summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc8576.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc8576.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc8576.txt')
-rw-r--r--doc/rfc/rfc8576.txt2803
1 files changed, 2803 insertions, 0 deletions
diff --git a/doc/rfc/rfc8576.txt b/doc/rfc/rfc8576.txt
new file mode 100644
index 0000000..a6b4f05
--- /dev/null
+++ b/doc/rfc/rfc8576.txt
@@ -0,0 +1,2803 @@
+
+
+
+
+
+
+Internet Research Task Force (IRTF) O. Garcia-Morchon
+Request for Comments: 8576 Philips
+Category: Informational S. Kumar
+ISSN: 2070-1721 Signify
+ M. Sethi
+ Ericsson
+ April 2019
+
+
+ Internet of Things (IoT) Security: State of the Art and Challenges
+
+Abstract
+
+ The Internet of Things (IoT) concept refers to the usage of standard
+ Internet protocols to allow for human-to-thing and thing-to-thing
+ communication. The security needs for IoT systems are well
+ recognized, and many standardization steps to provide security have
+ been taken -- for example, the specification of the Constrained
+ Application Protocol (CoAP) secured with Datagram Transport Layer
+ Security (DTLS). However, security challenges still exist, not only
+ because there are some use cases that lack a suitable solution, but
+ also because many IoT devices and systems have been designed and
+ deployed with very limited security capabilities. In this document,
+ we first discuss the various stages in the lifecycle of a thing.
+ Next, we document the security threats to a thing and the challenges
+ that one might face to protect against these threats. Lastly, we
+ discuss the next steps needed to facilitate the deployment of secure
+ IoT systems. This document can be used by implementers and authors
+ of IoT specifications as a reference for details about security
+ considerations while documenting their specific security challenges,
+ threat models, and mitigations.
+
+ This document is a product of the IRTF Thing-to-Thing Research Group
+ (T2TRG).
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 1]
+
+RFC 8576 IoT Security April 2019
+
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Research Task Force
+ (IRTF). The IRTF publishes the results of Internet-related research
+ and development activities. These results might not be suitable for
+ deployment. Documents approved for publication by the IRSG are not
+ candidates for any level of Internet Standard; see Section 2 of RFC
+ 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc8576.
+
+Copyright Notice
+
+ Copyright (c) 2019 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 2]
+
+RFC 8576 IoT Security April 2019
+
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4
+ 2. The Thing Lifecycle . . . . . . . . . . . . . . . . . . . . . 5
+ 3. Security Threats and Managing Risk . . . . . . . . . . . . . 8
+ 4. State of the Art . . . . . . . . . . . . . . . . . . . . . . 13
+ 4.1. IP-Based IoT Protocols and Standards . . . . . . . . . . 13
+ 4.2. Existing IP-Based Security Protocols and Solutions . . . 16
+ 4.3. IoT Security Guidelines . . . . . . . . . . . . . . . . . 18
+ 5. Challenges for a Secure IoT . . . . . . . . . . . . . . . . . 21
+ 5.1. Constraints and Heterogeneous Communication . . . . . . . 21
+ 5.1.1. Resource Constraints . . . . . . . . . . . . . . . . 21
+ 5.1.2. Denial-of-Service Resistance . . . . . . . . . . . . 22
+ 5.1.3. End-to-End Security, Protocol Translation, and the
+ Role of Middleboxes . . . . . . . . . . . . . . . . . 23
+ 5.1.4. New Network Architectures and Paradigm . . . . . . . 25
+ 5.2. Bootstrapping of a Security Domain . . . . . . . . . . . 25
+ 5.3. Operational Challenges . . . . . . . . . . . . . . . . . 25
+ 5.3.1. Group Membership and Security . . . . . . . . . . . . 26
+ 5.3.2. Mobility and IP Network Dynamics . . . . . . . . . . 27
+ 5.4. Secure Software Update and Cryptographic Agility . . . . 27
+ 5.5. End-of-Life . . . . . . . . . . . . . . . . . . . . . . . 30
+ 5.6. Verifying Device Behavior . . . . . . . . . . . . . . . . 30
+ 5.7. Testing: Bug Hunting and Vulnerabilities . . . . . . . . 31
+ 5.8. Quantum-Resistance . . . . . . . . . . . . . . . . . . . 32
+ 5.9. Privacy Protection . . . . . . . . . . . . . . . . . . . 33
+ 5.10. Reverse-Engineering Considerations . . . . . . . . . . . 34
+ 5.11. Trustworthy IoT Operation . . . . . . . . . . . . . . . . 35
+ 6. Conclusions and Next Steps . . . . . . . . . . . . . . . . . 36
+ 7. Security Considerations . . . . . . . . . . . . . . . . . . . 36
+ 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 36
+ 9. Informative References . . . . . . . . . . . . . . . . . . . 37
+ Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 50
+ Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 50
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 3]
+
+RFC 8576 IoT Security April 2019
+
+
+1. Introduction
+
+ The Internet of Things (IoT) denotes the interconnection of highly
+ heterogeneous networked entities and networks that follow a number of
+ different communication patterns, such as: human-to-human (H2H),
+ human-to-thing (H2T), thing-to-thing (T2T), or thing-to-things
+ (T2Ts). The term "IoT" was first coined in 1999 by the Auto-ID
+ center [AUTO-ID], which had envisioned a world where every physical
+ object has a radio-frequency identification (RFID) tag with a
+ globally unique identifier. This would not only allow tracking of
+ objects in real time but also allow querying of data about them over
+ the Internet. However, since then, the meaning of the Internet of
+ Things has expanded and now encompasses a wide variety of
+ technologies, objects, and protocols. It is not surprising that the
+ IoT has received significant attention from the research community to
+ (re)design, apply, and use standard Internet technology and protocols
+ for the IoT.
+
+ The things that are part of the Internet of Things are computing
+ devices that understand and react to the environment they reside in.
+ These things are also often referred to as smart objects or smart
+ devices. The introduction of IPv6 [RFC6568] and CoAP [RFC7252] as
+ fundamental building blocks for IoT applications allows connecting
+ IoT hosts to the Internet. This brings several advantages,
+ including: (i) a homogeneous protocol ecosystem that allows simple
+ integration with other Internet hosts; (ii) simplified development
+ for devices that significantly vary in their capabilities; (iii) a
+ unified interface for applications, removing the need for
+ application-level proxies. These building blocks greatly simplify
+ the deployment of the envisioned scenarios, which range from building
+ automation to production environments and personal area networks.
+
+ This document presents an overview of important security aspects for
+ the Internet of Things. We begin by discussing the lifecycle of a
+ thing in Section 2. In Section 3, we discuss security threats for
+ the IoT and methodologies for managing these threats when designing a
+ secure system. Section 4 reviews existing IP-based (security)
+ protocols for the IoT and briefly summarizes existing guidelines and
+ regulations. Section 5 identifies remaining challenges for a secure
+ IoT and discusses potential solutions. Section 6 includes final
+ remarks and conclusions. This document can be used by IoT standards
+ specifications as a reference for details about security
+ considerations that apply to the specified system or protocol.
+
+ The first draft version of this document was submitted in March 2011.
+ Initial draft versions of this document were presented and discussed
+ during the meetings of the Constrained RESTful Environments (CORE)
+ Working Group at IETF 80 and later. Discussions on security
+
+
+
+Garcia-Morchon, et al. Informational [Page 4]
+
+RFC 8576 IoT Security April 2019
+
+
+ lifecycle at IETF 92 (March 2015) evolved into more general security
+ considerations. Thus, the draft was selected to address the T2TRG
+ work item on the security considerations and challenges for the
+ Internet of Things. Further updates of the draft were presented and
+ discussed during the T2TRG meetings at IETF 96 (July 2016) and IETF
+ 97 (November 2016) and at the joint interim meeting in Amsterdam
+ (March 2017). This document has been reviewed by, commented on, and
+ discussed extensively for a period of nearly six years by a vast
+ majority of the T2TRG and related group members, the number of which
+ certainly exceeds 100 individuals. It is the consensus of T2TRG that
+ the security considerations described in this document should be
+ published in the IRTF Stream of the RFC series. This document does
+ not constitute a standard.
+
+2. The Thing Lifecycle
+
+ The lifecycle of a thing refers to the operational phases of a thing
+ in the context of a given application or use case. Figure 1 shows
+ the generic phases of the lifecycle of a thing. This generic
+ lifecycle is applicable to very different IoT applications and
+ scenarios. For instance, [RFC7744] provides an overview of relevant
+ IoT use cases.
+
+ In this document, we consider a Building Automation and Control (BAC)
+ system to illustrate the lifecycle and the meaning of these different
+ phases. A BAC system consists of a network of interconnected nodes
+ that performs various functions in the domains of Heating,
+ Ventilating, and Air Conditioning (HVAC), lighting, safety, etc. The
+ nodes vary in functionality, and a large majority of them represent
+ resource-constrained devices such as sensors and luminaries. Some
+ devices may be battery operated or may rely on energy harvesting.
+ This requires us to also consider devices that sleep during their
+ operation to save energy. In our BAC scenario, the life of a thing
+ starts when it is manufactured. Due to the different application
+ areas (i.e., HVAC, lighting, or safety), nodes/things are tailored to
+ a specific task. It is therefore unlikely that one single
+ manufacturer will create all nodes in a building. Hence,
+ interoperability as well as trust bootstrapping between nodes of
+ different vendors is important.
+
+ The thing is later installed and commissioned within a network by an
+ installer during the bootstrapping phase. Specifically, the device
+ identity and the secret keys used during normal operation may be
+ provided to the device during this phase. Different subcontractors
+ may install different IoT devices for different purposes.
+ Furthermore, the installation and bootstrapping procedures may not be
+ a discrete event and may stretch over an extended period. After
+ being bootstrapped, the device and the system of things are in
+
+
+
+Garcia-Morchon, et al. Informational [Page 5]
+
+RFC 8576 IoT Security April 2019
+
+
+ operational mode and execute the functions of the BAC system. During
+ this operational phase, the device is under the control of the system
+ owner and used by multiple system users. For devices with lifetimes
+ spanning several years, occasional maintenance cycles may be
+ required. During each maintenance phase, the software on the device
+ can be upgraded, or applications running on the device can be
+ reconfigured. The maintenance tasks can be performed either locally
+ or from a backend system. Depending on the operational changes to
+ the device, it may be required to rebootstrap at the end of a
+ maintenance cycle. The device continues to loop through the
+ operational phase and the eventual maintenance phases until the
+ device is decommissioned at the end of its lifecycle. However, the
+ end-of-life of a device does not necessarily mean that it is
+ defective; rather, it denotes a need to replace and upgrade the
+ network to next-generation devices for additional functionality.
+ Therefore, the device can be removed and recommissioned to be used in
+ a different system under a different owner, thereby starting the
+ lifecycle all over again.
+
+ We note that the presented lifecycle represents to some extent a
+ simplified model. For instance, it is possible to argue that the
+ lifecycle does not start when a tangible device is manufactured but
+ rather when the oldest bit of code that ends up in the device --
+ maybe from an open-source project or the operating system -- was
+ written. Similarly, the lifecycle could also include an on-the-shelf
+ phase where the device is in the supply chain before an owner/user
+ purchases and installs it. Another phase could involve the device
+ being rebadged by some vendor who is not the original manufacturer.
+ Such phases can significantly complicate other phases such as
+ maintenance and bootstrapping. Finally, other potential end states
+ can be, e.g., a vendor that no longer supports a device type because
+ it is at the end of its life or a situation in which a device is
+ simply forgotten but remains functional.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 6]
+
+RFC 8576 IoT Security April 2019
+
+
+ _Manufactured _SW update _Decommissioned
+ / / /
+ | _Installed | _ Application | _Removed &
+ | / | / reconfigured | / replaced
+ | | _Commissioned | | | |
+ | | / | | | | _Reownership &
+ | | | _Application | | _Application | | / recommissioned
+ | | | / running | | / running | | |
+ | | | | | | | | | | \\
+ +##+##+###+#############+##+##+#############+##+##+##############>>>
+ \/ \______________/ \/ \_____________/ \___/ time //
+ / / \ \ \
+ Bootstrapping / Maintenance & \ Maintenance &
+ / rebootstrapping \ rebootstrapping
+ Operational Operational
+
+ Figure 1: The Lifecycle of a Thing in the Internet of Things
+
+ Security is a key requirement in any communication system. However,
+ security is an even more critical requirement in real-world IoT
+ deployments for several reasons. First, compromised IoT systems can
+ not only endanger the privacy and security of a user but can also
+ cause physical harm. This is because IoT systems often comprise
+ sensors, actuators, and other connected devices in the physical
+ environment of the user that could adversely affect the user if they
+ are compromised. Second, a vulnerable IoT system means that an
+ attacker can alter the functionality of a device from a given
+ manufacturer. This not only affects the manufacturer's brand image
+ but can also leak information that is very valuable for the
+ manufacturer (such as proprietary algorithms). Third, the impact of
+ attacking an IoT system goes beyond a specific device or an isolated
+ system, since compromised IoT systems can be misused at scale. For
+ example, they may be used to perform a Distributed Denial of Service
+ (DDoS) attack that limits the availability of other networks and
+ services. The fact that many IoT systems rely on standard IP
+ protocols allows for easier system integration, but this also makes
+ attacks on standard IP protocols widely applicable in other
+ environments. This results in new requirements regarding the
+ implementation of security.
+
+ The term "security" subsumes a wide range of primitives, protocols,
+ and procedures. For instance, it includes services such as
+ confidentiality, authentication, integrity, authorization, source
+ authentication, and availability. It often also includes augmented
+ services such as duplicate detection and detection of stale packets
+ (timeliness). These security services can be implemented through a
+ combination of cryptographic mechanisms such as block ciphers, hash
+ functions, and signature algorithms, as well as noncryptographic
+
+
+
+Garcia-Morchon, et al. Informational [Page 7]
+
+RFC 8576 IoT Security April 2019
+
+
+ mechanisms that implement authorization and other aspects of
+ security-policy enforcement. For ensuring security in IoT networks,
+ one should not only focus on the required security services but also
+ pay special attention to how the services are realized in the overall
+ system.
