Reader small image

You're reading from  Azure IoT Development Cookbook

Product typeBook
Published inAug 2017
Reading LevelIntermediate
PublisherPackt
ISBN-139781787283008
Edition1st Edition
Languages
Tools
Right arrow
Author (1)
Yatish Patil
Yatish Patil
author image
Yatish Patil

Yatish Patil is currently working with Saviant Consulting as a technical project manager. He has delivered enterprise IoT and analytics applications using Microsoft Azure, ASP.NET, MVC, C#, SQL Server, and NoSQL. He has diverse industrial experience in IT and has worked in a variety of domains, such as utilities, manufacturing, and engineering. He has completed his certification in Developing Azure Solutions in the Microsoft Azure Certification. Yatish was also the technical reviewer for a Microsoft Azure-based technology book Microsoft Azure IaaS Essentials, which teaches guides Microsoft Azure subscribers how to design, configure, and build cloud-based infrastructure using Microsoft Azure. Yatish was among the industry speakers at India IoT Symposium, 2016. He delivered the industry session on remote asset monitoring with Microsoft Azure IoT Suite.
Read more about Yatish Patil

Right arrow

Azure IoT Hub Security and Best Practices

In this chapter, you will learn following recipes:

  • Securing a device with IoT Hub
  • Securing a communication
  • IP filtering with IoT Hub
  • IoT Hub access rights
  • Security best practices

Introduction

The era of the Internet of Things (IoT) is growing at a tremendous pace. Digitally connected devices are innovated for every aspect of our lives, including our homes, offices, cars, and our bodies too; with researchers claiming that, by 2020, the number of active wireless connected devices will exceed 40 billion.

It's up to the manufacturer and the system implementer of these IoT devices and IoT solutions to use more effective methods of IoT security in the following four areas:

  • IoT devices: Devices which can capture and send telemetry data to the cloud.
  • Field gateway: Devices that can aggregate data to and from the end devices which are unable to connect directly, this could be due to limitations such as protocol communication and so on.
  • Cloud gateways: Any cloud endpoint that is able to receive data or send commands to field gateways or IoT devices out in...

Securing a device with IoT Hub

IoT Hub provides hyper-scale identity registry for millions of devices per unit. The Azure IoT Hub secures devices while they are out in the field by registering them in Hub and providing a unique identity key for each IoT device. These secured details require the IoT solution/backend application to communicate with the device while it is in the field operation. It is a quick and easy process to configure an IoT device which can communicate over the internet into the IoT Hub. The device manufacturer will associate these details during the manufacturing of the hardware unless an Over the AIR (OTA) technique is implemented.

Getting ready

The Azure IoT SDKs help to manage any devices that are a...

Securing a communication

With the estimated number of IoT devices set to increase in the coming years across the globe, it is important how we connect those devices. The durability of receiving telemetry data from devices and delivering commands in response will be an important feature of any IoT solution which needs to be considered.

Getting ready

Azure IoT Hub does not permit insecure connections. Transport Layer Security (TLS) is always enforced. All messages are tagged with the originator on the service side, allowing the detection of in-payload origin spoofing attempts.

The Azure IoT Hub SDK provides a messaging infrastructure to establish secure communication between the connected devices using several IoT protocols...

IP filtering with IoT Hub

Security is an important aspect of any IoT solution based on the Azure IoT Hub. Sometimes, your IoT solution needs to explicitly give the range of the IP addresses from which the devices can connect as part of the custom IoT security configuration. IP filtering enables customers to configure IoT Hub to only accept connections from specific IP addresses assigned to the IoT devices or to block communication for a specific range of IP addresses.

Getting ready

The IP filter configuration is very easy for an administrator. These rules apply any time a device or a backend application connects on any supported protocols (currently AMQP, MQTT, AMQP/WS, MQTT/WS, HTTP/1).

The IP filter allows a maximum 10 rules...

IoT Hub access rights

IoT Hub has a defined set of permissions that needs to be taken into consideration. It is used for any IoT device or backend solution to connect or communicate with the IoT Hub. Once you have the appropriate permission, only then you will be able to access the respective IoT Hub endpoints.

Getting ready

The different permissions that you can grant to a device or backend application to access your IoT Hub are:

  • iothubowner: This will allow any device or backend solution all permissions
  • service: This will allow an access policy with only the Service connect permission
  • device: This will enable the device with an access Policy which has the Device connect permission
  • registryRead: This is a policy with Registry...

Security best practices

The IoT security strategy defines how to secure data in the cloud and protect data integrity, while IoT device telemetry data does the communication over the public internet, and securely provisions IoT devices which are continuously running and collecting data in the field. One needs to work on this strategy from the manufacturing, development, and deployment of IoT devices and their implementation infrastructure.

How to do it...

In this recipe we will try to use the security practices:

  1. Design the hardware such that it should be operational for the minimum required activity and time. Some IoT devices are battery-powered and can live a long life if this strategy is followed.
  2. Tampering with the device...
lock icon
The rest of the chapter is locked
You have been reading a chapter from
Azure IoT Development Cookbook
Published in: Aug 2017Publisher: PacktISBN-13: 9781787283008
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Yatish Patil

Yatish Patil is currently working with Saviant Consulting as a technical project manager. He has delivered enterprise IoT and analytics applications using Microsoft Azure, ASP.NET, MVC, C#, SQL Server, and NoSQL. He has diverse industrial experience in IT and has worked in a variety of domains, such as utilities, manufacturing, and engineering. He has completed his certification in Developing Azure Solutions in the Microsoft Azure Certification. Yatish was also the technical reviewer for a Microsoft Azure-based technology book Microsoft Azure IaaS Essentials, which teaches guides Microsoft Azure subscribers how to design, configure, and build cloud-based infrastructure using Microsoft Azure. Yatish was among the industry speakers at India IoT Symposium, 2016. He delivered the industry session on remote asset monitoring with Microsoft Azure IoT Suite.
Read more about Yatish Patil