IoTAA Security Guideline V1.0
IoTAA Security Guideline V1.0
SECURITY GUIDELINE
Internet of Things Security Guideline V1.0
This Guideline was developed by Workstream 5 Security and Network Resilience of the
IoT Alliance Australia (IoTAA) – http://www.iot.org.au/
Disclaimers
1) Notwithstanding anything contained in this Guideline:
a) Internet of Things Alliance Australia, (IoTAA) disclaims responsibility (including where IoTAA or any of
its officers, agents or contractors has been negligent) for any direct or indirect loss, damage, claim or
liability any person may incur as a result of any:
i) reliance on or compliance with this Guideline;
ii) inaccuracy or inappropriateness of this Guideline; or
iii) inconsistency of this Guideline with any law; and
b) IoTAA disclaims responsibility (including where IoTAA or any of its officers, agents or contractors has
been negligent) for ensuring compliance by any person with this Guideline.
2) The above disclaimers will not apply to the extent they are inconsistent with any relevant legislation.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Malcolm Shore
Outgoing Chair
Workstream 5 Security and Network Resilience, IoT Alliance Australia (IoTAA)
February 2017
4.
PRIVACY 15
4.1
Privacy Principles 15
4.2
Trust Framework 16
5
SECURITY 19
5.1
Security Principles 19
5.2
Application Layer 20
5.3
Routing Layer 21
5.3.1
6LoWPAN 22
5.3.2
ZigBee 22
5.3.3
LoRaWAN 22
5.3.4
Sigfox 23
5.3.5
NB-IoT 23
5.4
Physical and Media Access Control Layers 23
5.5
Hardware Security 24
6
DOMAIN VIEWPOINTS 26
6.1
Consumer Domain 26
6.2
Industrial Domain 26
6.3
Healthcare Domain 27
6.4
Smart Cities Domain 27
9
LEGAL ISSUES 38
9.1
IoT in Telecommunications Law 38
9.1.1
Overview of regulatory framework 38
9.1.2
Protection of communications 39
9.1.3
Ability to access and intercept 40
9.1.4
Mandatory data retention 40
9.1.5
New developments 41
9.2
Other Areas Impacted by IoT 41
9.2.1
Network access 41
9.2.2
Liability 41
9.2.3
Data Ownership 41
9.2.4
Nation State Activities 41
APPENDIX I 42
OWASP Principles of Security 42
IoT SECURITY GUIDELINE V1.0 5
FEBRUARY 2017
APPENDIX II 44
OWASP Security Testing Guide 44
APPENDIX III 46
GSMA Security Recommendations 46
1.1.1 The development of this Guideline has been facilitated by Workstream 5 Security and
Network Resilience of IoT Alliance Australia (IoTAA). Workstream 5 comprises
representatives from the IoT and telecommunications industries, government, privacy
advocates and consumer groups.
1.1.2 The Guideline should be read in the context of other relevant codes, guidelines,
standards and documents.
1.1.3 The Guideline should be read in conjunction with related legislation, including:
(a) the Telecommunications Act 1997;
(b) the Telecommunications (Interception and Access) Act 1979;
(c) the Radiocommunications Act 1992; and
(d) the Privacy Act 1988.
1.1.4 Compliance with this Guideline does not guarantee compliance with any legislation.
The Guideline is not a substitute for legal advice.
1.2 Scope
1.3 Objectives
2.2 Definitions
2.3 Interpretations
The end-to-end IoT pathway consists of three main components: embedded devices,
gateways, and end point applications. The embedded devices connect with their local
gateway via protocols such as 6LoWPAN, ZigBee, ZWave, Thread, Bluetooth and Bluetooth LE,
WiFi, and WirelessHART etc. There are also a number of long-range IoT protocols such as
LoRaWAN, NB-IoT, etc.
Gateways connect with the wider internet using various links such as cellular and ethernet-
based wide area connectivity.
2Paul Freemantle, White Paper A Reference Architecture For The Internet of Things, http://wso2.com/whitepapers/a-
reference-architecture-for-the-internet-of-things/
IoT SECURITY GUIDELINE V1.0 12
FEBRUARY 2017
In the home automation sector, the Home Network Automation Protocol (HNAP) is being
adopted by many vendors as the protocol of choice for device management. The protocol
was patented originally by Pure Networks, but is now owned and being further developed by
Cisco.
At the low power application level, the Constrained Application Protocol (CoAP) is an IETF
protocol which is designed for RESTful applications and uses HTTP semantics (and feeds into
HTTP in the wider network) but with a much smaller footprint and a binary rather than a text-
based exchange. CoAP is designed to be used over UDP. MQTT, the Message Queue
Telemetry Transport, is an alternative to CoAP and has been deployed as a publish/subscribe
messaging protocol for wireless sensor networks.
The multicast DNS service (mDNS) is commonly used by IoT devices to resolve host names to
IP addresses within small networks that do not include a local name server.
The UK Government has promoted the development of an IoT interoperability standard
known as Hypercat. This standard aims to improve data discoverability and interoperability
and to enable a catalogue of devices and capabilities to be published as a web repository
of devices with associated metadata. This is currently one of the preferred interoperability
options3.
As with any new technology, there are many protocols and standards being trialled and
proposed for IoT, and these will form part of the detailed IoT reference architecture going
forward. It is likely that they will in time be supported by implementation profiles specific to
use cases.
The IoT security architecture is a component of the wider IoT reference architecture. It starts
with the business outcomes and derives security requirements and controls traceable to
those outcomes. Given the ubiquity of IoT, case specific security architecture viewpoints will
need to be developed on demand using standard building blocks. The nature of IoT
technology will place unusual demands on the architecture such as low power
cryptographic algorithms and low latency communications. Identity and access
management is another challenge which requires quite different solutions to traditional
enterprise deployments. Secure interoperability will drive the need for security protocol and
profile standardisation.
A key part of the response to the increasing interconnectivity is to ensure the deployed
systems are available on demand and can be trusted to protect a user’s privacy. Given the
commodity nature of many IoT devices and the implications of security and privacy, a robust
trust framework which is incorporated into the design of products is necessary. The approach
should be based on an open and federated business model, a service-oriented IT
architecture, and a user-centric trust model. Data needs to be more open and
interconnected, but privacy and security must be at the heart of how it’s stored and used. In
particular, centralisation and matching of data can be met with suspicion by citizens and
needs to be managed carefully.
