SlideShare uma empresa Scribd logo
1 de 54
Your Thing is pwnd 
Security Challenges for the 
Internet of Things 
Paul Fremantle 
CTO, WSO2 (paul@wso2.com) 
PhD researcher, Portsmouth 
University 
(paul.fremantle@port.ac.uk) 
@pzfreo 
#wso2 
#iotconf 
@iotconf
Firstly, does it even matter?
My three rules for IoT security 
• 1. Don’t be stupid 
• 2. Be smart 
• 3. Think about what’s different
My three rules for IoT security 
• 1. Don’t be stupid 
– The basics of Internet security haven’t gone away 
• 2. Be smart 
– Use the best practice from the Internet 
• 3. Think about what’s different 
– What are the unique challenges of your device?
“Google 
Hacking”
http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/
http://freo.me/1pbUmof
So what is different about IoT? 
• The longevity of the device 
– Updates are harder (or impossible) 
• The size of the device 
– Capabilities are limited – especially around crypto 
• The fact there is a device 
– Usually no UI for entering userids and passwords 
• The data 
– Often highly personal 
• The mindset 
– Appliance manufacturers don’t think like security experts 
– Embedded systems are often developed by grabbing existing 
chips, designs, etc
Physical Hacks 
A Practical Attack on the MIFARE Classic: 
http://www.cs.ru.nl/~flaviog/publications/Attack.MIFARE.pdf 
Karsten Nohl and Henryk Plotz. MIFARE, Little Security, Despite Obscurity
UltraReset 
https://intrepidusgroup.com/insight/2012/09/ultrareset-bypassing-nfc-access-control-with-your-smartphone/
Or try this at home? 
http://freo.me/1g15BiG
http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-630.html
Hardware recommendations 
• Don’t rely on obscurity
Hardware recommendations 
• Don’t rely on obscurity 
• Don’t rely on obscurity 
• Don’t rely on obscurity 
• Don’t rely on obscurity 
• Don’t rely on obscurity 
• Don’t rely on obscurity 
• Don’t rely on obscurity
Hardware Recommendation #2 
• Unlocking a single device should risk only that 
device’s data
The Network
Crypto on small devices 
• Practical Considerations and Implementation 
Experiences in Securing Smart Object Networks 
– http://tools.ietf.org/html/draft-aks-crypto-sensors-02
ROM requirements
ECC is possible 
(and about fast enough)
Crypto 
Borrowed from Chris Swan: 
http://www.slideshare.net/cpswan/security-protocols-in-constrained-environments/13
Won’t ARM just solve this problem?
Cost matters 
8 bits 
$5 retail 
$1 or less to embed 
32 bits 
$25 retail 
$?? to embed
Another option?
SIMON and SPECK 
https://www.schneier.com/blog/archives/2013/07/simon_and_speck.html
Datagram Transport Layer Security 
(DTLS) 
• UDP based equivalent to TLS 
• https://tools.ietf.org/html/rfc4347
Key distribution
How do you distribute keys to devices? 
• Usually at manufacture time 
• Complex to update 
• What about expiration?
Passwords 
• Passwords suck for humans 
• They suck even more for devices
MQTT
Why Federated Identity for IoT? 
• Can enable a meaningful consent mechanism 
for sharing of device data 
• Giving a device a token to use on API calls 
better than giving it a password 
– Revokable 
– Granular 
• May be relevant for both 
– Device to cloud 
– Cloud to app
Device to Cloud 
• Put an OAuth2 token on the device 
• Set the “scope” to be limited 
– This device can publish to this topic 
• Support refresh model
Quick Demo 
• Apologies…. This is not a “slick” demo!
Cloud to App 
• The same technology can be used to enable 
some app to subscribe to a specific topic 
• Much easier than with Arduino!
Lessons learnt 
• OAuth2 Token lengths are usually ok (no promise though) 
– OpenId Connect much larger 
• Registration is hard 
• MQTT and MPU / I2C code is 97% of Duemilanove 
– Adding the final logic to do OAuth2 flow pushed it to 99% 
– No TLS in this demo is a big issue 
• Different OAuth2 implementations behave differently 
– Need to disable updating the refresh token with every refresh 
• Need to be able to update the scope of token if this will work 
for long term embedded devices 
• MQTT needs some better designed patterns for RPC 
– Standardised
More information 
http://pzf.fremantle.org/2013/11/using-oauth- 
20-with-mqtt.html 
http://siot-workshop.org/
OpenId Connect
Are you creating the next 
privacy breach?
Summary 
• Think about security with your next device 
• We as a community need to make sure that 
the next generation of IoT devices are secure 
• We need to create exemplars 
– Shields 
– Libraries 
– Server software 
– Standards
WSO2 Reference Architecture for the Internet of Things http://freo.me/iotra

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
Internet of Things Security Patterns
Internet of Things Security PatternsInternet of Things Security Patterns
Internet of Things Security Patterns
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
IoT security
IoT securityIoT security
IoT security
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
Iot Security
Iot SecurityIot Security
Iot Security
 

Destaque

Challenges in the IoT
Challenges in the IoTChallenges in the IoT
Challenges in the IoT
EUBrasilCloudFORUM .
 