+
+3. Security Threats and Managing Risk
+
+ Security threats in related IP protocols have been analyzed in
+ multiple documents, including Hypertext Transfer Protocol (HTTP) over
+ Transport Layer Security (TLS) (HTTPS) [RFC2818], Constrained
+ Application Protocol (CoAP) [RFC7252], IPv6 over Low-Power Wireless
+ Personal Area Networks (6LoWPAN) [RFC4919], Access Node Control
+ Protocol (ANCP) [RFC5713], Domain Name System (DNS) [RFC3833], IPv6
+ Neighbor Discovery (ND) [RFC3756], and Protocol for Carrying
+ Authentication and Network Access (PANA) [RFC4016]. In this section,
+ we specifically discuss the threats that could compromise an
+ individual thing or the network as a whole. Some of these threats
+ might go beyond the scope of Internet protocols, but we gather them
+ here for the sake of completeness. The threats in the following list
+ are not in any particular order, and some threats might be more
+ critical than others, depending on the deployment scenario under
+ consideration:
+
+ 1. Vulnerable software/code: Things in the Internet of Things rely
+ on software that might contain severe bugs and/or bad design
+ choices. This makes the things vulnerable to many different
+ types of attacks, depending on the criticality of the bugs,
+ e.g., buffer overflows or lack of authentication. This can be
+ considered one of the most important security threats. The
+ large-scale Distributed Denial of Service (DDoS) attack,
+ popularly known as the Mirai botnet [Mirai], was caused by
+ things that had well-known or easy-to-guess passwords for
+ configuration.
+
+ 2. Privacy threat: The tracking of a thing's location and usage may
+ pose a privacy risk to people around it. For instance, an
+ attacker can infer privacy-sensitive information from the data
+ gathered and communicated by individual things. Such
+ information may subsequently be sold to interested parties for
+ marketing purposes and targeted advertising. In extreme cases,
+ such information might be used to track dissidents in oppressive
+ regimes. Unlawful surveillance and interception of traffic to/
+ from a thing by intelligence agencies is also a privacy threat.
+
+ 3. Cloning of things: During the manufacturing process of a thing,
+ an untrusted factory can easily clone the physical
+ characteristics, firmware/software, or security configuration of
+
+
+
+Garcia-Morchon, et al. Informational [Page 8]
+
+RFC 8576 IoT Security April 2019
+
+
+ the thing. Deployed things might also be compromised and their
+ software reverse engineered, allowing for cloning or software
+ modifications. Such a cloned thing may be sold at a cheaper
+ price in the market and yet can function normally as a genuine
+ thing. For example, two cloned devices can still be associated
+ and work with each other. In the worst-case scenario, a cloned
+ device can be used to control a genuine device or perform an
+ attack. One should note here that an untrusted factory may also
+ change functionality of the cloned thing, resulting in degraded
+ functionality with respect to the genuine thing (thereby
+ inflicting potential damage to the reputation of the original
+ thing manufacturer). Moreover, additional functionality can be
+ introduced in the cloned thing. An example of such
+ functionality is a backdoor.
+
+ 4. Malicious substitution of things: During the installation of a
+ thing, a genuine thing may be replaced by a similar variant (of
+ lower quality) without being detected. The main motivation may
+ be cost savings, where the installation of lower-quality things
+ (for example, noncertified products) may significantly reduce
+ the installation and operational costs. The installers can
+ subsequently resell the genuine things to gain further financial
+ benefits. Another motivation may be to inflict damage to the
+ reputation of a competitor's offerings.
+
+ 5. Eavesdropping attack: During the commissioning of a thing into a
+ network, it may be susceptible to eavesdropping, especially if
+ operational keying materials, security parameters, or
+ configuration settings are exchanged in the clear using a
+ wireless medium or if used cryptographic algorithms are not
+ suitable for the envisioned lifetime of the device and the
+ system. After obtaining the keying material, the attacker might
+ be able to recover the secret keys established between the
+ communicating entities, thereby compromising the authenticity
+ and confidentiality of the communication channel, as well as the
+ authenticity of commands and other traffic exchanged over this
+ communication channel. When the network is in operation, T2T
+ communication can be eavesdropped if the communication channel
+ is not sufficiently protected or if a session key is compromised
+ due to protocol weaknesses. An adversary may also be able to
+ eavesdrop if keys are not renewed or updated appropriately.
+ Lastly, messages can also be recorded and decrypted offline at a
+ later point of time. The VENONA project [venona-project] is one
+ such example where messages were recorded for offline
+ decryption.
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 9]
+
+RFC 8576 IoT Security April 2019
+
+
+ 6. Man-in-the-middle attack: Both the commissioning and operational
+ phases may be vulnerable to man-in-the-middle attacks. For
+ example, when keying material between communicating entities is
+ exchanged in the clear, the security of the key establishment
+ protocol depends on the tacit assumption that no third party can
+ eavesdrop during the execution of this protocol. Additionally,
+ device authentication or device authorization may be nontrivial
+ or need the support of a human decision process, since things
+ usually do not have a priori knowledge about each other and
+ cannot always differentiate friends and foes via completely
+ automated mechanisms.
+
+ 7. Firmware attacks: When a thing is in operation or maintenance
+ phase, its firmware or software may be updated to allow for new
+ functionality or new features. An attacker may be able to
+ exploit such a firmware upgrade by maliciously replacing the
+ thing's firmware, thereby influencing its operational behavior.
+ For example, an attacker could add a piece of malicious code to
+ the firmware that will cause it to periodically report the
+ energy usage of the thing to a data repository for analysis.
+ The attacker can then use this information to determine when a
+ home or enterprise (where the thing is installed) is unoccupied
+ and break in. Similarly, devices whose software has not been
+ properly maintained and updated might contain vulnerabilities
+ that might be exploited by attackers to replace the firmware on
+ the device.
+
+ 8. Extraction of private information: IoT devices (such as sensors,
+ actuators, etc.) are often physically unprotected in their
+ ambient environment, and they could easily be captured by an
+ attacker. An attacker with physical access may then attempt to
+ extract private information such as keys (for example, a group
+ key or the device's private key), data from sensors (for
+ example, healthcare status of a user), configuration parameters
+ (for example, the Wi-Fi key), or proprietary algorithms (for
+ example, the algorithm performing some data analytics task).
+ Even when the data originating from a thing is encrypted,
+ attackers can perform traffic analysis to deduce meaningful
+ information, which might compromise the privacy of the thing's
+ owner and/or user.
+
+
+
+
+
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 10]
+
+RFC 8576 IoT Security April 2019
+
+
+ 9. Routing attack: As highlighted in [Daniel], routing information
+ in IoT networks can be spoofed, altered, or replayed, in order
+ to create routing loops, attract/repel network traffic, extend/
+ shorten source routes, etc. A nonexhaustive list of routing
+ attacks includes:
+
+ a. Sinkhole attack (or blackhole attack), where an attacker
+ declares himself to have a high-quality route/path to the
+ base station, thus allowing him to do manipulate all packets
+ passing through it.
+
+ b. Selective forwarding, where an attacker may selectively
+ forward packets or simply drop a packet.
+
+ c. Wormhole attack, where an attacker may record packets at one
+ location in the network and tunnel them to another location,
+ thereby influencing perceived network behavior and
+ potentially distorting statistics, thus greatly impacting
+ the functionality of routing.
+
+ d. Sybil attack, whereby an attacker presents multiple
+ identities to other things in the network. We refer to
+ [Daniel] for further router attacks and a more detailed
+ description.
+
+ 10. Elevation of privilege: An attacker with low privileges can
+ misuse additional flaws in the implemented authentication and
+ authorization mechanisms of a thing to gain more privileged
+ access to the thing and its data.
+
+ 11. Denial of Service (DoS) attack: Often things have very limited
+ memory and computation capabilities. Therefore, they are
+ vulnerable to resource-exhaustion attack. Attackers can
+ continuously send requests to specific things so as to deplete
+ their resources. This is especially dangerous in the Internet
+ of Things since an attacker might be located in the backend and
+ target resource-constrained devices that are part of a
+ constrained-node network [RFC7228]. A DoS attack can also be
+ launched by physically jamming the communication channel.
+ Network availability can also be disrupted by flooding the
+ network with a large number of packets. On the other hand,
+ things compromised by attackers can be used to disrupt the
+ operation of other networks or systems by means of a Distributed
+ DoS (DDoS) attack.
+
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 11]
+
+RFC 8576 IoT Security April 2019
+
+
+ To deal with the above threats, it is required to find and apply
+ suitable security mitigations. However, new threats and exploits
+ appear on a daily basis, and products are deployed in different
+ environments prone to different types of threats. Thus, ensuring a
+ proper level of security in an IoT system at any point of time is
+ challenging. To address this challenge, some of the following
+ methodologies can be used:
+
+ 1. A Business Impact Analysis (BIA) assesses the consequences of the
+ loss of basic security attributes: confidentiality, integrity,
+ and availability in an IoT system. These consequences might
+ include the impact from lost data, reduced sales, increased
+ expenses, regulatory fines, customer dissatisfaction, etc.
+ Performing a business impact analysis allows a business to
+ determine the relevance of having a proper security design.
+
+ 2. A Risk Assessment (RA) analyzes security threats to an IoT system
+ while considering their likelihood and impact. It also includes
+ categorizing each of them with a risk level. Risks classified as
+ moderate or high must be mitigated, i.e., the security
+ architecture should be able to deal with those threats.
+
+ 3. A Privacy Impact Assessment (PIA) aims at assessing the
+ Personally Identifiable Information (PII) that is collected,
+ processed, or used in an IoT system. By doing so, the goal is to
+ fulfill applicable legal requirements and determine the risks and
+ effects of manipulation and loss of PII.
+
+ 4. Procedures for incident reporting and mitigation refer to the
+ methodologies that allow becoming aware of any security issues
+ that affect an IoT system. Furthermore, this includes steps
+ towards the actual deployment of patches that mitigate the
+ identified vulnerabilities.
+
+ BIA, RA, and PIA should generally be realized during the creation of
+ a new IoT system or when deploying significant system/feature
+ upgrades. In general, it is recommended to reassess them on a
+ regular basis, taking into account new use cases and/or threats. The
+ way a BIA, RA, or PIA is performed depends on the environment and the
+ industry. More information can be found in NIST documents such as
+ [NISTSP800-34r1], [NISTSP800-30r1], and [NISTSP800-122].
+
+
+
+
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 12]
+
+RFC 8576 IoT Security April 2019
+
+
+4. State of the Art
+
+ This section is organized as follows. Section 4.1 summarizes the
+ state of the art on IP-based IoT systems, within both the IETF and
+ other standardization bodies. Section 4.2 summarizes the state of
+ the art on IP-based security protocols and their usage. Section 4.3
+ discusses guidelines and regulations for securing IoT as proposed by
+ other bodies. Note that the references included in this section are
+ a representative of the state of the art at the point of writing, and
+ they are by no means exhaustive. The references are also at varying
+ levels of maturity; thus, it is advisable to review their specific
+ status.
+
+4.1. IP-Based IoT Protocols and Standards
+
+ Nowadays, there exists a multitude of control protocols for IoT. For
+ BAC systems, the ZigBee standard [ZB], BACNet [BACNET], and DALI
+ [DALI] play key roles. Recent trends, however, focus on an all-IP
+ approach for system control.
+
+ In this setting, a number of IETF working groups are designing new
+ protocols for resource-constrained networks of smart things. The
+ 6LoWPAN Working Group [WG-6LoWPAN], for example, has defined methods
+ and protocols for the efficient transmission and adaptation of IPv6
+ packets over IEEE 802.15.4 networks [RFC4944].
+
+ The CoRE Working Group [WG-CoRE] has specified the Constrained
+ Application Protocol (CoAP) [RFC7252]. CoAP is a RESTful protocol
+ for constrained devices that is modeled after HTTP and typically runs
+ over UDP to enable efficient application-level communication for
+ things. ("RESTful" refers to the Representational State Transfer
+ (REST) architecture.)
+
+ In many smart-object networks, the smart objects are dispersed and
+ have intermittent reachability either because of network outages or
+ because they sleep during their operational phase to save energy. In
+ such scenarios, direct discovery of resources hosted on the
+ constrained server might not be possible. To overcome this barrier,
+ the CoRE Working Group is specifying the concept of a Resource
+ Directory (RD) [RD]. The Resource Directory hosts descriptions of
+ resources that are located on other nodes. These resource
+ descriptions are specified as CoRE link format [RFC6690].
+
+ While CoAP defines a standard communication protocol, a format for
+ representing sensor measurements and parameters over CoAP is
+ required. "Sensor Measurement Lists (SenML)" [RFC8428] is a
+ specification that defines media types for simple sensor measurements
+ and parameters. It has a minimalistic design so that constrained
+
+
+
+Garcia-Morchon, et al. Informational [Page 13]
+
+RFC 8576 IoT Security April 2019
+
+
+ devices with limited computational capabilities can easily encode
+ their measurements and, at the same time, servers can efficiently
+ collect a large number of measurements.
+
+ In many IoT deployments, the resource-constrained smart objects are
+ connected to the Internet via a gateway that is directly reachable.
+ For example, an IEEE 802.11 Access Point (AP) typically connects the
+ client devices to the Internet over just one wireless hop. However,
+ some deployments of smart-object networks require routing between the
+ smart objects themselves. The IETF has therefore defined the IPv6
+ Routing Protocol for Low-Power and Lossy Networks (RPL) [RFC6550].
+ RPL provides support for multipoint-to-point traffic from resource-
+ constrained smart objects towards a more resourceful central control
+ point, as well as point-to-multipoint traffic in the reverse
+ direction. It also supports point-to-point traffic between the
+ resource-constrained devices. A set of routing metrics and
+ constraints for path calculation in RPL are also specified [RFC6551].