There is also a community of devices which require identity, and these have a different trust
model entirely. Identity is a complex and deeply personal concept with individuals having
multiple overlapping identities each of which has different rights and permissions. Some
identities need to be kept separated, and some need to be joined up. Consequently,
whether identities are kept separated or joined up needs to be considered on a case-by-
case basis, subject to requirements set out in the Privacy Act 1988 and any other applicable
laws. New ways of managing identities need to be developed, as many of the security
3IoT Alliance Australia has recommended that the Hypercat Standard be considered by Standards Australia for
adoption as an Australian Standard.
IoT SECURITY GUIDELINE V1.0 13
FEBRUARY 2017
mechanisms put in place to support identity (passwords, PINs, digital signatures) have in
practice acted as barriers to uptake of digital services.
Traditional IT systems implement security based on 25-year-old security control standards
which hardly address the current cyber security demands are quite unsuitable for use as the
basis of security and trust in the IoT. The use of enterprise security controls has not worked well
in the industrial control systems sector, where the requirement for continuous operation is
incompatible with routine patching and restarts. Similarly, it is unlikely that a home light bulb
will continuously check for patches, apply updates, and monitor for cyber-attack – with IoT
modules at sub-$1, a highly commoditised security paradigm is required.
The evolution of the IoT requires an approach to security and privacy which is agile and
supports unforeseen changes, across a wide range of quite different technologies and
applications. It requires an approach which recognises a global ecosystem consisting of
different sectors using common solutions developed independently, compliant with a
common set of principles but implementing a sector specific interpretation of security. A
common foundation for this may be the application of security at the data level. End-to-end
security across a device-to-application model with secure data analytics may also be part of
the solution.
As all sectors of government, industry, and society take advantage of the benefits that can
be realised through the IoT, so dependence upon real time connectivity increases. This
means that networks must become not only resilient, but must strive for survivability to enable
continued operation in the event of cyber-attack.
IoT communications offers some novel challenges with the need for ultra-low-power
protocols and algorithms. While some research work has been carried out into survivability,
this is an embryonic discipline which needs a great deal of urgent attention.
The approach to resilience is detailed in Section 6.
In 2014, a new set of Privacy Principles were enacted. These are set out in the Privacy Act
1988 and shown in Table 1.
Table 1: Australian Privacy Principles (APPs)
Principle Description
1 Open and transparent management of personal information
2 Anonymity and pseudonymity
3 Collection of solicited personal information
4 Dealing with unsolicited personal information
5 Notification of collection of personal information
6 Use or disclosure of personal information
7 Direct marketing
8 Cross border disclosure of personal information
9 Adoption, use or disclosure of government-related identifiers
10 Quality of personal information
11 Security of personal information
12 Access to personal information
13 Correction of personal information
The APPs are legally binding principles which are the cornerstone of the privacy protection
framework in the Privacy Act 1988. They set out standards, rights and obligations in relation to
the handling, holding, accessing and correction of personal information. They are
technologically neutral, principles-based law and apply to:
• most Australian government agencies
• private sector and not-for-profit organisations with an annual turnover of more
than $3 million
• all private sector health service providers, and
• some small businesses such as businesses trading in personal information.
Personal information is information or an opinion about an identified individual or an
individual who is reasonably identifiable, whether or not the information or opinion is true or
the information or opinion is recorded in a material form. For example, in the IoT context,
information from a sensor that indicates the presence of a person in a building may be
personal information if that individual is reasonably identifiable in the particular
circumstances.
A business is 'trading' in personal information if it collects from or discloses to someone else, an
individual's personal information for a benefit, service or advantage. Where a sensor collects
personal information for such a purpose, the business would generally need to comply with
the APPs.
Many of the APPs will be relevant in the IoT context. Particularly relevant to new IoT projects
that involve handling personal information, will be APP 1 on open and transparent
management of personal information. APP 1 lays down the first step in the information
lifecycle – planning and explaining how personal information will be handled before it is
collected. APP entities will be better placed to meet their privacy obligations if they embed
privacy protections in the design of their information handling practices. APP entities are
Not all of the trust framework requirements will be required by all products and services, but a
statement of which requirements are applicable and which are not demonstrates due
diligence. Some requirements may need to be interpreted against sector-specific IoT trust
requirements, and some requirements may be replaced in the IoT context, for example
passwords may be reset rather than recovered.
4 The SSL protocol has been discontinued by NIST. The TLS v1.2 protocol should be used in preference to SSL.
5The above framework is being proposed by the Online Trust Alliance. In the context of vulnerabilities, IoTAA notes
that at the radio level, payload encryption is not necessarily imposed by default by the technology and it is a
customer specification. This allows for the flexibility for the user to be responsible for the complexity of their
application. Nevertheless, frames are protected by an authentication sequence based on cryptographic
mechanisms. A different key needs to be allocated for each object. A sequence number in the frame is used to
avoid replay. Therefore, if the radio signal is recorded and played again on the radio, the network will reject the
packet since the sequence number has already been used. For technologies where the key is directly used to
encrypt information, having a limited number of small messages should be considered as reducing the risk of
compromising the key by simply listening to the traffic to virtually zero. This cannot be considered as a weakness
against other technologies, where a key is generated through an exchange.
IoT SECURITY GUIDELINE V1.0 17
FEBRUARY 2017
Entities covered by the Privacy Act 1988 will separately need to ensure that their personal
information handling practices comply with the legal requirements in Privacy Act 1988. For
example, an entity must have a privacy policy that includes certain prescribed information,
must comply with the notice requirements in APP 5 and must only use and disclose personal
information in certain limited circumstances set out in APPs 6 and 8.
7 https://iotsecurityfoundation.org/
IoT SECURITY GUIDELINE V1.0 19
FEBRUARY 2017
Re-using existing good security architectures rather
than designing brand new ones.
The questions which form the groups in the IoT Security Foundation Principles provide a good
start point or IoT security and should be considered at the outset of any IoT development and
deployment projects, and the specific principles associated with them applied where
relevant. In the longer term, these principles may form the foundation from which sector
specific IoT security profiles and controls can be developed.
NoSec -
The DTLS handshake for authentication and key agreement can pose a significant impact on
the resources of constrained devices, particularly with the requirement for elliptic curve
cryptography. Investigations continue into optimisations of DTLS in IoT environments and the
incorporation of elliptic curve cryptography in hardware.
Research is underway to consider the employment of alternative approaches to secure
CoAP communications, in particular the employment of object security rather than transport
layer security. This may be achieved by integrating security into the CoAP protocol itself using
new security options. This approach enables granular security on a per-message basis, and
supports the secure transversal of different domains and the usage of multiple authentication
mechanisms.
