vehicle • Used cellular network and the devices Controller Area Network (CAN)Bus • Chrysler recalled 1.4 million vehicles to fix this issue
  • 21. Anti-Patterns • Doing too much • Just because you can run a full Linux OS, should you? • Consider your end user – do they need root access? • Input validation and buffer overflows need to be checked • Bugs • Integer overflows • Race conditions • Memory corruption
  • 22. Anti-Patterns • Weak encryption • Service Passwords • No authentication • Default credentials that are easily discoverable • Permanent credentials ( for support ), never changeable • Failure to allow for revocation of credential or privilege • Failure to allow for delegation of privilege to another legitimate party (forces work arounds) • Unclear instructions or defaults to the device be online, rather than opt in
  • 23. Anti-Patterns • No Authentication • CAN bus how communication happens within an automobile. Never designed for connections over the internet. • Default Credentials • EURECOM found 100,000 internet facing IoT devices with default passwords • Permanent Credentials • ComfortLink thermostat set root passwords that could not be changed. Finally fixed after 2 years
  • 24. Online Trust Alliance – IoT Rules • Default passwords must be prompted to be reset or changed on first use • All users must adhere to SSL best practices using industry standards • All device sites and cloud services must use HTTPS encryption • Manufacturers must conduct penetration testing of devices, applications and services • Manufacturers must have remediation plans when vulnerabilities are found • All updates, patches, revision must be signed and verified • Manufactures must provide a mechanism for the transfer of ownership
  • 25. Emerging IoT Security Techniques • TPM ( Trusted Platform Module ) – Cryptographic keys burned into devices as it’s produced • Two factor (or more) authentication • Location based as verification • Using a paired device (smartwatch) as access control • Only send the data that you need and nothing more
  • 26. Emerging IoT Security Techniques • Where possible, say no to big data backends • Forbes reports more than 112 million records spilled in 2015 • More than a petabyte (1015 bytes) of data accidentally exposed online • New York Times reported that $50 million stolen from over 100,000 people using “Get Transcripts” service from the IRS • Instead - use concepts from Distributed Computing Systems • Store data close to the person • Provide time based access and deletion
  • 27. Data Type Best Location for Data Consequences If Data Is Lost, or the Network Is Compromised or Disrupted Sensitive/personal data On a personal device such as a phone, laptop, backup hard drive, or home computer Loss of employment; public humiliation; bullying or social isolation, which could potentially lead to suicide Medical data On a local device that can be shared with medical professionals on a timed clock Blackmailing; loss of employment Business data (e.g., LinkedIn profile) On publicly accessible servers (shared) N/A (this data was created with the intention of sharing it) Home automation system On a local network within the home without access to a larger network Loss of access to or control of lights, thermostats, or other home systems Credit: Calm Technology, Amber Case
  • 28. Summary • The world of connected devices ( IoT ) is still an emerging field • Data available will become increasing personal and unfiltered • As with prior technology changes: • The IoT ( and mistakes ) will happen whether we like it or not • Apply many of the same security practices from the IoC • Leverage distributed computing and best practices for data storage • Always provide mechanisms for updates