Reader small image

You're reading from  Mastering Internet of Things

Product typeBook
Published inMar 2018
PublisherPackt
ISBN-139781788397483
Edition1st Edition
Right arrow
Author (1)
Peter Waher
Peter Waher
author image
Peter Waher

Peter Waher is the founder of Little Sister®, a standards-based distributed social network, based on the principles of edge computing, privacy & information ownership, for humans and machines. Currently, Peter advises companies on topics such as privacy, the IoT and Smart Cities. He has worked for 24 years with computers and device communication, including low-level development in assembler for resource-constrained devices to high-level system design and architecture. His award-winning applications has attracted global attention, and he has been invited to speak at prestigious events.
Read more about Peter Waher

Right arrow

Chapter 15. Security for the Internet of Things

Unfortunately, security is one of those things that is seldom considered sufficiently, if at all. Security is invisible and, therefore, difficult to measure. Functionality is much more entertaining, and it is visible and demonstrable. It can turn heads, raise money, and give positive feedback. Security, on the other hand, cannot give positive feedback. And it is difficult to raise money for it, since it is difficult to prove security claims are valid. Lack of security, however, can give negative feedback, but only when it is too late.

If security problems are grave on the internet as a whole, for things on the internet, it's even worse. Devices, not operated by human, and supposed to work for years, perhaps without being able to be updated, are at great risk of being compromised and utilized for malicious purposes. The goal of this chapter is to motivate the reader to take security for the Internet of Things into account from the very beginning...

Understanding the risks


James Clapper, former director of National Intelligence of the USA, told Popular Science in 2016 that America's Greatest Threat is the Internet of Things. And the list of threats to America is not small.

The reason for this statement is that our society is so automated and optimized. Vulnerabilities in things make it possible to disrupt services, logistics, communication, energy, and the economy. It is possible to paralyze a modern society, using vulnerabilities in the systems used to make it run.

Today, hospital equipment, health devices, utilities, transport, trains, ships, cars, vans, airplanes, power plants, nuclear facilities, grocery stores, railways, motorways, harbors, and so on are to some extent automated. And they will be more so in the future, some even becoming autonomous, running without human intervention. And many of these systems contain serious vulnerabilities, sometimes known, but most often unknown to the creators, but not to cyber warriors. Many...

Getting to a bad place


When the internet was created and especially the web, much effort was invested into the interconnection of machines, transmission of messages, and publication of information, and little effort was made concerning the problem of how to avoid malicious users sabotaging the network and published information. Good people will not consider the fact that bad people will share the network with them. Resilience was defined as the ability to recover from faults. This would typically mean infrastructure losses and breakdowns, which were imagined to be random events, natural disasters, or wars, which were large scale local area events. Malicious attacks, however, do not affect components randomly, or locally, but systematically and globally, and in a much more sophisticated manner. Attacks exploit vulnerabilities in the design or code, to make it do things that were never intended or imagined. As such, protection mechanisms have not naturally developed. It is difficult to develop...

Understanding the root causes


So, how do we avoid repeating the same mistakes? Are these vulnerabilities and security threats an intrinsic part of the internet that we cannot counteract, and therefore we do not even try? Or are there methods that can be used to significantly improve the security in communication?

The major problem was that solutions were devised before the whole problem was understood. They wanted to find a method to transmit messages between computers in interconnected networks. They managed to do that exceedingly well. They did not consider, however, how to avoid the injection of fraudulent messages, or eavesdropping on transmitted messages. So, these were left out in the underlying protocols. As it became evident that these problems existed and posed a threat, solutions were added to solve them. But as these were aggregates, they became optional additions. They were never integrated into existing technology and made mandatory, since that would break compatibility. And...

Looking at alternative options


At some point in time, you must realize that continuing this path is not a good idea. Sometimes, you must throw away the old, even though it has served you well, and begin anew. When the weight of the legacy outweighs the benefits of continuing as usual, it's time to look at new options. And with the introduction of the Internet of Things, this is happening.

We have looked at several of the new options in this book. We've looked at new communication patterns and introduced new protocols. When designing a solution, you have the option of using a new type of technology. But take care to avoid repeating the same mistakes that others have done before you: don't be satisfied with a technology only because it solves your immediate problem quickly and rapidly and hope you can always do adjustments as requirements appear. Even though modern development processes encourage this mode of thinking, erroneously calling it agile, it is not a wise choice for the long run....

Getting to a better place


Regardless of whether you want it or not, if you're designing something for the Internet of Things, you must lay the foundation for it at the beginning. At the core of the foundation lies communication (among other things). Throughout the chapters, we've seen that protocols such as MQTT and HTTP, while they are easy to use, form a very bad foundation for interconnected things on the internet. While there are applications where they can be used, such as secondary web interfaces (HTTP) and local distributions of data (MQTT), for interoperability and exchange of data between devices on the internet, they are poor options. The amount of vulnerabilities you need to protect against, as well as the lack of communication pattern support, greatly outweighs using another protocol. CoAP with LWM2M might be a good choice, but only if the topology remains fixed, and if data collection and centralized processing is your main (or only) mode of communication. It's also a very poor...

Mastering data protection technologies


It is difficult to master all the technologies that exist concerning data protection. It is furthermore, a field that is in constant flux as new vulnerabilities are found. By choosing a good underlying foundation for your project, such as XMPP, you get a technology that helps you with many of the underlying risks — but not all. You will still need to understand the basics of data protection and cyber security. To cover this field meaningfully would require multiple books and is beyond the scope of this book. In this chapter, however, you will be presented by a very brief overview of technologies you should be familiar with, to the point of knowing how they work, what problems they solve, and when to use them.

Skimming the basics of encryption

Encryption algorithms are often divided into symmetric and asymmetric ciphers. Encryption algorithms often use multiple algorithms together to achieve the expected properties. Such ciphers are called hybrid. But...

Summary


In this chapter, you've been introduced to some of the risks involved in creating solutions for the Internet of Things. The goal has not been to dissuade you from doing so, but to prepare you, so that you know how to protect your solutions from common forms of attack. You've learned why security for the IoT is so important, how vulnerable smart societies are, and how design choices affect the security of your solutions. You've also been given an overview of some common forms of attacks and how to protect your systems from common vulnerabilities. In the next chapter, we will discuss privacy and how it affects the Internet of Things.

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Mastering Internet of Things
Published in: Mar 2018Publisher: PacktISBN-13: 9781788397483
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Peter Waher

Peter Waher is the founder of Little Sister®, a standards-based distributed social network, based on the principles of edge computing, privacy & information ownership, for humans and machines. Currently, Peter advises companies on topics such as privacy, the IoT and Smart Cities. He has worked for 24 years with computers and device communication, including low-level development in assembler for resource-constrained devices to high-level system design and architecture. His award-winning applications has attracted global attention, and he has been invited to speak at prestigious events.
Read more about Peter Waher