Team members: Nabil Bouamara Jeroen Delvaux Anum Masood Saleha Masood Djamel Mohamed Hongjian Peng Qurrat ul Ain Syeda Wishal Bokhari Mingli Wu Security & Privacy Group Presentation: Security & Privacy in Internet of Things Advanced Topics in Internet of Things Shanghai Jiao Tong University October 22, 2015 Defense Attack Does the Internet of Things need Security? Smartphone Pacemakers, insulin pumps etc. may be hacked Malicious applications may collect your private data (photos, messages, location, etc.) Can burglars determine whether you are home? Medical Devices Broadcast WiFi passwords unencrypted Smart Kitchen Appliances Laundry Equipment Group 6: Internet of Things – Security & Privacy Introduction Smart Lights Slide 02/25 Does the Internet of Things need Security? Yes! Home Entertainment System TVs were found to spy on not only what channels were being watched, but even transmit the names of files on connected USB drives You may be spied upon in your own home Billing fraud Refrigerator Refrigerators have been used to send out malicious emails (spam) Group 6: Internet of Things – Security & Privacy WebCam Introduction Hackers may take control and record you Smart Meter Slide 03/25 Case Study: Hackers Remotely Kill a Car • Modern cars are equipped with electronic systems • Brakes, steering, engine, transmission, locks, hood and truck releases, horn, heat, dashboard, … • Internet-connected, enabling remote threats • An automaker’s nightmare, by Miller & Valasek • Target: Jeep Cherokees (1000s of vehicles) • Remote control, via the Internet, from a laptop • Send commands through the entertainment system Human lives are at stake! Group 6: Internet of Things – Security & Privacy Introduction Slide 04/25 Layers of the IoT Presentation Outline (1) Security Needs & Mathematical Tools IoT device (2) Physical Security Internet backbone Local network (3) Applications (4) Government Group 6: Internet of Things – Security & Privacy Security Needs & Mathematical Tools Slide 05/25 Attacker Model Insecure communication channel hi hi, i am device 85; my sensitive data is 7184 thx, got it, go to mode 6 IoT device Local network Protocol Attacks: - Eavesdropping (Read) - Manipulation (Write) - Replay (History) Physical Attacks: - Power, electromagnetic, timing, optical, etc. Group 6: Internet of Things – Security & Privacy Security Needs & Mathematical Tools adversary Slide 06/25 Security Needs (1/2) To be provided by the cryptographic protocol • Data Confidentiality & Data Authentication Transfer 10$ to Bank Account X \T&-!@[ds$#7rfhrd&) - Cannot understand Modification detected WiFi access point Smartphone • Entity Authentication Access granted Genuine card (prover) Malicious card (impersonator) Group 6: Internet of Things – Security & Privacy Access denied Security Needs & Mathematical Tools Hotel room (verifier) Slide 07/25 Security Needs (2/2) To be provided by the cryptographic protocol • Entity Confidentiality (=Privacy) Shopping card Track shopping behavior of a specific customer over time Shop cashier • Availability (Resist Denial-of-Service) RFID tag Group 6: Internet of Things – Security & Privacy Disable genuine data flow temporarily / permanently Security Needs & Mathematical Tools RFID reader Slide 08/25 A Cryptographic Protocol Protect a “small key” only, which on its turn protects the “big data” hi \T&-!@[ds$# *)”<@x^+{ shared secret key (e.g., 128 bit) “Gibberish. They didn’t give me the key.” Physical vault (secure key storage) Group 6: Internet of Things – Security & Privacy “I cannot recover the key” adversary Security Needs & Mathematical Tools Slide 09/25 Tricky Trade-Off: Cost versus Security Low-Cost ResourceConstrained IoT Device - Secure protocols, algorithms and implementations Energy / Power Circuit Area Execution Time … Many cryptographic primitives have been broken… - WiFi: WEP protocol GSM: A5/1 algorithm Windows: MD5 algorithm … Group 6: Internet of Things – Security & Privacy - Don’t design your own crypto. - Peer-reviewed crypto competitions (AES, Keccak, …) Security Needs & Mathematical Tools Slide 10/25 Presentation Outline (1) Security Needs & Mathematical Tools IoT device (2) Physical Security Internet backbone Local network (3) Applications (4) Government Group 6: Internet of Things – Security & Privacy Physical Security Slide 11/25 Physical Attacks Microphone Apply & Collect Physical Stimuli Oscilloscope Scanning Electron Microscope (SEM) IoT device Side-Channel Traces Signal Processing (MATLAB, C++) Temperature Chamber Voltage Source Group 6: Internet of Things – Security & Privacy Focused Ion Beam (FIB) Secret Key Recovery Physical Security Slide 12/25 Physical Countermeasures • Not a fair game • Protect against all channels; attacker only needs one weakest link in a chain • Everything can be broken, given enough time & money • Countermeasures ($$$) • Sensors: light, temperature, voltage, EM, … Goal: render attacks economically infeasible Cost attack >> Profit Attack • Reduce the SNR of side-channel traces: masking, noise