Lecture 8 - IoT Analytics and Security
Lecture 8 - IoT Analytics and Security
Winter 2023
INST560 Internet of
Things
Internet of Things
Analytics and Security
Professor Aliakbar Jalali
aliakbar.jalali@live.uona.edu
Lecture 8
/59
Contents
UoNA-INST560 – Internet of Things (IoT)
• Introduction
• IoT Security
• Conclusion
• References
2 /59
Introduction: Major Components of IoT + Security
UoNA-INST560 – Internet of Things (IoT)
IoT SECURITY
+
3 /59
UoNA-INST560 – Internet of Things (IoT)
Introduction: IoT Data Analytics
4 /59
Introduction: IoT Analytics
UoNA-INST560 – Internet of Things (IoT)
7 /59
IoT Data Analytics
UoNA-INST560 – Internet of Things (IoT)
https://www.rfpage.com/what-are-the-major-components-of-internet-of-things/ 8 /59
IoT Data Analytics
UoNA-INST560 – Internet of Things (IoT)
• Big enterprises use the massive data collected from IoT devices
and utilize the insights for their future business opportunities.
12 /59
UoNA-INST560 – Internet of Things (IoT)
https://www.rfpage.com/what-are-the-major-components-of-internet-of-things/ 13 /59
IoT Analytics: Customer Product Utilization Analysis for Marketing
UoNA-INST560 – Internet of Things (IoT)
14 /59
Topics for Internet of Things Analytics
UoNA-INST560 – Internet of Things (IoT)
• You can query materialized views with simple SQL statements to gain real-time
data insights, leverage data value, and make instant business decisions.
• Smart city applications of IoT analytics, such as traffic management and energy
optimization.
• Data Collection: The sheer volume of data generated by IoT devices can be overwhelming,
making it a challenge to collect and store data efficiently.
• Data Quality: The data generated by IoT devices may be incomplete, inaccurate, or
inconsistent.
• Real-Time Analytics: IoT devices generate data in real-time, which means that the analytics
must also be performed in real-time to be effective.
• Security: IoT devices are often connected to a network, which makes them vulnerable to cyber
attacks.
• Integration with Legacy Systems: Many organizations have legacy systems that may not be
compatible with IoT devices or analytical IoT systems.
• Scalability: As the number of IoT devices continues to grow, analytical IoT systems must be
able to scale to accommodate the increasing amount of data generated.
• Interpretation and Visualization: Analyzing large amounts of data generated by IoT devices can
be challenging, and interpreting the data in a meaningful way may require specialized skills.
23 /59
Introduction: IoT Security
UoNA-INST560 – Internet of Things (IoT)
24 /59
Major Components of Internet of Things
UoNA-INST560 – Internet of Things (IoT)
IoT SECURITY
+
25 /59
Introduction: IoT Security
UoNA-INST560 – Internet of Things (IoT)
26 /59
Introduction to IoT Security (1/6)
UoNA-INST560 – Internet of Things (IoT)
IoT Security is an
on-demand cloud
subscription
service designed
to discover and
protect the
growing number
of connected
“things” on your
network.
https://docs.paloaltonetworks.com/iot/iot-security-admin/iot-security-overview/introduction-to-iot-security 27 /59
Introduction to IoT Security (2/6)
UoNA-INST560 – Internet of Things (IoT)
• IoT security is the practice that keeps your IoT systems safe.
• IoT security tools protect from threats and breaches, identify and monitor risks
and can help fix vulnerabilities.
• IoT security ensures the availability, integrity, and confidentiality of your IoT
solution.
• Unlike IT devices such as laptop computers that perform a wide variety of tasks,
IoT devices tend to be purpose-built with a narrowly defined set of functions.
• Using machine learning and AI, IoT Security recognizes these behaviors and
identifies every device on the network, creating a rich, context-aware inventory
that’s dynamically maintained and always up to date.
28 /59
Introduction to IoT Security (3/6)
UoNA-INST560 – Internet of Things (IoT)
30 /59
Introduction to IoT Security (4/6)
UoNA-INST560 – Internet of Things (IoT)
• IoT Security looks at over 200 parameters in network traffic metadata, including DHCP
option 55 parameter lists, HTTP user agent IDs, protocols, protocol headers, and a host of
others.
• It matches the network traffic patterns of new devices with those of previously identified
devices to identify the same types or similar types of devices, even those it is
encountering for the first time.
