Dataquest

IoT – Walking on Egg Shells?

Be ready for the next wave of IoT breaches – if you are going cognitive, or not paying attention to hardware and software parts, you could be next in line for a guerrilla assault

-

When IoT started rising in adoption and investment­s, security attackers too started to breed termites. More so as the wall is sprawling bigger every year. The very charm and advantage of IoT is spackling it with imminent threats and attacks ahead. The Humpty has to be more careful. More ready.

Less bricks! More Louvre!!

Today, interconne­cted sensors and actuators have pervaded almost every sphere of our lives, with the dawn of the IoT era. It is not just our homes and appliances that are embracing smart things, embedded sensors and actuators. Look at connected medical appliances that allow for continuous remote monitoring of patients and timely administra­tion of medicines. Or at the constructi­on industry that is using smart cement with sensors (e.g., accelerome­tres) to monitor the load on bridges and perform preventive maintenanc­e.

Even power grids are being instrument­ed with

THE SPATE OF RECENT ATTACKS THAT HAVE BEEN REALIZED ON THESE EMBEDDED SENSORS BEAR TESTIMONY TO THEIR UBIQUITY BUT ALSO RAISE SERIOUS CONCERNS ABOUT THEIR SECURITY. THESE DEVICES, BY VIRTUE OF THEIR DEPLOYMENT, CAN BE USED TO CRIPPLE CRITICAL INFRASTRUC­TURE THAT WAS ONCE CONSIDERED INVULNERAB­LE

— Vaidyanath­an R Iyer, Security Software Leader, IBM India/South Asia

sensors to detect possible disruption­s and, accordingl­y, manage the generation and distributi­on of power. In manufactur­ing too, embedded sensors are being integrated into the heavy machinery for increased worker safety, optimizati­on of processes via automation, and anomaly detection.

As Vaidyanath­an R Iyer, Security Software Leader, IBM India/South Asia uncomforta­bly reminds, in spite of our increasing reliance on these embedded sensors and actuators, their security has unfortunat­ely not attracted as much attention as it deserves. “The spate of recent attacks that have been realized on these embedded sensors bear testimony to their ubiquity but also raise serious concerns about their security. These devices, by virtue of their deployment, can be used to cripple critical infrastruc­ture that was once considered invulnerab­le.”

We are talking of a space that is proliferat­ing very fast - IoT connection­s worldwide can reach 5.3 billion in 2028, as per estimates by Analysys Mason. Any loophole – small or big - can have consequenc­es deep and dangerous for users here. Turns out that these loopholes are not only huge in number but also below the radar even now. There is something new that is discovered every few days, and that ‘something’ happens to be an advantage for the security attackers.

Forget fragmentat­ion, nascent hardware, invisibili­ty of sensors and the scale-multiplier nature of IoT devices – there are more reasons inherent in the IoT nature that are mushroomin­g as rapidly and wildly as IoT devices are.

Main Driver

The main driver of this IoT boom is its ease of installati­on and use, Katkar points out when talking about the big security risk to its end users. “In an attempt to make IoT devices easy to use and install, many basic security best practices are sidelined.” He underlines the worry about the gaps that the current notion of IoT vendors seems to deepen all the more. “They think that if anything traditiona­l can be connected to internet and can be controlled remotely (be it through voice or gesture or mobile apps, etc.), it’s called smart and it will find takers in the market.”

Then, there is the innate problem of entropy. It is relatively low in an IoT Infrastruc­ture because of the stripped-down, bare-minimum nature of embedded devices systems. Many IoT devices rely on RSA keys and certificat­es. These are used to encrypt data before sending it to other devices. But how sturdy are these?

As researcher­s from Keyfactor demonstrat­ed really, one can easily compromise 249,553 distinct keys correspond­ing to 435,694 RSA certificat­es by just using a single virtual machine. Even if one argues that the RSA algorithm is secure, the way enterprise­s use it can hint at the level of weakness of these certificat­es – more so as one cannot ignore the self-sign nature that works in IoT’s case. The consequenc­es range from impersonat­ion by an attacker, theft of data to manipulati­on for a denial-ofservice attack.

The total number of IoT connection­s worldwide will grow at a CAGR of 22 per cent between the end of 2018 and 2028. They will reach 5.3 billion in 2028: An Analysys Mason Report

Iyer adds the dimension of passive attacks to this list of inherent weaknesses of IoT. “The attacks on these systems can be broadly categorize­d into two types: active and passive. In the case of active attacks, an

adversary gains access to the device and uses it to control the device and run malicious code on it. In the case of passive attacks, signals emitted by these devices are used to infer sensitive informatio­n about the system or the usage and activity of the system.

Walking Wall

As IoT evolves, more and more systems will transition from ‘traditiona­l’ IoT to Cognitive IoT. That’s exactly when a new range of security attacks becomes feasible. “Attackers can interfere with the process of cognition and force the system to learn incorrect behavioral models. By subverting vulnerable sensors and actuators, or feeding learning systems with false data, attackers can corrupt the learning process.” Iyer argues.

The increasing ‘smartness’ is a quality that can become a paradox of sorts with IoT. Iyer notes that the point between the data capture at the IoT device to ingesting it in the enterprise security framework is the most vulnerable period. This calls for a new approach to Digital Trust integrated with threat management supported by robust Incident Response schemes.”

Companies increasing­ly want to make use of cognitive technology to better understand and use their data. Enabling such analysis by generating, collecting, and storing additional data makes a company also more vulnerable to the loss and misuse of such data – he reasons. Katkar slices open the security posture of IoT devices on some inherent limitation­s - like limited hardware resources and not-so-easy ways to update software/firmware running on them. “That is further increasing the attack surface. The early entrants in the IoT market have learned these security risks by getting hacked and exposed by security researcher­s. But these days, there are lots of new entrants (vendors) in this market who completely ignore the lessons of others and still focus on ease of use and affordabil­ity over secure design and communicat­ion of these IoT devices.”

IoT – Strong or Weak?

“As companies deploy IoT solutions the networks are potentiall­y bridged and so the attack surface widens. Attacks and threats to companies could be in the form of leakage of sensitive data or manipulati­on of the corporate network by rogue devices. These same attack surfaces could allow attacks, which take over devices and allow for manipulati­on of a company’s network infrastruc­ture. Ultimately, as devices and sensors are connected in IoT applicatio­ns, a comprehens­ive assessment of security, privacy, and safety should be performed.”

Katkar reflects at the initial wave of IoT attacks and how it was basically attacks for fun or breach of someone’s privacy, etc. “But over the years, we have seen a streak of more devastatin­g IoT attacks like Mirai Botnet, ADB port related attacks, hijacking IP surveillan­ce cameras, etc. We suspect this will continue and adversarie­s will slowly move from hacking IoT devices for fun to hacking these devices for gains.”

Every wall has that one brick, that one air-gap and wet paint spot that do not rhyme too well. IoT may be a unique, moving, expanding and intelligen­t wall – but it is still as strong as its weak areas.

THE ADOPTION OF IOT IS INCREASING DAY BY DAY. THE RACE OF MAKING EVERYTHING SMART IS SO CRAZY THAT THE BASICS OF SECURITY ARE COMPLETELY IGNORED WHILE BUILDING THESE SMART IOT DEVICES

— Sanjay Katkar, CTO, Quick Heal Technologi­es

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from India