The true security of intelligently interconnected IoT edge nodes

The Internet of Things (IOT) has set off one of the biggest technological waves in recent decades. It is expected that by 2015, 50 billion devices will be interconnected to form a network that may cover everything around us. The Internet of Things will span industrial, commercial, medical, automotive and other applications, affecting billions of people. Given its wide range of influences on individuals, institutions and systems, security has become the most critical component of any IoT system, and the concept that any responsible commercial IoT company must truly grasp security is widely recognized.

When evaluating the vulnerability of IoT networks, developers are eyeing the most basic element—the edge node. As a "thing" in the Internet of Things, a large number of sensors and actuators provide data to the Internet of Things and execute instructions from the cloud or users interacting with computers, mobile phones, in-vehicle systems, smart appliances or other platforms. Edge nodes are usually small, low-cost smart devices, but because of the limited resources they access, they are often mistakenly considered vulnerable. The servers that interact with the edge nodes and the networks connected to them already have mature security technologies, and edge nodes have not yet had such technologies.

When it comes to protecting such systems, people often regard "encryption" and "security" as equal, but in fact it is only one aspect of the security problem. One of the first tasks in creating a secure environment is to securely discover and prove the identity of the devices connected to your network. You must first determine who is connecting to the network, because if secure authentication is not established in advance, encryption and transport layer security protocols (such as SSL/TLS) do "protect" those visitors who should not enter your network at all.

The true security of intelligently interconnected IoT edge nodes

Figure 1. An attacker can still invade the network from an edge node despite a secure channel

In order to better understand the security of the node, let us use the online banking account to make an analogy. Start by creating a secure (ie encrypted and authenticated) connection between your computer and the bank's website (this is an https link). However, this secure link only verifies your computer when creating an encrypted communication channel between your computer and the bank, and does not authenticate you. At this point, the bank still doesn't know if you are a liar. You will need to enter your password. This password is your encryption key, so in theory, only you and the bank know. Once it is sent to the bank it will be compared to your saved password. If it matches, then for the bank, this proves that you are the person you claim to be. As can be seen from this example, the security of online banking is provided by two levels: 1) the transport layer establishes a secure connection, and 2) the application layer certifies (certifies) your identity. Similarly, if the Internet of Things is given enough attention, the node security of the Internet of Things must also be provided by multiple layers.

IoT nodes also use Transport Layer Security protocols to create secure connections to the cloud. But to achieve true security, IoT nodes must also gain application layer security. This means that not only the communication channel (ie, the pipe), but the node itself also needs to be authenticated. In addition to channel authentication, the application layer should establish encryption and data integrity checking mechanisms to protect data flowing through the pipeline.

With this in mind, these IoT devices are often simple and small devices that operate with little or no interaction, and therefore introduce a new network connectivity paradigm. This usually leads to a variety of questions. On the one hand, concerns about infrastructure security raise questions about “how to determine if an IoT device is trustworthy? Even how to know that a real IoT device is connected to your network, rather than pretending to be an IoT node. A malicious intrusion device?". This has been countered by some real problems. For example, "Someone knows that my thermostat is set a few degrees and what is the big deal?", "Who cares if anyone knows that my lights are on?", "Who?" I want to know how many steps I took for my pedometer record?".

If you consider not only what data the device has accessed, but also what data the device has accessed over the network, it will encounter more substantial problems. Several widely reported data leakage incidents are caused by non-secure network nodes through fake identity, and malicious intruders can pretend to be an IoT node to enter the corporate network. Once on the network, security becomes more vulnerable, and they eventually have access to the victim's customer database and disrupt the production process. If a malicious intruder can access and control the operation of the node itself in addition to accessing the cloud service, then determining the identity (authentication) of the node will be an extremely important consideration.

Although existing network security technologies such as SSL/TLS can well protect the communication channel between the invading edge nodes and the server, they are not invincible - they cannot prevent non-intrusive attacks. It's easy to see that if an attacker controls an edge node, SSL/TLS will not help.

Strict security consists of three basic elements, the acronym "CIA":

● Confidentiality - ConfidenTIality: Data stored or being sent should be visible only to the authorized person;

● Integrity - Integrity: Messages sent should not be modified before reaching the destination;

● Authenticity - AuthenTIcity: It can be assured that "the sender of the message is the claimed person."

There are many techniques for meeting the requirements of these elements, and the commonality is the use of a key or private key as a unique part of the verification identification tag. How to manage the storage and communication of these keys determines the security of the system.

The challenge now is to achieve edge node security while ensuring that available computing power, memory, power, and budget are maintained to a limited extent. The purpose of this paper is to identify key security policies for edge nodes, to illustrate the central role of keys in all security solutions, and to outline successful key management techniques.

Cascading benefits of secure identity

Once a node or device is identified as "trusted," you can get countless other benefits. Includes secure communications, ecosystem controls, and secure storage.

The true security of intelligently interconnected IoT edge nodes

Figure 2. The many benefits that an authenticated node can get.

As you can see, once you can verify that the IoT device matches your claim, you get the benefits you can only have in a trusted, secure environment.

Product Brand:Sn63/Pb37.Sn60/Pb40.Sn50/Pb50.Sn45/Pb55.Sn40/Pb60.Sn30/Pb70

Lead solder is made lead and tin metal, It enjoys excellent weld ability, reliable welding spot and little corrosion. The anode hemisphere, which is made from extremely high purity  raw materials, is of high quality and stable. 

Lead Solder Bar

Lead Solder Bar,Tin Lead Solder Bar,Lead Free Solder Bar,Lead Tin Soldering Bar

Shaoxing Tianlong Tin Materials Co.,Ltd. , https://www.tianlongspray.com