• Depending on various factors such as how much network traffic IoT devices generate and
how varied their behavior patterns are, IoT Security typically identifies most IoT devices
with a high level of confidence during the first day it starts accessing metadata from the
logging service.
• After that, IoT Security continues to increase the number of confidently identified devices
until it identifies all or nearly all of them.
• During this time, you can log in to the IoT Security portal to check that the device
inventory is being populated and monitor its progress.
32 /59
Introduction to IoT Security (6/6)
UoNA-INST560 – Internet of Things (IoT)
34 /59
What is "IoT Security"
UoNA-INST560 – Internet of Things (IoT)
45 /59
IoT Security/Privacy Weaknesses
UoNA-INST560 – Internet of Things (IoT)
• No Transport Encryption
• Backdoors
• Limited Resources
• IoT devices are not meant to perform the tasks of a full computer but connect to a
network & enhance the device’s primary functionality.
• As a result, IoT devices are built with far less processing power, energy, memory,
and communications bandwidth than traditional computers.
• While it’s obviously unreasonable to expect smart lightbulbs to have the capacity
of a desktop tower, the current situation renders many standard cybersecurity
techniques effectively unusable
• IoT devices and cybersecurity must meet in the middle, improving hardware and
developing lighter weight variants of cybersecurity mainstays.
47 /59
IoT Security/Privacy Weaknesses
UoNA-INST560 – Internet of Things (IoT)
• Financial Incentives
• IoT device developers may have significant financial incentive not to make
the needed improvements; security costs money, which raises the price of
their products, meaning their competitors can undercut them.
• Security and privacy can be selling points, but that requires a certain level of
security consciousness in the general public, which is often lacking for new
fields like IoT; after all, who ever heard of hacking a lightbulb?
• Many IoT devices offer users little ability to see “backstage” and review its functionality.
• This makes it difficult to keep track of data collection or the warning signs of a
compromise.
• Devices have also been built in a way that makes updating or upgrading almost
impossible.
• Example: Fiat issued a recall of 1.4 million cars due to a security flaw.
• The bug could only be patched by either taking the car to the dealership or doing it
yourself with a USB.
• This no doubt led many to simply ignore it, as nothing was visibly wrong with the car.
49 /59
IoT Security/Privacy Weaknesses
UoNA-INST560 – Internet of Things (IoT)
• IoT Heterogeneity
• IoT is a relatively young field, with several technical factors that prevent direct
importation of proven cybersecurity standards.
• Further, the lack of standards has led to a wide array of closed-source “black
box” systems, creating more security development problems as well as
encouraging “security through obscurity” policies, which have long been
discredited.
• This is not a IoT specific issue; many tech engineers neglect privacy or
don’t consider it part of their job.
51 /59
What is trust in IoT?
UoNA-INST560 – Internet of Things (IoT)
55 /59
UoNA-INST560 – Internet of Things (IoT)
Security Best Practices (4/4)
56 /59
Physical Security (1/3)
UoNA-INST560 – Internet of Things (IoT)
60 /59
Challenges of Securing IoT devices (1/2)
UoNA-INST560 – Internet of Things (IoT)
62 /59
Safe Wi-Fi Usage (1/3)
UoNA-INST560 – Internet of Things (IoT)
64 /59
UoNA-INST560 – Internet of Things (IoT)
Safe Wi-Fi Usage (3/3)
65 /59
UoNA-INST560 – Internet of Things (IoT)
Protected Devices (1/2)
66 /59
UoNA-INST560 – Internet of Things (IoT)
Protected Devices (2/2)
67 /59
Top 10 IoT vulnerabilities
UoNA-INST560 – Internet of Things (IoT)
https://www.wired.com/2015/07/hackers- https://www.forbes.com/sites/
remotely-kill-jeep-highway/ leemathews/2021/02 /15/florida-
water-plant-hackers-exploited-
oldsoftware-and-poor-password-
https://courses.sidnlabs.nl/ssi-2022/slides/lecture2.pdf habits/
69 /59
UoNA-INST560 – Internet of Things (IoT)
Components of IoT Security
70 /59
IoT Security Challenges
UoNA-INST560 – Internet of Things (IoT)
• Several of the areas within the topic of security that the Internet of
Things intersects, there's of course, cyber security related to the IoT
devices themselves.
