Ensuring the confidentiality of IoT systems and the security of the Internet of Things - threats and safeguards

Posted: 2022-11-15
Written by: Krzysztof Labuda


As I was preparing for my CEH certification, an IoT module appeared in the v11 version. As a result, I will attempt to give this article an overview of the selected solutions and, in addition to this, I will discuss how we can ensure confidentiality in systems

This text will also cover the security of systems at the network layer and the dangers of using radio waves as a transmission medium. On top of that, you will learn what types of open-access systems attacks you might encounter daily. You may also be interested in my previous article: Internet of Things security – encryption protocols in IoT systems.


We create scalable Internet of Things solutions for smart homes, manufacturing, and medicine. Build and test the software for your IoT product with us!


IoT or IoE – what is it?

IoT, or the Internet of Things (alternatively, in some publications, the Internet of Everything), is a field in information technology that dates back to the early 80s. Here in Poland, we have a saying, “When something serves everything, it does nothing.” In this context, such a description of IoT would be highly unfair. 

In a nutshell, IoT devices not only live up to their names by providing solutions for human activities (from industrial automation to medical and life-saving devices, to alarm sensors, to CCTV cameras, to smart TVs), but they also come with networking modules. It does not matter whether the NIC (network interface) is wired or wireless because, in any case, it enables communication within broad networks, including the internet. This method allows systems to communicate and be controlled from the top down, and a gateway (IoT gateway) is used to detach them from the internet. IoT devices benefit from connectivity and can be controlled via applications, and elements of such systems often include cloud servers where data analysis is performed. The range of applications for IoT systems is extremely extensive, and as a result, severe security issues with the Internet of Things can arise. 

Network layers security

Network layer security mechanisms and technologies that can provide for network segmentation, i.e., splitting the network into separate VLANs (segmentation at the L2 layer), come to the rescue. A significant added value for the security of such systems will be a NAC policy based on the radius server and the 802.1X standard in general.

To systematize this information, I will use a general diagram of the architecture of such systems:

In IoT systems, we may often encounter low power consumption requirements, so that battery power lasts as long as possible (for example, in systems such as ZigBee). Unfortunately, a trade-off must be made here, as encryption algorithms can sometimes be greedy for computational resources – especially asymmetric ones (multiplication, i.e., several multiplications, multiplication of points on elliptic curves, i.e., multiple additions) are computationally expensive and correlate with power consumption.

Since I am a huge chess fan, I feel inclined to quote a joke by one of Poland’s strongest chess grandmasters, Bartosz Soćko. Reflecting on the power of computers in the face of human capabilities in this discipline and the resulting dangers in the form of electronic doping, he concluded by saying that modern grandmasters have to work hard not to lose to a coffee grinder. Hearing this joke immediately brought to mind the ubiquity of IoT devices. In some fields, relatively low computing power can already challenge the human intellect! But let’s cut to the chase.

Internet of things – threats to IoT systems

The use of wireless communications brings with it the serious risk that it is impossible to hide a system that is present in the frequency spectrum. It stands to reason that these systems are susceptible to eavesdropping, and consequently, eavesdropped communications are vulnerable to reverse engineering (e.g., cryptanalysis). Radio systems at the functional layer rely on modulation techniques and information theory – the person who analyses them must also be proficient in these matters.

  • The use of repetitive commands in communication must be avoided in such systems. When used in combination with patient observation of the attacker and efficient use of replay attacks, these can uncover the secrets of a given solution in IoT security.
  • Another threat to these systems is the attempt to jam them (jamming) intentionally. It is difficult to protect against malicious jamming, especially when the power spectral density of the jamming signals exceeds that used for standard communication. There is a separate field of radio engineering called EMC (Electromagnetic Compatibility), whose goal is to develop mechanisms that will ensure the seamless coexistence of radio systems. Software-defined radio (SDR) technology has at least a few highly specialized tools that can be utilized to test IoE systems. It is worth mentioning that the URH is dedicated RF test equipment (Universal Radio Hacker), GNU Radio, Gqrx and HackRF or PandwaRF Marauder.
  • Free access to such IoT devices brings the opportunity to connect to the SPI flash or eMMC interface (soldering skills needed;-)) and read all the firmware, where one can find heaps of information (e.g., source code and binaries of services offered by the device (hardcoded passwords or SSH session keys).

Here are the tools available for analyzing the firmware itself. There are specialized instruments (spectrum analyzers, oscilloscopes) available that can help to find so-called side channels. Essentially, these techniques involve observing the device during regular operation. Several parameters are taken into account, including power consumption, heat emission, and electromagnetic radiation.

A deliberately disrupted operation of the IoT device under investigation can, however, yield outstanding results. For instance, when we start to interfere with the device’s clock signal (these approaches are generally referred to as Fault Injection Attacks), attempts are made to unlock the JTAG (glitching). Once the JTAG interface is unlocked, a gateway opens to allow us to manipulate the embedded software. Observing the device waveforms reveals most software-based mechanisms that ensure the device’s security under test. To make it even more complicated, various types of shielding coatings are used (incorporated into the design of the device during assembly) to weaken the emitted electromagnetic field through this side channel.  

Internet of Things security – keeping IoT systems secure

Physical protection alone (flooding with epoxy resin or hiding address lines between electronic components) can help to prevent physical access to the printed circuits. Using reverse engineering to test a system’s resistance to the types of attacks mentioned above is one way to secure an IoT system.

In this case, a graph of the dependence on power consumption as a function of time is created during the execution of the ciphertext. Ultimately, this leads to the core. In the SPA (Simple Power Analysis) approach, RSA-based systems, which rely on a factorization technique at the functional layer, show vulnerability to this type of analysis. A solution to this problem is to throw a potential attacker off the trail by using techniques such as active masking of the input data, e.g., randomly delaying it and adding the processing of redundant elements.

On the other hand, attempts are made to extract the key in the DPA (Differential Power Analysis) approach, using statistical analysis on a set of measurements of the cryptographic system under study (during its operation). Regarding security techniques, there are several libraries available on the market that can eliminate this risk. Still, there are hardware-based solutions that prevent this type of attack.

Here you will find an example of research into a market-leading and recognized security – the AES symmetric algorithm.

OWASP TOP 10 and STRIDE – support in penetration test plan development


Summing it up

To conclude, it is worth mentioning two models that help to introduce information security policies in organizations: the CIA triangle and Parker’s Hexagon.

CIA stands for three things:

  •   Confidentiality,
  •   Integrity,
  •   Availability.

This model was expanded in 2002 by Donn B. Parker with the following elements:

  •     Possession,
  •     Authenticity,
  •     Utility.

The state of ownership is closely related to free access. It is, therefore, easy to imagine a situation where a device comes with sophisticated and non-trivial security features, only to have them destroyed by such a mundane action as manually resetting it to default settings.

IoT is a field experiencing very rapid market share growth. Many sources deal with manufacturing standards and guides for effective practices to secure them. The threats lurking in the security of IoT devices and their protection are numerous – the points I have presented are not exhaustive. Still, they are a helpful starting point for a discussion; one I strongly recommend.

If you have an IoT system or are just planning to create one and want to make it immune to hackers’ attacks, get in touch with us. We boast extensive experience in implementing security processes for both IoT systems and highly specialized embedded systems. Schedule a free consultation with us and discuss your idea!


*The study is based on the following materials: IoT Security Foundation / Techtarget
Written by: Krzysztof Labuda,
Security Test Consultant

A participant in the Certified Ethical Hacker CEH v11 program, teaches the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals.

the form below.
We will contact you to set up
a conversation at the convenient
moment for you.