L10 Flashcards
Potential security threats for IoT
- Cloning of smart objects
- Malicious substitution of smart things
- Firmware attacks
- Extraction of security parameters
- Man-in-the-middle attakcs during key exchange
- Routing attacks
- Same threats as internet
Compare IoT and internet protocol stack
IoT
- CoAP (constrained application protocol)
- UDP (for close networks)
- 6LowPAN
- MAC
- PHY
Internet
- HTTP
- TCP
- IP
- MAC
- PHY
Main characteristic of CoAP used in IoT
Has very restricted formats for security reasons
Compare secure IoT and internet protocol
IoT
- CoAPs (constrained application protocol)
- DTLs
- IP/TPSec
- MAC
- PHY
Internet
- HTTP
- TLS
- IP/IPSec
- MAC
- PHY
Draw schematic of symmetric-key cryptographic algorithm (SKA) (L10 5)
write
Mention some example of IoT ecosystem security attacks
- Network layer: sniffing attack
- Application layer: DoS attack, worm-virus attack
- Perception layer: node replication attack, jamming attack, DoS attack, wormhole attack, information routing attack
What is a wormhole attack?
It creates an unauthenticated channel between two points
Advantages of hardware security
- software authentication is not the most efficient way
- physical functions cannot be copied or altered by external attackers
- useful in: identity, military, automotive
Main ideas of physical unclonable functions PUFs
- offer DNA-like identification techniques
- unpredictable and unclonable properties, impossible to regenerate, model or alter
- classified into: non-electronic, analog electronics, delay-based, memory-based
Describe in more detail PUF classifications
- Non-electronic: optical, paper, CD, RF-DNA, magnetic
- analog electronic: CMOS Vt, coating, LC
- delay-based: arbiter, ring oscillators
- memory-based: S-ram, butterfly, latch
Explain basic idea of coating PUFs (L10 12)
- a conductive structure is designed for example to create an intentional capacitance
- by measuring the capacitance the object can be identified
Main ideas of physical obfuscated keys (POKs)
- key is permanently stored in a physical way instead of digital memory
- any invasive attack will permanently destroy the key
Cause of variations on PUFs
- non-uniform conditions during fabrication
- variations in process parameters (oxide thickness)
- aging effects
- variation in dimensions of devices
- ambient effects (i.e. temperature)
- variation in circuit characteristics