• In the case of wearables, devices are always on, and they're always on you,
and they're Gathering potentially sensitive data such as location, Health vitals
notifications Etc.
• This makes the data potentially very personal that device is collecting and
that's traversing the network it's connected to, and unlike conventional
computers that you know maybe collect dust on a desk somewhere connected
vehicles and Internal medical devices present unique security challenges and
considerations, because human safety is also affected by their unimpeded
operation and integrity.
• So, when your heart know is connected to the internet, hackers hacking your
bank, might be the least of your worries because your kind of walking around
thinking is this device inside of me secure, and what happens if it gets
intruded.
78 /59
IoT Security Challenges
UoNA-INST560 – Internet of Things (IoT)
• So, we need to consider that those actuators could become the hands
and feet of an attacker and that's essentially the gist of why there are
some unique considerations with IoT security, because IoT security
really intersects physical security and sometimes human safety.
79 /59
IoT Security Challenges
UoNA-INST560 – Internet of Things (IoT)
• So, that kind of takes us into other areas for opportunities, for
Innovation, unfortunately you know as we usually hear about
these worst-case scenarios, the badness of IoT security, or the
challenges.
• Those conversations don’t really do IoT justice, for how IoT can
actually play an important role in enhancing the lives of people.
• This includes enhancing their security and safety.
• The ubiquity of IoT, which can present security challenges also
means that IoT has a unique viewpoint on our environments,
and lives.
83 /59
IoT Security Challenges
UoNA-INST560 – Internet of Things (IoT)
• Moreover at least, once you get past, like basic level security like firewalling, isolation
keeping systems patched, things like that, many cyber security incidents, can actually
be prevented if there’s additional context available during authentication and
authorization.
• So, everyone's probably familiar with like two-factor authentication for example, where
we're using our phone, or a little code generator, and when we log into a bank, we log
into our email, we're presented with a prompt for a password, but also this two-factor
auth code right, that's a perfect example of this idea of having additional context.
• So, in the case of two-factor authentication, you pair something you know like a
password with something you have like a phone or a code generator.
• So that A system can differentiate between a mirror imposter, who stole your password
from the actual you, okay.
• So, kind of taking this a little further and back to IoT, here's a really interesting
example that I like.
85 /59
IoT Security Challenges
UoNA-INST560 – Internet of Things (IoT)
• So, from at least, as back as at least as early as 2016 possibly, a little bit
earlier than that, some banks started looking at consumer cellular providers,
to see if they could coordinate their data, their intense amounts of data,
about consumer Behavior, to help prevent credit card fraud.
• They realized that, can the consumer usually have their phone on them, or
near them, and that even knowing that Rough Country, or rough area of a
cell tower that a person's phone was connected to, at the time of a credit
card transaction.
• Having that information, it could be very useful context, with that additional
location context, Banks could compare that to the location of a merchant,
and basically get a very good sense of if this transaction looked like that of a
stolen card, or card number or is it occurring somewhere in the vicinity of
where this consumer is located.
86 /59
IoT Security Challenges
UoNA-INST560 – Internet of Things (IoT)
87 /59
Major Components of IoT – User Interface
UoNA-INST560 – Internet of Things (IoT)
IoT SECURITY
+
88 /59
IoT User interfaces
UoNA-INST560 – Internet of Things (IoT)
https://www.rfpage.com/what-are-the-major-components-of-internet-of-things/ 89 /59
User interfaces
UoNA-INST560 – Internet of Things (IoT)
• The IoT will fundamentally reshape our lifestyles and social relationships.
• The effect on the economy is already tangible, even if the IoT is still in its
infancy.
• The correct solutions for IoT security and privacy depends on the size of
ecosystems that you are designing and what kind of connections, data
and devices are involved.
• Model-driven development of user interfaces for IoT systems via domain-specific components
and patterns
• https://jisajournal.springeropen.com/articles/10.1186/s13174-017-0064-1
• https://www.youtube.com/watch?v=zl2ZbdSeQVY&t=171s
• https://www.youtube.com/watch?v=pKfDqI92hws
• Help Net Security, “Flaws in the design of IoT devices”, May 7, 2019
https://www.helpnetsecurity.com/2019/05/07/iot-design-flaws-identified/
• https://courses.sidnlabs.nl/ssi-2022/slides/lecture2.pdf
93 /59