SlideShare une entreprise Scribd logo
1  sur  36
Architectural Considerations
in Smart Object Networking
IAB RFC 7452
Dave Thaler
Hannes Tschofenig
Mary Barnes (moderator)
1
Some History Behind This Document
• A couple years ago, the IAB observed that:
• Many non-IP-based smart object devices are being made and used
• Various forums exist that defined profiles for non-IP-based devices
• Belief among some of them that IP is too heavyweight
• RFC 6574 (Smart Object Workshop Report), April 2012 recommended IAB develop
architectural guidelines about how to use existing protocols
• It also pointed out some things for the IETF to address
• We wanted a document that explained to device engineers why/when IP should be used
• This RFC 7452 is the result
• Thanks to various IETF folks who provided great feedback
2
Meanwhile, much work happened in parallel
• IETF WGs (6LO, 6TiSCH, ACE, CORE, DICE, LWIG, ROLL, etc.)
• IRTF proposed “Thing-to-Thing” RG
• RFC 7228 “Terminology for Constrained-Node Networks”
• Three classes of constrained nodes, down to <<10KB memory/100KB code
• ZigBee Alliance created ZigBee IP that uses IPv6 and 6LoWPAN
• Bluetooth SIG and IETF worked on IPv6 over BTLE (Bluetooth Smart)
• IP-based alliances expanded (AllSeen, IPSO, OIC, OMA, Thread, etc.)
• And of course the hackers worked overtime too…
3
Headlines
IETF 92 Technical Plenary 4
What’s so special about a “smart object”?
• There’s many types of smart objects, so various answers might
include:
A. It’s very constrained in some way (cost, power, memory, bandwidth, etc.)
B. It interacts directly with physical world even when no user is around, and so
potentially more dangerous
C. It’s physically accessible by untrusted people and so may be more
vulnerable
D. It’s physically inaccessible by trusted people and has a long (5-40yr) lifespan
5
Smart Object Architecture
6
Information &
Data Models
Software Stack
Hardware
• Schema for exposing device-specific properties/methods/notifications/etc.
• Choice of protocols from app layer to link layer
• Choice of radio/other technology (Wi-Fi, Bluetooth, IEEE 802.15.4, …)
IETF typically focuses just on this layer
Internet-connected smart objects are even harder
• Besides all of the other issues, there’s
• Internet protocols to deal with
• Corresponding attacks to deal with
• More privacy issues to deal with (e.g., jurisdiction-specific legal requirements)
7
There’s still tradeoffs of putting IP in smart objects
• If you DO put IP in a smart object:
• You have to devote resources (code/memory/power) to it that might be
desirable for other device functionality
• You have to worry about securing IP from the Internet
• If you DON’T put IP in a smart object:
• You usually need an Application-Layer Gateway (ALG) deployed
• You might end up reinventing things IETF already did
• You can’t leverage the large ecosystem of IP-based knowledge, tools, etc.
8
App
TCP/IP
L2
App
L2
vs.
Four Common Communication Patterns
1. Device-to-device within same network
2. Device-to-cloud
3. Device-to-ALG (to cloud or another local network)
4. Back-end data sharing
9
• Device talks directly to another local device (often smart phone or a wearable)
• Security & trust often based on direct relationship between the devices (pairing)
• Rarely uses IP today but apps instead directly sit over link layer protocol
• Bluetooth, Z-Wave, ZigBee, …
• Such forums often standardize device-specific data models
• Results in many orgs doing somewhat redundant work, with differing
information models for the same type of device
Device-to-Device Pattern
Smart
Object
Local
Network
Other
Device
Beacons
Cadence SensorParrot
Hearing Aid
Examples
StickNFind
Suunto Ambit 3
11
12
Device-to-Cloud Pattern
Internet
Application
Service
Provider
Smart
Object
Local Network
• Device connects directly to some cloud service
• Allows users to access data/device from anywhere
• Requires choosing L2 already widely deployed, e.g. WiFi
• Many different config. bootstrap solutions exist today
• Often service and device are from same vendor
• Can lead to silos with proprietary protocols
• Device might become unusable if ASP goes away or
changes hosting provider
• Standard protocols and/or open source can mitigate
Examples
LittlePrinter
Withings Scale
Tractive
Dropcam 13
Shut down
this month
14
Device-to-ALG Pattern (1/2)
• Typically used in any of these cases:
a) Uses L2 media not already ubiquitous (e.g., 802.15.4)
b) Special local authentication/authorization is required
c) Interoperability needed with legacy non-IP devices
• Often ALG and device are from same vendor
• Another common model is ALG in a smartphone
Internet
Application
Service
Provider
App-
Layer
Gateway
Local Network
Smart
Object
Local
Network
Other
Device
Local
Network
15
Device-to-ALG Pattern (2/2)
• ALG also allows integrating IPv6-only devices
and legacy IPv4-only devices/apps/cloud services
• Cheaper and more reliable generic gateways more likely if devices
use standard protocols not requiring an app-layer gateway
• Lack of standard data models for device types hampers this
Examples of ALGs
Philips Hue
NXP Janet-IP
Revolv Smart Home