generators, … • Circuit Level: physically unclonable functions (PUFs), special logic styles, … Group 6: Internet of Things – Security & Privacy Physical Security Slide 13/25 Presentation Outline (1) Security Needs & Mathematical Tools IoT device (2) Physical Security Internet backbone Local network (3) Applications (4) Government Group 6: Internet of Things – Security & Privacy Applications Slide 14/25 Privacy-Enhancing Technologies for the Internet • Virtual Private Network (VPN) • Isolated private network for a selected group of users • E.g., securely distribute data among business partners • E.g., individuals (bypass the Great Firewall) • Onion Routing (e.g., TOR) • Anonymous sender • Data encapsulated in encryption layers • Onion routers peel away 1 layer to reveal next destination Group 6: Internet of Things – Security & Privacy Applications Slide 15/25 Secure Communications over the Web • Cryptographic protocol: SSL/TLS • • • • Applications: Web browsing, E-mail, instant messaging, … End-to-end authentication of client & server Data confidentiality Long version history with many security flaws (e.g., Heartbleed bug, 2014) Web server (e.g., facebook.com) Client Web Browser (e.g., Google Chrome) Group 6: Internet of Things – Security & Privacy Applications Slide 16/25 Domain Name Servers (DNS) (1) Domain name: www.facebook.com (2) IP-address: 31.13.77.6 DNS Client Web Browser (3) Facebook server (IP) Group 6: Internet of Things – Security & Privacy • User convenience: remember words instead of numbers • Security was an afterthought: DNS Security Extensions (DNSSEC) • Ensure that the user connects to a genuine server and not a malicious one (DNS cache poisoning). Applications Slide 20/25 Security of the Cloud • Many companies & individuals migrate their data to the cloud • Cheaper than maintaining your own IT infrastructure • Mixed feelings in terms of security • Cloud providers have technical (cryptographic) expertise • Trust issue: rely on the goodness of the cloud providers Secure storage of and processing on user / company data Secure download Secure upload Group 6: Internet of Things – Security & Privacy Applications Slide 18/25 End-Point Security • Cryptographic algorithms don’t solve everything • All efforts are in vain if the end-point (OS) is infected • Malware, viruses, Trojan horses, key-loggers, … • One minor flaw and the whole system might collapse • E.g., hackers released customer names of an on-line dating service, marketing to married people (2015) • Protect the end-user against him/her-self k • Passwords (too short, dictionary attacks, reuse across services, …) • Phishing Group 6: Internet of Things – Security & Privacy Applications Slide 19/25 Presentation Outline (1) Security Needs & Mathematical Tools IoT device Internet backbone Local network (2) Physical Security (3) Applications (4) Government Group 6: Internet of Things – Security & Privacy Government Slide 20/25 Role of the Government • Both attacker (gather intelligence) and defender (legal system), e.g., USA NSA Whistleblower Edward Snowden (2014) Federal Trade Commission (FTC) FTC Chairwoman Edith Ramirez, Goal: “Protecting America’s customers” Mass-surveillance on US citizens, escalating since 9/11 (demand backdoors in products) Private user data: - Facebook, - GMail, - AT&T, -… Group 6: Internet of Things – Security & Privacy Government Recommendations for companies that sell IoT products (2015): - physical + algorithmic security - collect no more user data than needed - user awareness Slide 21/25 Legislation in the European Union • European Commission (EC) • Single set of rules across Europe • Data security = a fundamental right • Basic laws in directives 95/46/EC and 2002/58/EC • • • • • The right of silence (for IT) The right to be forgotten Accountability for operators Transparent: consent of the user before processing data User has unlimited control over his/her data (includes location) Group 6: Internet of Things – Security & Privacy Government Neelie Kroes, Vice President of the EC & Commissioner for the Digital Agenda Slide 22/25 Trust • End-users rely on the ethical behavior of IoT service providers • No hard mathematical guarantees unfortunately • Government should enforce this • Customer privacy often breached • Facebook, Google, … passed user data to the NSA • Bell faces $750M lawsuit over allegedly selling customer data to advertisers (2015) Tim Cook, CEO Apple, 2015 “Our devices do not betray us” “Our competitors are gobbling up everything they can learn about you and trying to monetize it”. Group 6: Internet of Things – Security & Privacy Government Slide 23/25 Conclusion • Security is often an afterthought in the IoT • Many breaches have been reported • Not even all data is encrypted • The IoT is already there, we now have to make it secure Evolve towards a healthy immune system Enforced by technical (cryptographic) and legal means Group 6: Internet of Things – Security & Privacy Conclusion Slide 24/25 Thanks you! Questions? Denial-of-Service