The Challenges of IoT Security and IoT Device Hardening

By Andrew Bickley, Arrow Electronics

Security has quickly become a key concern in the world of the IoT. While digital transformation has made clear to organisations the value of data, there are also high risks surrounding the potential misuse of data. This misuse highlighting the absolute necessity for strong cyber security. IoT technologies introduce numerous attack surfaces that hackers can exploit to steal data or launch other exploits. Going forward, more and more companies will be affected: Gartner predicts that over half of major new business processes and systems will incorporate some element of the IoT by 2020.

Security for IoT Devices

There is no doubting the power IoT applications can deliver, to help improve business efficiency and raise quality of service. Deploying huge numbers of connected sensors and actuators enables organisations to gather massive quantities of data to drive continuous improvement including: control processes remotely to streamline staffing and maximise yield, track the locations of assets to increase operational efficiency, and anticipate maintenance requirements in remote equipment to minimise down-time and utilise staff efficiently, to name just a few.

As a tool to support activities like business, commerce, and environmental management, the IoT is just at the beginning of its evolutionary cycle; many more as-yet unimagined applications can be expected to emerge in the future. The imagination of application developers will likely be matched only by that of hackers intent on subverting the IoT for their own ends.

IoT Hacking

Organisations will come to rely heavily on their IoT-based applications, to respond quickly to events in the field and make the right long-term business decisions. They will need a high level of trust in the data from connected assets. Hence preventing unauthorised access to this data is extremely important, to prevent eavesdropping or sabotage; if malicious agents can intercept data or gain access to connected devices, they can exploit numerous opportunities to cause damage by selling or publishing the data illegally, altering the data to misinform or misdirect, loading bogus code to take over or block the devices, or gain access to more sensitive assets within the organisation. These could be security cameras, access-control systems, drives containing confidential information, or others. If any such exploits are successful, victims may suffer direct financial losses or other harm such as reputational damage or lost market opportunities.

By their nature, IoT devices often operate autonomously for long periods, in remote locations, without being regularly inspected for signs of physical tampering. Moreover, being connected to the Internet gives online hackers the opportunity to launch attacks over the Internet without needing to go anywhere near the physical location of the device. Software that scours the Internet for vulnerable connected devices is already readily available on the Internet. Moreover, Gartner – in the same report that predicts the future pervasiveness of the IoT – has said there will be a $5 billion black market by 2020 for fake sensor and video data that can be used to compromise the integrity of data from legitimate IoT devices.

IoT Weaknesses

Clearly, the threat is real and significant, and organisations understand the key areas of vulnerability that present barriers to adoption of IoT-based business solutions. Businesses surveyed by 451 Research expressed concern about weaknesses throughout the IoT infrastructure, particularly at the network edge including IoT endpoints and their connections to other devices and the central network. The most important concerns are the physical security of endpoints, authentication of connected devices, the security of application software, and the connections between IoT devices and the central network. Issues like the security of IoT data stores and vulnerability to denial of service attacks rank below the challenges related to the more vulnerable edge devices and infrastructure.

IoT Security Best Practices 

Securing assets connected to the IoT is a huge challenge. Devices are not only vulnerable to physical attacks as well as online exploits, but also typically have only limited resources like processor cycles, power, and memory, to support electronic security. Suitable security must also be unobtrusive, so as not to obstruct authorised users or detract from the overall efficiency and business value of the application.

To help implement adequate security, within the prevailing constraints, it is valuable to analyse the potential threats facing various types of device, and the possible implications of a breach in each case, and so develop coherent security policies and best practice guidelines. The IoT Security Foundation has comprehensively studied device and data security breaches, and their impact on privacy, business activity, infrastructure and safety, to formulate a set of security compliance classes. This analysis can help ensure that IoT devices are designed with adequate security for their intended use, and deployed appropriately by network planners. Table 1 describes these compliance classes, in relation to device integrity, device availability, and data confidentiality.

0818-The-Challenges-of-IoT-Security-and-How-to-Harden-the-Edge-fig1

Table 1. IoT Security Foundation compliance framework for IoT end nodes.

