securing_iot_devices-through_paasmer

Securing IoT Devices through PAASMER

ManagementTeamMouli1

Kavitha Gopalan

The recent DDoS attack using connected devices was massive and disruptive, to say the least. The attack which was done using the internet enabled Cameras affected lot of websites Twitter, Amazon, Reddit, Netflix, and more. The attack specifically targeted the DNS (Domain Name System) that maps human readable website address to their IP address.

In this attack, the malicious malware named Mirai was infected to the smart home devices like connected cameras that were vulnerable. Mirai spreads itself by scanning the Internet for IPs owned by commonly connected devices. These devices are often left with factory logins passwords and weak security protocols. The software uses this weakness to upload itself onto the device and take it over. Once the device is infected it will act like a botnet and sends spurious traffic to website swamping them that the website won’t be able to handle the load that it could break down. Cyber-attacks are not new but a smart device that have an IP address and that are not properly secured are vulnerable and could open the gate for more serious and dangerous attack.

IoT is influencing our lives in numerous ways by bringing a lot of value. But at the same time, IoT involves connecting the devices to Internet. Any connected objects like cars and home appliances are vulnerable. On one hand the enormous amount of data from the smart devices need to be secure and safe and should not fall into the wrong hands and on the other hand, the smart devices acting like botnets to create the DDOS type of attack.

Therefore, building secure IoT products and solution are a top priority and IoT product manufacturer, software vendors and platform vendors all have the task at hand to build a system which is secure and can prevent these kinds of attack.

Solving the Security Threat Using PAASMER platform
As a secure IoT platform, PAASMER’s goal has been to ensure that IoT service/products built using the platform is highly secure.

PAASMER Security framework follows a ground-up implementation to ensure data from the device to cloud and beyond is secure and no data compromise happens during. It also ensures that the devices are not exposed to any kind of attack.

PAASMER Security framework and how data safety is ensured is defined as below.

Device Level security
Device-level security in PAASMER ensures the edge devices and gateways are not vulnerable and they do not expose their IP address to other devices which are not authorized for the access. This prevents any type of attack on them.
PAASMER Device-level security is implemented in MISTY Operating system/Firmware package for IoT devices. The key features include

  1. Secure Boot
  2. Secure Provisioning
  3. Secure updates and patches

The secure boot validates and authenticates the software in the device each time the device powers up through a digital signature. This ensures no unknown software or malware is running on the device. An additional hardware chip called TPM provides enhanced security.

Secure provisioning uses secure tokens to establish the device into the network. Once the devices communicate its presence a secure token is released for the device to communicate with the gateway.

The IoT devices also need regular software updates and patches to keep them safe from malicious virus and attacks. However, what usually happens is once these devices are installed it’s forgotten. That’s why PAASMER offers Over the air software updates and patches which ensure the user does not need to bother about doing a regular software update. It’s automatically updated when a new patch is available after a secure device authentication.

Access Control, Authentication, and Authorization
Access Control is built into the operating system to ensure that only authorized users are accessing the device. User level policy, Device level policy limits the access to users/device to the function they must perform. Multi-layered authentication like username/password, passcode based authentication, strong password rule and policy based access is defined at the device layer. PAASMER security framework forces customers to rest password during the initial registration process forcing them to change the factory password and also implements stringent rules for passwords.

Device authentication allows each device to validate itself when they enter the network thus removing device trying to sneak the network.

Data Encryption
PAASMER also provides end to end Data encryption. All the data service from the device to the gateway to cloud to applications are encrypted so no data theft is possible while the data is moving.

PAASMER Security Framework leverages the SSL 3.0 and TLS 1.0 standards to leverage the latest in session and security frameworks to ensure security for the data. All communications require valid certificates that are authenticated every time a client connects.

PAASMER also ensures the data itself is encrypted with the Advanced Encryption Standard (AES) encryption specification.

Secure Communication
PAASMER mandates the usage of secure network tunnel for device communication with the cloud. The choice of network tunnel can vary between each use case. Handling all device communications over the secure network tunnel ensures that there is no network spoofing of device data or controls. Special Ant-DDoS choices on network tunnel ensure protection against the DDoS attacks.

