IoT Security
Article | June 28, 2023
Manufacturers were already digitizing their processes before March 2020. The COVID-19 pandemic gave IT and operational professionals in the manufacturing space reasons to want to move faster. Teams that can’t work on the factory floor (pandemic, weather, closed roads, etc.) need a way to monitor and control processes over the network. Supply chain woes—like wildly fluctuating demand and the container ship that blocked the Suez Canal—highlighted the need for agility. A skilled labor shortage has further accelerated plans for automation.
Digitization brings visibility and agility
The fourth industrial revolution, also known as Industry 4.0, lays the foundation of modern digital manufacturing. It brings together cyber and physical systems, automation, industrial IoT, and better vertical and horizontal integration.
The network has a starring role in digital manufacturing, connecting people and applications in any location to factory-floor assets like sensors, actuators, cameras, and industrial automation and control systems (IACS). Benefits of digitization include improved overall equipment effectiveness (OEE) uptime, product quality, worker safety, cybersecurity, 24/7 asset monitoring and faster new product introduction and accelerating plant buildouts.
Four essentials for manufacturing networks
As IT and operational professionals work to innovate traditional manufacturing facilities and operations, we must consider that digital manufacturing requires more networks. Here are guidelines for making sure your manufacturing network is up to the task.
Use network devices specifically designed for industrial environments like factories
In addition to high performance and reliability, industrial routers, switches, and firewalls need to withstand harsh environmental conditions like extreme temperatures, shock, vibration, and humidity. They also need to be able to control access, have support for real-time industrial protocols, and enable the flow of key operational data to move across applications in the cloud. Further, the operational networks they build need to be scalable and highly resilient. We designed our industrial routers and switches to meet these requirements.
Give IT and OT visibility and control into what they care about
The manufacturing network is a joint project of the IT and OT teams. If you’re on the IT team, you want a solution that works with your existing network management and security applications, and doesn’t require significant training or disruption. You want to automate network maintenance and quickly identify and solve performance issues, especially in this business-critical space. If you’re on the OT team, you’re probably not an IT expert. You want visibility of issues that impact availability, product quality, workforce effectiveness and straightforward recommendations to resolve them. Cisco DNA Center – proven in the largest IT networks – meets all these needs. It automates time-consuming manual tasks, continuously monitors network health, and provides reports and controls on an easy-to-use dashboard. Cisco Cyber Vision gives you visibility into assets and processes.
For agile manufacturing, look for “plug-and-play” deployment
Manufacturers are simultaneously expanding production, hyper-customizing products, improving operations, and launching new products and services. To achieve these goals, you need the agility to scale product capacity, change product mix, and reallocate resources as needed. Quickly shift networking and production resources where you need them using Cisco DNA Center’s plug-and-play onboarding and provisioning.
Pay careful attention to cybersecurity
Cybersecurity starts with knowing everything that is connected to your industrial network, who’s talking to each other and what they are saying. Cisco Cyber Vision automatically takes a complete inventory. OT teams use a graphical interface to create production zones (aka network segments) containing all assets that need to communicate. (The painting controller doesn’t need to talk to the assembly-line controller.) Cisco Identity Services Engine (ISE) deploys polices that block unintended communications between segments to keep malware infections from spreading. Cisco Cyber Vision also takes a baseline of each asset’s usual communications patterns, alerting OT and IT teams to unusual behavior that could be a sign of a security breach.
Prepare to do more with less
The manufacturing skills shortage has widened the skills gap, with fewer experts left on the plant floor to prevent mistakes and solve crises. Connecting your plant floor helps you do more with less. A resilient network with the four qualities I’ve described—rugged devices, IT and OT collaboration, simpler and agile network management, and cybersecurity—helps you proactively identify potential problems, discover the cause, and resolve them before they affect production or quality.
Read More
IoT Security
Article | July 5, 2023
Manufacturing industry or the Industrial Internet of Things has been one of the driving verticals for development of 5G technologies. Wide 5G deployement for Industrial IoT has long been in the pipeline but we might expect it to be a reality very soon.
The true success of 5G depends on the verticals as trends suggest that that Industrial IoT alone will triple the number of needed base stations globally. And many verticals will need efficient wireless connectivity to become successful. 5G has features that are specifically designed to address the needs of vertical sectors, such as network slicing and URLLC. The ultra-reliable low latency communications and massive machine type communications required by the IIoT will soon be realized.
Table of Contents:
How Will 5G Impact Industrial IoT?
5G Accelerations for IIoT
Industrial 5G
How Will 5G Benefit Industrial IoT?
