IoT_PPT24_IoT_Security
IoT_PPT24_IoT_Security
IoT_PPT24_IoT_Security
Security in IoT
Security in IoT Survey: https://ieeexplore.ieee.org/document/7005393
• IoT security is the act of securing IoT devices and the networks
they're connected to.
29-10-2024 2
Cont…
Traditional Network architecture of cloud-based IoT Solutions.
Source: Zhou et. al., “Security and Privacy for Cloud-Based IoT: Challenges, Countermeasures, and Future Directions” IEEE Comm. Magazine, Jan. 2017, pp. 26-33.
29-10-2024 3
Security Requirements
Fundamental Requirements:
• Authentication
• Confidentiality – merely ensures that the
individual is who he or she
– refers to protecting claims to be
information from being
accessed by unauthorized
parties • Non-repudiation
– is the assurance that someone
• Integrity cannot deny the validity of
something
– Data must not be changed in
transit.
• Resilience
• Availability – is the ability to prepare for,
respond to and recover from
– is a guarantee of reliable an attack.
access to the information by
authorized people.
Few more Requirements - Privacy ;
Anonymity; Accountability; Trust
29-10-2024 4
Common Security Attacks
• Snooping : unauthorized access or interception of data.
• Traffic Analysis : obtain some other types of information by monitoring online traffic.
• Replaying : the attacker replays the obtained/snooped copy of a message later on.
• Repudiation : The sender of the message might later deny that it has sent the message
OR the receiver of the message might later deny that it has received the message.
• Denial of Service (DoS): attacker may slow down or totally make unavailable the
service of a legitimate system.
29-10-2024 5
Cryptography for Confidentiality
• It has a long history dating back at least as far as Julius Caesar
(dated: 100 BC).
• Cryptographic techniques allow a sender to disguise data so that
an intruder can gain no information from the intercepted data.
29-10-2024 6
Cont…
• To create the ciphertext from the plaintext, Alice uses an
encryption algorithm and a key
– Asymmetric / public key systems : a pair of keys is used. One of the keys is
known to both Bob and Alice (indeed, it is known to the whole world).
The other key is known only by either Bob or Alice (but not both).
29-10-2024 7
Message Digest for Integrity
• We must ensure integrity: the message should remain unchanged.
• The electronic equivalent of the document and fingerprint pair is the message
and digest pair.
29-10-2024 8
Hash Function
• Cryptographic Hash Function is required to have the following properties:
– takes an input, m, and computes a fixed size string H(m) known as a hash
• Popularly used
Hash Functions:
– MD5
– SHA-1
29-10-2024 9
Message Authentication
29-10-2024 10
Cont…
• One nice feature of a MAC is that it does not require an encryption algorithm
• Note: MAC => Message Authentication Code / Message Integrity Code (MIC).
MAC Layer => Medium Access Control Layer
29-10-2024 11
IoT PHY Layer (1/2)
• IEEE 802.15.4 PHY manages
– Physical RF transceiver of the sensing device, Channel selection,
– Energy management, and Signal management
• Standard supports multiple channels (e.g. 16 channels in the 2.4 GHz ISM radio band)
29-10-2024 12
IoT MAC Layer (2/2)
• IEEE 802.15.4 MAC manages • IEEE 802.15.4 can support network topologies
– accesses to the physical channel – peer-to-peer,
– network beaconing – star,
– cluster networks
– validation of frames
– guaranteed time slots (GTS)
– node association/joining • Devices are identified using
– link level security – 16-bit short identifier
• usually employed in restricted environments
– data services – 64-bit EUI-64
29-10-2024 13
Security in IoT PHY & MAC
• Security Suite in MAC:
– IEEE 802.15.4 standard support various security suite at the MAC layer,
CBC Mode
29-10-2024 14
Achieved Security Requirements
29-10-2024 15
Data Frame with Security Header
• Security Enabled Bit field of the Frame Control field being set
• Auxiliary Security Header is employed only when security is used
Security Control field identifies the Security Level mode
Frame Counter used to ensure sequential freshness of frames sent by this device.
Standard employs 128-bit keys that is known implicitly by the two communication parties,
OR determined from information transported in the Key Identifier field.
◦ Key Source subfield specifies the group key originator
◦ Key Index subfield identifies a key from a specific source
29-10-2024 16
Security-related information
• The various security suites require transportation of security-related
information for different configurations
Security Suites Achieved Security
Requirements
AES-CTR Confidentiality
The key counter (Key Control field) is incremented if the maximum value for the Frame Counter is reached.
29-10-2024 17
Cont…
• To support semantic security and also replay protection,
each block is encrypted using a different nonce or Initialization Vector (IV).
Block counter: The sender breaks the original packet into 16-byte blocks, with each
block identified by its own block counter.
29-10-2024 18
Access Control
Access Control Mechanisms:
IEEE 802.15.4 MAC also provides access control functionalities
The 802.15.4 radio chips of the device stores an access control lists (ACL)
• maximum of 255 entries (generally for 255 destination address)
29-10-2024 19
Added Security with TSCH
• IEEE 802.15.4 - 2011 provides security services at the MAC layer
• IEEE 802.14.4e - 2012 introduces few modifications in security services corresponding to
different modes
• Addendum defines the possibility of using null and 4 or 5-byte Frame Counter values
– Frame counter is used to ensure sequential freshness of frames sent by this device.
– It can be set to the global Absolute Slot Number (ASN) of the network
• usage of the ASN as a global frame counter value enables
– time-dependent security,
– replay protection and
– semantic security.
