53
SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A demonstration of the challenges of the Internet of Things

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A demonstration of the challenges of the Internet of Things

Page 2: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

  Tobias Zillner, BSc. MMSc.

–  Former student @HGB

  Senior IS Auditor @Cognosec in Vienna

–  Penetration Testing, Security Audits, Security Consulting

–  Breaking stuff :D

  Owner of a home automation system :D

WHO IS THAT GUY?

Page 3: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

  Not Smart Meter

  Special requirements

  Standards used in IoT

  Burglarizing 2.0 ;)

  Annoying neighbors

WHAT ITS ABOUT?

Page 4: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

1.  Introduction

2.  Problems

3.  Risks & Threats

4.  Standards

5.  Practical Demonstration

6.  Summary

AGENDA

Page 5: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS

INTRODUCTION

Page 6: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

WHAT IS THE INTERNET OF THINGS?

  Dynamic global network infrastructure

  Based on standard and interoperable communication protocols

  Consists of physical and virtual things

  Everything is identifiable, communicates and interacts

Page 7: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

IOT APPLICATION DOMAINS

IOT Application Domains

Automotive

Intelligent Buildings

Medical Technology

Retail, Logistics Safety,

Security, Privacy

Entertainment

Insurance

Page 8: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

EVOLUTION

Stage 1: Personification of Dumb

Stage

Stage 2: Partially Autonomous

Sensor Networks

Stage 3: Autonomous

Independent Devices

Page 9: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

HOME AUTOMATION

  Home Automation

–  the introduction of technology within the home to enhance the quality of life of its occupants

  Goals

–  Save energy

–  Increase comfort

–  Remote monitoring

Page 10: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

SMART HOMES

 ©  h$ps://cdn.hackaday.io/images/2596161408899944332.png  

Page 11: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

FUTURE OF WIRED SMART HOMES

h$ps://hivizme.files.wordpress.com/2012/06/cable-­‐mess.jpg    

Page 12: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

WHY IS THIS IMPORTANT?

2  h$p://www.gartner.com/newsroom/id/2839717  3  h$p://www.gartner.com/newsroom/id/2636073  4  h$p://www.heise.de/newsIcker/meldung/CES-­‐Internet-­‐der-­‐Dinge-­‐komfortabel-­‐vernetzt-­‐2512856.html    

  Trend is wireless connections

  Samsung CEO BK Yoon:

–  “Every Samsung device will be part of IoT till 2019” 4

  Over 500 smart device per household in 2022 2

900000

26000000000

0

5,000,000,000

10,000,000,000

15,000,000,000

20,000,000,000

25,000,000,000

30,000,000,000

2009   2020  

Number of IoT Devices

Page 13: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS

PROBLEMS

Page 14: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

  HOME automation has high privacy requirements

  Huge source of personalized data

Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters - all connected to the next-generation internet1

-Former CIA Director David Petraeus

WHY SECURITY?

1  h$p://www.wired.com/2012/03/petraeus-­‐tv-­‐remote/  

"

"

Page 15: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

MOTIVATION

 h$ps://www.pinterest.com/pin/383368987005584547/    

We’ll spy on you through your dishwasher1

-Former CIA Director David Petraeus

" "

Page 16: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

PROBLEMS

Problems Physical

protection not enough

Similar to SCADA

problematic

Unsecure devices are

roled out Now getting connected

Not managed

CIO of the house

Page 17: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

UNIQUE CHARACTERISTICS

Limited Resources

Interconnectivity

Heterogeneity

Dynamic Changes / Topology

Limited Reliability

Page 18: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

REQUIREMENTS

  Interoperability

  Future proof

  Moderate costs

  Usability

–  Installation overhead

–  User interaction

–  Configuration effort

Page 19: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS

RISKS & THREATS

Page 20: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

OWASP IOT TOP 10 - 2014

1.  Insecure Web Interface

2.  Insufficient Authentication/Authorization

3.  Insecure Network Services

4.  Lack of Transport Encryption

5.  Privacy Concern

6.  Insecure Cloud Interface

7.  Insecure Mobile Interface

8.  Insufficient Security Configurability

9.  Insecure Software/Firmware

10. Poor Physical Security

Page 21: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

THREATS IDENTIFIED BY BSI

Outage due to environmental

conditions Insufficient Planning

Lack of regulation for frequency usage

and disruption through other

systems

Security configurations

Weaknesses in key management

Uncontrolled radiowave

propagation Eavesdropping of communication

Replay and manipulation of

messages

Simulation of a valid network components Availability Creation of

movement profiles

Page 22: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS

STANDARDS

Page 23: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

STANDARDS

HomeMaIc  

ZigBee  

Z-­‐Wave   Bluetooth  LE  /  Smart  

EnOcean  

KNX  

BidCoS   Insteon  

Wave2m  (Wavenis)  

