Securing The Internet of Things IoT
Securing The Internet of Things IoT
Securing The Internet of Things IoT
Roll No:147509
NIT WARANGAL
Comuter Science and Engineering Department
M.Tech CSE 2014-2016
Page 0
Table of Contents
Abstract: .......................................................................................................................................... 4
1. Introduction: ................................................................................................................................ 4
2. Background: ................................................................................................................................. 5
2.1 What is the Internet of Things? ......................................................................................... 6
2.2 Evolving the Internet of Things: ......................................................................................... 7
3. Security in Internet of Things: .................................................................................................. 8
3.1 Challenges of Internet of Things: ....................................................................................... 8
3.2 Need for Security: .................................................................................................................. 8
4. Communication and Security of IoT ............................................................................................ 9
4.1. Protocol stack for the IoT: .................................................................................................... 9
4.2 Security requirments: .......................................................................................................... 10
5. IEEE 802.15.4 protocol: ............................................................................................................. 10
5.1
6.4.2.
Page 1
8.2.2
8.3
TinyDTLS: ............................................................................................................... 21
9. Conclusion: ................................................................................................................................ 21
10. References: .............................................................................................................................. 22
Page 2
List of Figures:
Figure 1 . Popularity of IoT ......................................................................................................... 6
Figure 2 . Evolution of the Internet in five phases......................................................................... 7
Figure 3 . Protocol stack for the IoT............................................................................................... 9
Figure 4 . security in IEEE 802.15.4 .............................................................................................. 11
Figure 5 . Format of Initialization Vector for AES-CRT and AES-CCM security in IEEE 802.15.4.. 11
Figure 6 . Format of an ACL entry in IEEE 802.15.4 ..................................................................... 11
Figure 7 . analysis of Lightweight IPSec ...................................................................................... 14
Figure 8 . Memory analysis for IPSec in IoT ................................................................................. 14
Figure 9 . Secure RPL message..................................................................................................... 16
Figure 10 . Security section of secure RPL messages .................................................................... 16
Figure 11 . CoAP Architecture ....................................................................................................... 18
Figure 12 . DTLS in protocol stack ................................................................................................. 19
Figure 13 . Analysis of DTLS for CoAP security ............................................................................. 20
Figure 14 . Packet loss ratio in DTLS .............................................................................................. 20
Figure 15 . Space saving in DTLS compression .............................................................................. 21
Figure 16 . Average Energy consumption for DTLS Packet Transmission ..................................... 21
Page 3
Abstract:
The Internet of Things (IoT) is the next generation of internet
which will make daily life easier based on intelligent sensors and smart
objects working together. But on the other hand there will be many
security challenges which need to think in a different way to protect IoT
applications.
This report gives overview about IoT, and analyzes security
challenges and requirements in IoT. Besides introducing IoT
communication stack designed by IEEE and IETF to meet the important
criteria of power-efficiency, reliability, Internet connectivity and
inteoperability. This communication stack is the backbone for this
report which discusses different mechanisms to secure communications
in each protocol, as well as limitations and some improvments and open
issues for future research.
1. Introduction:
The Internet of Things (IoT) is a computing concept that describes
a future internet where everyday physical objects will be connected to
the Internet and be able to identify themselves to other devices and
exchanging information with their surroundings.
Internet infrastructure has been growth to include massive
number of sensing objects which have constrained resources and
exhcange huge amount of data, sometimes its highly personal.
Consequently traditional methods for internet security are not suffeicint
and proper mechanisms shoud be developed to secure IoT
communications. IEEE and IETF have designed communication and
security technologies for the IoT. Such technologies currently form the
protocol stack for the IoT. This stack is enabled to meet the important
criteria of reliability, power-efficiency, Internet connectivity, and to
guarantee interoperability with existing Internet standards and
guarantee that sensing devices are able to communicate with other
Internet entities in the context of future IoT distributed applications.
Page 4
2. Background:
Technology is changing the way of interconnection with the
world. Today, companies are developing products for the consumer
market that would have been unimaginable a decade ago: Internetconnected cameras that allow you to post pictures online with a single
click; home automation systems that turn on your front porch light
when you leave work; and bracelets that share with your friends how
far you have biked or run during the day. These are all examples of the
Internet of Things (IoT), an interconnected environment where all
manner of objects have a digital presence and the ability to
communicate with other objects and people. The IoT explosion is
already around us, in the form of wearable computers, smart health
trackers, connected smoke detectors and light bulbs, and essentially any
other Internet-connected device that isnt a mobile phone, tablet, or
traditional computer.