One of the fundamental aspects of the IoT is the manner low-powered devices self-organise
and share information (route and data information) among themselves. Even though these
sensory devices are energy constrained, they need to store and process data, dynamically
connect to the network, and interoperate with other devices. Some of the devices may act
as internal or border routers.
For a route to be established, route information is transmitted from node to node (multi-
hopping) until the desired destination is found. Throughout the route maintenance phase,
nodes can add, delete or needlessly delay the transmission of control information (selfish or
misbehaving nodes). It is during route discovery or forwarding that malicious nodes can
attack. For example, a node can introduce a routing table overflow attack by transmitting a
large amount of false route information to its neighbours in a manner that will cause its
neighbour's routing table to overflow or be poisoned. A malicious node can advertise a false
route with the smallest hop count and with the latest sequence number, hence other nodes,
seeing this as a route update, quickly invalidate their old route to innocently accept the new
false route. IoT networks require adequate security to enable seamless operation and for
5.3.1 6LoWPAN
6LoWPAN environments route traffic using the Routing Protocol for Low-power and Lossy
Networks (RPL) protocol. Rather than providing a generic approach to routing, RPL provides
a framework that is adaptable to the requirements of particular classes of applications. This
suits the richer attribute approach to security.
In the most typical setting various 6LoWPAN nodes are connected through multi-hop paths to
a small set of root devices responsible for data collection and coordination. RPL defines
secure versions of the various routing control messages, as well as three basic security modes:
unsecured, pre-installed, and authenticated and adopts AES/CCM as the basis to support
security. A secure RPL control message includes a security field after the ICMPv6 message
header. The information in the security field indicates the level of security and the
cryptographic algorithms employed to process security for the message.
Incorporation of a timestamp and a nonce in a 6LoWPAN message can also protect against
fragmentation attacks. Hash chains and purging of messages from suspicious senders can
also help protect replay attacks between sensors and 6LoWPAN devices.
6LoWPAN inherits its security model from IEEE 802.15.4. No security mechanisms are currently
defined in the context of the 6LoWPAN adaptation layer. RFC 4919, however, discusses the
possibility of using IPSec at the network layer, although this may be too processing intensive
for smaller IoT devices.
5.3.2 ZigBee
5.3.3 LoRaWAN
LoRaWAN is a Low Power Wide Area Network (LPWAN) specification intended for wireless
devices which are battery powered, and provides secure bi-directional communication,
mobility and localisation services. LoRaWAN is typically architected as a star-of-stars topology
in which a gateway acts as a transparent bridge relaying messages between end-devices
and a back-end server.
Communication between end-devices and gateways is spread spectrum which provides a
significant security advantage. In addition, LoRaWAN offers several layers of encryption:
• unique 64-bit network key to ensure security at the network level;
9Secure routing for Internet of Things: A survey. Airehrour, Gutierrez and Ray, Journal of Network and Computer
Applications, (66) 2016
IoT SECURITY GUIDELINE V1.0 22
FEBRUARY 2017
• a unique 64-bit application key to ensure end-to-end security at the application
level; and
• device specific 128-bit key.
5.3.4 Sigfox
SIGFOX is a cellular style system that enables remote devices to connect using ultra-narrow
band, UNB technology. It is aimed at low cost machine-to-machine applications where wide
area coverage is required and cellular is too costly. The overall SIGFOX network topology has
been designed to provide a scalable, high-capacity network, with very low energy
consumption, while maintaining a simple and easy to rollout star-based cell infrastructure.
SIGFOX allows up to 140 messages per device per day, with the message payload of 12 bytes
and a wireless throughput of up to 100 bits per second and is ultra-low power. The SIGFOX
network is radio-based using unlicensed frequencies. Data is not delivered directly to the user
from the radio system. When data is received from the radio network, a message is sent to
user’s server or an aggregator which in turn will dispatch it to the user.
5.3.5 NB-IoT
The 3GPP began work on NB-IoT in September 2015. The initial results of this work have been
strongly supported by Industry. By December 2015, the first pre-commercialisation trial was
successfully completed in Spain by Vodafone, Huawei, Neul and U-blox. NB-IoT is designed as
a resilient network which is power-efficient and has deep in-building penetration, wide area
ubiquitous coverage, and can manage high volumes of small data packets.
IEEE 802.15.4 defines the physical layer and media access control for low-rate wireless
personal area networks, or LR-WPAN. This is the standard used in personal and industrial
applications where there are many sensors and a low-cost, low-speed network approach
can be used. It operates at about 250Kb/s at up to 10 metres. Other standards such as
WirelessHART, DigiMesh, ISA100.11a also exist as low power physical layer standards. ZigBee is
built on IEEE 802.15.4, as is 6LoWPAN.
At the higher data rates, Ethernet, WiFi and WiMax are well known physical layer standards.
In the cellular space, the current 2G-4G standards are deployed and 5G is emerging as a
real option for IoT use. At the same time, Narrowband IOT (NB-IOT) has been developed and
is in trials as a technology that can co-exist with existing cellular networks to provide IOT
solutions now.
IEEE 802.15.4 does not require security, but it can be applied to enable device
authentication, payload protection, and message replay protection. An access control list is
used to specify the security configuration based on the destination address, and from this the
symmetric cryptography for payload protection. Where security is specified, an auxiliary
security header will be used. The cryptographic security modes that can be employed in an
IEEE 802.15.4 system are as shown in Table 5.
The Advanced Encryption Standard counter mode (AES-CTR) can be used where
confidentiality of the link layer encryption only is required, with message integrity being
handled at a higher level. However, there are some concerns regarding this mode’s
susceptibility to denial of service attacks through use of forged packets, and its use is
discouraged.
The CCM mode combines the counter and CBC modes of operation to provide
confidentiality, authenticity and integrity at the link layer.
In the mobile space, NB-IOT utilises the security and privacy features that already exist in
mobile networks, such as support for user identity confidentiality, entity authentication,
confidentiality, data integrity, and device identification.
LoRaWAN incorporates the ability to authenticate the node in the network and to protect
the payload using AES encryption. It uses two keys, one at the network layer for message
integrity and one at the application layer for confidentiality. LoRaWAN does not allow for the
device key to be changed, but does create a unique session key for payload encryption
when the device joins a network. AES counter mode (AES-CTR) for payload encryption.
Other protocols at the physical layer also use encryption mechanisms: Bluetooth LE/Smart
uses AES, and ethernet can be secured by MACsec (IEEE 802.1AE).
