This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:iot-reloaded:hardware_and_cybersecurity [2024/12/03 19:40] – [IoT hardware attacks] ktokarz | en:iot-reloaded:hardware_and_cybersecurity [2024/12/10 21:44] (current) – pczekalski | ||
---|---|---|---|
Line 10: | Line 10: | ||
* In some IoT deployments, | * In some IoT deployments, | ||
* Since the communication between the IoT devices and between the IoT devices and the access point or gateway is through wireless radio communication channels, the IoT devices are vulnerable to jamming attacks designed to force them to deplete their stored energy rapidly. | * Since the communication between the IoT devices and between the IoT devices and the access point or gateway is through wireless radio communication channels, the IoT devices are vulnerable to jamming attacks designed to force them to deplete their stored energy rapidly. | ||
- | * IoT devices are also vulnerable to flooding attacks designed to flood IoT devices with benign or useless packets so that they will spend more energy processing these useless packets, rapidly depleting their stored energy and eventually shutting down the device. | + | * IoT devices are also vulnerable to flooding attacks designed to flood IoT devices with benign or useless packets, so they will spend more energy processing these useless packets, rapidly depleting their stored energy and eventually shutting down the device. |
* Since IoT devices are relatively easy to infect with malware, they are vulnerable to a kind of malware attack in which the attacker infects the device with malware that forces the device to perform more computations, | * Since IoT devices are relatively easy to infect with malware, they are vulnerable to a kind of malware attack in which the attacker infects the device with malware that forces the device to perform more computations, | ||
- | * Another type of IoT hardware vulnerability is route poisoning, in which the attacker creates routing loops, turns some devices into sinkholes, or increases routing paths to force the devices to spend more energy and eventually deplete their energy, reducing the lifetime of some of the devices in the network. | + | * Another type of IoT hardware vulnerability is route poisoning, in which the attacker creates routing loops, turns some devices into sinkholes, or increases routing paths to force the devices to spend more energy and eventually deplete their energy, reducing the lifetime of some devices in the network. |
* IoT devices can easily be infected and turned into botnets, which can then be used to conduct sophisticated large-scale attacks, such as distributed denial of service attacks, which can paralyse IT assets (servers and gateways). | * IoT devices can easily be infected and turned into botnets, which can then be used to conduct sophisticated large-scale attacks, such as distributed denial of service attacks, which can paralyse IT assets (servers and gateways). | ||
* Another IoT hardware vulnerability is the lack of visibility. Many IoT devices are deployed without appropriate identification numbers (IP addresses), creating blind spots because the devices are not visible to security monitoring tools and can be exploited. Also, the fact that various devices may have different protocols makes monitoring all the devices within the network challenging, | * Another IoT hardware vulnerability is the lack of visibility. Many IoT devices are deployed without appropriate identification numbers (IP addresses), creating blind spots because the devices are not visible to security monitoring tools and can be exploited. Also, the fact that various devices may have different protocols makes monitoring all the devices within the network challenging, | ||
- | * An inefficient firmware verification mechanism allows tampering with or reverse-engineering the firmware, making the device vulnerable to attacks. Attackers may illegally update | + | * An inefficient firmware verification mechanism allows tampering with or reverse-engineering the firmware, making the device vulnerable to attacks. Attackers may illegally update the device's firmware |
* Due to poor device management strategies, some organisations or individuals sometimes fail to attend to some devices to ensure that they are well-secured (failing to install necessary updates and patch security holes to gaps), leaving them vulnerable to attacks from cybercriminals. | * Due to poor device management strategies, some organisations or individuals sometimes fail to attend to some devices to ensure that they are well-secured (failing to install necessary updates and patch security holes to gaps), leaving them vulnerable to attacks from cybercriminals. | ||
* Some hardware security vulnerabilities are hard to eliminate, such as side-channel attacks, reverse engineering of the hardware, malware infection, and data extraction, which could be exploited and result in a data breach. | * Some hardware security vulnerabilities are hard to eliminate, such as side-channel attacks, reverse engineering of the hardware, malware infection, and data extraction, which could be exploited and result in a data breach. | ||
Line 25: | Line 25: | ||
IoT hardware attacks are the various ways that security weaknesses resulting from limitations in IoT hardware can be exploited to compromise the security of IoT data and systems. An attacker may install malware on IoT devices, manipulate their functionality, | IoT hardware attacks are the various ways that security weaknesses resulting from limitations in IoT hardware can be exploited to compromise the security of IoT data and systems. An attacker may install malware on IoT devices, manipulate their functionality, | ||
- | * Unauthorised access: Some IoT device manufacturers use weak or no security mechanisms to minimise manufacturing costs and reduce the time to market to meet the increase in market demand. They sometimes do not provide mechanisms for necessary updates to patch up security holes. Some create backdoors for remote servicing, which malicious hackers can exploit. In contrast, others use default or no passwords, making it easier for attackers to access | + | * Unauthorised access: Some IoT device manufacturers use weak or no security mechanisms to minimise manufacturing costs and reduce the time to market to meet the increase in market demand. They sometimes do not provide mechanisms for necessary updates to patch up security holes. Some create backdoors for remote servicing, which malicious hackers can exploit. In contrast, others use default or no passwords, making it easier for attackers to access and exploit |
* Emulation of fake IoT devices: A third party that knows the communication protocol could develop software to emulate standard functionalities between IoT devices and then get the leverage to share false information. | * Emulation of fake IoT devices: A third party that knows the communication protocol could develop software to emulate standard functionalities between IoT devices and then get the leverage to share false information. | ||
