International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) Research Article June 2017 Security Challenges in Internet of Things (IoT) Alok Kumar Pathak Scientist-D, National Informatics Centre, New Delhi, India Abstract— The Term ‘Internet of things’ can be roughly understood as the use of standard Internet protocols for interconnection of highly heterogeneous networked entities for the human-to-thing or thing-to-thing communication in embedded networks. Because of the inherent nature of the IOT devices the security threats, although acknowledged, but is still not fully understood how existing IP security protocols and architectures could be used to connect various devices that range from 8-bit chips to 32 and 64 bit new generation Raspberry Pi based devices running full fledged Linux operating systems. Inefficient security capabilities and irregular or no patching of vulnerabilities in these devices, coupled with lack of consumer security alertness, provide malicious users with opportunities to exploit these devices. In this paper, we discuss the broad usage areas of IoT, Security threats in the IoT ecosystems and finally the steps and the approaches to mitigate the threats. Keywords— IoT, Security, Protocol, DDoS, I. INTRODUCTION The Internet in late 80s and early 90s, fascinated everyone with the potential to change the way how people could communicate, ideate and collaborate in the years to come. All this happened amid constant fear that Internet is insecure and vulnerable to attacks compromising on user privacy. Similarly the Internet of Things (IoT) has been charming everyone since last couple of years because of its potential to rapidly transform businesses and people‘s lives. IoT comprises of devices (including sensors) that interact and communicate with other machines, objects and environments thereby creating an ecosystem for ‗Smart‘ Surroundings. As per the prediction by Gartner there will be around 26 billion devices connected to each other by 2020. Other analysts even predict the number to be in excess of 50 billion[1]. Obviously this would end up generating huge volume of raw data that needs to be processed and analysed to generate meaningful information to help stakeholders take informed decisions The term IoT was first coined by the Auto-ID centre [2] in 1999. There have been rapid developments in the fundamental concepts ever since. The IoT now presents a strong area of research with various initiatives underway be it the (re)design, application, or the use of standard Internet technology. With the introduction of IPv6 and web services as fundamental building blocks for IoT applications [3], it promises to bring a number of basic advantages including: (i) Simple Integration with Internet hosts (ii) Ease in development of different appliances (iii) A homogeneous interface for applications, removing the need for application-level proxies. This has simplified the deployment of scenarios of IoT ecosystems ranging from building automation to production environments to smart homes. IoT Architecture A simple representation of IoT architecture may be described in four components[4] : a) IoT Devices called ‗Things‘ b) The Gateway c) Network and Cloud and finally d) The Service layer as shown in figure 1. Please note that the cloud infrastructure could also be an in house server instead. But this approach is not cost effective. © www.ijarcsse.com, All Rights Reserved Page | 648 Pathak International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) IoT Devices By definition, the IoT devics is anything that can be interconnected in home, business and industrial set up with capability to collect and send information to the service layer for analysis. The devices basically have sensors that detect or gather the current state or information. The devices come in all kinds of capabilities and processing [5]. At the lowest level, the devices have 8-bit controllers like Arduino boards. The devices could be based on 32 bit architecture running embedded Linux platform like OpenRWT The latest and the most powerful devices may have full Linux OS (or Android) running on 32 or even 64 bit platforms like Raspberry Pi. This category also includes the mobile apps running on Smartphone. Gateways Although the sophisticated devices may connect to the network using common protocol or technologies such as: Direct Ethernet or Wi-Fi, Bluetooth low energy, Near field Communication(NFC) or Zigbee[6], the IoT devices were not originally meant to connect to the Internet directly owing to the simplicity at the design level. Gateways help to fill up the gap by enabling the devices to connect to Internet ensuring the manageability and security aspects. Around 85% of existing IOT devices connects through gateway. Network and Cloud Infrastructure A network comprise of routers, repeaters and gateways, which control data flow and connect to telecom networks such as 3G, 4G and LTE for IP based communications. The IoT devices generate enormous amount of data. Cloud infrastructure provides the required hardware capacity and processing power for processing of this data. Service Creation Layer The middleware components such as the Service Bus; extract, transform, load [ETL], applications, web servers which perform the act of data massaging and presenting it for consumption through various channels such as desktop, browser and mobile applications (apps) comprise the stack of service creation layer. II. APPLICATION DOMAINS There is hardly any area where a potential use case of IoT is not being envisaged. Some of the chief areas where IoT is supposed to transform the entire business domain are: Manufacturing and Logistics, Health care, Home Automation, Banking and Finance and Retail[7]. Manufacturing: o Communication between