Abstract

The distinguishing feature of the Internet of Things is that many devices get interconnected. The threat of side-channel attacks in this setting is less understood than the threat of traditional network and software exploitation attacks that are perceived to be more powerful.This work is a case study of Thread, an emerging network and transport level stack designed to facilitate secure communication between heterogeneous IoT devices. We perform the first side-channel vulnerability analysis of the Thread networking stack. We leverage various network mechanisms to trigger manipulations of the security material or to get access to the network credentials. We choose the most feasible attack vector to build a complete attack that combines network specific mechanisms and Differential Electromagnetic Analysis. When successfully applied on a Thread network, the attack gives full network access to the adversary. We evaluate the feasibility of our attack in a TI CC2538 setup running OpenThread, a certified open-source implementation of the stack.The full attack does not succeed in our setting. The root cause for this failure is not any particular security feature of the protocol or the implementation, but a side-effect of a feature not related to security. We summarize the problems that we find in the protocol with respect to side-channel analysis, and suggest a range of countermeasures to prevent our attack and the other attack vectors we identified during the vulnerability analysis.In general, we demonstrate that elaborate security mechanisms of Thread make a side-channel attack not trivial to mount. Similar to a modern software exploit, it requires chaining multiple vulnerabilities. Nevertheless, such attacks are feasible. Being perhaps too expensive for settings like smart homes, they pose a relatively higher threat to the commercial setting. We believe our experience provides a useful lesson to designers of IoT protocols and devices.

Highlights

  • Over the last few years we have seen a huge increase of IoT-enabled devices available on the market

  • If an adversary has access to such a smart lock connected to a mesh network in her room, she might be able to exploit it in a similar way to what we describe in this paper to get access to the hotel network

  • We described how different network mechanisms that can be learned by the attacker from the published OpenThread code can be used to create attack vectors for side-channel attacks

Read more

Summary

Introduction

Over the last few years we have seen a huge increase of IoT-enabled devices available on the market. EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread business fields gathered together in various working groups, organizations or consortia. Their aim is to augment the smart objects’ capabilities by enhancing the communication and data exchange between devices from different makers. Side-channel attacks exploit information gained from a device performing cryptographic operations to determine the secret value used during the observed executions. The attacker, equipped with a digital oscilloscope, an EM probe, and optionally an amplifier, captures the EM emissions of a device while it performs cryptographic operations for various inputs using the same secret key. The most likely key used during the observed computations will give the highest correlation value

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.