Securing the Internet of Things - or how light bulbs can spy on you

Fifty billion hackable devices batten down the hatches

Next gen security for virtualised datacentres

What happens when clouds of sensitive data collide

Data from the device doesn't have to be encrypted just once and then sent all the way to the cloud; the flow of information can be segmented and protected within these shorter paths. This allows the data to be secured between just the device and a home hub or another trusted third party called a security manager. The hub and security manager can encrypt the data again after deciding which cloud service will receive the information.

A security manager in this case is a server defined by the Weightless Special Interest Group (SIG). These guys are the brains behind the Weightless machine-to-machine communications standard, which will initially operate in White Spaces - the chunks of radio frequency now free to use after the death of analogue TV.

Weightless-compatible devices chat to each other and their manager in their own separate network, and are not reliant on a home hub nor a broadband connection. The manager could be run by a network provider, a hardware manufacturer (say, Bosch), a utility (such as Scottish Power) or the Weightless SIG itself.

A Weightless-SIG-hosted security manager passes device data to the company providing the service (be that Scottish Power or whomever) and take instructions from the user if he or she wants to change providers.

When it comes to the cryptography itself, Nordic Semiconductor's Daniel Ryan explained how its communications chips had evolved; security is a secondary feature of the short-range radio electronics made by Nordic for numerous computer keyboards and mice.

Early versions simply had a crypto-key stored in the wireless keyboard and the USB receiver dongle; bytes of data representing the key presses were trivially XORed with the key to obfuscate the transmission, a solution which was both expensive and insecure. The next version added a counter, to prevent replay attacks, and used AES rather than XOR, but it still required unique keys to be programmed into the devices at manufacture (an expensive process) and was vulnerable to analysis given the non-random nature of typed text.

The third design requires the keyboard to generate a random crypto-key for each dongle it talks to; before this key is sent to the receiver, it is encrypted using a secret common to all of Nordic's Gazell chips. That shared secret is never used again between the keyboard and the dongle; the now randomly padded communication is subsequently encrypted with the new key, which is remembered by the keyboard and the dongle forever. For complete security a PIN is added during pairing, and the transmission power is turned down during pairing to reduce the chance of being sniffed. Lastly, the source code for the whole lot has been thrown open for public scrutiny.

Those changes aren't all in response to customer requests, or hack attacks, but were put in place in an attempt to build confidence in the security of the product even if incidents of wireless keyboard sniffing are all but unknown. It would only take one public case to dent that trust, perhaps fatally.

Mandated data protection, coming to a light bulb near you

The R&TTE regulations, required for the CE mark, already request that manufacturers "incorporate ... safeguards to ensure that the personal data and privacy of the user and of the subscriber are protected", but drafted updates turn that request into an obligation. Thus, cryptography will be mandated in any of the 50 billion things used by people or households (as opposed to cows, sheep, streetlights, etc).

But the big question which remains is how it's all going to be paid for, which in turn defines the architecture and thus the security that can be applied.

The manufacturer of a boiler might add a lifetime's cloud support to the price of its product, but as CSR's Robin Heydon pointed out, when one's thermostat checks the weather forecast from Accuweather it's not going to see the advertising that pays for the service, so machines will have less free data to work with than their eyeball-touting masters.

ISPs might start selling smart hubs that aggregate data for transmission, but today's heating and lighting systems are built into houses well before the ISP has been selected, so cloud-based management of Hue lightbulbs or Nest thermostats will need to be transferable between owners and service providers.

All this is predicated on the assumption that our homes are going to become hives of connectivity with machines chattering away to each other day and night, sometimes saying nothing at all other than a "hello, world" just to make sure robbers don't take the lack of network traffic as an indicative of our absence.

If we ignore the Internet of Things, pretending it's not going to happen, then likely it will emerge through mandated smart meters and kids' toys. Only then it will come without the privacy safeguards, owner's control and security which the chaps and chapesses in Cambridge spent so long debating. ®

The essential guide to IT transformation

More from The Register

next story
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Microsoft: Azure isn't ready for biz-critical apps … yet
Microsoft will move its own IT to the cloud to avoid $200m server bill
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
Object storage bods Exablox: RAID is dead, baby. RAID is dead
Bring your own disks to its object appliances
Oracle reveals 32-core, 10 BEEELLION-transistor SPARC M7
New chip scales to 1024 cores, 8192 threads 64 TB RAM, at speeds over 3.6GHz
VMware vaporises vCHS hybrid cloud service
AnD yEt mOre cRazy cAps to dEal wIth
prev story


Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?