You are on page 1of 28

Security

Why is security so important in IoT?

Securing the device

Outlin Securing the network


e
Managing updates

2
Importance of
security

3
IoT is almost in every field

4
Examples of security
issues
Door locks
◦cars
◦house

House appliances
◦burn
◦used as network bots

Medical devices
◦harm people

Public utilities
◦power grid
◦water network
https://www.pubnub.com/blog/2015-05-04-10-challenges-securing-iot-communications-iot-security/

5
Security types
SECURITY BY DESIGN SECURITY BY OBSCURITY

Theoretically proven Closed box


Usually open solution No one knows what is inside
Tested and reviewed by a large number of If hacked, all the systems
users
fail How is it updates
Trust the users
Trust the enterprise that
designed it

6
Local Security

Network Security
Securing
a device Software

Hardware

7
Local
Security

8
Change the default password
Raspberry Pi
◦pi/raspberry

BeagleBone
◦ debian/temppwd

Mirai Net
◦ Rent devices for DDoS

Distribute devices with a random default


password

9
Disable unused
services
SSH
◦login access
If you don’t need it, stop it!

X Server
◦UI, unless you have a display
Disable administration over the air
◦default login

Avahii
◦device discovery (multicast)

SMB (Samba)
◦WannaCry, used SMB 1

10
Networ
k
security

11
Avoid self-written
protocols
You are the the only one using it
No one tested it
Is it theoretically secure?
Firewalls might stop it

12
Use secure protocols
HTTPS
◦Authenticates the server
◦Encrypted communication

MQTT/SSL
◦Encrypted MQTT

XMPP
◦Secure messages exchange protocol
◦Authenticates servers between each other

Devices
◦Computers
◦Microcontrollers

13
Read before implementation
Read about security issues in the field

Study what experts in the field say

Understand the security

problems

14
Hardwar
e

15
What should you
use?
The right hardware for the right job

Cloud Storage

Use hardware that is able to secure the


network Cloud Processing

Internet

Follow the IoT stack


Network

Local storage

Local Processing

Sensors

16
Microcontrollers and Computers
Simple systems Full CPUs
Control hardware High speeds
Low speeds Large
memory
Small memory ◦Is able to
◦2 KB
use
◦RSA key might security
be is 2KB
Run OS
Run single ◦Linux OS
software
◦RTOS Local
network
Local network and
only Internet
17
Softwar
e

18
Supported Software
Raspberry Pi CHIP
Arduino YUN Banana Pi
BeagleBone
Arduino TIAN
UDOO

19
Upstream changes
If you change software, push it upstream

For every software update, you have to port


your software for it

20
Use open
libraries
If the protocol is used, someone wrote a
library
Use a library that is actively maintained
Follow security updates for the library

21
Sure you want to use it?

22
This is all right to use

23
How do you update the device?
Your software will have update
◦features
◦Security

OS
◦ dual partition

Applications
◦ snap
◦ Google Store (Android Things)

24
Trusted software
Digitally sign the software

Secure boot
◦hardware support here
◦additional hardware

Secure software
◦ digitally signed
◦ Verified before install

25
Trust store

26
Security by design

Local security

Securit Securing the network


y
Manage secure updates

Security is important

27
Questions?

28

You might also like