Conclusion
To reap the full potential of IoT the security challenges faced by IoT devices should be mitigated. While the onus of Securing IoT devices lies with the platform vendors, software vendors, product manufacturers and consumers alike, vendors need to harden security in each of their offerings by the following end to end security implementation. By using PAASMER platform, IoT manufacturers can leverage the inbuilt security elements to build a Secure IoT platform in a quick, efficient way.

iot_basics

IoT Basic Definitions and States

ManagementTeamMouli1

Chandramouli Srinivasan

There is much variation in understanding of the Internet of Things and its related concepts — operational technology and machine-to-machine communication.The concept of the Internet of Things (IoT) is not fundamentally new, but several factors are converging to drive extremely high levels of deployment. Mass adoption is shifting the IoT into a powerful force for business transformation.

  • The IoT is the network of dedicated physical objects (things) that contain embedded technology to sense or interact with their internal state or external environment. The IoT comprises an ecosystem that includes things, communication, applications and data analysis.
  • Machine-to-machine (M2M) communication services refer to connectivity services that link IoT “things” to central or back-end systems, without human input.
  • Operational technology (OT) is enterprise technology used to monitor and/or control physical devices, assets and processes.

Why Now for the IoT?
The concept of the IoT is not fundamentally new. Connected “things” have provided benefits to enterprises and consumers for years. Examples include automated teller machines (ATMs), airline check-in machines and card-operated door locks. Back-end systems have provided much value in these situations by analyzing usage patterns, enhancing maintenance support and interfacing with enterprise software. However, the IoT is evolving beyond these early examples as increasing penetration and greater numbers of use cases lead to the much greater utility.

Several diverse factors are converging to drive further value and use from the IoT:

  • Business models that take advantage of the IoT are emerging — such as pay-as-you-drive insurance offerings, smart waste bins on city streets and remote healthcare services. These models are seen as proof that the IoT will solve real business problems, and they spur enterprises to explore new ways in which to use the IoT.
  • The costs of connectivity and of embedded technology have fallen to a point where this is no longer a barrier to adoption. Costs are now low enough for most situations and are continuing to fall. Broadband is now well penetrated to allow much of this connectivity.
  • Mobile app development platforms have matured, allowing OT devices such as programmable logic controllers (PLCs) to be controlled and monitored remotely from a tablet computer. APIs are being added to industrial and other OT software in order to support this change.
  • The power of big data and analytics is being applied to the data originating from things. This supports decision making in a wide range of contexts and is probably the largest value component of the IoT.
  • New applications are rapidly emerging that focus on the control and monitoring of physical entities. These are extremely diverse and include inventory control, remote healthcare, livestock control, home energy management, agricultural crop sensing, and many more examples.
  • IoT hosting platforms are available from a growing list of suppliers. These cloud-based facilities can scale to very large numbers of users and things. They integrate and link with application and middleware while providing some degree of security. These platforms offer a quick and easy basis on which to develop IoT solutions.
  • Standards and ecosystems are starting to form. These will stabilize over the next several years, facilitating rapid development of solutions across a range of industries.
  • Distributed DBMS styles such as NoSQL and higher performance in-memory computing are available to support real-time analytics.
  • Regulation and legislation are pushing some categories of things into the mainstream. Examples include smart meters and many automotive functions. Intelligent lighting will follow as governments encourage energy savings through light-emitting diode (LED) technology. The infrastructure required for these use cases will support further examples and will, therefore boost overall growth of the IoT.

IoT Today offers Limited Value

  • Few use cases
  • Fragmented solutions
  • Unclear ownership of the IoT in enterprises

IoT Tomorrow will offer Transformation Value

  • Mass adoption
  • Tens of billions of things connected
  • Multi-trillion-dollar economic value from the IoT

Future IoT will be driven by these Key Drivers

  • New business models that take advantage of the IoT
  • Falling costs of connectivity and technology
  • Mobile app development platforms
  • Analytics applied to things
  • New applications
  • IoT hosting platforms
  • Standards and ecosystems
  • Distributed and real-time architectures
  • Regulation
iot_banner2

Weekly Digest on Internet of Things

ManagementTeamMouli1

Kavitha Gopalan

Blockchain-based IoT project does drone deliveries using Ethereum
Chronicled, a San Francisco-based technology company that is currently developing a blockchain-hosted registry and protocol for the Internet of Things (IoT), has unveiled a prototype drone delivery system using Ethereum.

