Skip to main content

Secured IoT Devices

Authenticating these devices and their connections

Image Source: Yingyaipumi/Stock.adobe.com

By Jon Gabay for Mouser Electronics

Published April 19, 2022

Introduction

As more devices connect to the globally accessible Internet, there is a growing concern for safety, protection, and privacy. Everything is attainable: phones, laptops, desktops, TVs, home interfaces, and medical devices. Even military systems rely heavily on the IoT, as the Internet helps connect ships, planes, tanks, drones, soldier wearables, and bases to improve operational awareness.

By now, even the everyday consumer is familiar with passwords, person (vs. robot) identification, machine (IP and MAC address) identification, and location identification (through GPS or cellular location). There are more machine-to-machine communications than people-to-people, which means authentication techniques will vary. But as with any connected device, bad players can do a lot of damage to people and property.

With military, governmental, civic, responders, and critical infrastructure online, machines are becoming more vital to authenticate who they are talking to and know that their communications are safe and secure.

While encryption and authentication techniques have gotten more sophisticated, it can be a cat and mouse game. As one safeguard falls, the next layer is imposed.

As a residential user of IoT, facility supervisor, or IoT device designer, it is essential to understand the basics of IoT authentications to protect yourself, your product designs, or your establishments.

What is Safe?

The Internet was never architected to be a secure network. What originated as an information-sharing platform between government research facilities and universities with the Transmission Control Protocol/ Internet Protocol (TCP/IP) using payloads for data, embedded with wrappers to control routing source and destination, has evolved. Data can take multiple paths and even arrive out of sequence, requiring reassembly. Signaling protocols, including passwords, are typically not encrypted or scrambled, and access to a network means access to any device on that network.

The World Wide Web expands threats as wired and wireless networks can be jammed, and IPs and MAC addresses can be spoofed. With the high-speed 5G connectivity, a lot of data can be stolen very quickly.

There are valid reasons to be concerned. It isn't just a garage door opener, Portal, Echo, or Alexa at stake. As our IoT and network-connected technologies continue to advance, lives can halt very quickly. Significant services, networks, and even medical devices have the potential to be compromised.

IoT Screen Door Security

There are many ways into the data stream. IoT devices are particularly vulnerable since, often, they are buried wireless nodes that can be locally jammed and spoofed. Some studies, such as the Palo Alto Networks' IoT Security Threat Report from 2020, say that 98% of IoT traffic is unencrypted, making field equipment cheap and easy to make (Figure 1).

For example, a semi-sophisticated burglar could take control of your alarm system, video camera feeds, and Wi-Fi by jamming and spoofing while sitting in your driveway.

To combat local or endpoint incursions, employ encryption wherever possible. Many devices offer encryption options. In addition to changing passwords and logins, alternate between encryption methods. It is also helpful to review the login histories that devices provide. A review of these logins can alert you if an attempted unauthorized login occurs.

Unfortunately, there are many ways into the data stream network. Non-local incursions ocurr when someone takes control of a wireless router, an access point, a central office switch and router, a wired-to-wireless link transport, or an international funnel router. These attacks are referred to as "Man in the Middle" attacks in which equipment manufacturers leave back doors into their equipment for law enforcement and intelligence services.

 

Figure 1: 98% of IoT traffic is unencrypted, according to Palo Alto Networks' IoT Threat Report. (Source: Gorodenkoff/Adobe Stock)

Insertion into the communications data stream is the most direct way to threaten security. The transmit and receive paths for data are intercepted and manipulated through redirection. Once in the data stream, anonymous spamming, DDoS attacks, and malware can cause the hijacking of a device. Malware can creep in if hackers are clever enough to mimic firmware upgrades that let their code control.

Modern Approaches and Techniques

One-way, or symmetric authentication, is the simple process of offering a username and password for entry into various systems when prompted. Doing so authenticates a user at one end of the network connection. A problem here is that usernames and passwords are gathered and stored in many locations and devices, making this technique somewhat convenient but relatively ineffective for any real security.

With two-way authentication, another layer is added to the username-password requirements. The two nodes in communications need to verify something they possess. This could be an assigned temporary password issued by another pier or even a biometric fingerprint (Figure 2).

Three-way authentication adds more hurdles and requests for verification. The more constraints required, the longer processes become for users. This can deter many time-sensitive applications and users. Public key cryptographic authentication is more secure than usernames and passwords and can be more resilient against brute force attacks.

 

Figure 2: An added layer in the form of biometric fingerprinting. (Source: DG-Studio/AdobeStock)

Cryptographic keys are the de facto mode of authentication in protocols like SSH, which are already widely used in IoT devices. Shared Secret Authentication, which is symmetric, shares private data via secure communications. The technique is effective if there is no intercepted 'man-in-the-middle' attack. Decentralized access and control can make man-in-the-middle attacks more difficult to perform compared to centralized authentication. It is essential to note that secure communication is required to set up a secure transmission.

At a facility, biometrics is an option for manned devices. Fingerprint identification, retinal scans, and facial recognition are all other layers of protection prompted when sensitive data is accessed. This is not feasible for machine-to-machine authentication, however. Machines must rely on cryptographic private and public keys.

