Supplier eBooks

Digi - Simplified Connectivity

Issue link: https://resources.mouser.com/i/1442769

Contents of this Issue

Navigation

Page 21 of 24

22 Distributed Denial of Service (DDoS) attacks are becoming more and more prevalent. These attacks may not necessarily be targeted at the average IoT edge device but a hijacking of a connected IoT edge device may be used to create a 'BotNet', a group of hijacked devices working together to work in unison to attack a central point on the IoT network or an external server/ computer outside of the local network. Even if these attacks are not targeted at the local IoT network, they still pose multiple problems by preventing regular IoT work to take place or even simply draining the battery on a mobile IoT edge device creating maintenance cost for the administrators leaving them wondering why the battery didn't last longer. Security is a Balance Between Economic Cost and Benefit Given enough time, money and expertise any system can be hacked, so it is important to design a system to deter an attacker by making it uneconomic (i.e. the cost or effort of an attack far outweighs any benefit to an attacker). Types of attacks can be classified in terms of investment, the type of attacker and equipment used. These range from: • Expensive invasive attacks (such as reverse engineering, or sophisticated micro probing a chip) • To lower cost: Passive software attacks (exploiting unintentional security vulnerabilities in the code) Communication attacks (e.g. exploiting weaknesses in the internet protocols, crypto, or key handling) Security is always a balance between economic cost and benefit, dependent upon the value of assets on the one hand and the cost of security features on the other. The success of the IoT will depend on data and services being protected, and when the security balance is right, it can open up new opportunities and markets. The 10 Security Techniques Every Iot Designer Should Consider Confidentiality The of Service Data Integrity Embedded Solution This intrusion exposes sensitive or confidential information, including the viewing of data in the actual device or the the/cloning of device firmware itself. The criminal uses authentication weaknesses or failures to enable unauthorized devices to access data or services. Or, an upgrade feature is unlocked without authorization. A corruption of information where unauthorized messages are introduced into a network or control of a device is taken over by an unauthorized party. Availability A denial-of-service attack prevents the device from sending messages by flooding it with hostile tra•ic. 1 2 3 4 Method Complexity, Resources Needed Notes Packet Encryption Low Foundation for most embedded system security Replay Protection Low Prevents resubmission of recorded messages Message Authentication Code Low Prevents messages from being changed Port Protection Low Secures ports that may be physically accessed by an attacker Secure Bootloader Moderate Ensures only authorized firmware is allowed to run Pre-Shared Keys Low Preferred for smaller systems SSH High Generally on OS-based systems; can prevent malicious connections Public Key Exchange High Generally on OS-based systems; can prevent malicious connections TLS High Generally on OS-based systems; can prevent malicious connections WPA2 High Generally on OS-based systems; can prevent malicious connections Communication Attacks Man in the Middle Weak RNG Code Vulnerabilities Non-Invasive HW Attacks Side Channels (DEMA, DPA) Physical Access to Device: JTAG, Bus Probing, IO Pins, etc. Val ue t o Att acker Cost / Eort to Secure Cost / Eort to Attack Invasive HW Attacks Well Resourced and Funded Unlimited Time, Money & Equipment Soware Attacks Malware Social Engineering Man in the Middle Weak RNG Code Vulnerabilities Malware Social Engineering Well Resourced and Funded Unlimited Time, Money & Equipment Side Channels (DEMA, DPA) Physical Access to Device: JTAG, Bus Probing, 10 Pins, etc. Communications Attacks Software Attacks Invasive HW Attacks Cost/Effort to Attack

Articles in this issue

view archives of Supplier eBooks - Digi - Simplified Connectivity