* Identity Theft: An attacker could steal the identification of legitimate devices and then perform malicious actions within the network without being identified. | * Identity Theft: An attacker could steal the identification of legitimate devices and then perform malicious actions within the network without being identified. | ||
Line 34: | Line 34: | ||
* Vampire attacks: In this kind of attack, an attacker tries to increase the energy consumption of a battery-powered IoT device significantly, | * Vampire attacks: In this kind of attack, an attacker tries to increase the energy consumption of a battery-powered IoT device significantly, | ||
* Routing attacks: An attacker may manipulate the routing information of the devices to create routing loops, selectively forward packets or intend to use longer routes to increase energy consumption. Some routing attacks include sinkholes, selective forwarding, wormholes, and Sybil attacks ((A. Rayes, S. Salam, Internet of Things-From Hype to Reality, Springer Nature, 2017.)). | * Routing attacks: An attacker may manipulate the routing information of the devices to create routing loops, selectively forward packets or intend to use longer routes to increase energy consumption. Some routing attacks include sinkholes, selective forwarding, wormholes, and Sybil attacks ((A. Rayes, S. Salam, Internet of Things-From Hype to Reality, Springer Nature, 2017.)). | ||
- | * Jamming attacks: A denial of service attack in a shared wireless communication channel where a user may prevent other users from using the shared channel ((S. Yan-Qiang, W. Xiao-dong, Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice, DOI: 10.4018/ | + | * Jamming attacks: A denial of service attack in a shared wireless communication channel where a user may prevent other users from using the shared channel ((S. Yan-Qiang, W. Xiao-dong, Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice, DOI: 10.4018/ |
* Brut-force attacks: This kind of attack is aimed at obtaining the login credentials of the detail to gain unauthorised access to the device. For devices with fault passwords, commonly used passwords (e.g., admin), or weak passwords, attackers can access these credentials and use them to gain illegal access to IoT devices. | * Brut-force attacks: This kind of attack is aimed at obtaining the login credentials of the detail to gain unauthorised access to the device. For devices with fault passwords, commonly used passwords (e.g., admin), or weak passwords, attackers can access these credentials and use them to gain illegal access to IoT devices. | ||
* DoD/DDoD attacks: Because adequate security mechanisms are not implemented to harden the security of IoT devices, they can easily be compromised. Many IoT devices can constitute an army of botnets to conduct DDoS attacks to saturate the buffers and other resources in the access points, fog nodes and cloud platforms. | * DoD/DDoD attacks: Because adequate security mechanisms are not implemented to harden the security of IoT devices, they can easily be compromised. Many IoT devices can constitute an army of botnets to conduct DDoS attacks to saturate the buffers and other resources in the access points, fog nodes and cloud platforms. | ||
* Packet collision attacks: This attack is typical in IoT applications where the devices share the wireless communication channel. An attacker can capture some of the devices and then use them to create packet collisions in the communication channel to disrupt the communication and force the devices to consume more energy by trying to transmit packets multiple times and increase the time the devices stay awake to perform communication (or decreases the sleep time of the device). This kind of attack is a type of energy depletion attack. | * Packet collision attacks: This attack is typical in IoT applications where the devices share the wireless communication channel. An attacker can capture some of the devices and then use them to create packet collisions in the communication channel to disrupt the communication and force the devices to consume more energy by trying to transmit packets multiple times and increase the time the devices stay awake to perform communication (or decreases the sleep time of the device). This kind of attack is a type of energy depletion attack. | ||
- | * Physical attack on the device: An IoT device may be physically manipulated to extract vital information | + | * Physical attack on the device: An IoT device may be physically manipulated |
===== IoT hardware security ===== | ===== IoT hardware security ===== | ||
Line 44: | Line 44: | ||
It is tough to eliminate IoT hardware vulnerabilities due to the hardware resource constraint of IoT devices. Some of the measures for securing IoT devices and mitigating the risk posed by IoT security vulnerabilities include the following: | It is tough to eliminate IoT hardware vulnerabilities due to the hardware resource constraint of IoT devices. Some of the measures for securing IoT devices and mitigating the risk posed by IoT security vulnerabilities include the following: | ||
* Implementing lightweight encryption schemes on IoT devices: The data stored in the IoT devices (e.g., device authentication data and other sensitive data) should be encrypted to ensure its confidentiality and integrity are not compromised. The IoT data should be encrypted before being transmitted through any transmission medium. Since traditional cryptographic algorithms are computationally expensive and require strong and energy-hungry computing systems, it is preferable to implement lightweight cryptographic algorithms that require relatively less energy. | * Implementing lightweight encryption schemes on IoT devices: The data stored in the IoT devices (e.g., device authentication data and other sensitive data) should be encrypted to ensure its confidentiality and integrity are not compromised. The IoT data should be encrypted before being transmitted through any transmission medium. Since traditional cryptographic algorithms are computationally expensive and require strong and energy-hungry computing systems, it is preferable to implement lightweight cryptographic algorithms that require relatively less energy. | ||
- | * Implementing robust authentication mechanisms on IoT devices: | + | * Implementing robust authentication mechanisms on IoT devices: |
* Configuring firewalls to protect devices from traffic-based attacks: The network' | * Configuring firewalls to protect devices from traffic-based attacks: The network' | ||
* Ensure that the software and hardware components are not compromised: | * Ensure that the software and hardware components are not compromised: |