Internet of thing (IoT and cloud convergence opportunitis and challenges
 Internet of thing (IoT and cloud convergence opportunitis and challenges  Internet of thing (IoT and cloud convergence opportunitis and challenges
Internet of thing (IoT and cloud convergence opportunitis and challenges
Dr.-Ing Abdur Rahim Biswas
 

Destaque (20)

Challenges in the IoT
Challenges in the IoTChallenges in the IoT
Challenges in the IoT
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
IoT App Development Areas And Major Challenges
IoT App Development Areas And Major ChallengesIoT App Development Areas And Major Challenges
IoT App Development Areas And Major Challenges
 
Internet of thing (IoT and cloud convergence opportunitis and challenges
 Internet of thing (IoT and cloud convergence opportunitis and challenges  Internet of thing (IoT and cloud convergence opportunitis and challenges
Internet of thing (IoT and cloud convergence opportunitis and challenges
 
Big Data Analytics & IoT Challenges
Big Data Analytics & IoT ChallengesBig Data Analytics & IoT Challenges
Big Data Analytics & IoT Challenges
 
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
 
Edge-Fog Cloud
Edge-Fog CloudEdge-Fog Cloud
Edge-Fog Cloud
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
Embedded Security and the IoT
Embedded Security and the IoTEmbedded Security and the IoT
Embedded Security and the IoT
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
Opportunities and Challenges of Large-scale IoT Data Analytics
Opportunities and Challenges of Large-scale IoT Data AnalyticsOpportunities and Challenges of Large-scale IoT Data Analytics
Opportunities and Challenges of Large-scale IoT Data Analytics
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
 
20170101 RILHEVA HVAC IOT PLATFORM
20170101 RILHEVA HVAC IOT PLATFORM20170101 RILHEVA HVAC IOT PLATFORM
20170101 RILHEVA HVAC IOT PLATFORM
 
IoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayIoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT Gateway
 
BUD17-104: Scripting Languages in IoT: Challenges and Approaches
BUD17-104: Scripting Languages in IoT: Challenges and ApproachesBUD17-104: Scripting Languages in IoT: Challenges and Approaches
BUD17-104: Scripting Languages in IoT: Challenges and Approaches
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 

Semelhante a Your Thing is Pwned - Security Challenges for the IoT

Securing IoT Applications
Securing IoT Applications Securing IoT Applications
Securing IoT Applications
WSO2
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
Paul Fremantle
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
PacSecJP
 
Hugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric ImpHugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric Imp
Business of Software Conference
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
Monika Keerthi
 

Semelhante a Your Thing is Pwned - Security Challenges for the IoT (20)

Your Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of ThingsYour Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of Things
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Securing IoT Applications
Securing IoT Applications Securing IoT Applications
Securing IoT Applications
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
 
Hugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric ImpHugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric Imp
 
Pulga, a Tiny Open-Source MQTT Broker for Flexible and Secure IoT Deployments
Pulga, a Tiny Open-Source MQTT Broker for Flexible and Secure IoT DeploymentsPulga, a Tiny Open-Source MQTT Broker for Flexible and Secure IoT Deployments
Pulga, a Tiny Open-Source MQTT Broker for Flexible and Secure IoT Deployments
 
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsxDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
Null mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNull mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmware
 
IoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangaloreIoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangalore
 
BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.
 