+
+ The IPv6 over Networks of Resource-constrained Nodes (6lo) Working
+ Group of the IETF [WG-6lo] has specified how IPv6 packets can be
+ transmitted over various link-layer protocols that are commonly
+ employed for resource-constrained smart-object networks. There is
+ also ongoing work to specify IPv6 connectivity for a Non-Broadcast
+ Multi-Access (NBMA) mesh network that is formed by IEEE 802.15.4
+ Time-Slotted Channel Hopping (TSCH) links [ARCH-6TiSCH]. Other link-
+ layer protocols for which the IETF has specified or is currently
+ specifying IPv6 support include Bluetooth [RFC7668], Digital Enhanced
+ Cordless Telecommunications (DECT) Ultra Low Energy (ULE) air
+ interface [RFC8105], and Near Field Communication (NFC)
+ [IPv6-over-NFC].
+
+ Baker and Meyer [RFC6272] identify which IP protocols can be used in
+ smart-grid environments. They give advice to smart-grid network
+ designers on how they can decide on a profile of the Internet
+ protocol suite for smart-grid networks.
+
+ The Low Power Wide-Area Network (LPWAN) Working Group [WG-LPWAN] is
+ analyzing features, requirements, and solutions to adapt IP-based
+ protocols to networks such as LoRa [LoRa], Sigfox [sigfox], NB-IoT
+ [NB-IoT], etc. These networking technologies enable a smart thing to
+ run for years on a single coin-cell by relying on a star network
+ topology and using optimized radio modulation with frame sizes in the
+ order of tens of bytes. Such networks bring new security challenges,
+ since most existing security mechanism do not work well with such
+ resource constraints.
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 14]
+
+RFC 8576 IoT Security April 2019
+
+
+ JavaScript Object Notation (JSON) is a lightweight text-
+ representation format for structured data [RFC8259]. It is often
+ used for transmitting serialized structured data over the network.
+ The IETF has defined specifications for encoding cryptographic keys,
+ encrypted content, signed content, and claims to be transferred
+ between two parties as JSON objects. They are referred to as JSON
+ Web Keys (JWKs) [RFC7517], JSON Web Encryption (JWE) [RFC7516], JSON
+ Web Signatures (JWSs) [RFC7515], and JSON Web Token (JWT) [RFC7519].
+
+ An alternative to JSON, Concise Binary Object Representation (CBOR)
+ [RFC7049], is a concise binary data format that is used for
+ serialization of structured data. It is designed for resource-
+ constrained nodes, and therefore it aims to provide a fairly small
+ message size with minimal implementation code and extensibility
+ without the need for version negotiation. CBOR Object Signing and
+ Encryption (COSE) [RFC8152] specifies how to encode cryptographic
+ keys, message authentication codes, encrypted content, and signatures
+ with CBOR.
+
+ The Light-Weight Implementation Guidance (LWIG) Working Group
+ [WG-LWIG] is collecting experiences from implementers of IP stacks in
+ constrained devices. The working group has already produced
+ documents such as [RFC7815], which defines how a minimal Internet Key
+ Exchange Version 2 (IKEv2) initiator can be implemented.
+
+ The Thing-2-Thing Research Group (T2TRG) [RG-T2TRG] is investigating
+ the remaining research issues that need to be addressed to quickly
+ turn the vision of IoT into a reality where resource-constrained
+ nodes can communicate with each other and with other more capable
+ nodes on the Internet.
+
+ Additionally, industry alliances and other standardization bodies are
+ creating constrained IP protocol stacks based on the IETF work. Some
+ important examples of this include:
+
+ 1. Thread [Thread]: Specifies the Thread protocol that is intended
+ for a variety of IoT devices. It is an IPv6-based network
+ protocol that runs over IEEE 802.15.4.
+
+ 2. Industrial Internet Consortium [IIoT]: The consortium defines
+ reference architectures and security frameworks for development,
+ adoption, and widespread use of Industrial Internet technologies
+ based on existing IETF standards.
+
+ 3. IPSO Alliance (which subsequently merged with OMA SpecWorks
+ [OMASpecWorks]): The alliance specifies a common object model
+ that enables application software on any device to interoperate
+ with other conforming devices.
+
+
+
+Garcia-Morchon, et al. Informational [Page 15]
+
+RFC 8576 IoT Security April 2019
+
+
+ 4. OneM2M [OneM2M]: The standards body defines technical and API
+ specifications for IoT devices. It aims to create a service
+ layer that can run on any IoT device hardware and software.
+
+ 5. Open Connectivity Foundation (OCF) [OCF]: The foundation develops
+ standards and certifications primarily for IoT devices that use
+ Constrained Application Protocol (CoAP) as the application-layer
+ protocol.
+
+ 6. Fairhair Alliance [Fairhair]: Specifies an IoT middleware to
+ enable a common IP network infrastructure between different
+ application standards used in building automation and lighting
+ systems such as BACnet, KNX, and ZigBee.
+
+ 7. OMA LwM2M [LWM2M]: OMA Lightweight M2M is a standard from the OMA
+ SpecWorks for M2M and IoT device management. LwM2M relies on
+ CoAP as the application-layer protocol and uses a RESTful
+ architecture for remote management of IoT devices.
+
+4.2. Existing IP-Based Security Protocols and Solutions
+
+ There are three main security objectives for IoT networks:
+
+ 1. protecting the IoT network from attackers
+
+ 2. protecting IoT applications and thus the things and users
+
+ 3. protecting the rest of the Internet and other things from attacks
+ that use compromised things as an attack platform
+
+ In the context of the IP-based IoT deployments, consideration of
+ existing Internet security protocols is important. There are a wide
+ range of specialized as well as general-purpose security solutions
+ for the Internet domain, such as IKEv2/IPsec [RFC7296], Transport
+ Layer Security (TLS) [RFC8446], Datagram Transport Layer Security
+ (DTLS) [RFC6347], Host Identity Protocol (HIP) [RFC7401], PANA
+ [RFC5191], Kerberos [RFC4120], Simple Authentication and Security
+ Layer (SASL) [RFC4422], and Extensible Authentication Protocol (EAP)
+ [RFC3748].
+
+ TLS provides security for TCP and requires a reliable transport.
+ DTLS secures and uses datagram-oriented protocols such as UDP. Both
+ protocols are intentionally kept similar and share the same ideology
+ and cipher suites. The CoAP base specification [RFC7252] provides a
+ description of how DTLS can be used for securing CoAP. It proposes
+ three different modes for using DTLS: the PreSharedKey mode, where
+ nodes have pre-provisioned keys for initiating a DTLS session with
+ another node, RawPublicKey mode, where nodes have asymmetric-key
+
+
+
+Garcia-Morchon, et al. Informational [Page 16]
+
+RFC 8576 IoT Security April 2019
+
+
+ pairs but no certificates to verify the ownership, and Certificate
+ mode, where public keys are certified by a certification authority.
+ An IoT implementation profile is defined for TLS version 1.2 and DTLS
+ version 1.2 that offers communication security for resource-
+ constrained nodes [RFC7925].
+
+ There is ongoing work to define an authorization and access-control
+ framework for resource-constrained nodes. The Authentication and
+ Authorization for Constrained Environments (ACE) Working Group
+ [WG-ACE] is defining a solution to allow only authorized access to
+ resources that are hosted on a smart-object server and identified by
+ a URI. The current proposal [ACE-OAuth] is based on the OAuth 2.0
+ framework [RFC6749], and it comes with profiles intended for
+ different communication scenarios, e.g., "Datagram Transport Layer
+ Security (DTLS) Profile for Authentication and Authorization for
+ Constrained Environments (ACE)" [ACE-DTLS].
+
+ Object Security for Constrained RESTful Environments (OSCORE)
+ [OSCORE] is a proposal that protects CoAP messages by wrapping them
+ in the COSE format [RFC8152]. Thus, OSCORE falls in the category of
+ object security, and it can be applied wherever CoAP can be used.
+ The advantage of OSCORE over DTLS is that it provides some more
+ flexibility when dealing with end-to-end security. Section 5.1.3
+ discusses this further.
+
+ The Automated Certificate Management Environment (ACME) Working Group
+ [WG-ACME] is specifying conventions for automated X.509 certificate
+ management. This includes automatic validation of certificate
+ issuance, certificate renewal, and certificate revocation. While the
+ initial focus of the working group is on domain-name certificates (as
+ used by web servers), other uses in some IoT deployments are
+ possible.
+
+ The Internet Key Exchange (IKEv2)/IPsec -- as well as the less used
+ Host Identity protocol (HIP) -- reside at or above the network layer
+ in the OSI model. Both protocols are able to perform an
+ authenticated key exchange and set up the IPsec for secure payload
+ delivery. Currently, there are also ongoing efforts to create a HIP
+ variant coined Diet HIP [HIP-DEX] that takes constrained networks and
+ nodes into account at the authentication and key-exchange level.
+
+ Migault et al. [Diet-ESP] are working on a compressed version of
+ IPsec so that it can easily be used by resource-constrained IoT
+ devices. They rely on the Internet Key Exchange Protocol Version 2
+ (IKEv2) for negotiating the compression format.
+
+ The Extensible Authentication Protocol (EAP) [RFC3748] is an
+ authentication framework supporting multiple authentication methods.
+
+
+
+Garcia-Morchon, et al. Informational [Page 17]
+
+RFC 8576 IoT Security April 2019
+
+
+ EAP runs directly over the data link layer and thus does not require
+ the deployment of IP. It supports duplicate detection and
+ retransmission but does not allow for packet fragmentation. PANA is
+ a network-layer transport for EAP that enables network access
+ authentication between clients and the network infrastructure. In
+ EAP terms, PANA is a UDP-based EAP lower layer that runs between the
+ EAP peer and the EAP authenticator.
+
+4.3. IoT Security Guidelines
+
+ Attacks on and from IoT devices have become common in recent years --
+ for instance, large-scale DoS attacks on the Internet Infrastructure
+ from compromised IoT devices. This fact has prompted many different
+ standards bodies and consortia to provide guidelines for developers
+ and the Internet community at large to build secure IoT devices and
+ services. The following is a subset of the different guidelines and
+ ongoing projects:
+
+ 1. Global System for Mobile Communications Association (GSMA) IoT
+ security guidelines [GSMAsecurity]: GSMA has published a set of
+ security guidelines for the benefit of new IoT product and
+ service providers. The guidelines are aimed at device
+ manufacturers, service providers, developers, and network
+ operators. An enterprise can complete an IoT Security Self-
+ Assessment to demonstrate that its products and services are
+ aligned with the security guidelines of the GSMA.
+
+ 2. Broadband Internet Technical Advisory Group (BITAG) IoT Security
+ and Privacy Recommendations [BITAG]: BITAG has published
+ recommendations for ensuring the security and privacy of IoT
+ device users. BITAG observes that many IoT devices are shipped
+ from the factory with software that is already outdated and
+ vulnerable. The report also states that many devices with
+ vulnerabilities will not be fixed, either because the
+ manufacturer does not provide updates or because the user does
+ not apply them. The recommendations include that IoT devices
+ should function without cloud and Internet connectivity and that
+ all IoT devices should have methods for automatic secure
+ software updates.
+
+ 3. United Kingdom Department for Digital, Culture, Media and Sport
+ (DCMS) [DCMS]: UK DCMS has released a report that includes a
+ list of 13 steps for improving IoT security. These steps, for
+ example, highlight the need for implementing a vulnerability
+ disclosure policy and keeping software updated. The report is
+ aimed at device manufacturers, IoT service providers, mobile
+ application developers, and retailers.
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 18]
+
+RFC 8576 IoT Security April 2019
+
+
+ 4. Cloud Security Alliance (CSA) New Security Guidance for Early
+ Adopters of the IoT [CSA]: CSA recommendations for early
+ adopters of IoT encourage enterprises to implement security at
+ different layers of the protocol stack. It also recommends
+ implementation of an authentication/authorization framework for
+ IoT deployments. A complete list of recommendations is
+ available in the report [CSA].
+
+ 5. United States Department of Homeland Security (DHS) [DHS]: DHS
+ has put forth six strategic principles that would enable IoT
+ developers, manufacturers, service providers, and consumers to
+ maintain security as they develop, manufacture, implement, or
+ use network-connected IoT devices.
+
+ 6. National Institute of Standards and Technology (NIST)
+ [NIST-Guide]: The NIST special publication urges enterprise and
+ US federal agencies to address security throughout the systems
+ engineering process. The publication builds upon the
+ International Organization for Standardization
+ (ISO)/International Electrotechnical Commission (IEC) 15288
+ standard and augments each process in the system lifecycle with
+ security enhancements.
+
+ 7. National Institute of Standards and Technology (NIST)
+ [NIST-LW-PROJECT] [NIST-LW-2016]: NIST is running a project on
+ lightweight cryptography with the purpose of: (i) identifying
+ application areas for which standard cryptographic algorithms
+ are too heavy, classifying them according to some application
+ profiles to be determined; (ii) determining limitations in those
+ existing cryptographic standards; and (iii) standardizing
+ lightweight algorithms that can be used in specific application
+ profiles.
+
+ 8. Open Web Application Security Project (OWASP) [OWASP]: OWASP
+ provides security guidance for IoT manufacturers, developers,
+ and consumers. OWASP also includes guidelines for those who
+ intend to test and analyze IoT devices and applications.
+
+ 9. IoT Security Foundation [IoTSecFoundation]: The IoT Security
+ Foundation has published a document that enlists various
+ considerations that need to be taken into account when
+ developing IoT applications. For example, the document states
+ that IoT devices could use a hardware root of trust to ensure
+ that only authorized software runs on the devices.
+
+ 10. National Highway Traffic Safety Administration (NHTSA) [NHTSA]:
+ The US NHTSA provides guidance to the automotive industry for
+ improving the cyber security of vehicles. While some of the
+
+
+
+Garcia-Morchon, et al. Informational [Page 19]
+
+RFC 8576 IoT Security April 2019
+
+
+ guidelines are general, the document provides specific
+ recommendations for the automotive industry, such as how various
+ automotive manufacturers can share cybersecurity vulnerabilities
+ discovered.
+
+ 11. "Best Current Practices for Securing Internet of Things (IoT)
+ Devices" [Moore]: This document provides a list of minimum
+ requirements that vendors of IoT devices should to take into
+ account while developing applications, services, and firmware
+ updates in order to reduce the frequency and severity of
+ security incidents that arise from compromised IoT devices.