Page 24: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

THE ZIGBEE STANDARD

ZigBee

Based on IEEE 802.15.4

Low-cost

Low-power

Two-way

Reliable

Purely wireless

Page 25: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

ZIGBEE

  Focused on sporadic real time communication

–  No constant communication

  Remote Control

  Home Automation

  Building Automation

  Smart Energy

  Health Care

Page 26: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

ZIGBEE SECURITY

ZigBee Security

Symmetric Encryption

Message Authentication Integrity Freshness

Page 27: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

SYMMETRIC CRYPTOGRAPHY

Page 28: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

ZIGBEE SECURITY

  Highly reliant on secrecy of keys

–  Network key

–  Link key

  No PKI available

  No digital certificates

Page 29: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

HOW ARE KEYS EXCHANGED?

Preinstalled Devices

Key Transport • Out of band recommended

Key Establishment • Derived from other keys • Also requires preinstalled

keys

Page 30: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

HOME AUTOMATION PUBLIC PROFILE

  Default Trust Center Link Key –  0x5A 0x69 0x67 0x42 0x65 0x65 0x41 0x6C 0x6C 0x69 0x61

0x6E 0x63 0x65 0x30 0x39

–  ZigBeeAlliance09

  Use Default Link Key Join –  0x01(True)

–  This flag enables the use of default link key join as a fallback case at startup time.

  Return to Factory Defaults –  In support of a return to factory default capability, HA devices

shall implement the ZDO Management Leave server service.

Page 31: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

SECURITY SUMMARY

Key Transport

Trust Establishment

Device Tampering

Key Rotation

Security Level per network

Page 32: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

THE KNX STANDARD

KNX

KNX is a bus system for home and building

automation

Shared bus used for communication

No Security at the moment

Security not a real concern

Page 33: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

KNX

It is quite unlikely that legitimate users of a network would have the means to intercept, decipher, and then tamper with the KNXnet/IP without excessive study of the KNX Specifications. Thus the remaining security threat is considered to be very low and does not justify mandating encryption, which would require considerable computing resources. 5

"

"

5  KNX  System  SpecificaIons  -­‐  KNXnet/IP,  Version  01.04.02    

Page 34: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

KNX WEBINAR

... you will learn how to develop KNX devices that guarantee secure communication and that protect data, within a KNX installation. 6

  Featuring:

–  Authentication

–  Data integrity

–  Installation freshness

–  Confidentiality

" "

6  h$p://www.knx.org/knx-­‐en/training/knx-­‐eacademy/webinars/Secure-­‐KNX-­‐InstallaIons/index.php  

Page 35: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

KNX

Page 36: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

KNX

Security specification only in draft state

Security features not included in configuration software

No products that support security available

Page 37: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS

PRACTICAL DEMONSTRATION

Page 38: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

PRACTICAL DEMONSTRATION

NETWORK KEY EXTRACTION

Page 39: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

NETWORK KEY EXTRACTION

1.  Motion sensor will be added to the system

2.  Hub is going to be paired with sensor

3.  Key will be sent to sensor

4.  Exchange will be sniffed

Page 40: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

NETWORK KEY EXTRACTION

Fallback  key  exchange  unsecure  

Most  vendors  only  implement  fallback  soluIon  

Same  security  level  as  plaintext  exchange  

Page 41: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

WHAT DOES THE VENDOR SAY?

Page 42: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

NETWORK KEY EXTRACTION

So, the

1.  Timeframe limited

2.  Proximity is necessary

3.  Key extraction works only at pairing

Page 43: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

WHAT WOULD AN ATTACKER DO?

Place a malicious

device near the target and wait

Try to force repairing

Page 44: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

WHAT WOULD AN ATTACKER DO?

Page 45: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

NETWORK KEY EXTRACTION

  It is not only about technology :D

Wait for users to re-pair the device

Jam the communication

Page 46: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

PRACTICAL DEMONSTRATION

DEVICE TAKEOVER

Page 47: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

DEVICE TAKEOVER

Devices are paired and working

1.  Reset to factory default settings

2.  Setup own network

3.  Join the target device to our network

Page 48: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

DEVICE TAKEOVER

No physical access is required

No knowledge of the secret key is needed

Usability overrules security

Page 49: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS

SUMMARY

Page 50: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

SUMMARY

Standards provide security measures

Implementation very important

Security at the moment is not mature

Page 51: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

SUMMARY

  Last tier communication is, however, still only one part

Page 52: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS

TIME FOR QUESTIONS / LETS TALK ABOUT IT

Page 53: SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS · – This flag enables the use of default link key join as a fallback case at startup time. ... SECURITY OF WIRELESS HOME AUTOMATION

CONTACT

Tobias Zillner, BSc MMSc

Mobile: +43 664 8829 8290 

Email: [email protected]