D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via sms
 
IOT Exploitation
IOT Exploitation	IOT Exploitation
IOT Exploitation
 

Mais de WSO2

Mais de WSO2 (20)

Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 

Último

一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
dyuozua
 
一比一原版(UC毕业证书)坎特伯雷大学毕业证成绩单原件一模一样
一比一原版(UC毕业证书)坎特伯雷大学毕业证成绩单原件一模一样一比一原版(UC毕业证书)坎特伯雷大学毕业证成绩单原件一模一样
一比一原版(UC毕业证书)坎特伯雷大学毕业证成绩单原件一模一样
dyuozua
 
一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样
一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样
一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样
dyuozua
 
一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样
一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样
一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样
dyuozua
 
一比一原版(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
一比一原版(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样一比一原版(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
一比一原版(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
dyuozua
 
一比一原版(MU毕业证书)梅努斯大学毕业证成绩单原件一模一样
一比一原版(MU毕业证书)梅努斯大学毕业证成绩单原件一模一样一比一原版(MU毕业证书)梅努斯大学毕业证成绩单原件一模一样
一比一原版(MU毕业证书)梅努斯大学毕业证成绩单原件一模一样
dyuozua
 
一比一原版(RUG毕业证书)格罗宁根大学毕业证成绩单原件一模一样
一比一原版(RUG毕业证书)格罗宁根大学毕业证成绩单原件一模一样一比一原版(RUG毕业证书)格罗宁根大学毕业证成绩单原件一模一样
一比一原版(RUG毕业证书)格罗宁根大学毕业证成绩单原件一模一样
dyuozua
 
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
sovco
 
一比一原版(Mac毕业证书)麦克马斯特大学毕业证成绩单原件一模一样
一比一原版(Mac毕业证书)麦克马斯特大学毕业证成绩单原件一模一样一比一原版(Mac毕业证书)麦克马斯特大学毕业证成绩单原件一模一样
一比一原版(Mac毕业证书)麦克马斯特大学毕业证成绩单原件一模一样
dyuozua
 
Corporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdfCorporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdf
Probe Gold
 
一比一原版(AUT毕业证书)奥克兰理工大学毕业证成绩单原件一模一样
一比一原版(AUT毕业证书)奥克兰理工大学毕业证成绩单原件一模一样一比一原版(AUT毕业证书)奥克兰理工大学毕业证成绩单原件一模一样
一比一原版(AUT毕业证书)奥克兰理工大学毕业证成绩单原件一模一样
dyuozua
 

Último (20)

一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
 
一比一原版(UC毕业证书)坎特伯雷大学毕业证成绩单原件一模一样
一比一原版(UC毕业证书)坎特伯雷大学毕业证成绩单原件一模一样一比一原版(UC毕业证书)坎特伯雷大学毕业证成绩单原件一模一样
一比一原版(UC毕业证书)坎特伯雷大学毕业证成绩单原件一模一样
 
The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results Presentation
 
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call GirlsPremium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
 
一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样
一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样
一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样
 
Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024
 
AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024
 
一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样
一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样
一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样
 
Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024
 
一比一原版(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
一比一原版(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样一比一原版(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
一比一原版(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
 
Teekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings PresentationTeekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings Presentation
 
一比一原版(MU毕业证书)梅努斯大学毕业证成绩单原件一模一样
一比一原版(MU毕业证书)梅努斯大学毕业证成绩单原件一模一样一比一原版(MU毕业证书)梅努斯大学毕业证成绩单原件一模一样
一比一原版(MU毕业证书)梅努斯大学毕业证成绩单原件一模一样
 
一比一原版(RUG毕业证书)格罗宁根大学毕业证成绩单原件一模一样
一比一原版(RUG毕业证书)格罗宁根大学毕业证成绩单原件一模一样一比一原版(RUG毕业证书)格罗宁根大学毕业证成绩单原件一模一样
一比一原版(RUG毕业证书)格罗宁根大学毕业证成绩单原件一模一样
 
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
 
SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024
 
一比一原版(Mac毕业证书)麦克马斯特大学毕业证成绩单原件一模一样
一比一原版(Mac毕业证书)麦克马斯特大学毕业证成绩单原件一模一样一比一原版(Mac毕业证书)麦克马斯特大学毕业证成绩单原件一模一样
一比一原版(Mac毕业证书)麦克马斯特大学毕业证成绩单原件一模一样
 
Western Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 PresentationWestern Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 Presentation
 
Corporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdfCorporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdf
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
 
一比一原版(AUT毕业证书)奥克兰理工大学毕业证成绩单原件一模一样
一比一原版(AUT毕业证书)奥克兰理工大学毕业证成绩单原件一模一样一比一原版(AUT毕业证书)奥克兰理工大学毕业证成绩单原件一模一样
一比一原版(AUT毕业证书)奥克兰理工大学毕业证成绩单原件一模一样
 