+
+ 12. European Union Agency for Network and Information Security
+ (ENISA) [ENISA-ICS]: ENISA published a document on
+ communication-network dependencies for Industrial Control
+ Systems (ICS)/Supervisory Control And Data Acquisition (SCADA)
+ systems in which security vulnerabilities, guidelines, and
+ general recommendations are summarized.
+
+ 13. Internet Society Online Trust Alliance [ISOC-OTA]: The Internet
+ Society's IoT Trust Framework identifies the core requirements
+ that manufacturers, service providers, distributors, purchasers,
+ and policymakers need to understand, assess, and embrace for
+ effective security and privacy as part of the Internet of
+ Things.
+
+ Other guideline and recommendation documents may exist or may later
+ be published. This list should be considered nonexhaustive. Despite
+ the acknowledgment that security in the Internet is needed and the
+ existence of multiple guidelines, the fact is that many IoT devices
+ and systems have very limited security. There are multiple reasons
+ for this. For instance, some manufacturers focus on delivering a
+ product without paying enough attention to security. This may be
+ because of lack of expertise or limited budget. However, the
+ deployment of such insecure devices poses a severe threat to the
+ privacy and safety of users. The vast number of devices and their
+ inherently mobile nature also imply that an initially secure system
+ can become insecure if a compromised device gains access to the
+ system at some point in time. Even if all other devices in a given
+ environment are secure, this does not prevent external attacks caused
+ by insecure devices. Recently, the US Federal Communications
+ Commission (FCC) has stated the need for additional regulation of IoT
+ systems [FCC]. It is possible that we may see other such regional
+ regulations in the future.
+
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 20]
+
+RFC 8576 IoT Security April 2019
+
+
+5. Challenges for a Secure IoT
+
+ In this section, we take a closer look at the various security
+ challenges in the operational and technical features of IoT and then
+ discuss how existing Internet security protocols cope with these
+ technical and conceptual challenges through the lifecycle of a thing.
+ This discussion should not be understood as a comprehensive
+ evaluation of all protocols, nor can it cover all possible aspects of
+ IoT security. Yet, it aims at showing concrete limitations and
+ challenges in some IoT design areas rather than giving an abstract
+ discussion. In this regard, the discussion handles issues that are
+ most important from the authors' perspectives.
+
+5.1. Constraints and Heterogeneous Communication
+
+ Coupling resource-constrained networks and the powerful Internet is a
+ challenge, because the resulting heterogeneity of both networks
+ complicates protocol design and system operation. In the following
+ subsections, we briefly discuss the resource constraints of IoT
+ devices and the consequences for the use of Internet protocols in the
+ IoT domain.
+
+5.1.1. Resource Constraints
+
+ IoT deployments are often characterized by lossy and low-bandwidth
+ communication channels. IoT devices are also often constrained in
+ terms of the CPU, memory, and energy budget available [RFC7228].
+ These characteristics directly impact the design of protocols for the
+ IoT domain. For instance, small packet-size limits at the physical
+ layer (127 Bytes in IEEE 802.15.4) can lead to (i) hop-by-hop
+ fragmentation and reassembly or (ii) small IP-layer maximum
+ transmission unit (MTU). In the first case, excessive fragmentation
+ of large packets that are often required by security protocols may
+ open new attack vectors for state-exhaustion attacks. The second
+ case might lead to more fragmentation at the IP layer, which commonly
+ downgrades the overall system performance due to packet loss and the
+ need for retransmission.
+
+ The size and number of messages should be minimized to reduce memory
+ requirements and optimize bandwidth usage. In this context, layered
+ approaches involving a number of protocols might lead to worse
+ performance in resource-constrained devices since they combine the
+ headers of the different protocols. In some settings, protocol
+ negotiation can increase the number of exchanged messages. To
+ improve performance during basic procedures such as, for example,
+ bootstrapping, it might be a good strategy to perform those
+ procedures at a lower layer.
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 21]
+
+RFC 8576 IoT Security April 2019
+
+
+ Small CPUs and scarce memory limit the usage of resource-expensive
+ cryptographic primitives such as public key cryptography as used in
+ most Internet security standards. This is especially true if the
+ basic cryptographic blocks need to be frequently used or the
+ underlying application demands low delay.
+
+ There are ongoing efforts to reduce the resource consumption of
+ security protocols by using more efficient underlying cryptographic
+ primitives such as Elliptic Curve Cryptography (ECC) [RFC8446]. The
+ specification of elliptic curve X25519 [ecc25519], stream ciphers
+ such as ChaCha [ChaCha], Diet HIP [HIP-DEX], and ECC groups for IKEv2
+ [RFC5903] are all examples of efforts to make security protocols more
+ resource efficient. Additionally, most modern security protocols
+ have been revised in the last few years to enable cryptographic
+ agility, making cryptographic primitives interchangeable. However,
+ these improvements are only a first step in reducing the computation
+ and communication overhead of Internet protocols. The question
+ remains if other approaches can be applied to leverage key agreement
+ in these heavily resource-constrained environments.
+
+ A further fundamental need refers to the limited energy budget
+ available to IoT nodes. Careful protocol (re)design and usage are
+ required to reduce not only the energy consumption during normal
+ operation but also under DoS attacks. Since the energy consumption
+ of IoT devices differs from other device classes, judgments on the
+ energy consumption of a particular protocol cannot be made without
+ tailor-made IoT implementations.
+
+5.1.2. Denial-of-Service Resistance
+
+ The tight memory and processing constraints of things naturally
+ alleviate resource-exhaustion attacks. Especially in unattended T2T
+ communication, such attacks are difficult to notice before the
+ service becomes unavailable (for example, because of battery or
+ memory exhaustion). As a DoS countermeasure, DTLS, IKEv2, HIP, and
+ Diet HIP implement return routability checks based on a cookie
+ mechanism to delay the establishment of state at the responding host
+ until the address of the initiating host is verified. The
+ effectiveness of these defenses strongly depends on the routing
+ topology of the network. Return routability checks are particularly
+ effective if hosts cannot receive packets addressed to other hosts
+ and if IP addresses present meaningful information as is the case in
+ today's Internet. However, they are less effective in broadcast
+ media or when attackers can influence the routing and addressing of
+ hosts (for example, if hosts contribute to the routing infrastructure
+ in ad hoc networks and meshes).
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 22]
+
+RFC 8576 IoT Security April 2019
+
+
+ In addition, HIP implements a puzzle mechanism that can force the
+ initiator of a connection (and potential attacker) to solve
+ cryptographic puzzles with variable difficulties. Puzzle-based
+ defense mechanisms are less dependent on the network topology but
+ perform poorly if CPU resources in the network are heterogeneous (for
+ example, if a powerful Internet host attacks a thing). Increasing
+ the puzzle difficulty under attack conditions can easily lead to
+ situations where a powerful attacker can still solve the puzzle while
+ weak IoT clients cannot and are excluded from communicating with the
+ victim. Still, puzzle-based approaches are a viable option for
+ sheltering IoT devices against unintended overload caused by
+ misconfiguration or malfunctioning things.
+
+5.1.3. End-to-End Security, Protocol Translation, and the Role of
+ Middleboxes
+
+ The term "end-to-end security" often has multiple interpretations.
+ Here, we consider end-to-end security in the context of end-to-end IP
+ connectivity from a sender to a receiver. Services such as
+ confidentiality and integrity protection on packet data, message
+ authentication codes, or encryption are typically used to provide
+ end-to-end security. These protection methods render the protected
+ parts of the packets immutable as rewriting is either not possible
+ because (i) the relevant information is encrypted and inaccessible to
+ the gateway or (ii) rewriting integrity-protected parts of the packet
+ would invalidate the end-to-end integrity protection.
+
+ Protocols for constrained IoT networks are not exactly identical to
+ their larger Internet counterparts, for efficiency and performance
+ reasons. Hence, more or less subtle differences between protocols
+ for constrained IoT networks and Internet protocols will remain.
+ While these differences can be bridged with protocol translators at
+ middleboxes, they may become major obstacles if end-to-end security
+ measures between IoT devices and Internet hosts are needed.
+
+ If access to data or messages by the middleboxes is required or
+ acceptable, then a diverse set of approaches for handling such a
+ scenario is available. Note that some of these approaches affect the
+ meaning of end-to-end security in terms of integrity and
+ confidentiality, since the middleboxes will be able to either decrypt
+ or partially modify the exchanged messages:
+
+ 1. Sharing credentials with middleboxes enables them to transform
+ (for example, decompress, convert, etc.) packets and reapply the
+ security measures after transformation. This method abandons
+ end-to-end security and is only applicable to simple scenarios
+ with a rudimentary security model.
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 23]
+
+RFC 8576 IoT Security April 2019
+
+
+ 2. Reusing the Internet wire format for IoT makes conversion between
+ IoT and Internet protocols unnecessary. However, it can lead to
+ poor performance in some use cases because IoT-specific
+ optimizations (for example, stateful or stateless compression)
+ are not possible.
+
+ 3. Selectively protecting vital and immutable packet parts with a
+ message authentication code or encryption requires a careful
+ balance between performance and security. Otherwise, this
+ approach might either result in poor performance or poor
+ security, depending on which parts are selected for protection,
+ where they are located in the original packet, and how they are
+ processed. [OSCORE] proposes a solution in this direction by
+ encrypting and integrity protecting most of the message fields
+ except those parts that a middlebox needs to read or change.
+
+ 4. Homomorphic encryption techniques can be used in the middlebox to
+ perform certain operations. However, this is limited to data
+ processing involving arithmetic operations. Furthermore, the
+ performance of existing libraries -- for example, Microsoft SEAL
+ [SEAL] -- is still too limited, and homomorphic encryption
+ techniques are not widely applicable yet.
+
+ 5. Message authentication codes that sustain transformation can be
+ realized by considering the order of transformation and
+ protection (for example, by creating a signature before
+ compression so that the gateway can decompress the packet without
+ recalculating the signature). Such an approach enables IoT-
+ specific optimizations but is more complex and may require
+ application-specific transformations before security is applied.
+ Moreover, the usage of encrypted or integrity-protected data
+ prevents middleboxes from transforming packets.
+
+ 6. Mechanisms based on object security can bridge the protocol
+ worlds but still require that the two worlds use the same object-
+ security formats. Currently, the object-security format based on
+ COSE [RFC8152] is different from JSON Object Signing and
+ Encryption (JOSE) [RFC7520] or Cryptographic Message Syntax (CMS)
+ [RFC5652]. Legacy devices relying on traditional Internet
+ protocols will need to update to the newer protocols for
+ constrained environments to enable real end-to-end security.
+ Furthermore, middleboxes do not have any access to the data, and
+ this approach does not prevent an attacker who is capable of
+ modifying relevant message header fields that are not protected.
+
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 24]
+
+RFC 8576 IoT Security April 2019
+
+
+ To the best of our knowledge, none of the mentioned security
+ approaches that focus on the confidentiality and integrity of the
+ communication exchange between two IP endpoints provide the perfect
+ solution in this problem space.
+
+5.1.4. New Network Architectures and Paradigm
+
+ There is a multitude of new link-layer protocols that aim to address
+ the resource-constrained nature of IoT devices. For example, IEEE
+ 802.11ah [IEEE802ah] has been specified for extended range and lower
+ energy consumption to support IoT devices. Similarly, LPWAN
+ protocols such as LoRa [LoRa], Sigfox [sigfox], and NarrowBand IoT
+ (NB-IoT) [NB-IoT] are all designed for resource-constrained devices
+ that require long range and low bit rates. [RFC8376] provides an
+ informational overview of the set of LPWAN technologies being
+ considered by the IETF. It also identifies the potential gaps that
+ exist between the needs of those technologies and the goal of running
+ IP in such networks. While these protocols allow IoT devices to
+ conserve energy and operate efficiently, they also add additional
+ security challenges. For example, the relatively small MTU can make
+ security handshakes with large X509 certificates a significant
+ overhead. At the same time, new communication paradigms also allow
+ IoT devices to communicate directly amongst themselves with or
+ without support from the network. This communication paradigm is
+ also referred to as Device-to-Device (D2D), Machine-to-Machine (M2M),
+ or Thing-to-Thing (T2T) communication, and it is motivated by a
+ number of features such as improved network performance, lower
+ latency, and lower energy requirements.
+
+5.2. Bootstrapping of a Security Domain
+
+ Creating a security domain from a set of previously unassociated IoT
+ devices is a key operation in the lifecycle of a thing in an IoT
+ network. This aspect is further elaborated and discussed in the
+ T2TRG draft on bootstrapping [BOOTSTRAP].
+
+5.3. Operational Challenges
+
+ After the bootstrapping phase, the system enters the operational
+ phase. During the operational phase, things can use the state
+ information created during the bootstrapping phase in order to
+ exchange information securely. In this section, we discuss the
+ security challenges during the operational phase. Note that many of
+ the challenges discussed in Section 5.1 apply during the operational
+ phase.
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 25]
+
+RFC 8576 IoT Security April 2019
+
+
+5.3.1. Group Membership and Security
+
+ Group-key negotiation is an important security service for IoT
+ communication patterns in which a thing sends some data to multiple
+ things or data flows from multiple things towards a thing. All
+ discussed protocols only cover unicast communication and therefore do
+ not focus on group-key establishment. This applies in particular to
+ (D)TLS and IKEv2. Thus, a solution is required in this area. A
+ potential solution might be to use the Diffie-Hellman keys -- which
+ are used in IKEv2 and HIP to set up a secure unicast link -- for
+ group Diffie-Hellman key negotiations. However, Diffie-Hellman is a
+ relatively heavy solution, especially if the group is large.
+
+ Symmetric and asymmetric keys can be used in group communication.
+ Asymmetric keys have the advantage that they can provide source
+ authentication. However, doing broadcast encryption with a single
+ public/private key pair is also not feasible. Although a single
+ symmetric key can be used to encrypt the communication or compute a
+ message authentication code, it has inherent risks since the capture
+ of a single node can compromise the key shared throughout the
+ network. The usage of symmetric keys also does not provide source
+ authentication. Another factor to consider is that asymmetric
+ cryptography is more resource-intensive than symmetric key solutions.