IoT is a B2B application and users just want to get actionable data from their sensors and not worry about whether it’s old data or unreliable data. I think 5G changes this dynamic significantly over the long term by standardizing and simplifying the experience and interactions, and possibly engaging more of the industry to help solve IoT’s problems but also improve the total experience.
- Anshel Sag, analyst at Moor Insights & Strategy
• Data-Transfer Speeds
Any IoT is said to be commercially successful depending on how fast it can set up communications with other IoT devices, software based websites or applications, phones, and tablets. 5G promises exactly all of this with significant increase in transfer speeds.
5G is 10x faster than its LTE counterparts and allows IoT devices to communicate and share data faster than ever. All IoT devices will benefit from the faster speed of 5G with reduced lag and improved sending and receiving of data and notifications between connected devices.
• Greater Network Reliability
5G networks also offer more reliable and stable connection which is extremely important for any IoT including devices like locks, security cameras and monitoring systems that depend on real-time updates.
With reliable connectivity consumers will be the greater beneficiary.
It is however, imperative for manufactures to trust and invest in 5G compatible devices to reap the benefits of high-speed connectivity, very low latency, and a greater coverage that will arrive with the next generation network.
READ MORE:How Will the Emergence of 5G Affect Federated Learning?
5G Accelerations for IIoT
• Diversity in Industrial IoT
The opportunities that industrial IoT bring with is varied and its used cases span the spectrum from indoor to outdoor, less demanding to mission-critical, data rate from dozens of bps to gbps, device motion from fixed to mobility, and power source from button battery to high voltage.
Predictive maintenance, smart metering, asset tracking, and fleet management are some of the commonly known opportunities for IIoT, which be extended further by 5G through continued diversity and expansion.
• 5G Inspires Untapped Frontiers
Industrial IoT application areas such as mobile robot control in production automation and autonomous vehicles in open pit mining require wide mobility, low latency and mission-critical reliability. They rely on wireless access at 50ms to 1ms latency and service reliability from 5 nines to 6 nines.
Though 4G/LTE has attempted to address these areas of IIoT application it has failed due to unsatisfactory performance. With ultra-reliable and low latency connection, 5G will take industrial IoT to unconquered spaces.
• Managing the Enterprise 5G Network
Typically, enterprise IT is responding to the business demand from Operational Technology (OT) and mandates security, integration, visibility, control, and compatibility. In this scenario, 5G is not about “what,” but about “how”. IT needs to consider the right approach to bring 5G to the enterprise and decide whether to co-manage with the service provider (SP) or self-manage. The experience of IT in managing Industrial Ethernet and Wi-Fi may not hold when it comes to 5G. IT will likely require OT’s partnership to address complexity, security, integration, and other new challenges that 5G presents.
Industrial 5G
The potential for industrial 5G huge as it enables whole new business models.
Industrial IoT has a core requirement of the ability to connect sensors, devices, software applications, production process, workers and consumers. The connectivity requires to be seamless vertical and horizontal integrations of all layers of automation pyramids that increases operational efficiency of the plant floor and the supply chain by optimal use of data, information and analytics. This can be improved by five key elements:
• Improved Connectivity
• Availability
• Low Latency
• Flexibility
• Speed
Industrial 5G will impact these areas of the manufacturing industry to guide the success of Industrial IoT.
Industrial 5G will play a key role in helping industrial users achieve the goals of Industrial IoT. 5G offers wireless communications services with reduced latency, increased connection density, and improved flexibility compared to the current 4G generation. 5G technology has a theoretical downlink peak speed of 20 Gbps (gigabits per second), which is about 20 times faster than the current generation.
The key is to start building IoT devices with broadly adopted operating systems, built-in security all the way down to the silicon, verifiable and updatable firmware, and mainstream application development tooling.
- Anshel Sag, analyst at Moor Insights & Strategy
The push and pull in achieving 5G success in IoT will be there until technology providers and end users work together to set up a consensus on standardization. The success will also depend on best-of-breed approach allowing the introduction of new technology over the lifecycle. Software and system integration will also be important attributes to a successful 5G deployment.
READ MORE:How Will IoT Revolutionize Pharmaceutical Manufacturing?
Read More
IoT Security
Article | June 27, 2023
Pharma is big business, but what it’s not generally recognized is, in large part, a manufacturing business with complex supply chains, finicky chemical processes and products that have to meet stringent quality controls. Few of those outside the industry think about how drugs are made safely, efficiently and at scale with reliable quality and in precisely measured doses. Even more interesting is the simple fact that pharma often produces sophisticated drugs using manufacturing processes that are decades out of date, and which are being phased out in comparable industries, such as chemical manufacturing.