Gateway
SmartThings
Nest
16
Example devices with phone as ALG
Zepp Golf
Sensor
Oral-B Toothbrush
Fitbit
Garmin
Forerunner 920XT
17
Back-end Data Sharing Pattern
• Data silos result from proprietary schemas
• Intentionally or simply due to lack of any standardization
• Many usage scenarios need data/devices from multiple sources
• Results in federated cloud services and/or (often RESTful) cloud APIs
• Standard protocols (HTTP, OAuth, etc.) help but are not sufficient
• Standardized information models generally outside scope of IETF
18
IETF 92 Technical Plenary 19
Example
Internet
SmartThings
service
DropCam
service
Cloud APIs
Summary of Lack of Standardization
• Information/data models for various types of smart objects
• Often outside scope of IETF, except for general connectivity models
• There’s lots of other forums in this space
• ”The nice thing about standards is that you have so many to choose from.” –Tanenbaum
• See also http://xkcd.com/927/
• App-layer mechanism to configure Wi-Fi (etc) settings
• WiFi Alliance has WPS but not ubiquitously accepted
• Using browser with web server in device avoids ”need” to standardize
• Still some desire for common mechanisms, but unclear where it best belongs
• Smart objects today often compete on time-to-market
• Standardization seen as too slow
20
Effect on End-to-End
• IAB RFC 1958: “the goal is … intelligence is end to end rather
than hidden in the network”
• But the smallest of constrained devices need “proxies, gateways, or
servers” for Internet communication
• IAB RFC 3724: “Requiring modification in the network … typically
more difficult than modifying end nodes”
• But can be expensive to put a secure software update mechanism in a
smart object
21
Total Cost of Ownership
We care most about this.
… if it results in savings here …
(e.g. sophisticated power management)
But it can make sense to spend more here …
(e.g., on flash/RAM, CPU, BOM)
= + +
Total Cost Hardware Cost Energy Cost Development Cost
(amortized, inc. deployment cost)
… and here.
(e.g. firmware update,
manageability)
More detailed treatment of this topic in a webinar by Peter Aldworth about
“How to Select Hardware for Volume IoT Deployments?”
Which approach to take?
Follow Design Patterns
Learn from Attacks
Following Security
Recommendations
Perform Classical Threat Analysis
Securing the Internet of Things
23IETF 92 Technical Plenary
Areas of Responsibility
Deployment
Implementation
Protocol Specifications and
Architecture
Cryptographic Primitives
Improved algorithms for integer
factorization, too small key size.
No end-to-end security, complexity
in specifications, insecure
authentication protocols
Buffer overflow attacks, poor UI or
other usability problems, poor
choice of hardware
Enabled debug ports, missing
deployment of security mechanisms
Examples of Problems
Understanding the distributed nature of the development process is essential for tackling security problems.
24
IETF 92 Technical Plenary
Security Recommendations (IETF)
• Key management: RFC 4107 discusses the trade-off between manual and
automatic key management and recommends the use of automatic key
management.
• RFC 7258 argues that protocols should be designed such that they make
Pervasive monitoring significantly more expensive or infeasible (such as by
using opportunistic security - RFC 7435).
• draft-iab-crypto-alg-agility argues for the ability to migrate from one
algorithm to another over time (called Crypto Agility).
• Randomness requirements and key length recommendations 
subsequent slide
• Also available are protocol-specific recommendations
• Using TLS in Applications (uta) working group
• DTLS In Constrained Environments (dice) working group
25IETF 92 Technical Plenary
Randomness Requirements
• RFC 4086 – “Randomness Requirements for Security”
• Security protocols frequently use random numbers for
• Nonces for use with authentication and to avoid replay protection
• Key transport
• Asymmetric key generation (e.g., ephemeral Diffie-Hellman key pairs)
• Signature algorithms based on El Gamal
• Unfortunately, most sources of randomness available at laptops and desktop
PCs are not available at embedded systems.
• Startup clock time in nanosecond resolution, input events, disk access timings, IRQ
timings.
• The danger is that there is little (to no) randomness in embedded systems, as
observed by Nadja Heninger et al. and Kenneth Paterson et al.
26IETF 92 Technical Plenary
Key Length Requirements
 The chosen key length impacts security and performance.
 [I-D.ietf-uta-tls-bcp] recommends at least 112 bits symmetric keys.
 A 2013 ENISA report states that an 80bit symmetric key is sufficient
for legacy applications but recommends 128 bits for new systems.
 ECC offers better performance than RSA for the same level of security
taking over-the-wire bandwidth into account.
 For this reason, there is a preference for use of ECC with IoT
protocols.
27IETF 92 Technical Plenary
Learn from Attacks
• Selected attacks to illustrate common problems:
• Limited software update mechanism
• Missing key management
• Inappropriate access control
