Previous Page  43 / 84 Next Page
Information
Show Menu
Previous Page 43 / 84 Next Page
Page Background

New-Tech Magazine Europe l 43

with location potentially an intrinsic

part of the value of the sensor data.

The concern here is how robust the

solution is in detecting and handling

failure cases. For example, either

through jamming the GNSS receiver,

or spoofing the input to the GNSS

receiver, it is just as important to

detect that the reported position is

different to reality as it is to protect

against a direct attack on the rest of

the system. Man-in-the-middle style

attacks on the sensor data passed

to the host will also be another

consideration. Being able to detect

both this and spoofing attacks and

alerting the end-application are

important aspects of incorporating

security into your design.

As the IoT era advances forward

security can no longer be an

afterthought. Implementing a

security regime into your product

is as essential as the device’s core

function.

dispersed sensors the favoured

approach is to enable an over-the-

air method. While the concept is

fairly straightforward, the chances

of this becoming an attack point

is high. Ensuring the downloaded

firmware image or patch is validated

prior to being flashed is essential.

This must include a process that

ensures the resulting image can be

authenticated and integrity-checked

before use; with an ability to back-

track to the previously authenticated

image should a security breach or

hardware problem be encountered

during the update process, whilst

also preventing older versions from

being accepted.

The next consideration is that of the

communications or transport layer.

There needs to be a mechanism for

the device to be able to authenticate

itself with the server, and vice versa.

Whatever the method used, the

device should be able to sign or

encrypt any data communicated with

the server. The ability to securely

manage the keys used for the

signing, decryption and encryption

processes will ensure that these can

be changed whenever necessary,

even on a per session basis. Data

being communicated is always open

to the potential of being intercepted

or compromised by man-in-the-

middle attacks, including at the

device interface level. Hence taking

unauthorised control of the device is

another possibility that needs to be

avoided at all cost.

Access to device functionality is

often via a number of defined APIs.

Unfortunately, the access to device

features and the implications for

security can often be overlooked.

Those wishing to exploit or

compromise a device, even if for

the fun of it, usually have a lot of

time available to probe for open

APIs and experiment with the

interrelationship between them and

device functionality. Sometimes

APIs incorporated within code

provide access not only to standard

features and capabilities but also

to premium or paid-for services.

Developers also frequently provide

undocumented APIs for their own

testing and configuration so it is

imperative that these are protected

as well. Hence, formal authentication

and authorisation techniques should

be employed to allow access to or

enable such API’s.

The final consideration is that of

robustness for those applications

that source data from external

devices, such as a GNSS receiver,