Your Thing is Pwned - Security Challenges for the IoT

  • 1. Your Thing is pwnd Security Challenges for the Internet of Things Paul Fremantle CTO, WSO2 (paul@wso2.com) PhD researcher, Portsmouth University (paul.fremantle@port.ac.uk) @pzfreo #wso2 #iotconf @iotconf
  • 2. Firstly, does it even matter?
  • 3.
  • 4.
  • 5. My three rules for IoT security • 1. Don’t be stupid • 2. Be smart • 3. Think about what’s different
  • 6. My three rules for IoT security • 1. Don’t be stupid – The basics of Internet security haven’t gone away • 2. Be smart – Use the best practice from the Internet • 3. Think about what’s different – What are the unique challenges of your device?
  • 7.
  • 10.
  • 12. So what is different about IoT? • The longevity of the device – Updates are harder (or impossible) • The size of the device – Capabilities are limited – especially around crypto • The fact there is a device – Usually no UI for entering userids and passwords • The data – Often highly personal • The mindset – Appliance manufacturers don’t think like security experts – Embedded systems are often developed by grabbing existing chips, designs, etc
  • 13. Physical Hacks A Practical Attack on the MIFARE Classic: http://www.cs.ru.nl/~flaviog/publications/Attack.MIFARE.pdf Karsten Nohl and Henryk Plotz. MIFARE, Little Security, Despite Obscurity
  • 15.
  • 16.
  • 17. Or try this at home? http://freo.me/1g15BiG
  • 19. Hardware recommendations • Don’t rely on obscurity
  • 20. Hardware recommendations • Don’t rely on obscurity • Don’t rely on obscurity • Don’t rely on obscurity • Don’t rely on obscurity • Don’t rely on obscurity • Don’t rely on obscurity • Don’t rely on obscurity
  • 21. Hardware Recommendation #2 • Unlocking a single device should risk only that device’s data
  • 23. Crypto on small devices • Practical Considerations and Implementation Experiences in Securing Smart Object Networks – http://tools.ietf.org/html/draft-aks-crypto-sensors-02
  • 25. ECC is possible (and about fast enough)
  • 26. Crypto Borrowed from Chris Swan: http://www.slideshare.net/cpswan/security-protocols-in-constrained-environments/13
  • 27. Won’t ARM just solve this problem?
  • 28. Cost matters 8 bits $5 retail $1 or less to embed 32 bits $25 retail $?? to embed
  • 30. SIMON and SPECK https://www.schneier.com/blog/archives/2013/07/simon_and_speck.html
  • 31. Datagram Transport Layer Security (DTLS) • UDP based equivalent to TLS • https://tools.ietf.org/html/rfc4347
  • 33. How do you distribute keys to devices? • Usually at manufacture time • Complex to update • What about expiration?
  • 34.
  • 35. Passwords • Passwords suck for humans • They suck even more for devices
  • 36.
  • 37.
  • 38. MQTT
  • 39.
  • 40. Why Federated Identity for IoT? • Can enable a meaningful consent mechanism for sharing of device data • Giving a device a token to use on API calls better than giving it a password – Revokable – Granular • May be relevant for both – Device to cloud – Cloud to app
  • 41.
  • 42. Device to Cloud • Put an OAuth2 token on the device • Set the “scope” to be limited – This device can publish to this topic • Support refresh model
  • 43.
  • 44. Quick Demo • Apologies…. This is not a “slick” demo!
  • 45.
  • 46. Cloud to App • The same technology can be used to enable some app to subscribe to a specific topic • Much easier than with Arduino!
  • 47. Lessons learnt • OAuth2 Token lengths are usually ok (no promise though) – OpenId Connect much larger • Registration is hard • MQTT and MPU / I2C code is 97% of Duemilanove – Adding the final logic to do OAuth2 flow pushed it to 99% – No TLS in this demo is a big issue • Different OAuth2 implementations behave differently – Need to disable updating the refresh token with every refresh • Need to be able to update the scope of token if this will work for long term embedded devices • MQTT needs some better designed patterns for RPC – Standardised
  • 48. More information http://pzf.fremantle.org/2013/11/using-oauth- 20-with-mqtt.html http://siot-workshop.org/
  • 50.
  • 51. Are you creating the next privacy breach?
  • 52.
  • 53. Summary • Think about security with your next device • We as a community need to make sure that the next generation of IoT devices are secure • We need to create exemplars – Shields – Libraries – Server software – Standards
  • 54. WSO2 Reference Architecture for the Internet of Things http://freo.me/iotra

Notas do Editor

  1. “Lots of people are emailing me and joking about what they’d do if they hacked the device,” said Way. “We believe this device is not hackable. But even if somebody managed to get in, the worst consequence would be lots of women having orgasms in unusual places.”