Iot growing day by day: Six years ago, for the first time, the
number of things connected to the Internet surpassed the number of
people. Experts estimate that, as of this year (2015), there will be 25
billion connected devices, and by 2020, 50 billion. Some estimate that by
2020, 90% of consumer cars will have an Internet connection, up from
less than 10 percent in 2013. Three and one-half billion sensors already
are in the marketplace, and some experts expect that number to
increase to trillions within the next decade. All of these connected
machines mean much more data will be generated: globally, by 2018,
mobile data traffic will exceed fifteen exabytes about 15 quintillion
bytes each month. By comparison, according to one estimate, an
exabyte of storage could contain 50,000 years worth of DVD-quality
video. Yet we are still at the beginning of this technology trend.
Benefits Vs Risks: these new developments are expected to bring
enormous benefits to consumers. Connected health devices will allow
consumers with serious health conditions to work with their physicians
to manage their diseases. Home automation systems will enable
consumers to turn off the burglar alarm, play music, and warm up
dinner right before they get home from work. Connected cars will notify
first responders in the event of an accident. And the Internet of Things
may bring benefits that we cannot predict.
Page 5
Page 6
For example, the term IoT can include the type of Radio Frequency
Identification RFID tags that businesses place on products in stores to
monitor inventory; sensor networks to monitor electricity use in hotels.
Moreover, the things in the IoT generally do not include desktop or
laptop computers and their close analogs, such as smartphones and
tablets, although these devices are often employed to control or
communicate with other things.
2.2 Evolving the Internet of Things:
The evolution of Internet begins with connecting two computers
together and then moved towards creating World Wide Web WWW
by connecting large number of computers together. The mobile-Internet
emerged by connecting mobile devices to the Internet. Then, peoples
identities joined the Internet via social networks. Finally, it is moving
towards Internet of Things by connecting every day objects to the
Internet.
The IoT has stepped out of its infancy and it is the next
revolutionary technology in transforming the Internet into a fully
integrated Future Internet. As we move from www (static pages web) to
web2 (social networking web) to web3 (ubiquitous computing web).
Page 7
Page 8
Fig
Figure 3 . Protocol stack for the IoT
MOUSTAFA NAJM | 147509
Page 9
Page 10
5.1
Figure 5 . Format of the Initialization Vector for AES-CRT and AES-CCM security in IEEE 802.15.4
Page 11
Page 12
Page 13
ROM amd RAM footprints show that AH and ESP consumes just 3.9KB
and 9kB, respectively, for mandatory IPSec Algorithms.
MOUSTAFA NAJM | 147509
Page 14
Page 15
DODAG Construction:
- Nodes periodically send link-local multicast DIO messages,
Stability or detection of routing inconsistencies influence the rate
of DIO messages.
- Nodes listen for DIOs and use their information to join a new
DODAG, or to maintain an existing DODAG
- Nodes may use a DIS message to solicit a DIO
- Based on information in the DIOs the node chooses parents that
minimize path cost to the DODAG root
7.2 Security in RPL:
7.2.1 Secure versions of the various routing control messages:
Page 16
The high order bit of the RPL Code field identifies whether or not
security is applied
Support of integrity and data authenticity:
- Integrity: AES/CCM with 128-bit keys for MAC
- integrity and data authenticity : RSA with SHA-256
* LVL: allows varying levels of data authentication and, optionally, of
data confidentiality.
7.2.2 Protection against packet replay attack:
Unsecured: no security
Preinstalled: preconfigured symmetric key
Authenticated: Appropriate for devices operating as routers,
obtaining a different cryptographic key from a key. The key
authority is responsible for authenticating and authorizing the
device.
The RPL specification currently defines that the authenticated
security mode must not be supported by symmetric cryptography
Although it doesnt specify how asymmetric cryptography may be
employed to support node authentication and key retrieval by the
device intending to operate as a router.
Page 17
Page 18
Security modes
NoSec: no protocol-level security and DTLS is disabled
PreSharedKey: PreShared Key(PSK)-based authentication is used.
The device store list of keys, each key includes a list of nodes for
which this key can be used
RawPublicKey: the device has an asymmetric key pair.the public
key is not embedded within an X.509 certificate.
Certificate: the device has an asymmetric key pair and The X.509
certificate binds the public key.
8.2.1
Page 19
Fig.13. shows:
- Large memory footprint in ROM and RAM because of
complexity of the DTLS handshake, i.e., many messages and
states, and beside that Crypto suites require SHA-2 that is not
available on hardware crypto co-processor.
- Overhead due to lower layer per-packet protocol headers.
Page 20
8.3
DTLS Improvement:
TinyDTLS:
Page 21
10. References:
1- Jorge Granjal, Edmundo Monteiro, Jorge S Silva, Security for the Internet of
Page 22