+ Thus, the security risks and performance trade-offs of applying
+ either symmetric or asymmetric keys to a given IoT use case need to
+ be well analyzed according to risk and usability assessments
+ [RFC8387]. [MULTICAST] is looking at a combination of
+ confidentiality using a group key and source authentication using
+ public keys in the same packet.
+
+ Conceptually, solutions that provide secure group communication at
+ the network layer (IPsec/IKEv2, HIP/Diet HIP) may have an advantage
+ in terms of the cryptographic overhead when compared to application-
+ focused security solutions (TLS/DTLS). This is due to the fact that
+ application-focused solutions require cryptographic operations per
+ group application, whereas network-layer approaches may allow sharing
+ secure group associations between multiple applications (for example,
+ for neighbor discovery and routing or service discovery). Hence,
+ implementing shared features lower in the communication stack can
+ avoid redundant security measures. However, it is important to note
+ that sharing security contexts among different applications involves
+ potential security threats, e.g., if one of the applications is
+ malicious and monitors exchanged messages or injects fake messages.
+ In the case of OSCORE, it provides security for CoAP group
+ communication as defined in RFC 7390, i.e., based on multicast IP.
+ If the same security association is reused for each application, then
+ this solution does not seem to have more cryptographic overhead
+ compared to IPsec.
+
+
+
+Garcia-Morchon, et al. Informational [Page 26]
+
+RFC 8576 IoT Security April 2019
+
+
+ Several group-key solutions have been developed by the MSEC Working
+ Group of the IETF [WG-MSEC]. The MIKEY architecture [RFC4738] is one
+ example. While these solutions are specifically tailored for
+ multicast and group-broadcast applications in the Internet, they
+ should also be considered as candidate solutions for group-key
+ agreement in IoT. The MIKEY architecture, for example, describes a
+ coordinator entity that disseminates symmetric keys over pair-wise
+ end-to-end secured channels. However, such a centralized approach
+ may not be applicable in a distributed IoT environment, where the
+ choice of one or several coordinators and the management of the group
+ key is not trivial.
+
+5.3.2. Mobility and IP Network Dynamics
+
+ It is expected that many things (for example, user devices and
+ wearable sensors) will be mobile in the sense that they are attached
+ to different networks during the lifetime of a security association.
+ Built-in mobility signaling can greatly reduce the overhead of the
+ cryptographic protocols because unnecessary and costly re-
+ establishments of the session (possibly including handshake and key
+ agreement) can be avoided. IKEv2 supports host mobility with the
+ MOBIKE extension [RFC4555] [RFC4621]. MOBIKE refrains from applying
+ heavyweight cryptographic extensions for mobility. However, MOBIKE
+ mandates the use of IPsec tunnel mode, which requires the
+ transmission of an additional IP header in each packet.
+
+ HIP offers simple yet effective mobility management by allowing hosts
+ to signal changes to their associations [RFC8046]. However, slight
+ adjustments might be necessary to reduce the cryptographic costs --
+ for example, by making the public key signatures in the mobility
+ messages optional. Diet HIP does not define mobility yet, but it is
+ sufficiently similar to HIP and can use the same mechanisms. DTLS
+ provides some mobility support by relying on a connection ID (CID).
+ The use of connection IDs can provide all the mobility functionality
+ described in [Williams] except sending the updated location. The
+ specific need for IP-layer mobility mainly depends on the scenario in
+ which the nodes operate. In many cases, mobility supported by means
+ of a mobile gateway may suffice to enable mobile IoT networks, such
+ as body-sensor networks. Using message-based application-layer
+ security solutions such as OSCORE [OSCORE] can also alleviate the
+ problem of re-establishing lower-layer sessions for mobile nodes.
+
+5.4. Secure Software Update and Cryptographic Agility
+
+ IoT devices are often expected to stay functional for several years
+ or decades, even though they might operate unattended with direct
+ Internet connectivity. Software updates for IoT devices are
+ therefore required not only for new functionality but also to
+
+
+
+Garcia-Morchon, et al. Informational [Page 27]
+
+RFC 8576 IoT Security April 2019
+
+
+ eliminate security vulnerabilities due to software bugs, design
+ flaws, or deprecated algorithms. Software bugs might remain even
+ after careful code review. Implementations of security protocols
+ might contain (design) flaws. Cryptographic algorithms can also
+ become insecure due to advances in cryptanalysis. Therefore, it is
+ necessary that devices that are incapable of verifying a
+ cryptographic signature are not exposed to the Internet, even
+ indirectly.
+
+ In his essay, Schneier highlights several challenges that hinder
+ mechanisms for secure software update of IoT devices
+ [SchneierSecurity]. First, there is a lack of incentives for
+ manufacturers, vendors, and others on the supply chain to issue
+ updates for their devices. Second, parts of the software running on
+ IoT devices is simply a binary blob without any source code
+ available. Since the complete source code is not available, no
+ patches can be written for that piece of code. Lastly, Schneier
+ points out that even when updates are available, users generally have
+ to manually download and install them. However, users are never
+ alerted about security updates, and many times do not have the
+ necessary expertise to manually administer the required updates.
+
+ The US Federal Trade Commission (FTC) staff report on "Internet of
+ Things - Privacy & Security in a Connected World" [FTCreport] and the
+ Article 29 Working Party's "Opinion 8/2014 on the Recent Developments
+ on the Internet of Things" [Article29] also document the challenges
+ for secure remote software update of IoT devices. They note that
+ even providing such a software-update capability may add new
+ vulnerabilities for constrained devices. For example, a buffer
+ overflow vulnerability in the implementation of a software update
+ protocol (TR69) [TR69] and an expired certificate in a hub device
+ [wink] demonstrate how the software-update process itself can
+ introduce vulnerabilities.
+
+ Powerful IoT devices that run general-purpose operating systems can
+ make use of sophisticated software-update mechanisms known from the
+ desktop world. However, resource-constrained devices typically do
+ not have any operating system and are often not equipped with a
+ memory management unit or similar tools. Therefore, they might
+ require more specialized solutions.
+
+ An important requirement for secure software and firmware updates is
+ source authentication. Source authentication requires the resource-
+ constrained things to implement public key signature verification
+ algorithms. As stated in Section 5.1.1, resource-constrained things
+ have limited computational capabilities and energy supply available,
+ which can hinder the amount and frequency of cryptographic processing
+ that they can perform. In addition to source authentication,
+
+
+
+Garcia-Morchon, et al. Informational [Page 28]
+
+RFC 8576 IoT Security April 2019
+
+
+ software updates might require confidential delivery over a secure
+ (encrypted) channel. The complexity of broadcast encryption can
+ force the usage of point-to-point secure links; however, this
+ increases the duration of a software update in a large system.
+ Alternatively, it may force the usage of solutions in which the
+ software update is delivered to a gateway and then distributed to the
+ rest of the system with a network key. Sending large amounts of data
+ that later needs to be assembled and verified over a secure channel
+ can consume a lot of energy and computational resources. Correct
+ scheduling of the software updates is also a crucial design
+ challenge. For example, a user of connected light bulbs would not
+ want them to update and restart at night. More importantly, the user
+ would not want all the lights to update at the same time.
+
+ Software updates in IoT systems are also needed to update old and
+ insecure cryptographic primitives. However, many IoT systems, some
+ of which are already deployed, are not designed with provisions for
+ cryptographic agility. For example, many devices come with a
+ wireless radio that has an AES128 hardware coprocessor. These
+ devices solely rely on the coprocessor for encrypting and
+ authenticating messages. A software update adding support for new
+ cryptographic algorithms implemented solely in software might not fit
+ on these devices due to limited memory, or might drastically hinder
+ its operational performance. This can lead to the use of old and
+ insecure software. Therefore, it is important to account for the
+ fact that cryptographic algorithms would need to be updated and
+ consider the following when planning for cryptographic agility:
+
+ 1. Would it be secure to use the existing cryptographic algorithms
+ available on the device for updating with new cryptographic
+ algorithms that are more secure?
+
+ 2. Will the new software-based implementation fit on the device
+ given the limited resources?
+
+ 3. Would the normal operation of existing IoT applications on the
+ device be severely hindered by the update?
+
+ Finally, we would like to highlight the previous and ongoing work in
+ the area of secure software and firmware updates at the IETF.
+ [RFC4108] describes how Cryptographic Message Syntax (CMS) [RFC5652]
+ can be used to protect firmware packages. The IAB has also organized
+ a workshop to understand the challenges for secure software update of
+ IoT devices. A summary of the recommendations to the standards
+ community derived from the discussions during that workshop have been
+ documented [RFC8240]. A working group called Software Updates for
+ Internet of Things (SUIT) [WG-SUIT] is currently working on a new
+ specification to reflect the best current practices for firmware
+
+
+
+Garcia-Morchon, et al. Informational [Page 29]
+
+RFC 8576 IoT Security April 2019
+
+
+ update based on experience from IoT deployments. It is specifically
+ working on describing an IoT firmware update architecture and
+ specifying a manifest format that contains metadata about the
+ firmware update package. Finally, the Trusted Execution Environment
+ Provisioning Working Group [WG-TEEP] aims at developing a protocol
+ for lifecycle management of trusted applications running on the
+ secure area of a processor (Trusted Execution Environment (TEE)).
+
+5.5. End-of-Life
+
+ Like all commercial devices, IoT devices have a given useful
+ lifetime. The term "end-of-life" (EOL) is used by vendors or network
+ operators to indicate the point of time at which they limit or end
+ support for the IoT device. This may be planned or unplanned (for
+ example, when the manufacturer goes bankrupt, the vendor just decides
+ to abandon a product, or a network operator moves to a different type
+ of networking technology). A user should still be able to use and
+ perhaps even update the device. This requires for some form of
+ authorization handover.
+
+ Although this may seem far-fetched given the commercial interests and
+ market dynamics, we have examples from the mobile world where the
+ devices have been functional and up to date long after the original
+ vendor stopped supporting the device. CyanogenMod for Android
+ devices and OpenWrt for home routers are two such instances where
+ users have been able to use and update their devices even after the
+ official EOL. Admittedly, it is not easy for an average user to
+ install and configure their devices on their own. With the
+ deployment of millions of IoT devices, simpler mechanisms are needed
+ to allow users to add new trust anchors [RFC6024] and install
+ software and firmware from other sources once the device is EOL.
+
+5.6. Verifying Device Behavior
+
+ Users using new IoT appliances such as Internet-connected smart
+ televisions, speakers, and cameras are often unaware that these
+ devices can undermine their privacy. Recent revelations have shown
+ that many IoT device vendors have been collecting sensitive private
+ data through these connected appliances with or without appropriate
+ user warnings [cctv].
+
+ An IoT device's user/owner would like to monitor and verify its
+ operational behavior. For instance, the user might want to know if
+ the device is connecting to the server of the manufacturer for any
+ reason. This feature -- connecting to the manufacturer's server --
+ may be necessary in some scenarios, such as during the initial
+ configuration of the device. However, the user should be kept aware
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 30]
+
+RFC 8576 IoT Security April 2019
+
+
+ of the data that the device is sending back to the vendor. For
+ example, the user might want to know if his/her TV is sending data
+ when he/she inserts a new USB stick.
+
+ Providing such information to the users in an understandable fashion
+ is challenging. This is because IoT devices are not only resource
+ constrained in terms of their computational capability but also in
+ terms of the user interface available. Also, the network
+ infrastructure where these devices are deployed will vary
+ significantly from one user environment to another. Therefore, where
+ and how this monitoring feature is implemented still remains an open
+ question.
+
+ Manufacturer Usage Description (MUD) files [RFC8520] are perhaps a
+ first step towards implementation of such a monitoring service. The
+ idea behind MUD files is relatively simple: IoT devices would
+ disclose the location of their MUD file to the network during
+ installation. The network can then retrieve those files and learn
+ about the intended behavior of the devices stated by the device
+ manufacturer. A network-monitoring service could then warn the user/
+ owner of devices if they don't behave as expected.
+
+ Many devices and software services that automatically learn and
+ monitor the behavior of different IoT devices in a given network are
+ commercially available. Such monitoring devices/services can be
+ configured by the user to limit network traffic and trigger alarms
+ when unexpected operation of IoT devices is detected.
+
+5.7. Testing: Bug Hunting and Vulnerabilities
+
+ Given that IoT devices often have inadvertent vulnerabilities, both
+ users and developers would want to perform extensive testing on their
+ IoT devices, networks, and systems. Nonetheless, since the devices
+ are resource constrained and manufactured by multiple vendors, some
+ of them very small, devices might be shipped with very limited
+ testing, so that bugs can remain and can be exploited at a later
+ stage. This leads to two main types of challenges:
+
+ 1. It remains to be seen how the software-testing and quality-
+ assurance mechanisms used from the desktop and mobile world will
+ be applied to IoT devices to give end users the confidence that
+ the purchased devices are robust. Bodies such as the European
+ Cyber Security Organization (ECSO) [ECSO] are working on
+ processes for security certification of IoT devices.
+
+ 2. It is also an open question how the combination of devices from
+ multiple vendors might actually lead to dangerous network
+ configurations -- for example, if the combination of specific
+
+
+
+Garcia-Morchon, et al. Informational [Page 31]
+
+RFC 8576 IoT Security April 2019
+
+
+ devices can trigger unexpected behavior. It is needless to say
+ that the security of the whole system is limited by its weakest
+ point.
+
+5.8. Quantum-Resistance
+
+ Many IoT systems that are being deployed today will remain
+ operational for many years. With the advancements made in the field
+ of quantum computers, it is possible that large-scale quantum
+ computers will be available in the future for performing
+ cryptanalysis on existing cryptographic algorithms and cipher suites.
+ If this happens, it will have two consequences. First,
+ functionalities enabled by means of primitives such as RSA or ECC --
+ namely, key exchange, public key encryption, and signature -- would
+ not be secure anymore due to Shor's algorithm. Second, the security
+ level of symmetric algorithms will decrease, for example, the
+ security of a block cipher with a key size of b bits will only offer
+ b/2 bits of security due to Grover's algorithm.