IoT Security Framework

Any approach to IoT security must also recognise that hackers will seek to target the weakest links in the network, and use the smallest and lowest-cost nodes as entry points or stepping stones to reach higher-value assets and/or penetrate core networks. A structured approach is needed when designing IoT devices, and when setting up networks, to ensure that all available security techniques are assessed and implemented according to need and within the capabilities of the host system. Security measures applicable to IoT devices include:

  • Tamper detection
  • Secure Data Storage
  • Securing Data transmission
  • Authentication
  • Secure boot
  • Secure firmware updates
  • Secure manufacturing of IoT devices
  • Secure decommissioning of IoT end nodes and proper handling of associated assets (data)
  • Security policies and procedures 

These considerations span the complete IoT-device lifecycle (figure 1), from the earliest stages of designing the embedded system – such as selecting a microcontroller with integrated cryptographic co-processing, or a discrete hardware Secure Element – through manufacture, commissioning and maintaining while in the field, to removal from the network and disposal at end of life.

 0818-The-Challenges-of-IoT-Security-and-How-to-Harden-the-Edge-fig2

Figure 1. Security concerns over product lifecycle.

Even with the aid of a rigorous compliance framework such as the that developed by the IoT Security Foundation, and a clear grasp of applicable hardware and software-based security techniques, the fact remains: IoT data faces a huge diversity of security challenges between network endpoints and the core, whether this is a private corporate network, or the Cloud. A wide range of security solutions is available, from many providers, but developers need help to evaluate, select, and combine the chosen elements into a coherent whole that covers all potential vulnerabilities optimally. Figure 2 suggests a security strategy for IoT-endpoint designs, to protect against physical and online attacks.

0818-The-Challenges-of-IoT-Security-and-How-to-Harden-the-Edge-fig3

Figure 2. Security strategy for edge-node designs.

IoT Security Solutions

The Arrow Connect offering aims to provide such a resource, by bringing together solutions for managing IoT devices including endpoints and gateways. It encompasses both a Software Development Kit (SDK) for gateways and endpoints, and the design of device to Cloud management. It includes solutions for provisioning devices on the network securely, authentication, handling security keys, device identification, device management, endpoint priorities, groupings and hierarchies, data ingestion, data storage, data access, and Over-The-Air (OTA) software update.

Conclusion

Securing the data and devices on the IoT is essential, but at the same time extremely challenging. Assets can be distributed over a large geographical area, left unattended, and subjected to all manner of attacks by devious and determined hackers. Clear frameworks and best practices, developed by security experts, can help device designers and network planners to put the right security measures in the right places, to match the severity of the threats posed in each case. IoT security is a multi-faceted challenge, and extra help to address each aspect properly empowers developers to ensure that even the weakest links are as strong as they need to be.

Ultime notizie

Sorry, your filter selection returned no results.

Non perderti le ultime novità sull'elettronica

Abbiamo aggiornato la nostra politica sulla privacy. Si prega di prendere un momento per rivedere questi cambiamenti. Cliccando su Accetto, l'utente accetta la Politica sulla privacy e Condizioni di utilizzo di Arrow Electronics.

Il nostro sito web mette i cookies sul vostro dispositivo per migliorare la vostra esperienza e il nostro sito. Leggete altre informazioni sui cookies che usiamo e su come disabilitarli qui. I cookies e le tecnologie di tracking possono essere usati per scopi commerciali.

Con un click su “Accept”, voi consentite l'inserimento dei cookies sul vostro dispositivo e l'uso da parte nostra di tecnologie di tracking. Per avere altre informazioni e istruzioni su come disabilitare i cookies e le tecnologie di tracking, clickate su “Read More” qui sotto. Mentre l'accettazione dei cookies e delle tecnologie di tracking è volontaria, una loro disabilitazione potrebbe determinare un funzionamento non corretto del sito web, ed alcuni messaggi di allarme potrebbero essere per voi meno importanti.

Noi rispettiamo la vostra privacy. Leggete qui la nostra politica relativa alla privacy