It should be noted that security at the physical and media access control layer requires a
certain amount of computing power and this may not be available to very constrained
devices, for example in devices such as micro/nano-technology enabled sensors. Energy
efficiency and sufficiency for IoT sensors is an active research area. Where possible,
symmetric cryptography should be implemented in hardware level in order to achieve
acceptable performance.
Hardware provides a solution to some of the problems of IoT security, for example in having a
hardware-based root of trust. In 2016, ARM has for some time included its TrustZone
architecture in its Cortex processors to provide system wide hardware isolation for trusted
software.
However, security threats to hardware and embedded systems are a well-known concern.
Early indications of the problem emerged in the 1990s with security assessments of smart
cards, where cryptographic keys have been able to be extracted10. More recent revelations
suggest that hardware may not only incorporate flaws but could be a vector for malicious
attack.
Defending against these threats requires an approach to security testing of hardware
components particular where the product depends upon hardware based random number
generators, encrypted bit streams, key storage elements, secured flash memory, anti-tamper
10 http://www.cl.cam.ac.uk/~mgk25/tamper2.pdf
11Addressing Hardware Security Challenges in Internet of Things: Recent Trends and Possible Solution. Koley S et al,
http://ieeexplore.ieee.org/document/7518284/
12http://www.globenewswire.com/news-release/2017/02/02/913426/0/en/Rapid7-Enables-IoT-Hardware-Security-
Testing-with-Metasploit.html
IoT SECURITY GUIDELINE V1.0 25
FEBRUARY 2017
6 DOMAIN VIEWPOINTS
Some domain specific guidance has been provided in the consumer, industrial, healthcare,
smart cities, and automotive domains.
The IoT Security Foundation has developed a foundation of guidance on IoT security, with the
first release focusing primarily on the consumer domestic – or home automation – domain.
This includes a set of 33 principles for IoT security, in seven groups, as described in section 5.1.
In addition, the IoT Security Foundation has proposed a compliance regime for
demonstrating security in IoT devices and systems. This classes an IoT product into one of five
classes – Class 0 to Class 4 - as shown in Table 6.
Table 6: IoT Security Foundation Classes
While there is no governance framework in which to apply a compliance regime, the IoT
Security Foundation envisages that an audit process could lead to use of a “Trust Mark” as a
qualified public symbol of conformance to best practice.
While many uses of the IoT will involve collection of data from sensors, IoT devices are also
remotely activated and configured through central decision making processes. The
controlled devices may be as simple as a light switch, or as complex and expensive as
aircraft control systems, nuclear reactors and mining systems. Many older systems use
continue to use SCADA or programmable logic controls (PLCs). SCADA is well known for
security weaknesses, with the Stuxnet worm being the most notorious example of a successful
and extremely damaging attack. Other attacks involve new IoT systems, such as the attacks
on telematics systems which lead to the demonstration at the 2015 Blackhat conference of
taking control of a Jeep Cherokee travelling at 70mph.
IoT control systems vary from the low-scale (a home lighting system) to the critical (power
supplies for a large city). There are as yet no comprehensive guidelines spanning this range.
Some guidelines, predominantly from the US, exist in specific areas such as SmartGrid.
The Industrial Internet Consortium (IIC) has published security guidance13 on security in the
industrial sector. The IIC see the industrial internet of things as being the convergence of
The US Food and Drug Administration has produced guidelines for the security of medical
devices and systems14. They consider both pre-market considerations to determine
“recommendations for manufacturers to address cybersecurity during the design and
development of the medical device” as well as post-market support: “... it is essential that
manufacturers implement comprehensive cybersecurity risk management programs and
documentation.”15 It could reasonably be expected that failure to do these will not only
lead to loss of life, but also to expensive litigation.
A security architecture for healthcare16 has been proposed by researchers at CISCO Systems,
in which they identify not only data and communications as attack surfaces but also the
physical device. The paper also identifies the relevant standards activities.
Many current smart city deployments are based on custom systems that are not
interoperable, portable across cities, extensible or cost-effective. In addition, the standards
community has yet to converge on a common language and architecture.
To address this problem, the US National Institute of Standards and Technology has convened
a working group17 to develop a common IoT-enabled smart city framework. This work is at an
early stage of development, but it is likely to have a significant impact on how smart cities
apply IoT.
14U.S. Department of Health and Human Services Postmarket Management of Cybersecurity in Medical Devices
http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM48202
2.pdf
Control-Systems
16 http://www.riverpublishers.com/journal/journal_articles/RP_Journal_2245-800X_133.pdf
17 https://pages.nist.gov/smartcitiesarchitecture/
IoT SECURITY GUIDELINE V1.0 27
FEBRUARY 2017
Automobile systems use the controller area network (CAN) bus to interact with almost all
systems. Brakes and steering are particular subsystems which introduce rigorous safety
requirements. Like SCADA this is an old technology with little regard for security. There is a
clear entry point by the debugging systems used by automotive repair shops. While
alternatives to CANbus are appearing, replacement will be a long-term objective. In the
meantime, advice by experts such as NXP’s security architect, van Roermund is18
• Isolating in-vehicle electronics from external interfaces, with firewalls;
• Applying strict access control to only allow known/trusted entities (partial) access
to in-vehicle systems;
• Further adapting in-vehicle networks, in which systems with similar criticality are
clustered in separate networks, to better isolate safety-critical systems from others;
• Protecting messages exchanged over in-vehicle networks using cryptography
(authentication, and maybe also encryption);
• Using intrusion detection/prevention systems (IPS/IDS) to detect and possibly
counter attacks;
• Protecting the ECUs (microcontrollers and their software) themselves through
secure boot, secure update, and other measures.
Almost every automotive system now comprises a sensor network and an actuator network.
Many issues arising from sensor data can be managed at higher levels, but these higher
levels and connectivity can lead to serious problems when they result in effects at the
actuator level. While there are guidelines in many important cases, the scope of the IoT at
present rules out generic solutions. Nevertheless, it is critical that attention be paid to these
issues.
Little attention has been given to the security of IoT products used in agriculture. However
the American Farm Bureau Federation has drafted a set of Privacy and Security Principles19
relating to the use of smart technology on farms, with a focus of enabling secure central
repositories of precision agriculture and farm data. These have been incorporated in the AG
Transparency Evaluator, a checklist approach to the application of the principles.
The principles are shown in Table 7.
It is likely there will be some overlap with the automotive sector as smart farm vehicles and
drones gain widespread adoption in the agricultural sector.