+
+ The above scenario becomes more urgent when we consider the so-called
+ "harvest and decrypt" attack in which an attacker can start to
+ harvest (store) encrypted data today, before a quantum computer is
+ available, and decrypt it years later, once a quantum computer is
+ available. Such "harvest and decrypt" attacks are not new and were
+ used in the VENONA project [venona-project]. Many IoT devices that
+ are being deployed today will remain operational for a decade or even
+ longer. During this time, digital signatures used to sign software
+ updates might become obsolete, making the secure update of IoT
+ devices challenging.
+
+ This situation would require us to move to quantum-resistant
+ alternatives -- in particular, for those functionalities involving
+ key exchange, public key encryption, and signatures. [C2PQ]
+ describes when quantum computers may become widely available and what
+ steps are necessary for transitioning to cryptographic algorithms
+ that provide security even in the presence of quantum computers.
+ While future planning is hard, it may be a necessity in certain
+ critical IoT deployments that are expected to last decades or more.
+ Although increasing the key size of the different algorithms is
+ definitely an option, it would also incur additional computational
+ overhead and network traffic. This would be undesirable in most
+ scenarios. There have been recent advancements in quantum-resistant
+ cryptography. We refer to [ETSI-GR-QSC-001] for an extensive
+ overview of existing quantum-resistant cryptography, and [RFC7696]
+ provides guidelines for cryptographic algorithm agility.
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 32]
+
+RFC 8576 IoT Security April 2019
+
+
+5.9. Privacy Protection
+
+ People will eventually be surrounded by hundreds of connected IoT
+ devices. Even if the communication links are encrypted and
+ protected, information about people might still be collected or
+ processed for different purposes. The fact that IoT devices in the
+ vicinity of people might enable more pervasive monitoring can
+ negatively impact their privacy. For instance, imagine the scenario
+ where a static presence sensor emits a packet due to the presence or
+ absence of people in its vicinity. In such a scenario, anyone who
+ can observe the packet can gather critical privacy-sensitive
+ information.
+
+ Such information about people is referred to as personal data in the
+ European Union (EU) or Personally identifiable information (PII) in
+ the US. In particular, the General Data Protection Regulation (GDPR)
+ [GDPR] defines personal data as: "any information relating to an
+ identified or identifiable natural person ('data subject'); an
+ identifiable natural person is one who can be identified, directly or
+ indirectly, in particular by reference to an identifier such as a
+ name, an identification number, location data, an online identifier
+ or to one or more factors specific to the physical, physiological,
+ genetic, mental, economic, cultural or social identity of that
+ natural person".
+
+ Ziegeldorf [Ziegeldorf] defines privacy in IoT as a threefold
+ guarantee:
+
+ 1. Awareness of the privacy risks imposed by IoT devices and
+ services. This awareness is achieved by means of transparent
+ practices by the data controller, i.e., the entity that is
+ providing IoT devices and/or services.
+
+ 2. Individual control over the collection and processing of personal
+ information by IoT devices and services.
+
+ 3. Awareness and control of the subsequent use and dissemination of
+ personal information by data controllers to any entity outside
+ the subject's personal control sphere. This point implies that
+ the data controller must be accountable for its actions on the
+ personal information.
+
+ Based on this definition, several threats to the privacy of users
+ have been documented [Ziegeldorf] [RFC6973], in particular
+ considering the IoT environment and its lifecycle:
+
+ 1. Identification - refers to the identification of the users, their
+ IoT devices, and generated data.
+
+
+
+Garcia-Morchon, et al. Informational [Page 33]
+
+RFC 8576 IoT Security April 2019
+
+
+ 2. Localization - relates to the capability of locating a user and
+ even tracking them, e.g., by tracking MAC addresses in Wi-Fi or
+ Bluetooth.
+
+ 3. Profiling - is about creating a profile of the user and their
+ preferences.
+
+ 4. Interaction - occurs when a user has been profiled and a given
+ interaction is preferred, presenting (for example, visually) some
+ information that discloses private information.
+
+ 5. Lifecycle transitions - take place when devices are, for example,
+ sold without properly removing private data.
+
+ 6. Inventory attacks - happen if specific information about IoT
+ devices in possession of a user is disclosed.
+
+ 7. Linkage - is about when information of two of more IoT systems
+ (or other data sets) is combined so that a broader view of the
+ personal data captured can be created.
+
+ When IoT systems are deployed, the above issues should be considered
+ to ensure that private data remains private. These issues are
+ particularly challenging in environments in which multiple users with
+ different privacy preferences interact with the same IoT devices.
+ For example, an IoT device controlled by user A (low privacy
+ settings) might leak private information about another user B (high
+ privacy settings). How to deal with these threats in practice is an
+ area of ongoing research.
+
+5.10. Reverse-Engineering Considerations
+
+ Many IoT devices are resource constrained and often deployed in
+ unattended environments. Some of these devices can also be purchased
+ off the shelf or online without any credential-provisioning process.
+ Therefore, an attacker can have direct access to the device and apply
+ advanced techniques to retrieve information that a traditional black-
+ box model does not consider. Examples of those techniques are side-
+ channel attacks or code disassembly. By doing this, the attacker can
+ try to retrieve data such as:
+
+ 1. Long-term keys. These long-term keys can be extracted by means
+ of a side-channel attack or reverse engineering. If these keys
+ are exposed, then they might be used to perform attacks on
+ devices deployed in other locations.
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 34]
+
+RFC 8576 IoT Security April 2019
+
+
+ 2. Source code. Extraction of source code might allow the attacker
+ to determine bugs or find exploits to perform other types of
+ attacks. The attacker might also just sell the source code.
+
+ 3. Proprietary algorithms. The attacker can analyze these
+ algorithms gaining valuable know-how. The attacker can also
+ create copies of the product (based on those proprietary
+ algorithms) or modify the algorithms to perform more advanced
+ attacks.
+
+ 4. Configuration or personal data. The attacker might be able to
+ read personal data, e.g., healthcare data, that has been stored
+ on a device.
+
+ One existing solution to prevent such data leaks is the use of a
+ secure element, a tamper-resistant device that is capable of securely
+ hosting applications and their confidential data. Another potential
+ solution is the usage of a Physical Unclonable Function (PUF) that
+ serves as unique digital fingerprint of a hardware device. PUFs can
+ also enable other functionalities such as secure key storage.
+ Protection against such data leakage patterns is not trivial since
+ devices are inherently resource-constrained. An open question is
+ whether there are any viable techniques to protect IoT devices and
+ the data in the devices in such an adversarial model.
+
+5.11. Trustworthy IoT Operation
+
+ Flaws in the design and implementation of IoT devices and networks
+ can lead to security vulnerabilities. A common flaw is the use of
+ well-known or easy-to-guess passwords for configuration of IoT
+ devices. Many such compromised IoT devices can be found on the
+ Internet by means of tools such as Shodan [shodan]. Once discovered,
+ these compromised devices can be exploited at scale -- for example,
+ to launch DDoS attacks. Dyn, a major DNS service provider, was
+ attacked by means of a DDoS attack originating from a large IoT
+ botnet composed of thousands of compromised IP cameras [Dyn-Attack].
+ There are several open research questions in this area:
+
+ 1. How to avoid vulnerabilities in IoT devices that can lead to
+ large-scale attacks?
+
+ 2. How to detect sophisticated attacks against IoT devices?
+
+ 3. How to prevent attackers from exploiting known vulnerabilities at
+ a large scale?
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 35]
+
+RFC 8576 IoT Security April 2019
+
+
+ Some ideas are being explored to address this issue. One of the
+ approaches relies on the use of Manufacturer Usage Description (MUD)
+ files [RFC8520]. As explained earlier, this proposal requires IoT
+ devices to disclose the location of their MUD file to the network
+ during installation. The network can then (i) retrieve those files,
+ (ii) learn from the manufacturers the intended usage of the devices
+ (for example, which services they need to access), and then (iii)
+ create suitable filters and firewall rules.
+
+6. Conclusions and Next Steps
+
+ This document provides IoT security researchers, system designers,
+ and implementers with an overview of security requirements in the IP-
+ based Internet of Things. We discuss the security threats, state of
+ the art, and challenges.
+
+ Although plenty of steps have been realized during the last few years
+ (summarized in Section 4.1) and many organizations are publishing
+ general recommendations describing how IoT should be secured
+ (Section 4.3), there are many challenges ahead that require further
+ attention. Challenges of particular importance are bootstrapping of
+ security, group security, secure software updates, long-term security
+ and quantum-resistance, privacy protection, data leakage prevention
+ -- where data could be cryptographic keys, personal data, or even
+ algorithms -- and ensuring trustworthy IoT operation.
+
+ Authors of new IoT specifications and implementers need to consider
+ how all the security challenges discussed in this document (and those
+ that emerge later) affect their work. The authors of IoT
+ specifications need to put in a real effort towards not only
+ addressing the security challenges but also clearly documenting how
+ the security challenges are addressed. This would reduce the chances
+ of security vulnerabilities in the code written by implementers of
+ those specifications.
+
+7. Security Considerations
+
+ This entire memo deals with security issues.
+
+8. IANA Considerations
+
+ This document has no IANA actions.
+
+
+
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 36]
+
+RFC 8576 IoT Security April 2019
+
+
+9. Informative References
+
+ [ACE-DTLS] Gerdes, S., Bergmann, O., Bormann, C., Selander, G., and
+ L. Seitz, "Datagram Transport Layer Security (DTLS)
+ Profile for Authentication and Authorization for
+ Constrained Environments (ACE)", Work in Progress,
+ draft-ietf-ace-dtls-authorize-08, April 2019.
+
+ [ACE-OAuth]
+ Seitz, L., Selander, G., Wahlstroem, E., Erdtman, S., and
+ H. Tschofenig, "Authentication and Authorization for
+ Constrained Environments (ACE) using the OAuth 2.0
+ Framework (ACE-OAuth)", Work in Progress, draft-ietf-ace-
+ oauth-authz-24, March 2019.
+
+ [ARCH-6TiSCH]
+ Thubert, P., "An Architecture for IPv6 over the TSCH mode
+ of IEEE 802.15.4", Work in Progress, draft-ietf-6tisch-
+ architecture-20, March 2019.
+
+ [Article29]
+ Article 29 Data Protection Working Party, "Opinion 8/2014
+ on the Recent Developments on the Internet of Things",
+ WP 223, September 2014, <https://ec.europa.eu/justice/
+ article-29/documentation/opinion-
+ recommendation/files/2014/wp223_en.pdf>.
+
+ [AUTO-ID] "Auto-ID Labs", September 2010,
+ <https://www.autoidlabs.org/>.
+
+ [BACNET] American Society of Heating, Refrigerating and Air-
+ Conditioning Engineers (ASHRAE), "BACnet", February 2011,
+ <http://www.bacnet.org>.
+
+ [BITAG] Broadband Internet Technical Advisory Group, "Internet of
+ Things (IoT) Security and Privacy Recommendations",
+ November 2016, <https://www.bitag.org/report-internet-of-
+ things-security-privacy-recommendations.php>.
+
+ [BOOTSTRAP]
+ Sarikaya, B., Sethi, M., and D. Garcia-Carillo, "Secure
+ IoT Bootstrapping: A Survey", Work in Progress,
+ draft-sarikaya-t2trg-sbootstrapping-06, January 2019.
+
+ [C2PQ] Hoffman, P., "The Transition from Classical to Post-
+ Quantum Cryptography", Work in Progress, draft-hoffman-
+ c2pq-04, August 2018.
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 37]
+
+RFC 8576 IoT Security April 2019
+
+
+ [cctv] "Backdoor In MVPower DVR Firmware Sends CCTV Stills To an
+ Email Address In China", February 2016,
+ <https://hardware.slashdot.org/story/16/02/17/0422259/
+ backdoor-in-mvpower-dvr-firmware-sends-cctv-stills-to-an-
+ email-address-in-china>.
+
+ [ChaCha] Bernstein, D., "ChaCha, a variant of Salsa20", January
+ 2008, <http://cr.yp.to/chacha/chacha-20080128.pdf>.
+
+ [CSA] Cloud Security Alliance Mobile Working Group, "Security
+ Guidance for Early Adopters of the Internet of Things
+ (IoT)", April 2015,
+ <https://downloads.cloudsecurityalliance.org/whitepapers/S
+ ecurity_Guidance_for_Early_Adopters_of_the_Internet_of_Thi
+ ngs.pdf>.
+
+ [DALI] DALIbyDesign, "DALI Explained", February 2011,
+ <http://www.dalibydesign.us/dali.html>.
+
+ [Daniel] Park, S., Kim, K., Haddad, W., Chakrabarti, S., and J.
+ Laganier, "IPv6 over Low Power WPAN Security Analysis",
+ Work in Progress, draft-daniel-6lowpan-security-analysis-
+ 05, March 2011.
+
+ [DCMS] UK Department for Digital Culture, Media & Sport, "Secure
+ by Design: Improving the cyber security of consumer
+ Internet of Things Report", March 2018,
+ <https://www.gov.uk/government/publications/
+ secure-by-design-report>.
+
+ [DHS] U.S. Department of Homeland Security, "Strategic
+ Principles For Securing the Internet of Things (IoT)",
+ November 2016,
+ <https://www.dhs.gov/sites/default/files/publications/
+ Strategic_Principles_for_Securing_the_Internet_of_Things-
+ 2016-1115-FINAL....pdf>.
+
+ [Diet-ESP] Migault, D., Guggemos, T., Bormann, C., and D. Schinazi,
+ "ESP Header Compression and Diet-ESP", Work in Progress,
+ draft-mglt-ipsecme-diet-esp-07, March 2019.
+
+ [Dyn-Attack]
+ Oracle Dyn, "Dyn Analysis Summary Of Friday October 21
+ Attack", October 2016, <https://dyn.com/blog/
+ dyn-analysis-summary-of-friday-october-21-attack/>.
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 38]
+
+RFC 8576 IoT Security April 2019
+
+
+ [ecc25519] Bernstein, D., "Curve25519: new Diffie-Hellman speed
+ records", February 2006,
+ <https://cr.yp.to/ecdh/curve25519-20060209.pdf>.