• Missing communication security
• Vulnerability to physical attacks
• Don’t forget to secure the server-side as well.
According to the Open Web Application Security Project (OWASP) this is
the #1 security vulnerability.
28IETF 92 Technical Plenary
Limited Software Update Mechanism
• In a presentation at the Chaos Communication Congress in December 2014 a security
vulnerability of devices implementing the TR69 protocol, which also provides a
software update mechanism, was disclosed.
• Real problem: Fix released in 2005 by AllegroSoft already but has not been distributed
along the value chain of chip manufacturers, gateway manufacturers, Internet service
providers.
• What happens when vendors do not support certain products anymore? Do IoT devices
need a “time-to-die”/”shelf-life”?
29IETF 92 Technical Plenary
• In January 2014 Bruce Schneier published an article where he expresses concerns
about the lack of software update mechanisms in IoT deployments.
• Example: LIFX - Internet connected light bulb
• The attack revealed that an AES key shared among all devices to simplify key management.
• The firmware image was extracted via JTAG using a Bus Blaster. Then, the firmware was analyzed
using IDA Pro.
• Mistakes only made by startups? See BMW ConnectedDrive
Pictures taken from http://contextis.co.uk/resources/blog/hacking-internet-connected-light-bulbs
30IETF 92 Technical Plenary
Missing Key Management Problem
Insteon LED Bulbs
 To find IoT devices connected to the Internet global scans have been used, for
example, using ZMap.
 Similar problems have been seen with various other appliances, such as
surveillance cameras, baby monitoring cameras and gas stations.
 Lacking access control to configuration files can cause problems for the entire
system, as demonstrated with attacks against industrial control systems.
31IETF 92 Technical Plenary
 Insecure default settings have caused problems with
Insteon LED Bulbs, as reported in
“When 'Smart Homes' Get Hacked: I Haunted A Complete
Stranger's House Via The Internet”
Inappropriate Access Control
• In “Green Lights Forever: Analyzing the Security of Traffic Infrastructure”
Ghena,et al. analyzed the security of the traffic infrastructure.
• Results:
• “The wireless connections are unencrypted and
the radios use factory default usernames and
passwords.”
• “All of the settings on the controller may be configured
via the physical interface on the controller, but they may
also be modified though the network. An FTP connection
to the device allows access to a writable configuration
database. This requires a username and password, but
they are fixed to default values which are published online
by the manufacturer.”
• A similar attack also exploited the unencrypted communication.
• “I even tested the attack launched from a drone flying at over 650 feet, and it worked!”
32IETF 92 Technical Plenary
Missing Communication Security
• Physical access to IoT devices introduces a
wide range of additional attack possibilities.
• In some cases it might be necessary to extract
keys contained on chip. This can be
accomplished using power analysis, or fault
injection (glitching) attacks.
• Tools for physical attacks decrease in cost and
become easier to use.
• Important to keep these attacks in mind since
we will see more of them in the future.
Chip Whisperer
JTAGulator
33IETF 92 Technical Plenary
Vulnerability to Physical Attacks
• Internet of Things security today is like PC security 20 years ago.
• Most attacks on consumer-oriented IoT systems fall under the ”script
kiddie” category.
• For industrial control systems many attacks are already scary
(see DragonFly, and attack against German steel factory).
• Risk analysis is often complex since hacked devices may be used for
further attacks. Hence, indirect consequences also need to be taken into
account.
• Examples: DDoS attacks using SNMP (used in printers),
hacked Femto home router used for spying
34IETF 92 Technical Plenary
Remarks
• RFC 6973 provides generic guidance that is also applicable to IoT
protocol engineering.
• Privacy challenges with the deployment of IoT technologies arise,
such as
• Quality of user consent, and
• Consequences of big data processing and inferences derived from data (such
as behavioral pattern)
• See also Article 29 Working Party publication: "Opinion 8/2014 on the
Recent Developments on the Internet of Things" from September
2014.
IETF 92 Technical Plenary 35
Privacy
• Re-use Internet security technologies:
• Use state-of-the-art key length
• Always use well-analysed security protocols.
• Use encryption to improve resistance against pervasive monitoring.
• Support automatic key management and per-device keys.
• Additional IoT relevant security aspects:
• Crypto agility is a hard decision and you need to think deeply about it.
• Integrate a software update mechanism and leave enough “head room”.
• Include a hardware-based random number generator.
• Threat analysis must take physical attacks into account.
• Use modern operating system concepts to avoid system-wide compromise
due to a single software bug.
36IETF 92 Technical Plenary
Summary

