Unit 1 Material
Unit 1 Material
What is it?
Both IoT/IIoT and CPS/CPPS have physical as well as cyber aspect. These may
also be referred to as smart systems. IoT emphasizes on connectivity while CPS
emphasizes on embedded part. Connected CPSs are thus called Internet of Things
(IoT). Therefore, CPS forms the first level of vertical digital integration and IoT
forms the second level. Due to the development of the technologies, new words
are constantly emerging like for instance Smart Factory, Future Factory, Smart
Industry etc. All in all, both IoT and CPS help enhance manufacturing and
industrial processes.
IoT security refers to a strategy of safeguards that help protect these internet-
enabled devices from cyber-attacks. It’s a fairly new discipline of cybersecurity,
given the relatively recent introduction to these non-standard computing devices.
Potential IoT attacks “could range from unauthorized access and data theft to
physical tampering of the devices.
The practice of IoT security involves protecting, identifying and monitoring risks,
threats and breaches of a multiple-device system.
As IoT devices grow in influence, so does the potential for unauthorized network
access. By design, IoT devices were not built with any sort of security
mechanisms in place.
Vulnerability:
There are many attack types; however, the following list provides some of the
most significant as they relate to the IoT:
and controls:
1.3 Security Engineering for IoT Development:
In today's fast-paced tech industry, security engineering often takes a back seat to
The world is not ideal, however, and IoT devices and systems will be rolled out
by a variety of company types using a multitude of development practices.
Gartner estimates that by 2017, 50% of all IoT solutions will originate from start-
up companies less than 3 years old. This imposes challenges as security is
frequently an afterthought and minor area of focus for most start-up
organizations.
Angel investors and venture capital firms may also impose barriers to a start-up's
meaningful incorporation of security; security is frequently demoted to a "nice to
have" status among an extensive list of features on the road to success. In this
environment, start-up companies and even more traditional companies will
frequently rely on the supposed security of their suppliers' hardware and software.
This occurs regardless of whether the intended deployment target and
environment are commensurate with the suppliers' stipulations.
The security engineer's job is to be able to examine and characterize each of these
disparate systems and define an appropriate lifecycle focused on maintaining a
secure state across the enterprise.
The lifecycle is designed to be iterative, allowing for the secure addition of new
IoT capabilities throughout an enterprise. Technical, policy, and procedural
lifecycle topics are addressed to enable a robust enterprise IoT security capability
that is continuously updated and tailored to the unique operating needs of the
system. An IoT security lifecycle should support an enterprise IoT ecosystem
with the following:
In many cases, edge rewire is not permitted in the IoT due to circumstances
such as protocol confinement, geolocation constraint, and so on. In this
scenario, one seeks to use the nodal detectability to infer the presence of an
attack.
An illustration of the attack and fusion-based defense model for the IoT is shown
in Figure 1.5. A two-player game between the defender (the fusion center) and
the attacker is naturally formed, given the critical value of network resilience
(e.g., the largest component can be no less than 50% of its original size) and the
node-level detection configurations.
Figure 1.5: Illustration of the attack and fusion-based defense model for the
IoT. The adversary attacks a subset of nodes, as indicated by the red dotted
arrows. The defender performs attack inference based on the attack status
feedbacks from another subset of nodes, as indicated by blue dashed arrows.
Intuitively, from the adversary’s perspective, too few node removals cause hardly
any harm to the network connectivity, while too many node removals are prone
to be detected by the fusion center, which means that the attack is eventually in
vain. From the defender’s perspective, inferring attacks using all feedbacks might
treat the topological attack as a false alarm, since only a small subset of nodes is
targeted.
On the other hand, inferring attacks using only a few feedbacks might suffer from
information insufficiency and therefore fail to detect the presence of attacks.
Consequently, there exists a balance point at which both attacker and defender
are satisfied with their own strategies, which is exactly the notion of Nash
equilibrium in game theory.
At game equilibrium, no player’s payoff can be increased by unilaterally
changing strategy. As a result, the game payoff at game equilibrium can be used
to study the robustness of a network.
It is observed that the EU power grid is more robust to the Internet router level
topology given the same parameters PD and PF, and the network robustness
approaches 1 as the detection capability increases, which suggests that the
adversary gradually loses its advantage in disrupting the network, and the damage
caused by malicious attacks can be alleviated by the fusion-based defense
mechanism.
Due to the open nature of vehicular networks, they are more amenable to
malicious attacks; and, due to their high mobility and dynamic topology, the
detection and prevention of such attacks is also more difficult.
We consider one such attack in this chapter, the Sybil attack, in which an
attacker tries to violate the unique vehicular ID property by forging or fabricating
it and presenting multiple identities.
There are mainly two types of Sybil attacks: (i) a single node presents multiple
identities; and (ii) a Sybil node uses the identity of another node. Sybil attacks
violate the fundamental assumption of one-to-one correspondence of a node with
its identity.
➢ Numerous objects: The IoT evolves into a large number of objects that
collectively move toward a state of pervasiveness.
➢ Interdependency between the cyber and the physical world: For example,
in one well-known IoT, the smart grid, the physical world cooperates with
the cyber network.