+
+ [ECSO] "European Cyber Security Organisation",
+ <https://www.ecs-org.eu/>.
+
+ [ENISA-ICS]
+ European Union Agency for Network and Information
+ Security, "Communication network dependencies for ICS/
+ SCADA Systems", February 2017,
+ <https://www.enisa.europa.eu/publications/
+ ics-scada-dependencies>.
+
+ [ETSI-GR-QSC-001]
+ European Telecommunications Standards Institute (ETSI),
+ "Quantum-Safe Cryptography (QSC); Quantum-safe algorithmic
+ framework", ETSI GR QSC 001, July 2016,
+ <https://www.etsi.org/deliver/etsi_gr/
+ QSC/001_099/001/01.01.01_60/gr_qsc001v010101p.pdf>.
+
+ [Fairhair] "The Fairhair Alliance",
+ <https://www.fairhair-alliance.org/>.
+
+ [FCC] US Federal Communications Commission, Chairman Tom Wheeler
+ to Senator Mark Warner, December 2016,
+ <https://docs.fcc.gov/public/attachments/
+ DOC-342761A1.pdf>.
+
+ [FTCreport]
+ US Federal Trade Commission, "FTC Report on Internet of
+ Things Urges Companies to Adopt Best Practices to Address
+ Consumer Privacy and Security Risks", January 2015,
+ <https://www.ftc.gov/news-events/press-releases/2015/01/
+ ftc-report-internet-things-urges-companies-adopt-best-
+ practices>.
+
+ [GDPR] "The EU General Data Protection Regulation",
+ <https://www.eugdpr.org>.
+
+ [GSMAsecurity]
+ "GSMA IoT Security Guidelines and Assessment",
+ <http://www.gsma.com/connectedliving/future-iot-networks/
+ iot-security-guidelines>.
+
+ [HIP-DEX] Moskowitz, R. and R. Hummen, "HIP Diet EXchange (DEX)",
+ Work in Progress, draft-ietf-hip-dex-06, December 2017.
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 39]
+
+RFC 8576 IoT Security April 2019
+
+
+ [IEEE802ah]
+ IEEE, "Status of Project IEEE 802.11ah", IEEE P802.11 -
+ Task Group AH - Meeting Update,
+ <http://www.ieee802.org/11/Reports/tgah_update.htm>.
+
+ [IIoT] "Industrial Internet Consortium",
+ <http://www.iiconsortium.org>.
+
+ [IoTSecFoundation]
+ Internet of Things Security Foundation, "Establishing
+ Principles for Internet of Things Security",
+ <https://iotsecurityfoundation.org/establishing-
+ principles-for-internet-of-things-security>.
+
+ [IPv6-over-NFC]
+ Choi, Y., Hong, Y., Youn, J., Kim, D., and J. Choi,
+ "Transmission of IPv6 Packets over Near Field
+ Communication", Work in Progress, draft-ietf-6lo-nfc-13,
+ February 2019.
+
+ [ISOC-OTA] Internet Society, "Online Trust Alliance (OTA)",
+ <https://www.internetsociety.org/ota/>.
+
+ [LoRa] "LoRa Alliance", <https://www.lora-alliance.org/>.
+
+ [LWM2M] OMA SpecWorks, "Lightweight M2M (LWM2M)",
+ <http://openmobilealliance.org/iot/lightweight-m2m-lwm2m>.
+
+ [Mirai] Kolias, C., Kambourakis, G., Stavrou, A., and J. Voas,,
+ "DDoS in the IoT: Mirai and Other Botnets", Computer,
+ Vol. 50, Issue 7, DOI 10.1109/MC.2017.201, July 2017,
+ <https://ieeexplore.ieee.org/document/7971869>.
+
+ [Moore] Moore, K., Barnes, R., and H. Tschofenig, "Best Current
+ Practices for Securing Internet of Things (IoT) Devices",
+ Work in Progress, draft-moore-iot-security-bcp-01, July
+ 2017.
+
+ [MULTICAST]
+ Tiloca, M., Selander, G., Palombini, F., and J. Park,
+ "Group OSCORE - Secure Group Communication for CoAP", Work
+ in Progress, draft-ietf-core-oscore-groupcomm-04, March
+ 2019.
+
+ [NB-IoT] Qualcomm Incorporated, "New Work Item: NarrowBand IOT (NB-
+ IOT)", September 2015,
+ <http://www.3gpp.org/ftp/tsg_ran/TSG_RAN/TSGR_69/Docs/
+ RP-151621.zip>.
+
+
+
+Garcia-Morchon, et al. Informational [Page 40]
+
+RFC 8576 IoT Security April 2019
+
+
+ [NHTSA] National Highway Traffic Safety Administration,
+ "Cybersecurity Best Practices for Modern Vehicles", Report
+ No. DOT HS 812 333, October 2016,
+ <https://www.nhtsa.gov/staticfiles/nvs/
+ pdf/812333_CybersecurityForModernVehicles.pdf>.
+
+ [NIST-Guide]
+ Ross, R., McEvilley, M., and J. Oren, "Systems Security
+ Engineering: Considerations for a Multidisciplinary
+ Approach in the Engineering of Trustworthy Secure
+ Systems", NIST Special Publication 800-160,
+ DOI 10.6028/NIST.SP.800-160, November 2016,
+ <http://nvlpubs.nist.gov/nistpubs/SpecialPublications/
+ NIST.SP.800\ -160.pdf>.
+
+ [NIST-LW-2016]
+ Sonmez Turan, M., "NIST's Lightweight Crypto Project",
+ October 2016, <https://www.nist.gov/sites/default/files/
+ documents/2016/10/17/
+ sonmez-turan-presentation-lwc2016.pdf>.
+
+ [NIST-LW-PROJECT]
+ NIST, "Lightweight Cryptography", <https://www.nist.gov/
+ programs-projects/lightweight-cryptography>.
+
+ [NISTSP800-122]
+ McCallister, E., Grance, T., and K. Scarfone, "Guide to
+ Protecting the Confidentiality of Personally Identifiable
+ Information (PII)", NIST Special Publication 800-122,
+ April 2010, <https://nvlpubs.nist.gov/nistpubs/legacy/sp/
+ nistspecialpublication800-122.pdf>.
+
+ [NISTSP800-30r1]
+ National Institute of Standards and Technology, "Guide for
+ Conducting Risk Assessments", NIST Special
+ Publication 800-30 Revision 1, September 2012,
+ <https://nvlpubs.nist.gov/nistpubs/Legacy/SP/
+ nistspecialpublication800-30r1.pdf>.
+
+ [NISTSP800-34r1]
+ Swanson, M., Bowen, P., Phillips, A., Gallup, D., and D.
+ Lynes, "Contingency Planning Guide for Federal Information
+ Systems", NIST Special Publication 800-34 Revision 1, May
+ 2010, <https://nvlpubs.nist.gov/nistpubs/Legacy/SP/
+ nistspecialpublication800-34r1.pdf>.
+
+ [OCF] "Open Connectivity Foundation",
+ <https://openconnectivity.org/>.
+
+
+
+Garcia-Morchon, et al. Informational [Page 41]
+
+RFC 8576 IoT Security April 2019
+
+
+ [OMASpecWorks]
+ "OMA SpecWorks",
+ <https://www.omaspecworks.org/ipso-alliance>.
+
+ [OneM2M] "OneM2M", <http://www.onem2m.org>.
+
+ [OSCORE] Selander, G., Mattsson, J., Palombini, F., and L. Seitz,
+ "Object Security for Constrained RESTful Environments
+ (OSCORE)", Work in Progress, draft-ietf-core-object-
+ security-16, March 2019.
+
+ [OWASP] The OWASP Foundation, "IoT Security Guidance", February
+ 2017,
+ <https://www.owasp.org/index.php/IoT_Security_Guidance>.
+
+ [RD] Shelby, Z., Koster, M., Bormann, C., Stok, P., and C.
+ Amsuess, Ed., "CoRE Resource Directory", Work in
+ Progress, draft-ietf-core-resource-directory-20, March
+ 2019.
+
+ [RFC2818] Rescorla, E., "HTTP Over TLS", RFC 2818,
+ DOI 10.17487/RFC2818, May 2000,
+ <https://www.rfc-editor.org/info/rfc2818>.
+
+ [RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H.
+ Levkowetz, Ed., "Extensible Authentication Protocol
+ (EAP)", RFC 3748, DOI 10.17487/RFC3748, June 2004,
+ <https://www.rfc-editor.org/info/rfc3748>.
+
+ [RFC3756] Nikander, P., Ed., Kempf, J., and E. Nordmark, "IPv6
+ Neighbor Discovery (ND) Trust Models and Threats",
+ RFC 3756, DOI 10.17487/RFC3756, May 2004,
+ <https://www.rfc-editor.org/info/rfc3756>.
+
+ [RFC3833] Atkins, D. and R. Austein, "Threat Analysis of the Domain
+ Name System (DNS)", RFC 3833, DOI 10.17487/RFC3833, August
+ 2004, <https://www.rfc-editor.org/info/rfc3833>.
+
+ [RFC4016] Parthasarathy, M., "Protocol for Carrying Authentication
+ and Network Access (PANA) Threat Analysis and Security
+ Requirements", RFC 4016, DOI 10.17487/RFC4016, March 2005,
+ <https://www.rfc-editor.org/info/rfc4016>.
+
+ [RFC4108] Housley, R., "Using Cryptographic Message Syntax (CMS) to
+ Protect Firmware Packages", RFC 4108,
+ DOI 10.17487/RFC4108, August 2005,
+ <https://www.rfc-editor.org/info/rfc4108>.
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 42]
+
+RFC 8576 IoT Security April 2019
+
+
+ [RFC4120] Neuman, C., Yu, T., Hartman, S., and K. Raeburn, "The
+ Kerberos Network Authentication Service (V5)", RFC 4120,
+ DOI 10.17487/RFC4120, July 2005,
+ <https://www.rfc-editor.org/info/rfc4120>.
+
+ [RFC4422] Melnikov, A., Ed. and K. Zeilenga, Ed., "Simple
+ Authentication and Security Layer (SASL)", RFC 4422,
+ DOI 10.17487/RFC4422, June 2006,
+ <https://www.rfc-editor.org/info/rfc4422>.
+
+ [RFC4555] Eronen, P., "IKEv2 Mobility and Multihoming Protocol
+ (MOBIKE)", RFC 4555, DOI 10.17487/RFC4555, June 2006,
+ <https://www.rfc-editor.org/info/rfc4555>.
+
+ [RFC4621] Kivinen, T. and H. Tschofenig, "Design of the IKEv2
+ Mobility and Multihoming (MOBIKE) Protocol", RFC 4621,
+ DOI 10.17487/RFC4621, August 2006,
+ <https://www.rfc-editor.org/info/rfc4621>.
+
+ [RFC4738] Ignjatic, D., Dondeti, L., Audet, F., and P. Lin, "MIKEY-
+ RSA-R: An Additional Mode of Key Distribution in
+ Multimedia Internet KEYing (MIKEY)", RFC 4738,
+ DOI 10.17487/RFC4738, November 2006,
+ <https://www.rfc-editor.org/info/rfc4738>.
+
+ [RFC4919] Kushalnagar, N., Montenegro, G., and C. Schumacher, "IPv6
+ over Low-Power Wireless Personal Area Networks (6LoWPANs):
+ Overview, Assumptions, Problem Statement, and Goals",
+ RFC 4919, DOI 10.17487/RFC4919, August 2007,
+ <https://www.rfc-editor.org/info/rfc4919>.
+
+ [RFC4944] Montenegro, G., Kushalnagar, N., Hui, J., and D. Culler,
+ "Transmission of IPv6 Packets over IEEE 802.15.4
+ Networks", RFC 4944, DOI 10.17487/RFC4944, September 2007,
+ <https://www.rfc-editor.org/info/rfc4944>.
+
+ [RFC5191] Forsberg, D., Ohba, Y., Ed., Patil, B., Tschofenig, H.,
+ and A. Yegin, "Protocol for Carrying Authentication for
+ Network Access (PANA)", RFC 5191, DOI 10.17487/RFC5191,
+ May 2008, <https://www.rfc-editor.org/info/rfc5191>.
+
+ [RFC5652] Housley, R., "Cryptographic Message Syntax (CMS)", STD 70,
+ RFC 5652, DOI 10.17487/RFC5652, September 2009,
+ <https://www.rfc-editor.org/info/rfc5652>.
+
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 43]
+
+RFC 8576 IoT Security April 2019
+
+
+ [RFC5713] Moustafa, H., Tschofenig, H., and S. De Cnodder, "Security
+ Threats and Security Requirements for the Access Node
+ Control Protocol (ANCP)", RFC 5713, DOI 10.17487/RFC5713,
+ January 2010, <https://www.rfc-editor.org/info/rfc5713>.
+
+ [RFC5903] Fu, D. and J. Solinas, "Elliptic Curve Groups modulo a
+ Prime (ECP Groups) for IKE and IKEv2", RFC 5903,
+ DOI 10.17487/RFC5903, June 2010,
+ <https://www.rfc-editor.org/info/rfc5903>.
+
+ [RFC6024] Reddy, R. and C. Wallace, "Trust Anchor Management
+ Requirements", RFC 6024, DOI 10.17487/RFC6024, October
+ 2010, <https://www.rfc-editor.org/info/rfc6024>.
+
+ [RFC6272] Baker, F. and D. Meyer, "Internet Protocols for the Smart
+ Grid", RFC 6272, DOI 10.17487/RFC6272, June 2011,
+ <https://www.rfc-editor.org/info/rfc6272>.
+
+ [RFC6347] Rescorla, E. and N. Modadugu, "Datagram Transport Layer
+ Security Version 1.2", RFC 6347, DOI 10.17487/RFC6347,
+ January 2012, <https://www.rfc-editor.org/info/rfc6347>.
+
+ [RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J.,
+ Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur,
+ JP., and R. Alexander, "RPL: IPv6 Routing Protocol for
+ Low-Power and Lossy Networks", RFC 6550,
+ DOI 10.17487/RFC6550, March 2012,
+ <https://www.rfc-editor.org/info/rfc6550>.
