Tema3 Seguridad IoT
Tema3 Seguridad IoT
MEIN, UIB
Security in IoT
Outline
1. Motivation.
2. Security services.
1
Security in IoT
Outline
1. Motivation.
2. Security services.
2
1. Motivation
1. Motivation
3
1. Motivation
1. Motivation
4
1. Motivation
1. Motivation
5
1. Motivation
1. Motivation
6
1. Motivation
1. Motivation
7
1. Motivation
1. Motivation
8
1. Motivation
1. Motivation
9
1. Motivation
1. Motivation
10
1. Motivation
1. Motivation
11
Security in IoT
Outline
1. Motivation.
2. Security services.
12
2. Security services
2. Security services
13
2. Security services
2. Security services
• Authentication.
• Access control.
• Data confidentiality.
• Data integrity.
• Nonrepudation.
14
2. Security services
2. Security services
• Authentication.
– Assurance that the communication entity (e.g., a device) is the one
that it claims to be.
• Access control.
• Data confidentiality.
• Data integrity.
• Nonrepudation.
15
2. Security services
2. Security services
• Authentication.
• Access control.
– Preventing or allowing the use of a resource: writing on a database,
accessing web resource (endpoint).
• Data confidentiality.
• Data integrity.
• Nonrepudation.
16
2. Security services
2. Security services
• Authentication.
• Access control.
• Data confidentiality.
– The protection of data from unauthorized disclosure.
• Data integrity.
• Nonrepudation.
17
2. Security services
2. Security services
• Authentication.
• Access control.
• Data confidentiality.
• Data integrity.
– The assurance that data received are exactly as it was sent by an
authorized entity.
• Nonrepudation.
18
2. Security services
2. Security services
• Authentication.
• Access control.
• Data confidentiality.
• Data integrity.
• Nonrepudation.
– Compound service: Data Integrity + Authentication.
19
Security in IoT
Outline
1. Motivation.
2. Security services.
20
3. Basic security mechanisms
1. Cryptography.
2. Hash function.
3. Digital signature.
4. Digital certificate.
21
3. Basic security mechanisms
1. Cryptography.
– Used to transform readable format messages (plaintext) into an
unreadable format (ciphertext) that can only be decrypted by
the authorised recipient through the use of a specific secret key.
2. Hash function.
3. Digital signature.
4. Digital certificate.
22
3. Basic security mechanisms
1. Cryptography.
2. Hash function.
– Cryptographic summary of data. It is a known function that
produces deterministic summaries; but it cannot recover the
original data. Hash functions do not use secret keys.
3. Digital signature.
4. Digital certificate.
23
3. Basic security mechanisms
1. Cryptography.
2. Hash function.
3. Digital signature.
– Exchange of plaintext data with the addition of an encrypted
hash (signature). On reception, the recipient decrypts the
encrypted hash (authentication) and then compares it with its
own hash of the plaintext data (data integrity).
4. Digital certificate.
24
3. Basic security mechanisms
1. Cryptography.
2. Hash function.
3. Digital signature.
4. Digital certificate.
– Some cryptographic mechanisms depend on two different
keys. One private key and one public key for each user or entity.
It is a complex infrastructure that allows to check if public keys
of entities are the ones that are supposed to be and exchange
the public keys for decrypting (Public Key Infrastructure).
25
3. Basic security mechanisms
26
3. Basic security mechanisms
27
3. Basic security mechanisms
1. Simmetric cryptography.
2. Asimmetric cryptography.
4. Hash function.
5. Digital signature.
6. Digital certificate.
28
3. Basic security mechanisms
[https://cheapsslsecurity.com/]
[https://cheapsslsecurity.com/]
30
3. Basic security mechanisms
1. Simmetric cryptography.
2. Asimmetric cryptography.
4. Hash function.
5. Digital signature.
6. Digital certificate.
31
3. Basic security mechanisms
● Each entity has two differenty keys: one public, one private.
● The pair of public-private keys are generated together in an
only-once fashion.
● Private key is kept secret by its owner entity.
● A message encrypted with a key can only be decrypted with its
counterpart.
● Algorithms: RSA (1024-2048 bits), ECC (192-224-… bits).