29-10-2024 20
Cont…
• IEEE 802.15.4e MAC frame employs two bits from the reserved space of security control
filed:
– bit 5 to enable suppression of the Frame Counter field i.e. null
– bit 6 to distinguish between a Frame Counter field occupying 4 or 5 bytes
29-10-2024 21
Adaptation Layer Protocol
• 6LoWPAN is currently a key technology to support
Internet communications in the IoT
• It defines:
– Header compression
• Compress the NET and TRN layer headers
– Neighbor discovery
– Address auto-configuration TCP/IP
6LoWPAN
29-10-2024 22
Security in 6LoWPAN
• No security mechanisms are currently defined in the context of the
6LoWPAN adaptation layer
29-10-2024 23
RPL
RPL protocol supports many control messages
• DIO (DODAG Information Object)
• DIS (DODAG Information Solicitation)
• DAO (Destination Advertisement Object)
• DAO-ACK (DAO acknowledgment)
• CC (Consistency Check)
• Etc.
29-10-2024 24
Security in RPL
• RPL specification defines
– secure versions of the various routing control message exchange
• Preinstalled
– using a pre-configured symmetric key
– Achieve: Confidentiality, Integrity, Data authentication
• Authenticated
– A device may initially join the network using a pre-configured key, and then obtain a different
key from the key authority with which it may start functioning as a router.
29-10-2024 25
RPL Control Message
29-10-2024 26
Security in RPL
T: indicate the type of counter filed – timestamp or
incremental counter value
Fig: Security fields after the 4-byte ICMP LVL: Security Level
-- indicates the provided packet security and allows for varying levels
header for a secure RPL control message
of data authentication and, optionally, of data confidentiality
Key Identifier:
-- indicates which key was used to protect the packet
Fig: Format of the Security field
RFC 6550 (RPL) defines all the fields in details.
29-10-2024 27
Security in RPL
• Support of Confidentiality & delay protection
– Using AES-CCM(Counter with CBC-MAC)
– MAC is applied on entire IPV6 packet
29-10-2024 28
CoAP
CoAP: Constrained Application Protocol
29-10-2024 29
CoAP Security
• CoAP Protocol defines bindings to DTLS (Datagram Transport-Layer Security)
to transparently apply security to all CoAP messages
– PreSharedKey
• sensing devices that are pre-programmed with the symmetric cryptographic keys required to
support secure communications
– RawPublicKey
• A given device must be pre-programmed with an asymmetric key pair
• supports authentication based on public-keys
• The device has an identity calculated from its public key, and a list of identities and public
keys of the nodes it can communicate with.
• This is mandatory for implementing CoAP
– Certificates
• The device has an asymmetric key pair with an X.509 certificate
• supports authentication based on public-keys
29-10-2024 30
CoAP Security
• Elliptic Curve Cryptography (ECC) is adopted to support the RawPublicKey and Certificates
security modes
ECC supports device authentication using the Elliptic Curve Digital Signature Algorithm
(ECDSA), and also key agreement using the Elliptic Curve Diffie-Hellman Algorithm with
Ephemeral keys (ECDHE).
29-10-2024 31
View from Operational Level
• Security Requirements from three Operation Levels:
Information Level
Integrity: received data should not been altered during the transmission
Anonymity: identity of the data source should remain hidden
Confidentiality: Data cannot be read by third parties
Privacy: The client’s private information should not be disclosed
Access Level
Access Control: only legitimate users can access to the devices and the network for
administrative tasks
Authentication: checks whether a device has the right to access a network and vice-versa
Authorization: ensures that only the authorized devices /users get access to the network
services or resources.
Functional Level
Resilience: refers to network capacity in case of attacks and failures
Self Organization: denotes the capability of an IoT system to adjust itself in order to remain
operational even in case of partial failure or attack
29-10-2024 32
Security Mechanisms for IoT
• Standard security mechanisms that have been designed to satisfy the security
requirements for IoT Services.
Encryption:
Standard Mechanisms:
Symmetric mechanism: AES-128, AES-192, AES-256 with CTR or CBC or CCM mode
Asymmetric mechanism: RSA , Elgamal
Authentication and Integrity protection are provided by Message Authentication Code (Symmetric
Mechanism), Digital Signature (Asymmetric Mechanism) and Hash Functions.
Lightweight Cryptography:
Block cipher : PRESENT, CLEIFA, PRINCE
Hash function: PHOTON, SPONGENT
29-10-2024 33
Security Mechanisms for IoT
• Standard security mechanisms that have been designed to satisfy the
security requirements for IoT Services.
Secure Hardware
illegitimate user can perform side channel attacks as devices can be deployed in remote
areas with less protection
It is possible to exploit both hardware and software solutions to eliminate or to mitigate
29-10-2024 34
Implementation in Commercial Device
In general, IoT devices include at least two
microcontrollers:
one responsible for the management and
processing of the data
other for connectivity
TI CC2650
Sensor Tag
TI CC26xx Functional Block Diagram
29-10-2024 35
Implementation in Commercial Device
In general, IoT devices include at least two • In general, Cortex-M family
microcontrollers: do not integrate
one responsible for the management and any hardware pseudorandom
processing of the data number generator,
other for connectivity any module supporting
cryptographic algorithms
such as AES
Most of the IoT devices use ARM
microcontrollers of Cortex-M series • Support for cryptographic
• Require minimal costs, power, and size: M0, M0+, algorithms is implemented
and M23 via software or by dedicated
• Offers balance between performance and energy co-processors
efficiency: M3 and M4
• high performance embedded applications: M7
Example:
TI CC2540 MCU provides an AES security co-processor for encryption and decryption
TI SoC CC2538 implements AES in hardware
29-10-2024 36
Important reference:
• Granjal et al., “Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues”
IEEE Communications Surveys & Tutorials, vol. 17, no. 3, 2015.
29-10-2024 37