19 http://www.fb.org/issues/technology/data-privacy/privacy-and-security-principles-for-farm-data
IoT SECURITY GUIDELINE V1.0 28
FEBRUARY 2017
Table 7: Privacy and Security Principles for Smart Agricultural Technology
Principle Description
Education The industry should work to develop programs to create educated customers
who understand their rights and responsibilities. Contracts should use using
simple, easy to understand language.
Ownership Farmers set the agreements on data use and sharing with the other stakeholders
with an economic interest, such as the tenant, landowner, cooperative, owner
of the precision agriculture system hardware, and/or technology provider.
Collection, The collection, access and use of farm data by technology providers should be
Access and granted only with the affirmative and explicit consent of the farmer through
Control contract agreements.
Notice Farmers must be notified that their data is being collected and about how the
farm data will be disclosed and used. This notice must be provided in an easily
located and readily accessible format.
Transparency Technology providers should notify farmers about the purposes for which they
and collect and use farm data, and provide contacts for inquiries or complaints. They
Consistency should explicitly state the types of third parties to which they disclose the data
and options for limiting its use and disclosure. The technology provider’s
principles, policies and practices should be transparent and fully consistent with
the terms and conditions in their contracts. Customer contract should not be
changed without agreement.
Choice Technology providers should explain the effects and abilities of a farmer’s
decision to opt in, opt out or disable the availability of services and features
offered by the technology and services. If multiple options are offered, farmers
should be able to choose some, all, or none of the options offered.
Portability Within the context of the agreement and retention policy, farmers should be
able to retrieve their data for storage or use in other systems, with the exception
of the data that has been made anonymous or aggregated and is no longer
specifically identifiable.
Terms and Farmers should know the third parties, partners, business partners, or affiliates of
Definitions their technology provider which have access to their data. Clear language
should be used in terms, conditions and agreements.
Disclosure, Use Technology providers must not sell and/or disclose non-aggregated farm data to
and Sale a third party without first securing a legally binding commitment to be bound by
Limitation the same terms and conditions that are in place with the farmer. Farmers must
be notified if such a sale is going to take place and have the option to opt out or
have their data removed prior to that sale.
Data Retention The technology provider should provide for the removal, secure destruction and
and Availability return of original farm data from the farmer’s account upon the request of the
farmer or after a pre-agreed period of time. Personally identifiable data
retention, availability and disposal policies should be documented.
Contract Farmers should be allowed to discontinue a service or halt the collection of data
Termination at any time subject to appropriate ongoing obligations. Procedures for
termination of services should be clearly defined in the contract.
Unlawful or Anti- Technology providers should not use the data for unlawful or anti-competitive
Competitive activities, such as a prohibition on the use of farm data by the ATP to speculate
Activities in commodity markets.
Liability & Technology providers should clearly define terms of liability. Farm data should be
Security protected with reasonable security safeguards against risks such as loss or
Safeguards unauthorised access, destruction, use, modification or disclosure. Polices for
notification and response in the event of a breach should be established.
The US Government is developing principles and strategies for managing risk in the critical
infrastructure domain20. IoT security strategies in this domain will have to align with the US
Government principles and strategies. These are summarised in Figure 2.
Control-Systems
21 https://ics-cert.us-cert.gov/Seven-Steps-Effectively-Defend-Industrial-Control-Systems
Reliability and availability are the resilience attributes considered by the International
Telecommunications Union to be characteristic of traditional networks, fixed and wireless, as
well as the emerging IP-based Next Generation Networks (NGNs). RFC 6568 provides some
early consideration of the possible approaches to resilience in the light of the characteristics
and constraints of wireless sensing devices, and discusses threats due to the physical
exposure of such devices which may pose serious demands for resiliency and survivability.
However, to be resilient a system must also be fault tolerant, dependable, and trustable.
Beyond this, diversity, adaptation, correlation, causation, and renewal are the most
promising directions of research into resilience of complex systems.
The resiliency of a system can be defined as its capability to resist external disruption and
internal failures, to recover and gain stability, and even to adapt its structure and behaviour
to constant change. The IoT will be so large as to be difficult to monitor effectively and
control efficiently, and consequently the resilience of any IoT system will be important.
7.1.1 Reliability
Interpreting reliability is more critical for IoT than for traditional IT services. An attribute which
can be critical for some IoT systems is latency – the delays that are experienced as traffic
travels through the various network links from the IoT device to the destination. This is
addressed by telecommunications providers in systems such as VOIP through providing a fit-
for-purpose class of service. NB-IoT is starting to underpin new telco class of service offerings
from the major telco providers.
7.1.2 Availability
Availability can be broken down into three key attributes: built in whole-of-life power sources,
the ability to access the internet through the IoT gateway, and the availability of transit paths
from the gateway to whatever destination is required either on the fixed line internet or linked
through mobile services to a handset data service.
Long-life devices are made possible through low power design, including the use of low
power near connectivity, and low power wide area (LPWAN22) communications. Some
solutions for energy harvesting are also appearing, such as WSN-HEAP23, which enable greatly
extended sensor lifetime. WSN-HEAP sensors can use environmental energy such as light,
vibration, and heat using nano-collectors. Cellular networks and standard WiFi require
significant power and are not always suitable for sensors. The IEEE has developed a standard
802.15.4 as a low power protocol. A promising solution for low power connectivity based on
IEEE 802.15.4 is 6LoWPAN, as adopted by ARM and Cisco. In the wide area, NB-IoT is designed
to be a low power requirement protocol to support devices with lifetimes of 10 years or more.
Access to the wide area IoT transit service is usually through a near-area gateway device
(also known as an edge node) such as a home hub, although wearable devices may look for
direct connectivity with cellular services for mobility.
There are five key issues with the first-hop, i.e. the device to near-area gateway, access:
• Signalling, to ensure that data is delivered and meets performance criteria;
• Security, especially authorisation, encryption, and open port protection;
• Presence detection, to know when an IoT device loses connectivity;
22 https://en.wikipedia.org/wiki/LPWAN
23Seah & Chan, Challenges in Protocol Design for Wireless Sensor Networks Powered by Ambient Energy Harvesting,
IEEE, Wireless Vitae 2009
IoT SECURITY GUIDELINE V1.0 31
FEBRUARY 2017
• Scalability, ensuring bandwidth is available as massive scaling of the IoT takes
place; and
• Protocol, whether the device connects using IPv4 and uses NAT across the
gateway, or connects natively in IPv6 (6LoWPAN carries an IPv6 address and
offers internet connectivity without significant additional overhead).
NB-IoT is different to other protocols as it is designed to connect directly with the cellular
network and will avoid some of the device to gateway issues.
