your thing is pwnd - security challenges for the internet of things

44
Your Thing is pwnd Security Challenges for the Internet of Things Paul Fremantle CTO, WSO2 ([email protected] ) PhD researcher, Portsmouth University ([email protected] ) @pzfreo #wso2 #solidcon @oreillysolid

Upload: wso2

Post on 15-Jan-2015

590 views

Category:

Technology


0 download

DESCRIPTION

The growth of Internet connected devices is hard to comprehend. From health monitoring gadgets to Home Automation systems. The real world is getting Internet connected. Lots of these devices are built on 8-bit microcontrollers. Often they use unencrypted radio comms or networking, and default passwords. Do we care? Maybe they are too simple, too uninteresting to hack? Visit examples of hacking Things, why we should care and how to fix it. If you are building a Thing, using an internet connected Thing, or working with data from Things, come along to find out what you should know about securing them.

TRANSCRIPT

Page 1: Your Thing is pwnd - Security Challenges for the Internet of Things

Your Thing is pwndSecurity Challenges for the

Internet of Things

Paul FremantleCTO, WSO2 ([email protected])

PhD researcher, Portsmouth University([email protected])

@pzfreo#wso2

#solidcon@oreillysolid

Page 2: Your Thing is pwnd - Security Challenges for the Internet of Things

Firstly, does it even matter?

Page 3: Your Thing is pwnd - Security Challenges for the Internet of Things
Page 4: Your Thing is pwnd - Security Challenges for the Internet of Things

“Google Hacking”

Page 5: Your Thing is pwnd - Security Challenges for the Internet of Things
Page 6: Your Thing is pwnd - Security Challenges for the Internet of Things

My three rules for IoT security

• 1. Don’t be dumb

• 2. Think about what’s different

• 3. Do be smart

Page 7: Your Thing is pwnd - Security Challenges for the Internet of Things

My three rules for IoT security

• 1. Don’t be dumb– The basics of Internet security haven’t gone

away

• 2. Think about what’s different– What are the unique challenges of your device?

• 3. Do be smart– Use the best practice from the Internet

Page 8: Your Thing is pwnd - Security Challenges for the Internet of Things
Page 10: Your Thing is pwnd - Security Challenges for the Internet of Things
Page 11: Your Thing is pwnd - Security Challenges for the Internet of Things

http://freo.me/1pbUmofhttp://freo.me/1pbUmof

Page 12: Your Thing is pwnd - Security Challenges for the Internet of Things

So what is different about IoT?• The fact there is a device

– Yes – its hardware! – Ease of use is almost always at odds with security

• The longevity of the device– Updates are harder (or impossible)

• The size of the device– Capabilities are limited – especially around crypto

• The data– Often highly personal

• The mindset– Appliance manufacturers don’t always think like security experts– Embedded systems are often developed by grabbing existing chips, designs, etc

Page 13: Your Thing is pwnd - Security Challenges for the Internet of Things

Physical Hacks

A Practical Attack on the MIFARE Classic: http://www.cs.ru.nl/~flaviog/publications/Attack.MIFARE.pdf Karsten Nohl and Henryk Plotz. MIFARE, Little Security, Despite Obscurity

Page 14: Your Thing is pwnd - Security Challenges for the Internet of Things
Page 15: Your Thing is pwnd - Security Challenges for the Internet of Things

Or try this at home?http://freo.me/1g15BiG

Page 17: Your Thing is pwnd - Security Challenges for the Internet of Things

Hardware recommendations• Don’t rely on obscurity

Page 18: Your Thing is pwnd - Security Challenges for the Internet of Things

Hardware recommendations• Don’t rely on obscurity• Don’t rely on obscurity• Don’t rely on obscurity• Don’t rely on obscurity• Don’t rely on obscurity• Don’t rely on obscurity• Don’t rely on obscurity

Page 19: Your Thing is pwnd - Security Challenges for the Internet of Things

Hardware Recommendation #2

• Unlocking a single device should risk only that device’s data

Page 20: Your Thing is pwnd - Security Challenges for the Internet of Things

The Network

Page 21: Your Thing is pwnd - Security Challenges for the Internet of Things

Ubertooth

http://ubertooth.sourceforge.net/https://www.usenix.org/conference/woot13/workshop-program/presentation/ryan

Page 22: Your Thing is pwnd - Security Challenges for the Internet of Things

Crypto on small devices• Practical Considerations and Implementation Experiences in

Securing Smart Object Networks– http://tools.ietf.org/html/draft-aks-crypto-sensors-02

Page 23: Your Thing is pwnd - Security Challenges for the Internet of Things

ROM requirements

Page 24: Your Thing is pwnd - Security Challenges for the Internet of Things

ECC is possible (and about fast enough)

Page 25: Your Thing is pwnd - Security Challenges for the Internet of Things

Crypto

Borrowed from Chris Swan: http://www.slideshare.net/cpswan/security-protocols-in-constrained-environments/13

Page 26: Your Thing is pwnd - Security Challenges for the Internet of Things

Won’t ARM just solve this problem?

Page 27: Your Thing is pwnd - Security Challenges for the Internet of Things

Cost matters

8 bits$5 retail$1 or less to embed

32 bits$25 retail$?? to embed

Page 28: Your Thing is pwnd - Security Challenges for the Internet of Things

Another option?

Page 29: Your Thing is pwnd - Security Challenges for the Internet of Things

SIMON and SPECK

https://www.schneier.com/blog/archives/2013/07/simon_and_speck.html

Page 30: Your Thing is pwnd - Security Challenges for the Internet of Things

Datagram Transport Layer Security (DTLS)

• UDP based equivalent to TLS• https://tools.ietf.org/html/rfc4347

Page 31: Your Thing is pwnd - Security Challenges for the Internet of Things

Key distribution

Page 32: Your Thing is pwnd - Security Challenges for the Internet of Things

Passwords• Passwords suck for humans• They suck even more for devices

Page 33: Your Thing is pwnd - Security Challenges for the Internet of Things
Page 34: Your Thing is pwnd - Security Challenges for the Internet of Things
Page 35: Your Thing is pwnd - Security Challenges for the Internet of Things
Page 36: Your Thing is pwnd - Security Challenges for the Internet of Things

Why Federated Identity for Things?

• Enable a meaningful consent mechanism for sharing of device data

• Giving a device a token to use on API calls better than giving it a password– Revokable– Granular

• May be relevant for both– Device to cloud– Cloud to app

• “Identity is the new perimeter”

Page 37: Your Thing is pwnd - Security Challenges for the Internet of Things

MQTT

Page 38: Your Thing is pwnd - Security Challenges for the Internet of Things

MQTT and OAuth2(demo at the WSO2 booth)

Page 39: Your Thing is pwnd - Security Challenges for the Internet of Things

What I haven’t covered enough of

Page 40: Your Thing is pwnd - Security Challenges for the Internet of Things

Are you setting up for the next privacy or security

breach?

Page 41: Your Thing is pwnd - Security Challenges for the Internet of Things
Page 42: Your Thing is pwnd - Security Challenges for the Internet of Things

Exemplars• Shields• Libraries• Server Frameworks• Standards and Profiles

Page 43: Your Thing is pwnd - Security Challenges for the Internet of Things

Summary• 1. Don’t be dumb• 2. Think about the differences• 3. Be smart • 4. Create and publish exemplars

Page 44: Your Thing is pwnd - Security Challenges for the Internet of Things

WSO2 Reference Architecture for the Internet of Things http://freo.me/iot-ra