Contenu connexe

Tendances

I.BEST FIRST SEARCH IN AI
I.BEST FIRST SEARCH IN AII.BEST FIRST SEARCH IN AI
I.BEST FIRST SEARCH IN AIvikas dhakane
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer NumericalsManisha Keim
 
Adversarial search
Adversarial searchAdversarial search
Adversarial searchNilu Desai
 
Artificial intelligence- Logic Agents
Artificial intelligence- Logic AgentsArtificial intelligence- Logic Agents
Artificial intelligence- Logic AgentsNuruzzaman Milon
 
Artificial Intelligence: Case-based & Model-based Reasoning
Artificial Intelligence: Case-based & Model-based ReasoningArtificial Intelligence: Case-based & Model-based Reasoning
Artificial Intelligence: Case-based & Model-based ReasoningThe Integral Worm
 
State Space Search in ai
State Space Search in aiState Space Search in ai
State Space Search in aivikas dhakane
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...vtunotesbysree
 
IoT Physical Devices and End Points.pdf
IoT Physical Devices and End Points.pdfIoT Physical Devices and End Points.pdf
IoT Physical Devices and End Points.pdfGVNSK Sravya
 
IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols Nagesh Rao
 
Game Playing in Artificial Intelligence
Game Playing in Artificial IntelligenceGame Playing in Artificial Intelligence
Game Playing in Artificial Intelligencelordmwesh
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxMeghaShree665225
 
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoTDamien Magoni
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io tKunal Bangar
 
Church Turing Thesis
Church Turing ThesisChurch Turing Thesis
Church Turing ThesisHemant Sharma
 

Tendances (20)

I.BEST FIRST SEARCH IN AI
I.BEST FIRST SEARCH IN AII.BEST FIRST SEARCH IN AI
I.BEST FIRST SEARCH IN AI
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer Numericals
 
Adversarial search
Adversarial searchAdversarial search
Adversarial search
 
Data Analytics for IoT
Data Analytics for IoT Data Analytics for IoT
Data Analytics for IoT
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 
Artificial intelligence- Logic Agents
Artificial intelligence- Logic AgentsArtificial intelligence- Logic Agents
Artificial intelligence- Logic Agents
 
Ppt 11 - netopeer
Ppt   11 - netopeerPpt   11 - netopeer
Ppt 11 - netopeer
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
Artificial Intelligence: Case-based & Model-based Reasoning
Artificial Intelligence: Case-based & Model-based ReasoningArtificial Intelligence: Case-based & Model-based Reasoning
Artificial Intelligence: Case-based & Model-based Reasoning
 
State Space Search in ai
State Space Search in aiState Space Search in ai
State Space Search in ai
 
Run time storage
Run time storageRun time storage
Run time storage
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
 
IoT Physical Devices and End Points.pdf
IoT Physical Devices and End Points.pdfIoT Physical Devices and End Points.pdf
IoT Physical Devices and End Points.pdf
 
IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols
 
Game Playing in Artificial Intelligence
Game Playing in Artificial IntelligenceGame Playing in Artificial Intelligence
Game Playing in Artificial Intelligence
 
5 csp
5 csp5 csp
5 csp
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
 
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoT
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io t
 
Church Turing Thesis
Church Turing ThesisChurch Turing Thesis
Church Turing Thesis
 

Similaire à Smart Object Architecture

Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationJisc
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityPaul Morse
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For CybersecurityMohammed Adam
 
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...
OpenStack Infrastructure at any Scale - Simple is BEST!? -  - OpenStack最新情報セミ...OpenStack Infrastructure at any Scale - Simple is BEST!? -  - OpenStack最新情報セミ...
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...VirtualTech Japan Inc.
 
