Telecoms, Datacoms, Wireless, IoT


The five pillars of secure IoT design

19 April 2017 Telecoms, Datacoms, Wireless, IoT

For any industrial Internet of Things (IoT) application, ensuring signal integrity is crucial for safety and operational reliability. However, even the most robust system has many attack surfaces that are vulnerable to would-be ­hackers intent on compromising a system. This is unacceptable for high-reliability systems in general, but as more contextual information gets added, including time and position, the level of compromise increases dramatically, so gaps in security must be identified and closed at every opportunity.

In the case of an IoT sensor, a chain of trust must be established from the sensor to the microcontroller and wireless module, and all the way through to the end application. In industrial applications for the IoT, every attack surface must be secured in order to establish a chain of trust. u-blox refers to this as its five pillars of secure IoT design:

• Device firmware and Secure Boot.

• Communications to the server.

• Interface security.

• Enforcing API control.

• Robustness that includes handling spoofing/jamming.

Secure Boot ensures that a device is executing the intended firmware by authenticating at each stage before booting the next process. Also, while over-the-air updates are useful for mass uploads of many widely deployed IoT devices, they create an attack surface that can be vulnerable, so all firmware must first be validated before being installed. A good implementation will include a backup of a previously authenticated image to allow backtracking if there is a problem.

At the communications or transport layer, a device needs to be able to authenticate itself with the server and all exchanged data should be encrypted, with no possibility of a ‘man in the middle’ attack. Secure key management will allow for this, even on a per-session basis.

The defined APIs that provide access to device functionality are also a vulnerability that must be addressed, though they are often overlooked. This is particularly insidious as hackers usually have a lot of time to look for open APIs and explore their relationship to device functionality and features, which sometimes might include access to paid services. Also, developers often use undocumented APIs for their own test and configuration purposes, so these must be protected too, using the same formal authentication and authorisation processes as used for all APIs.

The fifth link in securing IoT devices involves ensuring robustness, such as when facing jamming or spoofing attempts that might undermine the device’s ability to get accurate position data from a GNSS. The design must be able to detect that the reported information is not accurate and report the situation to the user or IoT network operator.

For more information contact Andrew Hutton, RF Design, +27 (0)21 555 8400, [email protected], www.rfdesign.co.za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

X-band radar
RF Design Editor's Choice Telecoms, Datacoms, Wireless, IoT
X-band radar systems, particularly those leveraging beamforming ICs (BFICs), advanced gallium nitride (GaN) and gallium arsenide (GaAs) components, are leading the way in providing the high-performance radar capabilities required for modern defence and surveillance.

Read more...
Reference board for cardio monitoring
Altron Arrow Telecoms, Datacoms, Wireless, IoT
The STDES-ESP01 reference board from STMicroelectronics demonstrates the capability of the ST1VAFE6AX and ST1VAFE3BX biosensors to detect ECG and SCG signals.

Read more...
LTE Cat 1 bis communication
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
The EG810M series is a series of LTE Cat 1 bis wireless communication modules specially designed by Quectel for M2M and IoT applications.

Read more...
Quad-channel 16-bit converter
RFiber Solutions Telecoms, Datacoms, Wireless, IoT
The ARF0468 from Advance RF is a quad-channel mixed-signal processing chip, with each channel comprising three major functional modules: ADC/DDC/DDS.

Read more...
Tactical navigation system
Etion Create Telecoms, Datacoms, Wireless, IoT
Etion Create’s CheetahNAV Compact is a versatile tactical navigation system designed for security services, emergency services, and light all-terrain vehicles (ATVs) using offline navigation maps.

Read more...
Smart module for multi-media devices
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
Powered by a Qualcomm processor, Quectel’s new SC200V is designed to deliver exceptional performance across system capabilities, multimedia functions, and network connectivity.

Read more...
Remote provisioning firmware added to SIMCom modules
Otto Wireless Solutions Telecoms, Datacoms, Wireless, IoT
SIMCom recently announced that its range of Cat 1 bis IoT modules are now being prepared with the firmware necessary to support SGP.32 functionality.

Read more...
GNSS antenna redefining what’s possible
RF Design Telecoms, Datacoms, Wireless, IoT
u-blox has achieved what was once thought impossible with the launch of the DAN-F10N, the industry’s smallest and most reliable L1, L5 dual-band GNSS antenna module.

Read more...
Innovative satellite navigation receiver
Altron Arrow Telecoms, Datacoms, Wireless, IoT
STMicroelectronics has released an innovative satellite navigation receiver to democratise precise positioning for automotive and industrial applications.

Read more...
u-blox expands NORA-B2 BLE modules
RF Design Telecoms, Datacoms, Wireless, IoT
The new nRF54L chipset-based wireless modules reduce current consumption and double processing capacity, catering to diverse mass market segments.

Read more...