Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT/Embedded Security

08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb

IoT Security Needs Creative Solutions

Not every security solution has a place in the IoT. Professionals must look in new directions to keep the Internet of Things secure.

The Internet of Things (IoT) is one of those evolving security areas that presents, as most things do, both opportunity and risk. Security professionals will tend to view the threats that it presents through their previous experiences, even though the threat models may be different.

Solutions that have worked in the past are usually the first ones used to deal with current problems. Such solutions, though, may be the wrong answer to a problem; even though they can be a generally good and valid solution.

Take encryption, for example. If you are dealing with an IoT device, you may insist upon the messages that it sends and receives be encrypted in some manner. The encryption is assumed by most to guarantee security.

But, what if there was a way around the encryption itself? Some researchers at Princeton came up with a paper entitled "Privacy Attacks and Defenses on Encrypted IoT Traffic" that assumed the case of traffic made up of encrypted messages and still showed how such traffic could still give up important data.

They looked at a "smart home" full of IoT devices. Basically, they realized that the metadata of the traffic would allow a passive network adversary to infer private in-home user activities using just the streamed traffic rates and packet headers.

The IoT things will talk to their various servers. A DNS request is one example of this. Traffic rates (which are patterns of repetitive queries to the device's remote management servers) along with the first six digits of MAC addresses generated may also provide much information. Since the MAC addresses won't be visible on ISP-level traffic, a LAN tap will come in handy in order to grab them.

Spikes in traffic can also infer when IoT devices are active. Such spikes will have nothing to do with the actual encrypted content issued by the device, but correlate to how it is being used.

You're invited to attend Light Reading's 11th annual Future of Cable Business Services event. Join us in New York on November 30 for the premier independent conference focusing on the cable industry's continuing efforts in the commercial services market – all cable operators and other communications service providers get in free.

There is a footprint that will be left by IoT devices whenever they are connected, and this aspect must be considered by the security team. Though the paper uses the example of a smart home, an organization will leave the same kinds of correlatable operational traces by the use of its own IoT devices.

This is the kind of threat avenue that a simple threat model may never consider. Yet, because of its passive nature and its simplicity it may prove to be rather effective.

The researchers have an idea what to do here. They basically want to upset the correlations that could be otherwise derived by inserting dummy network requests at random intervals. Called "traffic shaping," achieving it is not usually a drain on bandwidth as might be feared. For instance, using it on combined audio and video streaming only adds 40KB/s to the overall bandwidth requirements.

This traffic shaping idea may not be the total answer to IoT privacy by any means. But it is a step in the right direction, and shows the kind of innovative and wide-ranging approaches that need to be taken to the IoT for both security and remediation.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...
PUBLISHED: 2021-01-26
NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to...