Figure 1.8 shows the network architecture of an IoT platform. The security
issue in the IoT has received much attention. Obviously, the growing
popularity of objects with rich wireless communication capabilities has made
the IoT attractive to digital viruses and malicious content. Moreover, the
mobility and novel proximity-based communication technologies increase the
possibility of spreading malware.
The ongoing battle for smart grid security includes smart homes and, especially
when one technology becomes particularly widespread, it automatically creates a
high-reward target type. One specific area that is seeing a particular technological
increase, and is thus at higher risk of becoming such a target, is home automation
for personal use. Several companies offer products on the market to automate
lighting, shades, heating, cooling, and the like.
Among the many systems that feature different wired or wireless topologies is
digital STROM (dS) with its powerline-based bus and embedded central server.
This research is dedicated to finding security and privacy weaknesses in SHS
using the example of dS system. Wherever possible, we try to approach the
problem in a generic way that can also be applied to other systems.
1.8.1. The digitalSTROM Environment
Figure 1.10 shows a simplified SHS consisting of three separate power circuits
(one per floor), two dS appliances (TV, light on the dash dotted line), and a non-
dS charging electric vehicle on an outdoor plug. The dSM are interconnected
(dashed lines) with the dSS by the two-wire bus. The dSS is connected to the
home network, symbolized by the wireless router, by a Cat.5 cable or, optionally,
by a supported wireless universal serial bus (USB) dongle.
We divided the attacks into nine relative and perceived risk categories: low,
medium, and high in each of the two dimensions, severity and probability, shown
in Figure 1.12.
Figure 1.12: The nine risk categories.
A block cipher uses a symmetric key and algorithm to encrypt and decrypt a block
of data. A block cipher requires an initialization vector (IV) that is added to the
input plaintext in order to increase the key space of the cipher and make it more
difficult to use brute force to break the key. The IV is derived from a random
number generator, which is combined with text in the first block and the key to
ensure all subsequent blocks result in ciphertext that does not match that of the
first encryption block.
The block size of a block cipher refers to the number of bits that are processed
together. Data Encryption Standard (DES) and Advanced Encryption Standard
(AES) are both symmetric block ciphers.
The DES block cipher was originally designed by IBM in 1975 and consisted of
64-bit blocks and a 56-bit key. This cipher is not considered secure anymore, due
to the short key size, and was replaced in 1998 by AES. AES uses a 128-bit block
size and a 128-, 192- or 256-bit key size.
1.10. Message Integrity
The electronic equivalent of the document and fingerprint pair is the message
and digest pair.
1.10.3 Difference
The two pairs (document / fingerprint) and (message / message digest) are similar,
with some differences. The document and fingerprint are physically linked
together. The message and message digest can be unlinked separately, and, most
importantly, the message digest needs to be safe from change.
1.10.4 Checking Integrity
Six different authenticated encryption modes, namely OCB 2.0, Key Wrap,
CCM, EAX, Encrypt-then-MAC and GCM, have been standardized in ISO/IEC
19772:2009 (Authenticated encryption).
Hash functions are extremely useful and appear in almost all information security
applications.
Values returned by a hash function are called message digest or simply hash
values. The following picture illustrated hash function −
Features of Hash Functions:
1.13 Marketers:
Marketing has evolved remarkably in this digital age following the introduction
of cryptocurrency and blockchain tech. Just imagine a world where marketing no
longer centers on promoting physical products but on building trust and
community for digital assets.
Several benefits make elliptic curve cryptography an attractive option for certain
applications. First, as mentioned above, ECC requires smaller keys than other
methods to achieve the same level of security. This can be important in
constrained environments where limited storage is available.
Because ECC offers equivalent security with lower computing power and battery
resource usage, it is becoming more widely used in cryptocurrency platforms,
including Bitcoin and Ethereum, mobile applications, and low-power devices that
have limited computational power.
Finally, ECC can be used for digital signatures, key exchange, and other
purposes; this makes it a versatile tool for many different applications.
Elliptic curve cryptography has several practical applications in the real world.
One example is online banking and payments. When you make an online
purchase with your debit or credit card, your information is often encrypted using
ECC before it’s sent over the internet. This ensures that your information remains
confidential and secure throughout the transaction process.
PGP works by generating a public/private key pair for each user. The public key
can be shared with anyone, but the private key must be kept confidential at all
times. To encrypt an email, you simply need the recipient’s public key;
conversely, you’ll need your private key to decrypt an email you’ve received.
Data security and privacy protection are at the core of most internet users’
concerns. Encryption is a fundamental security measure designed to protect data
from unauthorized access. And public key infrastructure (PKI) is perhaps the
most common cryptography method.
Registration authority (RA): The interface between the user and the
certification authority. It is responsible for identifying applicants or certificate
holders and ensuring that the certificate usage constraints are met.
DSA has been widely adopted and used in various applications, including secure
email, digital certificates, and secure electronic transactions. However, newer
algorithms are becoming more popular because of their shorter key lengths and
computational efficiency.
1. A private key and corresponding public key are generated. The private key
is kept secret and used for signing, while the public key is available to
others for signature verification.
2. The private key holder performs a series of mathematical operations on the
message using a specific set of parameters and creates a unique digital
signature for it.
3. The recipient uses the public key associated with the private key to verify
the authenticity and integrity of the message. They can determine if the
signature is valid or not by performing a series of calculations on the
signature and the message.