Read More
Enterprise Iot
Article | July 20, 2023
Enhancing IoT security: Unveiling the significance of penetration testing in securing real-world IoT applications, identifying vulnerabilities, and mitigating risks for the protection of IoT data.
Contents
1. Introduction to IoT Application Security and Penetration Testing
1.1 Vulnerabilities of IoT application security
2. Fundamentals of IoT Penetration Testing
3. Considerations for IoT Penetration Testing
4. Methodologies and Approaches for IoT Penetration Testing
5. Takeaway
1. Introduction to IoT Application Security and Penetration Testing
Securing real-world IoT applications is paramount as the Internet of Things (IoT) permeates various aspects of any individuals lives. Penetration testing serves as a vital tool in identifying vulnerabilities and assessing the resilience of IoT systems against cyber threats. In this article, delve into the significance of penetration testing in securing IoT applications, exploring its role in identifying weaknesses, mitigating risks, and ensuring the integrity and confidentiality of IoT data.
1.1 Vulnerabilities of IoT application security
Expanded Attack Surface: The proliferation of IoT devices has dramatically expanded the attack surface, increasing the potential for security breach enterprise networks. With billions of interconnected devices, each presenting a potential vulnerability, the risk of unauthorized access, data breaches, and other security incidents is significantly heightened.
Risks: IoT devices often possess limited computational resources, making them susceptible to software and firmware vulnerabilities. Their resource-constrained nature can limit the implementation of robust security measures, leaving them exposed to potential attacks. Furthermore, a significant concern is the prevalence of default or weak credentials on these devices.
Diverse Threat Landscape: The threat landscape surrounding IoT devices is extensive and ever-evolving. It encompasses various attack vectors, including malware, botnets, DDoS attacks, physical tampering, and data privacy breaches. One notable example is the Mirai botnet, which compromised a vast number of IoT devices to launch large-scale DDoS attacks, leading to significant disruptions in internet services. In addition, IoT devices can serve as entry points for infiltrating larger networks and systems, allowing attackers to pivot and gain control over critical infrastructure.
Botnets: IoT devices can be infected with malware and become part of a botnet, which can be used for various malicious activities. Botnets are often utilized to launch distributed denial-of-service (DDoS) attacks, where a network of compromised devices overwhelms a target system with traffic, causing it to become inaccessible.
Ransomware: IoT devices are also vulnerable to ransomware attacks. Ransomware is malicious software that encrypts the data on a device and demands a ransom payment in exchange for the decryption key.
Data Breaches: IoT devices can be targeted to steal sensitive data, including personal identifiable information (PII) or financial data. Due to inadequate security measures, such as weak authentication or unencrypted data transmissions, attackers can exploit IoT devices as entry points to gain unauthorized access to networks and systems.
2. Fundamentals of IoT Penetration Testing
IoT penetration testing, also known as ethical hacking or security assessment, is a critical process for testing and identifying vulnerabilities and assessing the security posture of IoT devices, networks, and applications. It involves simulating real-world attacks to uncover weaknesses and provide insights for remediation.
IoT penetration testing involves identifying vulnerabilities, conducting targeted attacks, and evaluating the effectiveness of security controls in IoT systems. IoT pen-testing aims to proactively identify and address potential weaknesses that malicious actors could exploit. The methodology of IoT pen-testing typically follows a structured approach. It begins with attack surface mapping, which involves identifying all potential entry and exit points that an attacker could leverage within the IoT solution. This step is crucial for understanding the system's architecture and potential vulnerabilities. Pentesters spend considerable time gathering information, studying device documentation, analyzing communication protocols, and assessing the device's hardware and software components.
Once the attack surface is mapped, the following steps involve vulnerability identification and exploitation. This includes conducting security tests, exploiting vulnerabilities, and evaluating the system's resilience to attacks. The penetration testers simulate real-world attack scenarios to assess the device's ability to withstand threats. After exploitation, post-exploitation activities are performed to determine the extent of the compromise and evaluate the potential impact on the device and the overall IoT ecosystem. Finally, a detailed technical report summarizes the findings, vulnerabilities, and recommendations for improving the device's security.
3. Considerations for IoT Penetration Testing
Fuzzing and Protocol Reverse Engineering: Employ advanced techniques like fuzzing to identify vulnerabilities in communication protocols used by IoT devices. Fuzzing involves sending malformed or unexpected data to inputs and analyzing the system's response to uncover potential weaknesses.
Radio Frequency (RF) Analysis: Perform RF analysis to identify weaknesses in wireless communication between IoT devices. This includes analyzing RF signals, monitoring wireless communication protocols, and identifying potential vulnerabilities such as replay attacks or unauthorized signal interception.