A video shows a drone equipped with a secure blockchain-registered BLE identity chip which is able to self-authenticate with a computer-controlled window and gain access to a private residence in order to deliver a package.
Find out more on this post from IBtimes

Autonomous boats: self-driving in Amsterdam
Amsterdam: a quaint city overflowing with charm. After a recent visit, I fulfilled all of my dreams: riding bikes, visiting the Anne Frank house, and eating endless waffles. At the point when I had to slow down, I sat and watched the boats filled with locals and tourists roll by, and the question came to mind: What if the boats were self-driving?

MIT is joining forces with the city of Amsterdam to bring the world’s first fleet of autonomous boats. Over the next five years, they hope for these boats to become commonplace within the city’s canals, used for the transportation of people and resources as well as keeping track of the environment.
Find out more on this post from IBM

How IoT logistics will revolutionize supply chain management
OThe combination of mobile computing, analytics, and cloud services, all of which are fueled by the Internet of Things (IoT), is changing how delivery and fulfillment companies are conducting their operations.

One of the most popular methods for fulfilling deliveries today is through third-party logistics, which involves any company that provides outsourced services to move products and resources from one area to another.

But the IoT is going to change how this process operates.
Find out more on this post fromYahoo Finance

Repurposed sensor enables smartwatch to detect finger taps and other bio-acoustic signals
A smartwatch is capable of detecting and distinguishing a variety of taps, flicks and scratches by the hands and fingers, and all that’s required is a software upgrade that repurposes the device’s existing accelerometer, Carnegie Mellon University researchers discovered.

This new functionality makes possible new applications that use common gestures to control the smartwatch and, ultimately, other objects connected through the internet of things. By monitoring vibrations that occur when people hold objects or use tools, the smartwatch also would be capable of recognizing objects and activities.
Find out more on this post from Phys.org

The answer to Internet of Things madness? Open source, of course!
The IoT market is so diverse, with every product seemingly requiring its own app (and sometimes its own hub), that it has actually started to hold the market back. What’s worse is that consumers’ number one concern – security – suffers. Most products use and store your home Wi-Fi as a way of communicating, but sloppy security has repeatedly made those authentication details accessible, opening up your entire home’s system to attack.
Find out more on this post from Theregister.co.uk

internet-of-things

Weekly Digest on Internet of Things

ManagementTeamMouli1

Kavitha Gopalan

Calm, cruel and connected: August’s best and worst of IoT
Regular travelers know the pain of lugging around a wheelie suitcase. It can not only leave you with a stiff shoulder or wrenched arm but also the pain of longing for a hands free experience. Enter a robotic suitcase that utilizes a camera sensor and Bluetooth to follow its owner on their journey. The Cowarobot moves at a speed of 4.5 mph and is equipped for 12.5 miles of walking before needing a charge. It comes with a keyless locking function, can charge your devices and is equipped to dodge obstacles in its path.

This blog covers more of the new IOT products that will blow your mind
Find out more on this post fromForbes

Why a smart contact lens is the ultimate wearable
Smart contact lenses sound like science fiction. But there’s already a race to develop technology for the contact lenses of the future — ones that will give you super-human vision and will offer heads-up displays, video cameras, medical sensors and much more. In fact, these products are already being developed.

Sounds unreal, right? But it turns out that eyeballs are the perfect place to put technology.
Find out more on this post fromComputerworld

Connected barrels: Transforming oil and gas strategies with the Internet of Things
O&G companies can reap considerable value by developing an integrated IoT strategy with an aim to transform the business. It has been estimated that only 1 percent of the information gathered is being made available to O&G decision makers. Increased data capture and analysis can likely save millions of dollars by eliminating as many as half of a company’s unplanned well outages and boosting crude output by as much as 10 percent over a two-year period.In fact, IoT applications in O&G can literally influence global GDP. Industry-wide adoption of IoT technology could increase global GDP by as much as 0.8 percent, or $816 billion during the next decade, according to Oxford Economics.
Find out more on this post fromDupressDeloitte

How automation is transforming the way we do business, and what it means for you
The explosion of the Internet of Things (IoT) has added a level of complexity to IT and Marketing disciplines, providing new use cases to an already extensive array of devices and applications. Engaging customers at different stages of their marketing journey requires creating personalized messaging, scenario-specific experiences and multi-channel campaigns.
Find out more on this post from Geekwire

Smart dog collars could be the next big thing in wearables
The wearables industry has been primarily focused on building devices for humans, but that could change in the next few years, if the excitement over dog wearables with the Link AKC is any indicator.