Public keys are widely used and are generally safe. Third-party authorities and corporations can be the authority of a digital key certificate or identity certificate. A unique hex string can be generated by running an algorithm like RSA on the certification to authenticate credentials. Individual certificates can be combined as a chain and propagate until they reach a trusted global server.

As with any emerging technology, committees propose standards and practices that assure reliable and safe environments for whatever they are regulating. The X.509 digital certificates issued and controlled by globally trusted certificate authenticity authority are standardized in the IETF RFC5280 specification and prove ownership. The issuer verifies the authenticity and uses a key that supposedly only allows communications with the certificate's owner.

The asymmetric public key cryptosystem adds a higher level of security to dissuade those who may have the means of inserting themselves into the data stream but not real-time horsepower to break a key. Since all data is exposed to sniffers along the chain, it can be recovered and post-processed until a key is determined. This may not allow real-time control and access, but it does mean that no data is sacred, and any data transferred in the network can be broken with enough compute-intensive resources.

Adding hardware to an IoT device can reduce processing requirements and time to validate. With the Trusted Platform Module (TPM) approach, a chip or module can be added to an IoT device to store device-specific keys for authentication. TPMs can be implemented without special hardware, if you devote process resources to the task. This can be included in the firmware or software the IoT device is running. Isolated IoT devices can use Shared Access Signature (SAS) tokens, Uniform Resource Identifiers (URI), for clients that cannot be fully trusted. In this case, access can be to a limited subset of functions to assure a hostile force cannot perform a complete takeover of an IoT device.

Regardless of the tactic, the goal is to prove possession of a key without revealing the key's contents. This allows for validation of each endpoint, the device and remote host memory integrity, and the firmware or software tampering. It is usually conducted using a checksum or CRC for associated blocks of firmware or software.

The Quantum Quandary

As the world of quantum computing heats up, it is now possible for corporations, governments, and even individuals to possess and employ quantum computers to break encryption in real enough time to cause damage. The U.S. government is looking into the risks of blockchain and vulnerabilities pertaining to threats posed by quantum computers.

While it is not feasible to incorporate blockchain protection in a thermostat, it is considered an option for high-security sites. The question remaining is how easy it is to break using quantum computers.

When multiple states of a digital string can be present at once, algorithms, like Shor's algorithm, can be used to factor denominators very quickly. At the heart of cryptography is the ability to use real random numbers from a trustworthy random number generating source. In most cases, pseudo-random number generators are used since generating a valid random number is difficult.

Knowing how many bits are used in the pseudo-random string can significantly reduce the processing required to break a code. Sequential attacks which yield a generated key can be examined to greatly reduce processing time and use statistical algorithms to crack the code even more quickly.

The use of quantum technology to encrypt and protect is not out of the question (Figure 3).  As scientists learn how to entangle photons and electrons with higher stability and endurance, soon quantum encoding will let each endpoint know if anyone is observing or tampering with the data stream. While this seems too far in the future for anyone other than governmental research facilities and universities to witness, already, China has demonstrated a long quantum secured link for critical communications on relay drones that can be deployed quickly and change position when needed.

 

Figure 3: As scientists learn more about quantum tech, added layers of security become possible. (Source: Andrew Derr/AdobeStock)

Conclusions

For endpoint users of a device, many devices can take advantage of encryption. Use it and switch it every so often. Also, change out passwords on a semi-regular basis, using a wide variety of number and letter combinations. Don't be predictable and use the same prefix or suffix on new passwords. This includes local as well as cloud services Also, set up a name and password and encryption for your wired or wireless routers.

For facility managers and security supervisors, set up and use a secure boot through a reliable Root of Trust (RoT). Since remote and distributed software updates can be initiated over a network, a secure device boot is an excellent way to start securing the IoT devices in your realm. A reliable root of trust can use a hardened hardware module to perform attestation (firmware measurements, runtime state analysis, identity reporting, etc.).

A reliable root of trust can also help protect and secure storage. This covers sensitive data areas preventing access. In addition, the Root of Trust can set up a secure state if there is a software failure or error during initialization.

As a designer of IoT devices, understand what is established and in place for interoperability. This can differ for wired versus wireless links. Wireless links need solid Transport Security and Successor Protocols (TSL/SSL), Internet Protocol Security (IPsec), and Private Preshared Keys (PPSK). Wired links need a firewall in addition to IPS security.

As designers, it is also important to know what's coming. One technology to watch is fully homomorphic encryption (FHE). This technique allows multiple additions and multiplications to cypher text while still providing valid results. With HFE, you can work on data without decrypting it, eliminating data theft chances.

We have options and opportunities that continue to grow, but remember, nothing is entirely safe if the data stream can be accessed. Individuals may be very low-priority targets, but the larger targets, once compromised, affect us, especially in times of international turmoil. The IoT world may be growing, but that does not mean it is secure. We must remain vigilant and continue to develop solutions to combat the unforeseen.

About the Author

After completing his studies in electrical engineering, Jon Gabay has worked with defense, commercial, industrial, consumer, energy, and medical companies as a design engineer, firmware coder, system designer, research scientist, and product developer. As an alternative energy researcher and inventor, he has been involved with automation technology since he founded and ran Dedicated Devices Corp. up until 2004. Since then, he has been doing research and development, writing articles, and developing technologies for next-generation engineers and students.

Profile Photo of Jon Gabay