Red Team Exercises: Conduct red team exercises to simulate real-world attack scenarios and evaluate the organization's detection and response capabilities. Red team exercises go beyond traditional penetration testing by emulating the actions and techniques of skilled attackers. This helps uncover any weaknesses in incident response, detection, and mitigation processes related to IoT security incidents.
Embedded System Analysis: Gain expertise in analyzing and reverse engineering embedded systems commonly found in IoT devices. This includes understanding microcontrollers, debugging interfaces, firmware extraction techniques, and analyzing the device's hardware architecture. Embedded system analysis helps identify low-level vulnerabilities and potential attack vectors.
Zero-Day Vulnerability Research: Engage in zero-day vulnerability research to identify previously unknown vulnerabilities in IoT devices and associated software. This requires advanced skills in vulnerability discovery, exploit development, and the ability to responsibly disclose vulnerabilities to vendors.
4. Methodologies and Approaches for IoT Penetration Testing
Mobile, Web and Cloud Application Testing
Mobile, web, and cloud application testing is integral to IoT penetration testing, focusing on assessing the security of applications that interact with IoT devices. This methodology involves various steps to evaluate the security of these applications across different platforms. For mobile applications, the methodology includes reviewing the binary code, conducting reverse engineering to understand the inner workings, and analyzing the file system structure. Sensitive information such as keys and certificates embedded within the mobile app are scrutinized for secure storage and handling. The assessment extends to examining the application's resistance to unauthorized modifications. In web applications, the testing covers common vulnerabilities like cross-site scripting (XSS), insecure direct object references (IDOR), and injection attacks. Application reversing techniques are employed to gain insights into the application's logic and potential vulnerabilities. Additionally, hardcoded API keys are identified and assessed for their security implications.
Firmware Penetration Testing
Firmware penetration testing is a crucial aspect of IoT security assessments, aiming to identify vulnerabilities within the firmware running on IoT devices. The methodology encompasses multiple steps to uncover weaknesses. The process begins with binary analysis, dissecting the firmware to understand its structure, functionality, and potential vulnerabilities. Reverse engineering techniques are applied to gain deeper insights into the firmware's inner workings, exposing potential weaknesses like hardcoded credentials or hidden functionality. The analysis extends to examining different file systems used in the firmware and evaluating their configurations and permissions. Sensitive keys, certificates, and cryptographic material embedded within the firmware are scrutinized for secure generation, storage, and utilization. Additionally, the resistance of the firmware to unauthorized modification is assessed, including integrity checks, secure boot mechanisms, and firmware update processes.
IoT Device Hardware Pentest
IoT device hardware penetration testing involves a systematic methodology to assess the security of IoT devices at the hardware level. This comprehensive approach aims to identify vulnerabilities and weaknesses that attackers could exploit. The methodology includes analyzing internal communication protocols like UART, I2C, and SPI to understand potential attack vectors. Open ports are examined to evaluate the security controls and risks associated with communication interfaces. The JTAG debugging interface is explored to gain low-level access and assess the device's resistance to unauthorized access. Extracting firmware from EEPROM or FLASH memory allows testers to analyze the code, configurations, and security controls. Physical tampering attempts are made to evaluate the effectiveness of the device's physical security measures.
5. Takeaway
Penetration testing is crucial in securing real-world IoT applications, enabling organizations to identify vulnerabilities and mitigate risks effectively. By conducting comprehensive and regular penetration tests, organizations can proactively identify and address security weaknesses, ensuring the integrity and confidentiality of IoT data. With the ever-growing threat landscape and increasing reliance on IoT technologies, penetration testing has become indispensable to safeguard IoT applications and protect against potential cyber-attacks.
Several key factors will shape the future of IoT penetration testing. First, the increasing complexity of IoT systems will require testing methodologies to adapt and assess intricate architectures, diverse protocols, and a wide range of devices. Second, there will be a greater emphasis on security by design, with penetration testing focusing on verifying secure coding practices, robust access controls, and secure communication protocols. Third, supply chain security will become crucial, necessitating penetration testing to assess the security measures implemented by vendors, third-party components, and firmware updates. Fourth, integrating IoT penetration testing with DevSecOps practices will ensure continuous monitoring and improvement of IoT system security. Lastly, as attackers become more sophisticated, future IoT penetration testing methodologies will need to keep pace with evolving IoT-specific attack techniques. By embracing these advancements, IoT penetration testing will play a vital role in ensuring the security and privacy of IoT deployments.
Read More