Top Banner
Security and the Internet of Things Jordan Stone Notion
32
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IoT Security - Boulder Startup Week 2015

Security and the Internet of Things

Jordan Stone Notion

Page 2: IoT Security - Boulder Startup Week 2015

What is Notion?

Page 3: IoT Security - Boulder Startup Week 2015

Sound

Temperature

Light

OrientationNatural Frequency

Proximity

Acceleration

Water

@notion

Page 4: IoT Security - Boulder Startup Week 2015

4.9 BillionConnected devices by 2020

*http://www.gartner.com/newsroom/id/2905717@notion

Page 5: IoT Security - Boulder Startup Week 2015

5.9 millionAverage cost in USD of a data breach

http://www.accudatasystems.com/assets/2014-cost-of-a-data-breach-study.pdf@notion

Page 6: IoT Security - Boulder Startup Week 2015

So who cares about security for the Internet of

Things?

Page 7: IoT Security - Boulder Startup Week 2015

Everyone!

Page 8: IoT Security - Boulder Startup Week 2015

…including hackers

Page 9: IoT Security - Boulder Startup Week 2015

Defcon 2015• Not all hackers are bad hackers

• Examples:

• Angelina Jolie in the movie Hackers

• Defcon

• IoT Village

• Focused solely on hacking IoT devices

• Flaws must be presented to manufacturer before being entered in the contest

Page 10: IoT Security - Boulder Startup Week 2015

But some hackers are bad hackers

Page 11: IoT Security - Boulder Startup Week 2015

Like this guy

Page 12: IoT Security - Boulder Startup Week 2015

And this guy

Page 13: IoT Security - Boulder Startup Week 2015

Was he a ninja?

Page 14: IoT Security - Boulder Startup Week 2015

Why you care

• Bad hackers want your personal information

• More connected devices means more data

• More connected devices means more insecure connected devices

• Do you really want a hacker to know when you leave for work every day, or where your kids go to school?

Page 15: IoT Security - Boulder Startup Week 2015

Why you care Business version

• It costs a lot of money. A lot. Of. Money.

• Consumer trust is harder to gain and almost impossible to win back

• It will happen, even if you didn’t know it happened

Page 16: IoT Security - Boulder Startup Week 2015

What happens if your fridge gets hacked?

• Maybe nothing

• Maybe hackers know how much milk you drink

• Or that you’re not home

• Or they trigger your smart lock to unlock

Page 17: IoT Security - Boulder Startup Week 2015

Who’s been hacked?

• Refrigerators

• Thermostats

• Light bulbs

• You, probably. Just kidding.

Page 18: IoT Security - Boulder Startup Week 2015

What needs to be encrypted?

• M2M communication

• M2* communication

• User information

• Firmware files

• Databases

• Passwords/Keys

Page 19: IoT Security - Boulder Startup Week 2015

What kinds of security are available for IoT?

Page 20: IoT Security - Boulder Startup Week 2015

Symmetric Key Encryption

• Involves the use of a shared set of keys, typically with the same key used for encryption and decryption

• Advanced Encryption Standard (AES)

• Difficult to share keys securely, especially if you don’t own the whole supply chain

Page 21: IoT Security - Boulder Startup Week 2015

Asymmetric Key Encryption

• Involves a public/private key pair

• Also known as public key encryption

• This is how most of the internet works (e.g. SSL, TLS)

• Still susceptible to Man-in-the-Middle attacks

Page 22: IoT Security - Boulder Startup Week 2015

Blockchains

• Most famously used to record and verify Bitcoin transactions

• Track the history of devices via transactions

• Operates independently and is trustless

Page 23: IoT Security - Boulder Startup Week 2015

Private/Proprietary Encryption

• Don’t do this

• Don’t trust a product whose company does this

• Don’t recommend to your friend to do this

• Maybe recommend it to your competition

• On second thought, don’t

• Open Smart Grid Protocol did this and failed

https://threatpost.com/weak-homegrown-crypto-dooms-open-smart-grid-protocol/112680

Page 24: IoT Security - Boulder Startup Week 2015

“This function has been found to be extremely weak, and cannot be

assumed to provide any authenticity guarantee whatsoever.”

“Dumb Crypto in Smart Grids” authors

https://threatpost.com/weak-homegrown-crypto-dooms-open-smart-grid-protocol/112680

Page 25: IoT Security - Boulder Startup Week 2015

Security of Popular IoT Communication Platforms

Page 26: IoT Security - Boulder Startup Week 2015

ZigBee• Uses a MIC and shared private key to encrypt/

decrypt data

• Coordinator is considered the “trust center”

• Establishes keys

• Frame protection

• Key management

• OTA Key Setup is unsecured

Page 27: IoT Security - Boulder Startup Week 2015

Thread

• Devices join the network through your smartphone

• Leverages AES encryption for communication

• Uses product install codes to ensure only authorized devices join the network

• Supports public-key encryption

• Encrypted at network and application layers

Page 28: IoT Security - Boulder Startup Week 2015

AllSeen Alliance• Provides end-to-end application security

• No authentication at the routing layer

• Authentication and encryption keys are stored in a key store managed by the Security module

• Uses the Simple Authentication and Security Layer (SASL) to secure communication

• Uses a master secret and session key to authenticate and encrypt communication

Page 29: IoT Security - Boulder Startup Week 2015

How Does Notion do Security?

Page 30: IoT Security - Boulder Startup Week 2015

Notion’s Security Architecture

• Unique AES-256 bit private keys for each individual product

• Sensors encrypt their own data

• Bridge is just a proxy

• Backend decrypts and processes data

• Firmware and other backend messages happen in reverse

Page 31: IoT Security - Boulder Startup Week 2015

Notion’s Security Architecture

• All communication from our mobile apps is over HTTPS

• No sensitive information is stored in apps

• Communication between services in backend is also authenticated

• Working towards compliance with a NIST standard

Page 32: IoT Security - Boulder Startup Week 2015

Jordan StoneChief Software [email protected]

@cheddz

http://getnotion.com

@notion

Thanks!