Where the service involves cloud applications, as was the case with the Wink smart home
devices24, any accidental or scheduled maintenance outage will result in availability issues.
Wide-area transit path availability is a requirement that needs to be specified in the SLA for
the service, with multiple diverse paths and media designed-in for critical IoT services.
7.2 Survivability
24 www.wired.com/2015/04/smart-home-headaches/
25 Taylor C, Krings A., and Alves-Foss J. Risk Analysis and Probabilistic Survivability Assessment (RAPSA): An Assessment
Approach for Power Substation Hardening. Proceedings of ACM Workshop on Scientific Aspects of Cyber Terrorism.
(Washington DC), November 2002.
26 Mead NR, Ellison RJ, Linger RC, Longstaff T, McHugh J. Survivable Network Analysis Method. Technical Report
The development environment for IoT spans many languages, operating systems, and
networks. Hardware is specialised. The attack surface for IoT is enormous, there are no
accepted models for security across IoT, and there is a risk that security may become an
afterthought due to the demands of getting products to market27. In addition, as in the case
of industrial control systems, security is only just becoming recognised as a requirement.
Security in IoT helps ensure a product operates in a manner which promotes privacy and
safety. In the same way as security is applied to traditional IT products, the level of rigour at
which security is applied should be proportional to the potential consequences should it fail.
Given the wide scope of IoT, there is no single solution which defines security for IoT. Designers
need to identify the security requirements relevant to their products in the context of the
design goals, the environment in which the product will be deployed, and with regard to any
regulatory obligations that might apply.
The Open Group provides an approach to defining security requirements28 based on
identifying what are known as business attributes. Examples of a business attribute include
confidential, protected, private, available, and resilient. By defining which attributes apply, a
risk profile can be determined and the appropriate security controls applied.
Security is an important consideration when designing an IoT product or system, and a secure
IoT framework should be adopted to ensure that developers do not overlook security while
still allowing for rapid application development. The framework should incorporate security
components which deliver security by default, transparent to developers.
The Open Web Application Security Project was originally conceived as an initiative to
develop the definitive security and testing guide for web services. OWASP subsequently
extended its scope with a developed framework for mobile device testing, and has now
produced a similar framework and testing guide for IoT.
The OWASP IoT Security Principles, summarised at Appendix I, can be applied in various ways
by manufacturers, developers and consumers as evaluation criteria for various forms of IoT
products. These criteria provide the basis of a secure IoT development framework. Their
adoption as part of the overall development framework will substantially increase
confidence in, and may help minimise the overall cost of security.
The Internet of Things Security Foundation (UK) has produced a set of Principles for Security
IoT, based around privacy, trust, integrity, access control, ownership and auditing. The
document provides a set of questions in each area which explore the extent of a target
device’s security. This guidance is summarised in section 6.1.
www.networkworld.com/article/2909212/security0/schneier-on-eally-bad-iot-security-it-s-going-to-come-crashing-
27
down.html
28 www.opengroup.org/subjectareas/security
IoT SECURITY GUIDELINE V1.0 34
FEBRUARY 2017
The Industrial Consortium has produced a series of documents including the Industrial Internet
of Things Volume G4: Security Framework. This is a very thorough document covering the
business viewpoints of risk and trust and functional viewpoints including protecting endpoints,
protecting communications and connectivity, monitoring and analysis, and configuration
and management. This is summarised in section 6.2.
This document also pays particular attention to ‘brown fields’ systems where new solutions
and components must co-exist and interoperate with existing legacy solutions. This is in
recognition that there are many long-lived systems which are potentially “out of date,” and
solutions such as locked doors are no longer appropriate.
The National Institute of Standards and Technology’s Special Publication 183 provides “an
underlying and foundational science to IoT-based technologies on the realisation that IoT
involves sensing, computing, communication, and actuation.29” The model is based on five
primitives of sensor, aggregator, communications channel, eUtility, and decision trigger. It
also has six elements or characteristics of an IoT device: environment in which it operates,
cost, location, owner, identifier and snapshot.
NIST is also leading the work on development of an IoT-enabled smart city framework as
referenced in section 6.5.
The GSMA has produced a set of four documents covering IoT security: a security guidelines
overview, guidelines for IoT Service Ecosystem, guidelines for IoT endpoint system, and
guidelines for network operators30. The goal of these guidelines is to resolve the security
challenges inherent to its growth. These challenges are:
• Availability: ensuring constant connectivity between endpoints and their
respective services in a way which provides security similar to that of cellular
networks;
• Identity: authenticating endpoints, services, and the customer or end-user
operating the endpoint;
• Privacy: reducing the potential for harm to individual end-users by
understanding what privacy identifying information is processed, particularly
relating to tracking of people; and
• Security: ensuring that system integrity can be verified, tracked, and
monitored by understanding the security in its development lifecycle, whether
it uses a trusted computing base, its ability to detect and contain malicious
behaviour, and its incident management.
The guidelines provide a set of examples showing how security might be designed into
solutions taking into account the challenges above. The guidelines do not provide a new
security architecture, rather they identify the questions that should be posed, provide a list of
frequently asked questions, and indicate existing standards that might address the solutions.
GSMA observes that IoT technology has collapsed into a predictable model composed of
only several variants, with the IoT endpoint expected to take on one of three manifestations:
• the Lightweight Endpoint, e.g. wearables and home security sensors;
• the Complex Endpoint, e.g. appliances and SCADA systems; and
• the Gateway (or “Hub”).
29 http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-183.pdf
30 http://www.gsma.com/connectedliving/gsma-iot-security-guidelines-complete-document-set/
IoT SECURITY GUIDELINE V1.0 35
FEBRUARY 2017
The GSMA security model considers five targets for endpoint attack: networks, network
services, console access, local bus and chips.
The network security principles cover secure identification and authentication of users,
applications, endpoint devices, networks, and service platforms; security of communications;
and availability. The Guidelines list a set of best practice recommendations for service
providers to consider.
The Guidelines provide a set of security recommendations for the endpoints and service
ecosystem, which are shown at Appendix III.
The Open Connectivity Foundation (formerly the Open Interconnect Consortium, OIC) has
designed an open framework for the IoT. This provides detail down to the level of device
descriptions, data types, network protocols, and includes an IoT security specification. The
framework is still evolving.
The Cloud Security Alliance has produced a document entitled Security Guidance for Early
Adopters of the Internet of Things31. This covers the security controls which should be in place,
across seven primary areas:
• Analyse privacy impacts to stakeholders and adopt a Privacy-by-Design
approach to IoT development and deployment
• Apply a Secure Systems Engineering approach to architecting and deploying
a new IoT System.
