The “Internet of Things” or “IoT” as it’s affectionately known, has become one of the most prevalent buzzwords of 2016. Almost everything you touch today is somehow associated with it. Everything from smart thermostats, security systems, refrigerators and baby monitors in your home, to fitness bracelets and watches on your wrist, are connected to the Internet now. From clothing that use coloured LEDs to reflect your mood, to children’s educational toys, all have connectivity to “enhance your life experiences”.
With the race to bring new products to this evolving market, issues of both Security and Privacy are raised for consumers. At the low end of the spectrum, an attached IoT device could expose your WiFi configuration. On the high end of the spectrum, your personal banking, and health information could be exposed.
Depending on who you listen to, the analysts are saying that there will be between 25-30 BILLION Internet connected devices by the year 2020… just a short 4 years from now. (Cisco says 50 Billion!)
![]() |
http://hpe-enterpriseforward.com/eiu-securing-iot/ |
![]() |
http://hpe-enterpriseforward.com/eiu-securing-iot/ |
![]() |
Cisco: IoT Security Timeline |
![]() |
IoT PenguinBot |
What type of attacker is interested in exploiting IoT devices? We are finding that the IoT Threat Landscape is quite varied. Everyone from cybercriminals to government entities, hacktivists, and even insiders have shown up to the game. It’s apparently hard to resist the low hanging fruit of an easily exploitable system, that could lead directly into the corporate infrastructure.
How can we ensure that our products are secure from the beginning? What aids do we have to guide us in creating a more secure, more private consumer product?
I’m glad you asked! There are many initiatives currently to define the obstacles and opportunities to creating a secure Internet of Things ecosystem, but there ARE some guideline that you can follow.
As well, I am the Cavalry has published the Five Star Automotive Cyber Safety Program, with the purpose of bringing the industry together to standardize on a security framework for connected devices.
The OWASP Internet of Things Project provides information on:
- IoT Attack Surface Areas
- IoT Vulnerabilities
- Firmware Analysis
- ICS/SCADA Software Weaknesses
- Community Information
- IoT Testing Guides
- IoT Security Guidance
- Principles of IoT Security
- IoT Framework Assessment
- Developer, Consumer and Manufacturer Guidance
- Design Principles
Ecosystem Access Control | Device Memory |
Device Physical Interfaces |
Device Web Interface |
Device Firmware |
Device Network Services |
Administrative Interface |
Local Data Store |
Cloud Web Interface |
Ecosystem Communications |
Vendor Backend APIs |
Third Party Backend API’s |
Update Mechanism |
Mobile Application |
Network Traffic |
Attack Surface | Vulnerability |
---|---|
Ecosystem Access Control |
|
Device Memory |
|
Device Physical Interfaces |
|
Device Web Interface |
|
Device Firmware |
|
Device Network Services |
|
Administrative Interface |
|
Local Data Storage |
|
Cloud Web Interface |
|
Third-party Backend APIs |
|
Update Mechanism |
|
Mobile Application |
|
Vendor Backend APIs |
|
Ecosystem Communication |
|
Network Traffic |
|
OWASP: Top 10 IoT Security Issues
OWASP Top Ten IoT Security – Infographic
OWASP: IoT Security Guidance
RSA Conf: Mapping the IoT Attach Surface Areas
ARSTechnica: “Internet of Things” security is hilariously broken and getting worse
ARSTechnica: Police body cams found pre-installed with notorious Conficker worm
ARM.COM: From Sensor to Server, ARM drives the Internet of Things
Texas Instruments: Internet of Things – Opportunities and Challenges
DEFCON 23: IoT Attack Surface Mapping
HPE: Securing the IoT
Capgemini: Securing the Internet of Things
Globe and Mail: Internet of Things a playground for hackers
Globe and Mail: The Future is Smart – Why privacy must be baked into the Internet of Things
https://www.iamthecavalry.org/
IamtheCavalry: Five Star Automotive Cyber Safety Program
https://www.theguardian.com/technology/2015/nov/26/hackers-can-hijack-wi-fi-hello-barbie-to-spy-on-your-children
http://www.computerworld.com/article/2476599/cybercrime-hacking/black-hat-nest-thermostat-turned-into-a-smart-spy-in-15-seconds.html
https://www.exploitee.rs/index.php/Exploiting_Nest_Thermostats
http://www.theregister.co.uk/2016/01/12/ring_doorbell_reveals_wifi_credentials/
Embedded: Security framework for IoT devices
NIST Releases Draft Framework on the Internet of Things
Online Trust Alliance: IoT Trust Framework
WolfSSL: Embedded SSL Library for Applications, Devices, IoT, and the Cloud
http://www.bankingexchange.com/news-feed/item/5770-5-hacks-into-your-internet-of-things-devices
https://www.helpnetsecurity.com/2016/05/09/internet-of-fail/
Cisco: IoT Threat Environment
https://blog.knowbe4.com/worlds-most-famous-hacker-kevin-mitnick-iot-is-exploitable
http://krebsonsecurity.com/2016/02/this-is-why-people-fear-the-internet-of-things/