Null mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNull mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNitesh Malviya
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingssuser06ea42
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsJay Bryant
 
From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...P. Taylor Goetz
 
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsRoadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsNetwork Utility Force
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)Mike Svoboda
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsGordon Haff
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxssuser52b751
 
End to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdfEnd to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdfAlvaro Viebrantz
 
Oracle Cloud Networking And Security Exposed
Oracle Cloud Networking And Security Exposed Oracle Cloud Networking And Security Exposed
Oracle Cloud Networking And Security Exposed Riccardo Romani
 
IRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE WorkshopIRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE WorkshopEleni Trouva
 
TLDK - FD.io Sept 2016
TLDK - FD.io Sept 2016 TLDK - FD.io Sept 2016
TLDK - FD.io Sept 2016 Benoit Hudzia
 
Cloud - NDT - Presentation
Cloud - NDT - PresentationCloud - NDT - Presentation
Cloud - NDT - PresentationÉric Dusablon
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptxssuserf7cd2b
 

Similaire à Smart Object Architecture (20)

Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentation
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...
OpenStack Infrastructure at any Scale - Simple is BEST!? -  - OpenStack最新情報セミ...OpenStack Infrastructure at any Scale - Simple is BEST!? -  - OpenStack最新情報セミ...
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...
 
Null mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNull mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmware
 
Cloud Networking Trends
Cloud Networking TrendsCloud Networking Trends
Cloud Networking Trends
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
 
From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...
 
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsRoadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
 
Avoiding cloud lock-in
Avoiding cloud lock-inAvoiding cloud lock-in
Avoiding cloud lock-in
 
End to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdfEnd to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdf
 
Oracle Cloud Networking And Security Exposed
Oracle Cloud Networking And Security Exposed Oracle Cloud Networking And Security Exposed
Oracle Cloud Networking And Security Exposed
 
IRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE WorkshopIRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE Workshop
 
TLDK - FD.io Sept 2016
TLDK - FD.io Sept 2016 TLDK - FD.io Sept 2016
TLDK - FD.io Sept 2016
 
Cloud - NDT - Presentation
Cloud - NDT - PresentationCloud - NDT - Presentation
Cloud - NDT - Presentation
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 

Plus de Hannes Tschofenig

Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesHannes Tschofenig
 
Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Hannes Tschofenig
 
The Role of Standards in IoT Security
The Role of Standards in IoT SecurityThe Role of Standards in IoT Security
The Role of Standards in IoT SecurityHannes Tschofenig
 
Device Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2MDevice Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2MHannes Tschofenig
 
Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Hannes Tschofenig
 
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsPerformance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsHannes Tschofenig
 
Crypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M ProcessorsCrypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M ProcessorsHannes Tschofenig
 
How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?Hannes Tschofenig
 
A guide to make your research less successful
A guide to make your research less successfulA guide to make your research less successful
A guide to make your research less successfulHannes Tschofenig
 

Plus de Hannes Tschofenig (10)

Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
 
Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3
 
The Role of Standards in IoT Security
The Role of Standards in IoT SecurityThe Role of Standards in IoT Security
The Role of Standards in IoT Security
 
Device Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2MDevice Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2M
 
Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0
 
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsPerformance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
 
Crypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M ProcessorsCrypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M Processors
 
UMA for ACE
UMA for ACEUMA for ACE
UMA for ACE
 
How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?
 
A guide to make your research less successful
A guide to make your research less successfulA guide to make your research less successful
A guide to make your research less successful
 

Dernier

Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiMonica Sydney
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Balliameghakumariji156
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsMonica Sydney
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 

Dernier (20)

Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 

Smart Object Architecture

  • 1. Architectural Considerations in Smart Object Networking IAB RFC 7452 Dave Thaler Hannes Tschofenig Mary Barnes (moderator) 1
  • 2. Some History Behind This Document • A couple years ago, the IAB observed that: • Many non-IP-based smart object devices are being made and used • Various forums exist that defined profiles for non-IP-based devices • Belief among some of them that IP is too heavyweight • RFC 6574 (Smart Object Workshop Report), April 2012 recommended IAB develop architectural guidelines about how to use existing protocols • It also pointed out some things for the IETF to address • We wanted a document that explained to device engineers why/when IP should be used • This RFC 7452 is the result • Thanks to various IETF folks who provided great feedback 2
  • 3. Meanwhile, much work happened in parallel • IETF WGs (6LO, 6TiSCH, ACE, CORE, DICE, LWIG, ROLL, etc.) • IRTF proposed “Thing-to-Thing” RG • RFC 7228 “Terminology for Constrained-Node Networks” • Three classes of constrained nodes, down to <<10KB memory/100KB code • ZigBee Alliance created ZigBee IP that uses IPv6 and 6LoWPAN • Bluetooth SIG and IETF worked on IPv6 over BTLE (Bluetooth Smart) • IP-based alliances expanded (AllSeen, IPSO, OIC, OMA, Thread, etc.) • And of course the hackers worked overtime too… 3
  • 5. What’s so special about a “smart object”? • There’s many types of smart objects, so various answers might include: A. It’s very constrained in some way (cost, power, memory, bandwidth, etc.) B. It interacts directly with physical world even when no user is around, and so potentially more dangerous C. It’s physically accessible by untrusted people and so may be more vulnerable D. It’s physically inaccessible by trusted people and has a long (5-40yr) lifespan 5
  • 6. Smart Object Architecture 6 Information & Data Models Software Stack Hardware • Schema for exposing device-specific properties/methods/notifications/etc. • Choice of protocols from app layer to link layer • Choice of radio/other technology (Wi-Fi, Bluetooth, IEEE 802.15.4, …) IETF typically focuses just on this layer
  • 7. Internet-connected smart objects are even harder • Besides all of the other issues, there’s • Internet protocols to deal with • Corresponding attacks to deal with • More privacy issues to deal with (e.g., jurisdiction-specific legal requirements) 7
  • 8. There’s still tradeoffs of putting IP in smart objects • If you DO put IP in a smart object: • You have to devote resources (code/memory/power) to it that might be desirable for other device functionality • You have to worry about securing IP from the Internet • If you DON’T put IP in a smart object: • You usually need an Application-Layer Gateway (ALG) deployed • You might end up reinventing things IETF already did • You can’t leverage the large ecosystem of IP-based knowledge, tools, etc. 8 App TCP/IP L2 App L2 vs.
  • 9. Four Common Communication Patterns 1. Device-to-device within same network 2. Device-to-cloud 3. Device-to-ALG (to cloud or another local network) 4. Back-end data sharing 9
  • 10. • Device talks directly to another local device (often smart phone or a wearable) • Security & trust often based on direct relationship between the devices (pairing) • Rarely uses IP today but apps instead directly sit over link layer protocol • Bluetooth, Z-Wave, ZigBee, … • Such forums often standardize device-specific data models • Results in many orgs doing somewhat redundant work, with differing information models for the same type of device Device-to-Device Pattern Smart Object Local Network Other Device
  • 12. 12 Device-to-Cloud Pattern Internet Application Service Provider Smart Object Local Network • Device connects directly to some cloud service • Allows users to access data/device from anywhere • Requires choosing L2 already widely deployed, e.g. WiFi • Many different config. bootstrap solutions exist today • Often service and device are from same vendor • Can lead to silos with proprietary protocols • Device might become unusable if ASP goes away or changes hosting provider • Standard protocols and/or open source can mitigate
  • 14. 14 Device-to-ALG Pattern (1/2) • Typically used in any of these cases: a) Uses L2 media not already ubiquitous (e.g., 802.15.4) b) Special local authentication/authorization is required c) Interoperability needed with legacy non-IP devices • Often ALG and device are from same vendor • Another common model is ALG in a smartphone Internet Application Service Provider App- Layer Gateway Local Network Smart Object Local Network Other Device Local Network
  • 15. 15 Device-to-ALG Pattern (2/2) • ALG also allows integrating IPv6-only devices and legacy IPv4-only devices/apps/cloud services • Cheaper and more reliable generic gateways more likely if devices use standard protocols not requiring an app-layer gateway • Lack of standard data models for device types hampers this
  • 16. Examples of ALGs Philips Hue NXP Janet-IP Revolv Smart Home Gateway SmartThings Nest 16
  • 17. Example devices with phone as ALG Zepp Golf Sensor Oral-B Toothbrush Fitbit Garmin Forerunner 920XT 17
  • 18. Back-end Data Sharing Pattern • Data silos result from proprietary schemas • Intentionally or simply due to lack of any standardization • Many usage scenarios need data/devices from multiple sources • Results in federated cloud services and/or (often RESTful) cloud APIs • Standard protocols (HTTP, OAuth, etc.) help but are not sufficient • Standardized information models generally outside scope of IETF 18
  • 19. IETF 92 Technical Plenary 19 Example Internet SmartThings service DropCam service Cloud APIs
  • 20. Summary of Lack of Standardization • Information/data models for various types of smart objects • Often outside scope of IETF, except for general connectivity models • There’s lots of other forums in this space • ”The nice thing about standards is that you have so many to choose from.” –Tanenbaum • See also http://xkcd.com/927/ • App-layer mechanism to configure Wi-Fi (etc) settings • WiFi Alliance has WPS but not ubiquitously accepted • Using browser with web server in device avoids ”need” to standardize • Still some desire for common mechanisms, but unclear where it best belongs • Smart objects today often compete on time-to-market • Standardization seen as too slow 20
  • 21. Effect on End-to-End • IAB RFC 1958: “the goal is … intelligence is end to end rather than hidden in the network” • But the smallest of constrained devices need “proxies, gateways, or servers” for Internet communication • IAB RFC 3724: “Requiring modification in the network … typically more difficult than modifying end nodes” • But can be expensive to put a secure software update mechanism in a smart object 21
  • 22. Total Cost of Ownership We care most about this. … if it results in savings here … (e.g. sophisticated power management) But it can make sense to spend more here … (e.g., on flash/RAM, CPU, BOM) = + + Total Cost Hardware Cost Energy Cost Development Cost (amortized, inc. deployment cost) … and here. (e.g. firmware update, manageability) More detailed treatment of this topic in a webinar by Peter Aldworth about “How to Select Hardware for Volume IoT Deployments?”
  • 23. Which approach to take? Follow Design Patterns Learn from Attacks Following Security Recommendations Perform Classical Threat Analysis Securing the Internet of Things 23IETF 92 Technical Plenary