The smart collar, designed in collaboration with the American Kennel Club (AKC), comes packed with features you would find on a normal human wearable, including a fitness tracker and step count.
Find out more on this post from ReadWrite

What you need to know about the imminent threat of IoT botnets
What do security analyst Brian Krebs, French hosting giant OVH and famous gaming company Blizzard have in common? They’ve all been the recent victims of massive Distributed Denial of Service (DDoS) attacks, assaults that involve disabling online services by suffocating them with automated requests. Krebs’ blog was brought down by an unprecedented 620 Gbps flood, OVH suffered a 1.1 Tbps traffic, and Blizzard’s Battle.net service went offline after a sizeable DDoS hit its servers.While DDoS is nothing new, attacks of this magnitude are, and what’s making them possible are IoT botnets, armies of compromised Internet of Things devices doing the bidding of malicious actors. This means that any connected devices from CCTV cameras installed in streets to a harmless coffee machine sitting in your home can be secretly involved in attacking websites and servers
Find out more on this post fromVentureBeat

power-of-iot-edge3

Unleashing the Power of IoT Edge

ManagementTeamMouli1

Chandramouli Srinivasan

Enterprises are increasingly connecting a broad variety and number of IoT endpoints (a collection of sensors) to access data from and better manage physical assets that are relevant to their business. Typical IoT-enabled business objectives include traditional benefits, such as improved asset management, as well as new business opportunities and revenue models, such as subscribed-to services. Integrated IoT platforms are required due to the increasing sophistication, scale and business value of these data exchanges.

An IoT platform is an on-premises software suite or a cloud service (IoT platform as a service[PaaS]) that monitors and may manage and control various types of endpoints, often via applications business units deploy on the platform. The IoT platform generally incorporates operations involving IoT endpoints (sensors, devices, and multidevice systems), IoT gateways, and back-end enterprise applications and data. The platform provides the capability to monitor IoT event streams, enables specialized analysis and application development, and engages back-end IT systems or services. It typically plays a vital role in providing functionality for provisioning, controlling and even changing the endpoints to support IoT solutions. Any IoT solution contains two parts an IoT Edge (includes endpoints and gateways) and an IoT Cloud (includes Cloud, Analytics, and Visualizations).

General IoT Platform capabilities include:

  • Provisioning and management of devices
  • Data aggregation, integration, transformation, storage, and management
  • Device Event processing: Policy and Rules Management
  • Cybersecurity
  • IoT device communications (network and/or the Internet)
  • Adapter or Connectors (API hub, gateway software)
  • Customizing and building applications (SDK, IDE etc.)
  • IoT data analysis and visualization including machine learning
  • User interfaces for both end users and developers

MostIoT Platforms offer many of these capabilities in the cloud and allow edge devices like sensors and gateway to connect to their cloud and leverage these capabilities.

The IoT platform may be implemented by the enterprise as an on-premises solution, using an IoT PaaS in the cloud, or be distributed between any combination of on-premises IoT endpoint agents, the gateway, public cloud IoT PaaS, and back-end systems and data.Very few Edge focused IoT platforms like Fog-Horn and PAASMER provide many of these capabilities on the Edge of IoT. Offering these capabilities at the Edge means all the data from the sensors can be processed at the IoT Edge. This plays a critical role in providing a more real-time response to events and to lower the cost of maintaining an IoT solution.

MISTY is PAASMER IoT Edge software that bundles all the key elements required to power the edge to be truly intelligent than act as data transfer agents. Unique aspects of MISTY are:

    1. Modular Operating System.
    2. High Speed Edge Database.
    3. Real-Time Rules Engine.
    4. Edge Analytics.
    5. Edge Machine Learning Engine.
    6. Hyper-Scale Cloud Connectors.
    7. Patented Security Engine.

IoT platform software is an emerging market with many types of buyers across the enterprise, from central IT to various lines of business (or LOBs). These buyers have different objectives, project types and success criteria. IoT platform software’s rapid evolution is driven by enterprises’ technical and business requirements, which continue to rapidly evolve and vary by industry and region, and emerging standards.