47
Your Thing is pwnd Security Challenges for the Internet of Things Paul Fremantle CTO and CoFounder, WSO2 @pzfreo #wso2 #wso2con

Security challenges for IoT

  • Upload
    wso2

  • View
    356

  • Download
    4

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Security challenges for IoT

Your Thing is pwnd Security Challenges for the Internet

of Things  

Paul  Fremantle  CTO  and  Co-­‐Founder,  WSO2  @pzfreo  #wso2  #wso2con  

Page 2: Security challenges for IoT

Firstly,  does  it  even  maAer?    

Page 3: Security challenges for IoT
Page 4: Security challenges for IoT

“Google Hacking”

Page 5: Security challenges for IoT
Page 6: Security challenges for IoT

My  three  rules  for  IoT  security  

•  1.  Don’t  be  dumb  

•  2.  Think  about  what’s  different  

•  3.  Do  be  smart  

Page 7: Security challenges for IoT

My  three  rules  for  IoT  security  

•  1.  Don’t  be  dumb  –  The  basics  of  Internet  security  haven’t  gone  away  

•  2.  Think  about  what’s  different  –  What  are  the  unique  challenges  of  your  device?  

•  3.  Do  be  smart  –  Use  the  best  pracQce  from  the  Internet  

Page 8: Security challenges for IoT
Page 9: Security challenges for IoT

http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/

Page 10: Security challenges for IoT
Page 11: Security challenges for IoT

http://freo.me/1pbUmof http://freo.me/1pbUmof

Page 12: Security challenges for IoT

So  what  is  different  about  IoT?  

•  The  fact  there  is  a  device  –  Yes  –  its  hardware!    –  Ease  of  use  is  almost  always  at  odds  with  security  

•  The  longevity  of  the  device  –  Updates  are  harder  (or  impossible)  

•  The  size  of  the  device  –  CapabiliQes  are  limited  –  especially  around  crypto  

•  The  data  –  OXen  highly  personal  

•  The  mindset  –  Appliance  manufacturers  don’t  always  think  like  security  experts  –  Embedded  systems  are  oXen  developed  by  grabbing  exisQng  chips,  designs,  etc  

Page 13: Security challenges for IoT

Physical  Hacks  

A Practical Attack on the MIFARE Classic: http://www.cs.ru.nl/~flaviog/publications/Attack.MIFARE.pdf Karsten Nohl and Henryk Plotz. MIFARE, Little Security, Despite Obscurity

Page 14: Security challenges for IoT
Page 15: Security challenges for IoT

Or  try  this  at  home?  hAp://freo.me/1g15BiG    

Page 16: Security challenges for IoT

http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-630.html

Page 17: Security challenges for IoT

Hardware  recommendaQons  

•  Don’t  rely  on  obscurity    

Page 18: Security challenges for IoT

Hardware  recommendaQons  

•  Don’t  rely  on  obscurity  •  Don’t  rely  on  obscurity  •  Don’t  rely  on  obscurity  •  Don’t  rely  on  obscurity  •  Don’t  rely  on  obscurity  •  Don’t  rely  on  obscurity  •  Don’t  rely  on  obscurity    

Page 19: Security challenges for IoT

Hardware  RecommendaQon  #2    

•  Unlocking  a  single  device  should  risk  only  that  device’s  data  

Page 20: Security challenges for IoT

The  Network  

Page 21: Security challenges for IoT

hAp://ubertooth.sourceforge.net/  hAps://www.usenix.org/conference/woot13/workshop-­‐program/presentaQon/ryan  

Page 22: Security challenges for IoT

Crypto  on  small  devices  

•  PracQcal  ConsideraQons  and  ImplementaQon  Experiences  in  Securing  Smart  Object  Networks  –  hAp://tools.ied.org/html/draX-­‐aks-­‐crypto-­‐sensors-­‐02  

Page 23: Security challenges for IoT

ROM  requirements  

Page 24: Security challenges for IoT

ECC  is  possible    (and  about  fast  enough)  

Page 25: Security challenges for IoT

Crypto  

Borrowed from Chris Swan: http://www.slideshare.net/cpswan/security-protocols-in-constrained-environments/13

Page 26: Security challenges for IoT

Won’t  ARM  just  solve  this  problem?  

Page 27: Security challenges for IoT

Cost  maAers  

8 bits $5 retail $1 or less to embed

32 bits $25 retail $?? to embed

Page 28: Security challenges for IoT

Another  opQon?  

Page 29: Security challenges for IoT

SIMON  and  SPECK  

https://www.schneier.com/blog/archives/2013/07/simon_and_speck.html

Page 30: Security challenges for IoT

Datagram  Transport  Layer  Security  (DTLS)  

•  UDP  based  equivalent  to  TLS  •  hAps://tools.ied.org/html/rfc4347  

Page 31: Security challenges for IoT

Key  distribuQon  

Page 32: Security challenges for IoT

Passwords  

•  Passwords  suck  for  humans  •  They  suck  even  more  for  devices    

Page 33: Security challenges for IoT
Page 34: Security challenges for IoT
Page 35: Security challenges for IoT
Page 36: Security challenges for IoT

Why  Federated  IdenQty  for  Things?  

•  Enable  a  meaningful  consent  mechanism  for  sharing  of  device  data  •  Giving  a  device  a  token  to  use  on  API  calls  beAer  than  giving  it  a  

password  –  Revokable  –  Granular  

•  May  be  relevant  for  both  –  Device  to  cloud  –  Cloud  to  app  

•  “IdenQty  is  the  new  perimeter”  

Page 37: Security challenges for IoT

MQTT  

Page 38: Security challenges for IoT

MQTT  and  OAuth2    

Page 39: Security challenges for IoT

   An    Open  Source    IdenQty  and    EnQtlement  Management    Server  

   

Apache  Licensed  LDAP,  JDBC,  AcQve  Directory,  SCIM,  SPML  SAML2,  OpenID  Connect,  WS-­‐Trust,  Kerberos  OAuth  1.0/2.0,  XACML  2.0,  XACML  3.0  XDAS,  Web  Console,  SOAP  Admin  MulQ-­‐tenant,  Clusterable,  HA,  24x7  support  

39  

What  is  WSO2  IdenQty  Server?  

Page 40: Security challenges for IoT

Other  WSO2  technology  to  help  you  

•  WSO2  BAM  –  monitoring  •  WSO2  CEP  –  realQme  fraud  detecQon  •  WSO2  API  Manager  –  securing  API  endpoints    

Page 41: Security challenges for IoT

Real  Qme  event  processing  

41  

Page 42: Security challenges for IoT

Are you setting up for the next privacy or

security breach?

Page 43: Security challenges for IoT
Page 44: Security challenges for IoT

Exemplars  

•  Shields  •  Libraries  •  Server  Frameworks  •  Standards  and  Profiles  

Page 45: Security challenges for IoT

Summary  

•  1.  Don’t  be  dumb  •  2.  Think  about  the  differences  •  3.  Be  smart    •  4.  Create  and  publish  exemplars  

Page 46: Security challenges for IoT

WSO2 Reference Architecture for the Internet of Things http://freo.me/iot-ra

Page 47: Security challenges for IoT

Thank  You