  • 24. Areas of Responsibility Deployment Implementation Protocol Specifications and Architecture Cryptographic Primitives Improved algorithms for integer factorization, too small key size. No end-to-end security, complexity in specifications, insecure authentication protocols Buffer overflow attacks, poor UI or other usability problems, poor choice of hardware Enabled debug ports, missing deployment of security mechanisms Examples of Problems Understanding the distributed nature of the development process is essential for tackling security problems. 24 IETF 92 Technical Plenary
  • 25. Security Recommendations (IETF) • Key management: RFC 4107 discusses the trade-off between manual and automatic key management and recommends the use of automatic key management. • RFC 7258 argues that protocols should be designed such that they make Pervasive monitoring significantly more expensive or infeasible (such as by using opportunistic security - RFC 7435). • draft-iab-crypto-alg-agility argues for the ability to migrate from one algorithm to another over time (called Crypto Agility). • Randomness requirements and key length recommendations  subsequent slide • Also available are protocol-specific recommendations • Using TLS in Applications (uta) working group • DTLS In Constrained Environments (dice) working group 25IETF 92 Technical Plenary
  • 26. Randomness Requirements • RFC 4086 – “Randomness Requirements for Security” • Security protocols frequently use random numbers for • Nonces for use with authentication and to avoid replay protection • Key transport • Asymmetric key generation (e.g., ephemeral Diffie-Hellman key pairs) • Signature algorithms based on El Gamal • Unfortunately, most sources of randomness available at laptops and desktop PCs are not available at embedded systems. • Startup clock time in nanosecond resolution, input events, disk access timings, IRQ timings. • The danger is that there is little (to no) randomness in embedded systems, as observed by Nadja Heninger et al. and Kenneth Paterson et al. 26IETF 92 Technical Plenary
  • 27. Key Length Requirements  The chosen key length impacts security and performance.  [I-D.ietf-uta-tls-bcp] recommends at least 112 bits symmetric keys.  A 2013 ENISA report states that an 80bit symmetric key is sufficient for legacy applications but recommends 128 bits for new systems.  ECC offers better performance than RSA for the same level of security taking over-the-wire bandwidth into account.  For this reason, there is a preference for use of ECC with IoT protocols. 27IETF 92 Technical Plenary
  • 28. Learn from Attacks • Selected attacks to illustrate common problems: • Limited software update mechanism • Missing key management • Inappropriate access control • Missing communication security • Vulnerability to physical attacks • Don’t forget to secure the server-side as well. According to the Open Web Application Security Project (OWASP) this is the #1 security vulnerability. 28IETF 92 Technical Plenary
  • 29. Limited Software Update Mechanism • In a presentation at the Chaos Communication Congress in December 2014 a security vulnerability of devices implementing the TR69 protocol, which also provides a software update mechanism, was disclosed. • Real problem: Fix released in 2005 by AllegroSoft already but has not been distributed along the value chain of chip manufacturers, gateway manufacturers, Internet service providers. • What happens when vendors do not support certain products anymore? Do IoT devices need a “time-to-die”/”shelf-life”? 29IETF 92 Technical Plenary • In January 2014 Bruce Schneier published an article where he expresses concerns about the lack of software update mechanisms in IoT deployments.
  • 30. • Example: LIFX - Internet connected light bulb • The attack revealed that an AES key shared among all devices to simplify key management. • The firmware image was extracted via JTAG using a Bus Blaster. Then, the firmware was analyzed using IDA Pro. • Mistakes only made by startups? See BMW ConnectedDrive Pictures taken from http://contextis.co.uk/resources/blog/hacking-internet-connected-light-bulbs 30IETF 92 Technical Plenary Missing Key Management Problem
  • 31. Insteon LED Bulbs  To find IoT devices connected to the Internet global scans have been used, for example, using ZMap.  Similar problems have been seen with various other appliances, such as surveillance cameras, baby monitoring cameras and gas stations.  Lacking access control to configuration files can cause problems for the entire system, as demonstrated with attacks against industrial control systems. 31IETF 92 Technical Plenary  Insecure default settings have caused problems with Insteon LED Bulbs, as reported in “When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via The Internet” Inappropriate Access Control
  • 32. • In “Green Lights Forever: Analyzing the Security of Traffic Infrastructure” Ghena,et al. analyzed the security of the traffic infrastructure. • Results: • “The wireless connections are unencrypted and the radios use factory default usernames and passwords.” • “All of the settings on the controller may be configured via the physical interface on the controller, but they may also be modified though the network. An FTP connection to the device allows access to a writable configuration database. This requires a username and password, but they are fixed to default values which are published online by the manufacturer.” • A similar attack also exploited the unencrypted communication. • “I even tested the attack launched from a drone flying at over 650 feet, and it worked!” 32IETF 92 Technical Plenary Missing Communication Security
  • 33. • Physical access to IoT devices introduces a wide range of additional attack possibilities. • In some cases it might be necessary to extract keys contained on chip. This can be accomplished using power analysis, or fault injection (glitching) attacks. • Tools for physical attacks decrease in cost and become easier to use. • Important to keep these attacks in mind since we will see more of them in the future. Chip Whisperer JTAGulator 33IETF 92 Technical Plenary Vulnerability to Physical Attacks
  • 34. • Internet of Things security today is like PC security 20 years ago. • Most attacks on consumer-oriented IoT systems fall under the ”script kiddie” category. • For industrial control systems many attacks are already scary (see DragonFly, and attack against German steel factory). • Risk analysis is often complex since hacked devices may be used for further attacks. Hence, indirect consequences also need to be taken into account. • Examples: DDoS attacks using SNMP (used in printers), hacked Femto home router used for spying 34IETF 92 Technical Plenary Remarks
  • 35. • RFC 6973 provides generic guidance that is also applicable to IoT protocol engineering. • Privacy challenges with the deployment of IoT technologies arise, such as • Quality of user consent, and • Consequences of big data processing and inferences derived from data (such as behavioral pattern) • See also Article 29 Working Party publication: "Opinion 8/2014 on the Recent Developments on the Internet of Things" from September 2014. IETF 92 Technical Plenary 35 Privacy
  • 36. • Re-use Internet security technologies: • Use state-of-the-art key length • Always use well-analysed security protocols. • Use encryption to improve resistance against pervasive monitoring. • Support automatic key management and per-device keys. • Additional IoT relevant security aspects: • Crypto agility is a hard decision and you need to think deeply about it. • Integrate a software update mechanism and leave enough “head room”. • Include a hardware-based random number generator. • Threat analysis must take physical attacks into account. • Use modern operating system concepts to avoid system-wide compromise due to a single software bug. 36IETF 92 Technical Plenary Summary