+
+ [RFC6551] Vasseur, JP., Ed., Kim, M., Ed., Pister, K., Dejean, N.,
+ and D. Barthel, "Routing Metrics Used for Path Calculation
+ in Low-Power and Lossy Networks", RFC 6551,
+ DOI 10.17487/RFC6551, March 2012,
+ <https://www.rfc-editor.org/info/rfc6551>.
+
+ [RFC6568] Kim, E., Kaspar, D., and JP. Vasseur, "Design and
+ Application Spaces for IPv6 over Low-Power Wireless
+ Personal Area Networks (6LoWPANs)", RFC 6568,
+ DOI 10.17487/RFC6568, April 2012,
+ <https://www.rfc-editor.org/info/rfc6568>.
+
+ [RFC6690] Shelby, Z., "Constrained RESTful Environments (CoRE) Link
+ Format", RFC 6690, DOI 10.17487/RFC6690, August 2012,
+ <https://www.rfc-editor.org/info/rfc6690>.
+
+ [RFC6749] Hardt, D., Ed., "The OAuth 2.0 Authorization Framework",
+ RFC 6749, DOI 10.17487/RFC6749, October 2012,
+ <https://www.rfc-editor.org/info/rfc6749>.
+
+
+
+Garcia-Morchon, et al. Informational [Page 44]
+
+RFC 8576 IoT Security April 2019
+
+
+ [RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J.,
+ Morris, J., Hansen, M., and R. Smith, "Privacy
+ Considerations for Internet Protocols", RFC 6973,
+ DOI 10.17487/RFC6973, July 2013,
+ <https://www.rfc-editor.org/info/rfc6973>.
+
+ [RFC7049] Bormann, C. and P. Hoffman, "Concise Binary Object
+ Representation (CBOR)", RFC 7049, DOI 10.17487/RFC7049,
+ October 2013, <https://www.rfc-editor.org/info/rfc7049>.
+
+ [RFC7228] Bormann, C., Ersue, M., and A. Keranen, "Terminology for
+ Constrained-Node Networks", RFC 7228,
+ DOI 10.17487/RFC7228, May 2014,
+ <https://www.rfc-editor.org/info/rfc7228>.
+
+ [RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained
+ Application Protocol (CoAP)", RFC 7252,
+ DOI 10.17487/RFC7252, June 2014,
+ <https://www.rfc-editor.org/info/rfc7252>.
+
+ [RFC7296] Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and T.
+ Kivinen, "Internet Key Exchange Protocol Version 2
+ (IKEv2)", STD 79, RFC 7296, DOI 10.17487/RFC7296, October
+ 2014, <https://www.rfc-editor.org/info/rfc7296>.
+
+ [RFC7401] Moskowitz, R., Ed., Heer, T., Jokela, P., and T.
+ Henderson, "Host Identity Protocol Version 2 (HIPv2)",
+ RFC 7401, DOI 10.17487/RFC7401, April 2015,
+ <https://www.rfc-editor.org/info/rfc7401>.
+
+ [RFC7515] Jones, M., Bradley, J., and N. Sakimura, "JSON Web
+ Signature (JWS)", RFC 7515, DOI 10.17487/RFC7515, May
+ 2015, <https://www.rfc-editor.org/info/rfc7515>.
+
+ [RFC7516] Jones, M. and J. Hildebrand, "JSON Web Encryption (JWE)",
+ RFC 7516, DOI 10.17487/RFC7516, May 2015,
+ <https://www.rfc-editor.org/info/rfc7516>.
+
+ [RFC7517] Jones, M., "JSON Web Key (JWK)", RFC 7517,
+ DOI 10.17487/RFC7517, May 2015,
+ <https://www.rfc-editor.org/info/rfc7517>.
+
+ [RFC7519] Jones, M., Bradley, J., and N. Sakimura, "JSON Web Token
+ (JWT)", RFC 7519, DOI 10.17487/RFC7519, May 2015,
+ <https://www.rfc-editor.org/info/rfc7519>.
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 45]
+
+RFC 8576 IoT Security April 2019
+
+
+ [RFC7520] Miller, M., "Examples of Protecting Content Using JSON
+ Object Signing and Encryption (JOSE)", RFC 7520,
+ DOI 10.17487/RFC7520, May 2015,
+ <https://www.rfc-editor.org/info/rfc7520>.
+
+ [RFC7668] Nieminen, J., Savolainen, T., Isomaki, M., Patil, B.,
+ Shelby, Z., and C. Gomez, "IPv6 over BLUETOOTH(R) Low
+ Energy", RFC 7668, DOI 10.17487/RFC7668, October 2015,
+ <https://www.rfc-editor.org/info/rfc7668>.
+
+ [RFC7696] Housley, R., "Guidelines for Cryptographic Algorithm
+ Agility and Selecting Mandatory-to-Implement Algorithms",
+ BCP 201, RFC 7696, DOI 10.17487/RFC7696, November 2015,
+ <https://www.rfc-editor.org/info/rfc7696>.
+
+ [RFC7744] Seitz, L., Ed., Gerdes, S., Ed., Selander, G., Mani, M.,
+ and S. Kumar, "Use Cases for Authentication and
+ Authorization in Constrained Environments", RFC 7744,
+ DOI 10.17487/RFC7744, January 2016,
+ <https://www.rfc-editor.org/info/rfc7744>.
+
+ [RFC7815] Kivinen, T., "Minimal Internet Key Exchange Version 2
+ (IKEv2) Initiator Implementation", RFC 7815,
+ DOI 10.17487/RFC7815, March 2016,
+ <https://www.rfc-editor.org/info/rfc7815>.
+
+ [RFC7925] Tschofenig, H., Ed. and T. Fossati, "Transport Layer
+ Security (TLS) / Datagram Transport Layer Security (DTLS)
+ Profiles for the Internet of Things", RFC 7925,
+ DOI 10.17487/RFC7925, July 2016,
+ <https://www.rfc-editor.org/info/rfc7925>.
+
+ [RFC8046] Henderson, T., Ed., Vogt, C., and J. Arkko, "Host Mobility
+ with the Host Identity Protocol", RFC 8046,
+ DOI 10.17487/RFC8046, February 2017,
+ <https://www.rfc-editor.org/info/rfc8046>.
+
+ [RFC8105] Mariager, P., Petersen, J., Ed., Shelby, Z., Van de Logt,
+ M., and D. Barthel, "Transmission of IPv6 Packets over
+ Digital Enhanced Cordless Telecommunications (DECT) Ultra
+ Low Energy (ULE)", RFC 8105, DOI 10.17487/RFC8105, May
+ 2017, <https://www.rfc-editor.org/info/rfc8105>.
+
+ [RFC8152] Schaad, J., "CBOR Object Signing and Encryption (COSE)",
+ RFC 8152, DOI 10.17487/RFC8152, July 2017,
+ <https://www.rfc-editor.org/info/rfc8152>.
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 46]
+
+RFC 8576 IoT Security April 2019
+
+
+ [RFC8240] Tschofenig, H. and S. Farrell, "Report from the Internet
+ of Things Software Update (IoTSU) Workshop 2016",
+ RFC 8240, DOI 10.17487/RFC8240, September 2017,
+ <https://www.rfc-editor.org/info/rfc8240>.
+
+ [RFC8259] Bray, T., Ed., "The JavaScript Object Notation (JSON) Data
+ Interchange Format", STD 90, RFC 8259,
+ DOI 10.17487/RFC8259, December 2017,
+ <https://www.rfc-editor.org/info/rfc8259>.
+
+ [RFC8376] Farrell, S., Ed., "Low-Power Wide Area Network (LPWAN)
+ Overview", RFC 8376, DOI 10.17487/RFC8376, May 2018,
+ <https://www.rfc-editor.org/info/rfc8376>.
+
+ [RFC8387] Sethi, M., Arkko, J., Keranen, A., and H. Back, "Practical
+ Considerations and Implementation Experiences in Securing
+ Smart Object Networks", RFC 8387, DOI 10.17487/RFC8387,
+ May 2018, <https://www.rfc-editor.org/info/rfc8387>.
+
+ [RFC8428] Jennings, C., Shelby, Z., Arkko, J., Keranen, A., and C.
+ Bormann, "Sensor Measurement Lists (SenML)", RFC 8428,
+ DOI 10.17487/RFC8428, August 2018,
+ <https://www.rfc-editor.org/info/rfc8428>.
+
+ [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol
+ Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018,
+ <https://www.rfc-editor.org/info/rfc8446>.
+
+ [RFC8520] Lear, E., Droms, R., and D. Romascanu, "Manufacturer Usage
+ Description Specification", RFC 8520,
+ DOI 10.17487/RFC8520, March 2019,
+ <https://www.rfc-editor.org/info/rfc8520>.
+
+ [RG-T2TRG] IRTF, "Thing-to-Thing Research Group (T2TRG)",
+ <https://datatracker.ietf.org/rg/t2trg/charter/>.
+
+ [SchneierSecurity]
+ Schneier, B., "The Internet of Things Is Wildly Insecure
+ -- And Often Unpatchable", January 2014,
+ <https://www.schneier.com/essays/archives/2014/01/
+ the_internet_of_thin.html>.
+
+ [SEAL] Microsoft, "Microsoft SEAL: Fast and Easy-to-Use
+ Homomorphic Encryption Library",
+ <https://www.microsoft.com/en-us/research/project/
+ microsoft-seal/>.
+
+ [shodan] "Shodan", <https://www.shodan.io>.
+
+
+
+Garcia-Morchon, et al. Informational [Page 47]
+
+RFC 8576 IoT Security April 2019
+
+
+ [sigfox] "Sigfox - The Global Communications Service Provider for
+ the Internet of Things (IoT)", <https://www.sigfox.com>.
+
+ [Thread] "Thread", <http://threadgroup.org>.
+
+ [TR69] Oppenheim, L. and S. Tal, "Too Many Cooks - Exploiting the
+ Internet-of-TR-069-Things", December 2014,
+ <https://media.ccc.de/v/31c3_-_6166_-_en_-_saal_6_-
+ _201412282145_-_too_many_cooks_-_exploiting_the_internet-
+ of-tr-069-things_-_lior_oppenheim_-_shahar_tal>.
+
+ [venona-project]
+ National Security Agency | Central Security Service,
+ "VENONA", <https://www.nsa.gov/news-features/declassified-
+ documents/venona/index.shtml>.
+
+ [WG-6lo] IETF, "IPv6 over Networks of Resource-constrained Nodes
+ (6lo)", <https://datatracker.ietf.org/wg/6lo/charter/>.
+
+ [WG-6LoWPAN]
+ IETF, "IPv6 over Low power WPAN (6lowpan)",
+ <http://datatracker.ietf.org/wg/6lowpan/charter/>.
+
+ [WG-ACE] IETF, "Authentication and Authorization for Constrained
+ Environments (ace)",
+ <https://datatracker.ietf.org/wg/ace/charter/>.
+
+ [WG-ACME] IETF, "Automated Certificate Management Environment
+ (acme)", <https://datatracker.ietf.org/wg/acme/charter/>.
+
+ [WG-CoRE] IETF, "Constrained RESTful Environment (core)",
+ <https://datatracker.ietf.org/wg/core/charter/>.
+
+ [WG-LPWAN] IETF, "IPv6 over Low Power Wide-Area Networks (lpwan)",
+ <https://datatracker.ietf.org/wg/lpwan/charter/>.
+
+ [WG-LWIG] IETF, "Light-Weight Implementation Guidance (lwig)",
+ <https://datatracker.ietf.org/wg/lwig/charter/>.
+
+ [WG-MSEC] IETF, "Multicast Security (msec)",
+ <https://datatracker.ietf.org/wg/msec/charter/>.
+
+ [WG-SUIT] IETF, "Software Updates for Internet of Things (suit)",
+ <https://datatracker.ietf.org/wg/suit/charter/>.
+
+ [WG-TEEP] IETF, "Trusted Execution Environment Provisioning (teep)",
+ <https://datatracker.ietf.org/wg/teep/charter/>.
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 48]
+
+RFC 8576 IoT Security April 2019
+
+
+ [Williams] Williams, M. and J. Barrett, "Mobile DTLS", Work in
+ Progress, draft-barrett-mobile-dtls-00, March 2009.
+
+ [wink] Barrett, B., "Wink's Outage Shows Us How Frustrating Smart
+ Homes Could Be", Wired, Gear, April 2015,
+ <http://www.wired.com/2015/04/smart-home-headaches/>.
+
+ [ZB] "Zigbee Alliance", <http://www.zigbee.org/>.
+
+ [Ziegeldorf]
+ Ziegeldorf, J., Garcia Morchon, O., and K. Wehrle,
+ "Privacy in the Internet of Things: Threats and
+ Challenges", Security and Communication Networks, Vol. 7,
+ Issue 12, pp. 2728-2742, DOI 10.1002/sec.795, 2014.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 49]
+
+RFC 8576 IoT Security April 2019
+
+
+Acknowledgments
+
+ We gratefully acknowledge feedback and fruitful discussion with
+ Tobias Heer, Robert Moskowitz, Thorsten Dahm, Hannes Tschofenig,
+ Carsten Bormann, Barry Raveendran, Ari Keranen, Goran Selander, Fred
+ Baker, Vicent Roca, Thomas Fossati, and Eliot Lear. We acknowledge
+ the additional authors of a draft version of this document: Sye Loong
+ Keoh, Rene Hummen, and Rene Struik.
+
+Authors' Addresses
+
+ Oscar Garcia-Morchon
+ Philips
+ High Tech Campus 5
+ Eindhoven, 5656 AE
+ The Netherlands
+
+ Email: oscar.garcia-morchon@philips.com
+
+
+ Sandeep S. Kumar
+ Signify
+ High Tech Campus 7
+ Eindhoven, 5656 AE
+ The Netherlands
+
+ Email: sandeep.kumar@signify.com
+
+
+ Mohit Sethi
+ Ericsson
+ Jorvas 02420
+ Finland
+
+ Email: mohit@piuha.net
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Garcia-Morchon, et al. Informational [Page 50]
+