• Implement layered security protections to defend IoT assets
• Implement data protection best-practices to protect sensitive information
• Define lifecycle controls for IoT devices
• Define and implement an authentication/authorisation framework for the
organisation’s IoT Deployments
• Define and implement a logging/audit framework for the organisation’s IoT
ecosystem.
The Guidance gives substantial further details on these controls.
The design and implementation of security controls can be time consuming and costly,
requiring a high level of effort in the design and testing phases. Where similar products are
being developed, their security solutions are likely to be substantively similar, and the re-use
of an existing design can often provide an effective solution requiring little more than design
integration and testing. A design pattern is a formalisation of this concept, and is a reliable
implementation blueprint for a specific business use case scenario. A repository of software
security design patterns has been developed through the Pattern Languages community
and documented by the Carnegie-Mellon University Software Engineering Institute32. These
are for general software security, but provide a foundation for more specific use cases. An
increasing number of IoT design patterns are expected to become available as common
approaches are adopted by vendors.
IoTAA intends to progressively develop and publish IoT security design patterns to support this
Guideline.
31 https://cloudsecurityalliance.org/download/new-security-guidance-for-early-adopters-of-the-iot/
The OWASP principles of IoT security provide guidance on the risk level to which the IoT
device or system is likely to be exposed, and the systemic risk which this introduces to the
environment in which it operates. The level of risk then determines the depth of security
testing required for the product.
OWASP has developed a testing guide for IoT products (see Appendix II) which covers 16 IoT
Principles of Security and provides a framework for testing ten different vulnerabilities. It may
be beneficial to have a certificate of security testing produced by a testing laboratory in
order to provide independent security assurance to customers.
There is an increasing number of vendor end-to-end solutions being delivered for IoT
deployments. These are expected to produce solutions for a variety of use cases but will likely
evolve quickly as new IoT technologies emerge. Some will be more open than others, and
some will leverage and influence industry standards. When employing vendor end-to-end
solutions, the security model should be investigated and understood.
An example of this at the component level is Microchip. Microchip and Amazon have
collaborated to develop an integrated solution to help IoT devices quickly and easily comply
with AWS's mutual authentication IoT security model. The new security solution will help
companies implement security best practices from evaluation through production. This is
delivered as a hardware chip which integrates with the AWS Software Development Kit.
At the system level, IBM promotes an architecture-based on their Bluemix platform at the
application level, with the Watson IoT Platform working in conjunction with the HiveMQ
Enterprise MQTT Broker to enable device integration.
Microsoft has released an Internet of Things Security Architecture which promotes a four zone
model of Device, Field Gateway, Cloud Gateway, and Services. Each zone segments a
solution, and often has its own data, authentication and authorisation requirements. Zones
can also be used to isolate damage and restrict the impact of low trust zones on higher trust
zones.
The use of cyber insurance is becoming more prevalent and is a useful way for businesses to
address the risks of cyber-attack. When considering a business for insurance, the insurance
company will assess the cost of cover based on the client risk exposure, and may offer
premium reductions where security has been properly addressed.
When marketing and deploying IoT products and systems, the impact on insurance cover
may be a significant cost factor and taken into account. IoT products with a level of security
certification may be more attractive than those without.
Section 4 of this Security Handbook discusses how personal information is regulated by the
Privacy Act 1988. Another important body of security related regulation is imposed by
telecommunications law.
If an IoT solution involves deployment of a wireless network and/or includes the sale of
carriage services to customers, the solution will (very likely) be regulated by
telecommunications law.
Services that provide or resell carriage have onerous security obligations. Information
transiting the network must be protected. Use of it and use of the details of its customers is
heavily restricted. Unless exempt, there is an obligation to ensure that messages can be
intercepted by law enforcement and to retain and make available certain data.
Small changes in the design of a solution and/or making use of third party services can have
a big impact on the regulatory obligations that may apply.
It is important to understand when a provider is a carrier or CSP as carriers and CSPs are
subject to various obligations under the Telecommunications Act 1997.
A primary security obligation is the duty to protect the confidentiality of information that
relates to:
• the contents of communications that have been, or are being, carried; and
• the carriage services supplied; and
• the affairs or personal particulars that come to knowledge or possession by
reason of providing the service.
The Telecommunications (Interception and Access) Act 1979 prohibits the interception of
communications passing over a telecommunications system and lays out a number of
circumstances in which this prohibition does not apply. These include in the case of
emergency requests, where required to do so under various forms of warrant, and where
authorised by the Attorney-General for developing and testing interception capabilities.
As an incident of those obligations, the Telecommunications (Interception and Access) Act
1979 also requires that providers of telecommunications systems such as carriers and CSPs
must ensure that their system can:
• enable a communication passing over the system to be intercepted in
accordance with an interception warrant; and
• transmit lawfully intercepted information to the delivery points applicable in
respect of that kind of service.
It is possible to apply for an exemption from these requirements. Carriers and nominated CSPs
are also required to file an 'Interception Capability Plan' with the Department of
Communications and the Arts, which sets out how precisely it intends and is able to comply
with its obligation to provide interception capabilities.
At the time of writing, a proposal had been put before Parliament to introduce a broad
obligation on carriers and CSPs to protect the security of their telecommunications services
and facilities and for carriers and certain CSPs to report any changes to their network or
services that may have an impact on security.
IoT devices rely on internal network and internet access, and any disruption could result in
failure of the IoT system. Such disruption may be caused by a breakdown of net neutrality,
inadequate bandwidth provision by an internet provider or the result of a denial of service
attack. The legal consequences of such failures should be considered when designing the IoT
system.
9.2.2 Liability
An IoT system will generally consist of many components interacting in a complex fashion.
The attack surface of an IoT will expand in proportion to the multiple sensors and actuators it
contains, as well as by the cloud services it consumes. These components are likely to be
manufactured, contracted, or leased from multiple sources. The liability as a result of
accidental failure or deliberate cyber breach of any point is not currently clear.
The deployment of IoT will result in significant data being generated. As IoT evolves, it is likely
that an increasing amount of its data will be shared. Data ownership will become more
complex, and the consequences of corrupted data (either accidentally or deliberately) may
reach beyond its source organisation.
IoT will substantially expand the infrastructure surface for nation state attacks from the current
critical infrastructure. Such attacks may result from designed backdoors in equipment and/or
remote penetration, and will be well-resourced. Both government and utility companies will
need to ensure the integrity of devices and systems, and that adequate protection is in
place.