Notes de l'éditeur

  1. So the “gaps IETF should address” were pointed out in parallel with (not in) the document
  2. This animation on this slide is intended to be fast paced, slowing only for the entertainment impact of the points about the toilet and the toy bunny http://www.cnn.com/2013/08/02/tech/innovation/hackable-homes/index.html
  3. Voiceover will omit mention of parenthetical stuff Hannes’s slide also said essentially “Often requires a device-specific app to access full functionality” but I think that’s actually true independent of communication pattern, since devices often want vendor-specific differentiation.
  4. Time budget is 10 seconds or less on this slide. Don’t really need to say anything, just enough time for people to visually see the slide.
  5. Some L2 config solutions by the device acting like an AP until configured May see user demand to unlock/jailbreak smart objects
  6. Time budget is 20 seconds or less on this slide. LittlePrinter as an example of an ASP that went away, so open sourced, as discussed on previous slide. Source: http://littleprinterblog.tumblr.com/post/97047976103/the-future-of-little-printer
  7. Time budget is 10 seconds or less on this slide. Don’t really need to say anything, just enough time for people to visually see the slide.
  8. Time budget is 10 seconds or less on this slide. Don’t really need to say anything, just enough time for people to visually see the slide.
  9. Hannes will talk more about what makes it expensive to secure a smart object, in a minutes…
  10. “We care about this [total cost]” is not always true in enterprises due to bad bureaucracy
  11. Hannes’s slides start here
  12. (RFC 4086)
  13. RFC 4492 & RFC 3766 maps key length of symmetric and asymmetric crypto systems.
  14. Note: OWASP might be biased in their assessment since the organization deals mostly with Web-based vulnerabilities.
  15. Details: Popular embedded web server (called RomPager from AllegroSoft) installed on home gateways that use the TR 69 protocol. Version 4.07 of RomPaper released in 2002 contains various vulnerabilities (buffer overflow, etc.).
  16. MMU is the abbreviation for ”Malfunction Management Unit” – not for Memory Management Unit.