Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT/Embedded Security

9/5/2017
08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

IoT Security Needs Creative Solutions

Not every security solution has a place in the IoT. Professionals must look in new directions to keep the Internet of Things secure.

The Internet of Things (IoT) is one of those evolving security areas that presents, as most things do, both opportunity and risk. Security professionals will tend to view the threats that it presents through their previous experiences, even though the threat models may be different.

Solutions that have worked in the past are usually the first ones used to deal with current problems. Such solutions, though, may be the wrong answer to a problem; even though they can be a generally good and valid solution.

Encryption
Take encryption, for example. If you are dealing with an IoT device, you may insist upon the messages that it sends and receives be encrypted in some manner. The encryption is assumed by most to guarantee security.

But, what if there was a way around the encryption itself? Some researchers at Princeton came up with a paper entitled "Privacy Attacks and Defenses on Encrypted IoT Traffic" that assumed the case of traffic made up of encrypted messages and still showed how such traffic could still give up important data.

They looked at a "smart home" full of IoT devices. Basically, they realized that the metadata of the traffic would allow a passive network adversary to infer private in-home user activities using just the streamed traffic rates and packet headers.

The IoT things will talk to their various servers. A DNS request is one example of this. Traffic rates (which are patterns of repetitive queries to the device's remote management servers) along with the first six digits of MAC addresses generated may also provide much information. Since the MAC addresses won't be visible on ISP-level traffic, a LAN tap will come in handy in order to grab them.

Spikes in traffic can also infer when IoT devices are active. Such spikes will have nothing to do with the actual encrypted content issued by the device, but correlate to how it is being used.


You're invited to attend Light Reading's 11th annual Future of Cable Business Services event. Join us in New York on November 30 for the premier independent conference focusing on the cable industry's continuing efforts in the commercial services market – all cable operators and other communications service providers get in free.

There is a footprint that will be left by IoT devices whenever they are connected, and this aspect must be considered by the security team. Though the paper uses the example of a smart home, an organization will leave the same kinds of correlatable operational traces by the use of its own IoT devices.

This is the kind of threat avenue that a simple threat model may never consider. Yet, because of its passive nature and its simplicity it may prove to be rather effective.

Mitigation
The researchers have an idea what to do here. They basically want to upset the correlations that could be otherwise derived by inserting dummy network requests at random intervals. Called "traffic shaping," achieving it is not usually a drain on bandwidth as might be feared. For instance, using it on combined audio and video streaming only adds 40KB/s to the overall bandwidth requirements.

This traffic shaping idea may not be the total answer to IoT privacy by any means. But it is a step in the right direction, and shows the kind of innovative and wide-ranging approaches that need to be taken to the IoT for both security and remediation.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.