Machine-to-machine and Machine-to-Infrastructure o Tracking of Goods on the move and optimization of Logistics process Health care: o Health Monitoring of patients from Remote o Off premise Diagnosis and treatment Industrial and home automation: o Smart city and Smart home Automation o Work premise automation o Remote monitoring of home appliance o Smart billing systems for utilities like Gas, Electricity and home broadband o Geo tagging of domestic and wild animals for monitoring Retail: o Bar codes have limitations from the point of view of amount of data it can store and reflect. When replaced with IoT devices , more relevant data could be fed to the monitoring systems thereby improving the supply chain efficiency o Informed shopping experience to the end customers The areas where the IoT is being envisaged to be used are so diverse that it is extremely unlikely that same manufacturer will be able to produce end to end solution and support full potential of IoT solution to even one domain. Therefore there is plenty of scope for interfacing modules to be developed in order to integrate the ecosystem together. Smart homes and Retail are the pioneering areas where plethora of IoT devices will be deployed in coming years. For example, Walmart Company has already invested a lot in usage of IoT in their supply chain [8]. III. SECURITY ISSUES The very basic promise of IoT is to have an ecosystem with all kinds of devices with ubiquitous access to Internet deployed in areas like healthcare, home automation. These devices will generate huge amount of data for the consumption of smart monitoring systems. This volume of data with non stringent authorization access will make it difficult to plug in the security challenges. The major security bottlenecks and privacy concerns include [9]: User Authentication—Most of the devices operate on default password such as ‗1234‘ which is known to everybody and thus pose a huge security risk. At times these are even configured to use the default username/passwords. © www.ijarcsse.com, All Rights Reserved Page | 649 Pathak International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) Limited Encryption at Transport Layer —since the majority of devices are very low level from the hardware perspective, the encryption algorithm is not implemented thereby making the communication vulnerable to spoofing. Insecure interface—For the end use, the IoT-based solutions is accessed via a web browser or mobile application interface. This web/mobile interface may also be prone to Open Web Application Security Project (OWASP) [10] Top 10 vulnerabilities such as poor session management, Cross site scripting and Cross site request forgery attacks Unsecure code practices—At the middle layer, there could be issues related to unsecure coding of business and service logic Personal data privacy concerns—The IoT devices collect lot of personal information related to user (especially in the health care domain) like name , age, contact number, Date of birth etc which is transmitted over the network mostly without encryption posing severe privacy risk. Unauthorized access to such data would lead to unwanted divulgence of user information. For instance, the kind of food one may be purchasing might be analysed to understand the kind of health problems one might be facing. IV. SECURITY BREACHES AND ATTACKS The year 2015 was termed to be the year of IoT by the experts. However the months that followed witnessed many security breaches and attacks which have raised question marks on the dependability and risk of having an ecosystem wherein the small devices with limited scope to implement security connect to the Internet. For example, in October last year (2016) much of America‘s Internet was brought down by a network of IoT devices (called the Mirai Botnet) The cyber attack was reported to be the largest of its kind in history [11]. The botnet (comprising of compromised IoT Devices like IP cameras and DVRs) was used to carry out DDOS attack on the servers of Dyn, a company that controls much of the internet‘s domain name system (DNS) infrastructure. The attack was sustained for most part of the day affecting many sites including the hugely popular ones like Twitter, the Guardian, Netflix, Reddit, CNN and many others in Europe and the US. Security Mitigation As on date no vendor manufactures end to end IoT solution and hence the system could me made secure only when the security is embedded in the entire production life cycle. Every component of IoT solution must undergo comprehensive security review to detect any potential vulnerability. Some approaches towards minimization of security lapses are as under: Secure device platform—Any weakness in base device platform might lead to alteration of privilege the default user has. The OS running on the devices should be thoroughly examined to validate its security and configuration against the base lines of standard information security systems. Any intermediate interfaces should not be included in the production environment Secure Network traffic—As it is difficult to implement sophisticated security/encryption algorithmic in the devices because of the simplistic (or outdated) hardware architecture, the network traffic is thus vulnerable to man in the middle type attacks. Possibility of implementing some lightweight encryption algorithms should be explored to address the security concerns without affecting the performance requirements. Functional security requirements—A comprehensive high level functionality testing with emphasis on security and penetration may be included as a part of testing phase. Must also include negative testing during the validation. Whenever required the IoT solutions could use Software as a Service (SaaS)-based identity