● Idea: encrypt with one of the keys, decrypt with the other one.
→ Which service(s) can we provide by using this idea ?
32
3. Basic security mechanisms
● Confidentiality.
● Ana encrypts msg. with B.
● Msg. can only be decrypted with B.
● Only Bob is able to decrypt msg., as he is the only one who keeps B.
[https://cheapsslsecurity.com/] 33
3. Basic security mechanisms
● Authentication.
● Ana encrypts msg. with A.
● Msg. can only be decrypted with A.
● If the msg. is decrypted with A, it can only be from Ana as she is the only
one who keeps A.
Ana Bob
35
3. Basic security mechanisms
36
3. Basic security mechanisms
1. Simmetric cryptography.
2. Asimmetric cryptography.
4. Hash function.
5. Digital signature.
6. Digital certificate.
37
3. Basic security mechanisms
[https://cheapsslsecurity.com/]
● Used to reduce encrypt/decrypt effort.
● Provides connection confidentiality.
● Same questions as for asymmetric crypt. 38
3. Basic security mechanisms
1. Simmetric cryptography.
2. Asimmetric cryptography.
4. Hash function.
5. Digital signature.
6. Digital certificate.
39
3. Basic security mechanisms
● No key is required.
40
3. Basic security mechanisms
● Data integrity.
transmission
message message‘ hash’
message + hash
hash func. hash func.
hash hash
=?
yes
non-tampered message ☺
1. Simmetric cryptography.
2. Asimmetric cryptography.
4. Hash function.
5. Digital signature.
6. Digital certificate.
43
3. Basic security mechanisms
integrity
authentication
44
[https://cheapsslsecurity.com/]
3. Basic security mechanisms
1. Simmetric cryptography.
2. Asimmetric cryptography.
4. Hash function.
5. Digital signature.
6. Digital certificate.
45
3. Basic security mechanisms
46
3. Basic security mechanisms
47
3. Basic security mechanisms
48
3. Basic security mechanisms
49
3. Basic security mechanisms
50
3. Basic security mechanisms
● Ok, but:
● Who does create the digital certificates ?
● How can we validate (trust on) a digital certificate ?
52
3. Basic security mechanisms
● Ok, but:
● Who does create the digital certificates ?
● How can we validate (trust on) a digital certificate ?
PKI
(Public Key Infrastructure)
• hardware
• software • create
• store
• networks used to ? • distribute what ? digital certificates
• roles • validate
• revoke
• policies
• procedures
53
3. Basic security mechanisms
54
[https://id4d.worldbank.org/guide/digital-certificates-and-pki]
3. Basic security mechanisms
55
[https://id4d.worldbank.org/guide/digital-certificates-and-pki]
3. Basic security mechanisms
56
[https://id4d.worldbank.org/guide/digital-certificates-and-pki]
3. Basic security mechanisms
● RA (Registration Authority).
● Checks veracity of the data
(mainly the public key) of the
entity requesting a certificate.
De Chris 論 - Trabajo propio utilizando: [1] and OpenCliparts.org, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=2501151
57
[https://id4d.worldbank.org/guide/digital-certificates-and-pki]
3. Basic security mechanisms
● RA (Registration Authority).
● Checks veracity of the data
(mainly the public key) of the
entity requesting a certificate.
De Chris 論 - Trabajo propio utilizando: [1] and OpenCliparts.org, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=2501151
● VA (Validation Authority).
● Validates association between
certificate and the holder entity.
58
[https://id4d.worldbank.org/guide/digital-certificates-and-pki]
3. Basic security mechanisms
● RA (Registration Authority).
● Checks veracity of the data
(mainly the public key) of the
entity requesting a certificate.
De Chris 論 - Trabajo propio utilizando: [1] and OpenCliparts.org, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=2501151
● VA (Validation Authority).
● Validates association between
certificate and the holder entity.
● Further infrastructure.
● TSA (TimeStamp Authority).
● Repositories, e.g. CRL (Certificate
Revocation List).
● etc 59
[https://id4d.worldbank.org/guide/digital-certificates-and-pki]
3. Basic security mechanisms
60
3. Basic security mechanisms
61
3. Basic security mechanisms
● Final notes:
● No private or secret key is ever exchanged.
