Understanding IoT Security Concepts and Terminology
Lectures 1–3
IoT (Internet of Things) – interconnected physical devices exchanging data.
MMU (Malfunction Management Unit) – hardware failsafe.
Invariant – rule defining safe system states.
NTCIP – network protocol for traffic signal controllers.
DoS / DDoS – denial of service (resource flooding).
Replay Attack – reuse of old valid data packets.
Eavesdropping – intercepting communication.
Injection Attack – unauthorized commands/data inserted.
Tampering – altering transmitted or stored data.
CIA Triad – Confidentiality, Integrity, Availability.
STRIDE – Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of Privilege.
FHSS (Frequency Hopping Spread Spectrum) – changing frequencies to avoid interference.
Wearable IoT Layers – Device → Hub → Cloud.
Adversary Model – defines attacker capabilities and scope.
IoT Communication & Platforms (Lectures 4–6)
Eavesdropping (Passive Attack) – listening without altering data.
Impersonation (Active Attack) – attacker pretends to be a legitimate user/device.
Jamming – blocking signals by flooding the wireless channel.
Compromised Device – legitimate node taken over by an attacker.
TAP (Trigger-Action Programming) – “If this, then that” logic for IoT automation.
IFTTT (If This Then That) – online TAP platform using OAuth.
OAuth 2.0 – authorization without password sharing.
Phases: Signup, User Authentication, Token Exchange, API Access.
Overprovisioning – granting too many permissions in OAuth.
Pub/Sub Model – publisher sends → broker → subscribers receive.
MQTT (Message Queuing Telemetry Transport) – lightweight publish/subscribe protocol.
QoS 0 – At most once (no ACK).
QoS 1 – At least once (ACK, duplicates possible).
QoS 2 – Exactly once (safe, slowest).
Broker – routes MQTT messages based on topic.
Client-Server Model – request/response architecture.
Publish-Subscribe (Pub/Sub) – decoupled message delivery via broker.
🏭 Industrial IoT & SCADA (Lectures 7–9)
SCADA (Supervisory Control and Data Acquisition) – remote control systems.
ICS (Industrial Control System) – automation and process control.
CPS (Cyber-Physical System) – computer plus physical interaction.
IIoT (Industrial IoT) – industrial version of IoT.
PLC (Programmable Logic Controller) – rugged microcontroller for automation.
DCS (Distributed Control System) – controls within a local facility.
Modbus / DNP3 – common SCADA communication protocols.
Freshness – ensuring data is current (not replayed).
Safety Priority – SCADA emphasizes uptime and human safety over confidentiality.
Stuxnet Worm – first cyberweapon targeting ICS/PLCs.
Zero-Day Exploit – unknown vulnerability used in an attack.
Attribution – linking attacks to responsible entities.
Olympic Pipeline Incident – SCADA failure causing an explosion.
🔐 Encryption & Hashing (Lectures 10–12)
Encryption – converting plaintext to ciphertext for confidentiality.
Decryption – reversing encryption using a key.
Symmetric Encryption – same key for encrypting/decrypting (AES).
Asymmetric Encryption – public/private key pair (RSA, ECC).
AES – Advanced Encryption Standard (block cipher).
RC4, SEAL – stream ciphers (encrypt bit-by-bit).
RSA – asymmetric encryption and signature algorithm.
Diffie-Hellman (DH) – key agreement (shared secret over insecure channel).
ECC (Elliptic Curve Cryptography) – modern asymmetric scheme (faster than RSA).
Confidentiality vs Integrity – confidentiality hides data; integrity ensures it’s untampered.
MAC (Message Authentication Code) – integrity and authenticity check.
HMAC – hash-based MAC (keyed hash using SHA).
AE (Authenticated Encryption) – provides both confidentiality and integrity.
GCM (Galois/Counter Mode)
CCM (Counter Mode + CBC-MAC)
SHA-2 Family – SHA-256, SHA-384, SHA-512 (secure hashes).
Broken Hashes – MD5, SHA-1, CRC.
Preimage Resistance – hard to find x for given H(x)=y.
Second Preimage – hard to find x′≠x with the same hash.
Collision Resistance – hard to find any two inputs with the same hash.
Encrypt/MAC Orders:
MAC→Encrypt (TLS).
Encrypt→MAC (IPSec).
Encrypt+MAC (SSH).
AEAD (Authenticated Encryption with Associated Data) – includes unencrypted metadata.
✍️ Digital Signatures & Key Management (Lecture 13)
Digital Signature – proves message origin and integrity.
Sign(SK, H(M)) / Verify(PK, sig, H(M))
Non-repudiation – sender can’t deny authorship.
TTP (Trusted Third Party) – issues session keys between nodes.
Session Key (Kab) – temporary symmetric key for communication.
Nonce (Na/Nb) – random number used once to ensure freshness.
RSA Key Exchange – exchange random challenges to derive Kab = h(na⊕nb).
Diffie-Hellman MITM – attacker inserts own public keys; must use certificates.
Certificate – digital identity bound to public key, signed by CA.
CA (Certificate Authority) – trusted organization signing public keys.
PKI (Public Key Infrastructure) – framework managing certificates and key trust.
Certificate Chain – trust path from root CA to entity.
CA Compromise – fake certificate issuance.
📲 Bluetooth & Secure Pairing (Lectures 14–16)
Legacy Pairing
PIN – user-entered number to start pairing.
Kinit (Initialization Key) – derived from PIN, BD_Addr, and Rand.
Kab (Link Key) – derived from exchanged randoms LK_Rand_a/b.
AU_Rand / SRES – used for authentication challenge.
Brute Force Risk – short PINs easily guessed.
Jamming Attack – force re-pair to capture traffic.
Secure Simple Pairing (SSP)
ECDH (Elliptic Curve Diffie-Hellman) – computes shared DHKey.
Four SSP Modes:
Numeric Comparison – user confirms matching numbers; protects against MITM.
Passkey Entry – enter displayed code on device; protects against MITM.
Just Works – no user check; only eavesdrop protection.
OOB (Out-of-Band) – uses NFC/Wired; best MITM protection.
SSP Phases:
Public Key Exchange.
Authentication (mode-specific).
Verification.
Link Key and Encryption.
DHKey – shared ECDH-derived value.
Commit Values (H(PKa, PKb, Na/Nb)) – used to confirm matching secrets.
MITM Protection – only if user/device verification step exists.
👂 Bluetooth Eavesdropping
BLE (Bluetooth Low Energy) – 40 channels (37 data, 3 advertising).
Access Address – connection identifier.
CRCInit – 24-bit seed for packet integrity check.
Hop Interval – time per channel (ms).
Hop Increment – channel step size.
Hop Cycle Formula:
Cycle = 37 × 1.25 × HopInterval (ms).Whitening – XOR-based randomization to reduce interference.
Frequency Hopping – avoids jamming and tracking.
Eavesdropping Requirements: must determine Access Address, CRCInit, Hop Interval, Hop Increment.
🧩 General Security & Attack Terms
MITM (Man-in-the-Middle) – attacker relays between two victims.
Replay Attack – resend old valid data.
Nonce (Number Used Once) – prevents replay.
Freshness Check – validates new session.
Integrity Check – verify message unchanged.
Confidentiality – prevents data leakage.
Authenticity – confirms sender identity.
Non-repudiation – prevents sender denial.
Brute Force – systematic key guessing.
Entropy – randomness strength in keys.