management solutions for authorization and authentication requirements. The penetration testing should be held periodically. This will also minimize the advanced persistent threats (APT) for IoT solutions. Side Channel attack Mitigation- This attack is a form of reverse engineering. Electronics circuits may produce emissions (like heat or electromagnetic) as by products which an attacker can analyse to infer how the circuit works and what data is being processed even without the access to the circuitry. As these emissions do not play any role in the operation of circuit itself, it may go unnoticed which makes it extremely defenceless. This can only be prevented by doing thorough testing specifically for side channel attacks as the part of security testing. Secure code reviews—secure code reviews during the development phase may reduce the cost of fixing the defect greatly. Focus should be on areas with sensitive and security impacts such as boot process, security enforcement and encryption modules. End-to-end penetration test—Finally an End-to-end penetration testing should be done across all the interfaces to find out any vulnerabilities in the web, mobile and cloud interface of the IoT solutions. Each and every component must be secured in order to have a full proof secure ecosystem. Case Study of an IoT Solution To identify the attack scenarios and formulate mitigation plans for each component in the IoT Solution, we may take reference from the results of a US-based software company that developed a SecureTravel product using IoT technology. The solution tracks the real time data about the speed and the location of the vehicles including the people travelling on the vehicles [4]. © www.ijarcsse.com, All Rights Reserved Page | 650 Pathak International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) The IoT solution under study had the following components: Sensors in the vehicles Gateways Services Web interface Mobile interface The solution was subjected to comprehensive penetration testing with attacks such as threat modelling using the Spoofing, Tampering, Repudiation, Information disclosure, Denial of service (DoS), Elevation of privilege (STRIDE) software The idea was to understand the scenarios and propose a mitigation strategy(figure 2). V. CONCLUSION To have a decently secure IoT solution it is important to include security testing in the early part of life cycle of the solution. Mitigation of risks would also make the design easier to replicate. The secure systems development life cycle (SDLC) practices, the Security and privacy challenges must be adhered to. The Penetration Testing and side channel attack mitigation should happen periodically. Although the contemporary generation of platforms like Intel Edison is based on faster Atom Silvermont cores, which also runs many of the tablets and smartphones today, the majority of IoT devices run on chips are small and at times based on outdated architectures like based on Quark processors, which uses the same Instruction set as outdated Pentium P54C. This is because the majority of devices are wearable and disposable in nature and if implemented on high end platform will not only require high battery power but would increase the cost of Hardware thereby making the commercial viability questionable. We may eventually end up having powerful processors, such as Intel Atoms or ARMv8 chips, in products, like smart refrigerators or washing machines with touchscreens, but highly unlikely and impractical for disposable devices with small or no displays and with limited battery capacity. Manufacturing complete platforms for various IoT devices, could definitely introduce more standardisation and security. This may sound promising in principle but may lead to research and development of fewer platforms (just as in case of Personal computers and laptops, the hardware is based on only two major architectures: Apple and IBM) which if compromised would lead to cyber attacks of even greater proportions. REFERENCES [1] Cisco, ―The Internet of Things,‖ Cisco Visualizations, 2014 [2] AUTO-ID LABS. http://www.autoidlabs.org/. Online, last visited 10. June 2017. [3] E. Kim, D. Kaspar, N. Chevrollier, and JP. Vasseur. Design and Application Spaces for 6LoWPANs draft-ietf6lowpan-usecases-09. Design and Application Spaces for 6LoWPANs draft-ietf-6lowpan-usecases-09, January 2011.S. [4] S. Subramanian, V.V.Gopal and M Muthuswamy. ―Security and Privacy Challenges of IoT-enabled Solutions‖ ISACA Journal Volume 4, 2015 [5] Intel, ―Developing Solutions for Internet of Things‖, white paper, 2014 [6] Parneet Dhillon, Harsh Sadawarti. ―A Review Paper on Zigbee (IEEE 802.15.4) Standard‖. International Journal of Engineering Research & Technology, Vol. 3 - Issue 4 (April- 2014) [7] Freescale, ―What the Internet of Things (IoT) Needs to Become a Reality‖, white paper, May 2014 © www.ijarcsse.com, All Rights Reserved Page | 651 [8] [9] [10] [11] [12] [13] [14] Pathak International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) Hardgrave, Bill; ―RFID Adoption Is on Target,‖ RFID Journal, 5 January 2015 NCC Group, ―Security of Things: An Implementer‘s Guide to Cyber-Security for Internet of Things Devices and Beyond‖, 2014 The Open Web Application Security Project. https://www.owasp.org/index.php/Main_Page. Online, last visited 10. June 2017. http://www.autoidlabs.org/. Online, last visited 10. June 2017 WIRED, https://www.wired.com/2016/12/botnet-broke-internet-isnt-going-away/ Rolf H. Weber. ―Internet of Things – New security and privacy challenges‖. Science Direct, 2010 NCC Group, ―Security of Things: An Implementer‘s Guide to Cyber-Security for Internet of Things Devices and Beyond‖, 2014, © www.ijarcsse.com, All Rights Reserved Page | 652
© Copyright 2026 Paperzz