# Name Description
Edge components are likely to fall into adversarial hands. Assume
attackers will have physical access to edge components and can
1 Assume a Hostile Edge
manipulate them, move them to hostile networks, and control
resources such as DNS, DHCP, and internet routing.
The volume of IoT means that every design and security consideration
must also take into account scale. Simple bootstrapping into an
2 Test for Scale
ecosystem can create a self-denial of service condition at IoT scale.
Security counter measures must perform at volume.
Automated systems are extremely capable of presenting
misinformation in convincing formats. IoT systems should always verify
3 Internet of Lies
data from the edge in order to prevent autonomous misinformation
from tainting a system.
Automated systems are capable of complex, monotonous, and
4 Exploit Autonomy tedious operations that human users would never tolerate. IoT systems
should seek to exploit this advantage for security.
The advantage of autonomy should also extend to situations where a
5 Expect Isolation component is isolated. Security countermeasures must never
degrade in the absence of connectivity.
Data encryption only protects encrypted pathways. Data that is
transmitted over an encrypted link is still exposed at any point it is
unencrypted, such as prior to encryption, after decryption, and along
any communications pathways that do not enforce encryption.
6 Protect Uniformly
Careful consideration must be given to full data lifecycle to ensure
that encryption is applied uniformly and appropriately to guarantee
protections. Encryption is not total – be aware that metadata about
encrypted data might also provide valuable information to attackers.
It is very easy for developers to make mistakes when applying
encryption. Using encryption but failing to validate certificates, failing
to validate intermediate certificates, failing to encrypt traffic with a
7 Encryption is Tricky
strong key, using a uniform seed, or exposing private key material are
all common pitfalls when deploying encryption. Ensure a thorough
review of any encryption capability to avoid these mistakes.
Be sure that IoT components are stripped down to the minimum
viable feature set to reduce attack surface. Unused ports and
8 System Hardening protocols should be disabled, and unnecessary supporting software
should be uninstalled or turned off. Be sure to track third party
components and update them where possible.
To the extent possible limit access based on acceptable use criteria.
There's no advantage in exposing a sensor interface to the entire
9 Limit What You Can
internet if there's no good case for a remote user in a hostile country.
Limit access to white lists of rules that make sense.
IoT systems should be able to quickly on-board new components, but
should also be capable of re-credentialing existing components, and
10 Lifecycle Support de-provisioning components for a full device lifecycle. This capability
should include all components in the ecosystem from devices to
users.
IoT systems are capable of collecting vast quantities of data that may
seem innocuous at first, but complex data analysis may reveal very
Data in Aggregate is sensitive patterns or information hidden in data. IoT systems must
11
Unpredictable prepare for the data stewardship responsibilities of unexpected
information sensitivity that may only be revealed after an ecosystem
is deployed.
# Name Description
Assess any web interface to determine if weak passwords are
allowed
Assess the account lockout mechanism
Assess the web interface for XSS, SQLi and CSRF vulnerabilities
1 Insecure Web Interface and other web application vulnerabilities
Assess the use of HTTPS to protect transmitted information
Assess the ability to change the username and password
Determine if web application firewalls are used to protect web
interfaces
Assess the solution for the use of strong passwords where
authentication is needed
Assess the solution for multi-user environments and ensure it
includes functionality for role separation
Assess the solution for Implementation two-factor
Insufficient authentication where possible
2
Authentication/Authorisation Assess password recovery mechanisms
Assess the solution for the option to require strong passwords
Assess the solution for the option to force password expiration
after a specific period
Assess the solution for the option to change the default
username and password
Endpoint Eco-System
Critical
Implement an endpoint trusted computing base Implement a service trusted computing base
Utilise a trust anchor Define an organisational root of trust
Use a tamper resistant trust anchor Define a bootstrap method
Define an API for using the TCB Define a security front-end for public systems
Define an organisational root of trust Define a persistent storage model
Personalise each endpoint device prior to
Define an administration model
fulfilment
Minimum viable execution platform Define a systems logging and monitoring model
Uniquely provision each endpoint Define an incident response model
Endpoint password management Define a recovery model
Use a proven random number generator Define a sun-setting model
Cryptographically sign application images Define a set of security classifications
Remote endpoint administration Define classifications for sets of data types
Logging and diagnostics
Enforce memory protection
Boot loading outside of internal ROM
Locking critical sections of memory
Insecure bootloaders
Perfect forward secrecy
Endpoint communications security
Authenticating an endpoint
High Priority
Use internal memory for secrets Define a clear authorisation model
Anomaly detection Manage the cryptographic architecture
Use tamper resistant product casing Define a communications model
Enforce confidentiality/integrity to/from the trust
Use network authentication services
anchor
Over the air application updates Provisioning servers where possible
Improperly engineered or Unimplemented mutual
Define an update model
authentication
Privacy management Define a breach policy for abused data
Force authentication through the service
Privacy and unique endpoint identities
ecosystem
Run applications with appropriate privilege levels Implement input validation
Enforce a separation of duties in the application
Implement output filtering
architecture
Enforce language security Enforce strong password policy
Define application layer authentication and
authorisation
Default-open of fail-open firewall rules
Evaluate the communications privacy model
34 http://www.gsma.com/connectedliving/wp-content/uploads/2016/02/CLP.13-v1.0.pdf
IoT SECURITY GUIDELINE V1.0 46
FEBRUARY 2017
Medium
Enforce operating system level security
Define an application execution environment
enhancements
Disable debugging and testing technologies Use partner-enhanced monitoring services
Use a private access point name for cellular
Tainted memory via peripheral based attacks
connectivity
User interface security Define a third party data distribution policy
Third party code auditing Build a third party data filter
Utilise a private access point name
Implement environmental lock-out thresholds
Enforce power warning thresholds
Environment without backend connectivity
Device decommissioning and sun-setting
Unauthorised metadata harvesting
Low
Intentional and unintentional denial of service Rowhammer and similar attacks
Safety critical analysis Virtual machine compromises
Defeating shadowed components and untrusted
Build an API for users to control privacy attributes
bridges
Define a false positive/negative assessment
Defeating a cold boot attack
model
Non-obvious security risks
Combating focused ion beams and x-rays
Consider supply chain security
Lawful interception
IoTAA has 400 members from approximately 200 organisations across its six workstreams.
The workstreams are focused on:
- Collaboration
IoTAA was incorporated as a not-for-profit entity in July 2016, emerging from the
Communications Alliance IoT Think Tank, established in 2015.
IoTAA is hosted and supported by the University of Technology, Sydney (UTS) at its
Broadway Campus in Sydney.
http://www.iot.org.au/