● The holder is the only one who knows the private key.
● The holder is the responsible for keeping the private key secret, e.g.
storing it in a secure file like PKCS#12.
● Any operation by the holder must be carried out in person within the
client hardware, e.g. within a cryptographic card like PKCS#11.
[https://es.wikipedia.org/wiki/Infraestructura_de_clave_p%C3%BAblica] 62
Security in IoT
Outline
1. Motivation.
2. Security services.
63
4. IoT security rationale
1. Challenges.
2. Principles.
64
4. IoT security rationale
1. Challenges.
2. Principles.
65
4. IoT security rationale
The closer to the device in the value chain, the more specific the security challenges.
Example:
securing the HW of a connected thermostat may be new and difficult,
compared to securing a mobile app that controls it
66
[Hinarejos’a]
4. IoT security rationale
● Diversity.
● Scale.
67
4. IoT security rationale
● Diversity.
● Fragmentation in all layers → heterogeneous tools & techniques.
● Devices with ≠ CPU/memory/energy → RSA vs ECC; digital cert, etc. ?
● Thus need for device-adhoc security config. & management.
● Use of both secure (e.g. LTE) and not secure (e.g. Sigfox) networks.
● Use of both secure IoT platforms (e.g. AWS IoT) and local IoT deployments,
(e.g. local MQTT broker).
● Many uses cases, .e.g. smart home, wereables, retail, health, etc.
● Scale.
68
4. IoT security rationale
● Diversity.
● Scale (huge number of devices) implies:
● Difficult to config. & manage security of the devices
● Difficult to config. & manage security of private network within which
devices communicate.
● Difficult to apply report&control access policies of devices to IoT platform.
● Need for automating security config. & management of the devices.
69
4. IoT security rationale
1. Challenges.
2. Principles.
70
4. IoT security rationale
71
4. IoT security rationale
72
4. IoT security rationale
1. Challenges.
2. Principles.
73
4. IoT security rationale
74
4. IoT security rationale
75
4. IoT security rationale
76
4. IoT security rationale
77
4. IoT security rationale
78
4. IoT security rationale
79
4. IoT security rationale
80
4. IoT security rationale
81
4. IoT security rationale
82
4. IoT security rationale
83
4. IoT security rationale
84
4. IoT security rationale
85
4. IoT security rationale
86
4. IoT security rationale
87
4. IoT security rationale
88
4. IoT security rationale
89
4. IoT security rationale
90
4. IoT security rationale
91
4. IoT security rationale
92
4. IoT security rationale
93
References
[Hinarejos’a] Xisca Hinarejos, “Integration and connectivity of IoT systems”, slides for
master course 11769-Integration and connectivity of IoT systems, of MUSI, University of the
Balearic Islands. Available online on the course web page. 2021
[Hinarejos’b] Xisca Hinarejos, “Security at the Transport Layer TLS”, slides for master
course 11769-Integration and connectivity of IoT systems, MUSI, University of the Balearic
Islands. Available online on the course web page. 2021
[Oblancarte] Oscar Blancarte, “Que es Service-oriented architecture (SOA)”,
http://www.oscarblancarteblog.com, 2014.
[Zou’13] Honbo Zhou, “The Internet of Things in the Cloud”, CRC Press, Taylor & Francis
Group, Boca Ratón, 2013.
[Puri] Sumith Puri, “SOAP Web Services - CXF/JiBX [JAX-WS]”, 2016, https://dzone.com/
[Rondon] Bladimir Rondon, “Oauth 2 0, concepto y como funciona”, 2019,
https://youtu.be/pMLcAjE5Cso
[JavaB’19] Java Brains. What is JWT authorization really about - Java Brains.
https://youtu.be/soGRyl9ztjI
[WebDevS’19] Web Dev Simplified. What Is JWT and Why Should You Use JWT.
https://youtu.be/7Q17ubqLfaM
[Reink’16] Johann Reink. Understanding OAuth2.
http://www.bubblecode.net/en/2016/01/22/understanding-oauth2
94
Integrated Manufacturing Systems
Mateu Jover, Manuel Barranco
MEIN, UIB
Security in IoT