Industrial manufacturing
Industrial Internet of Things | Industrial materials | Equipment Maintenance and Repair | Industrial programming |
home  MfgRobots >> Industrial manufacturing >  >> Industrial Internet of Things >> Internet of Things Technology

IoT Security: Cryptographic Foundations for Robust Device Protection

IoT Security: Cryptographic Foundations for Robust Device Protection Editor’s Note: Securing the Internet of Things is essential for preserving the integrity of data streams, firmware, and the enterprise resources they connect to. IoT security is a multifaceted challenge that demands a systematic approach to identify threats and implement effective mitigations.

Adapted from Internet of Things for Architects by Perry Lea.


Chapter 12. IoT Security
By Perry Lea

Cryptography

Encryption and confidentiality are non‑negotiable for IoT deployments. They protect communication, firmware, and authentication processes. In practice, we work with three core cryptographic primitives:

click for larger image
IoT Security: Cryptographic Foundations for Robust Device Protection
Elements of cryptography. Symmetric encryption requires identical keys for both encryption and decryption, while asymmetric encryption uses distinct public/private key pairs. Hash functions provide one‑way integrity checks.

Symmetric cryptography

In symmetric encryption, plaintext is the cleartext input and ciphertext is the encrypted output. The Advanced Encryption Standard (AES) is the global benchmark, superseding older DES algorithms. AES conforms to FIPS 197 and ISO/IEC 18033‑3, and operates on 128‑bit blocks with key sizes of 128, 192, or 256 bits. Longer keys provide stronger security at the cost of additional CPU cycles: 128‑bit keys require 10 rounds, 192‑bit keys 12 rounds, and 256‑bit keys 14 rounds.

// Pseudo‑code for an AES‑128 cipher
// Input: 128‑bit plaintext
// Output: 128‑bit ciphertext
// w: 44 32‑bit words (expanded key)
state = in
w = KeyExpansion(key) // Key expansion phase
AddRoundKey(state, w[0, Nb-1]) // Initial round
for round = 1 to Nr-1
    SubBytes(state)   // Non‑linear substitution
    ShiftRows(state)   // Row permutation
    MixColumns(state) // Column mixing
    AddRoundKey(state, w[round*Nb, (round+1)*Nb-1])
end for
SubBytes(state)   // Final round
ShiftRows(state)
AddRoundKey(state, w[Nr*Nb, (Nr+1)*Nb-1])
out = state

Scroll or drag the corner of the box to expand as needed.

IoT Security: Cryptographic Foundations for Robust Device Protection

Block ciphers, such as AES, process data in fixed‑size blocks and rely on a block mode of operation to extend the algorithm to larger messages. An Initialization Vector (IV) ensures that identical plaintext blocks produce distinct ciphertexts, thwarting pattern analysis. Common modes include:

These modes originated in the late 1970s and were formalized by NIST in FIPS 81. While they secure confidentiality, they do not prevent tampering. Combining authentication with encryption led to authenticated‑encryption modes such as AES‑CCM (Counter with CBC‑MAC). CCM is integral to protocols like Zigbee, Bluetooth Low Energy, TLS 1.2 (post‑key‑exchange), IPsec, and Wi‑Fi WPA2.

IoT Security: Cryptographic Foundations for Robust Device Protection

AES‑CCM blends CTR for efficient decryption of the ciphertext stream and CBC for generating an authentication tag. The tag is compared against an expected value derived from the decrypted payload; a mismatch indicates potential tampering.

click for larger image
IoT Security: Cryptographic Foundations for Robust Device Protection
AES‑CCM mode.

IoT Security: Cryptographic Foundations for Robust Device Protection

In a fully connected mesh of n nodes, bidirectional communication requires n(n-1)/2 unique keys, scaling quadratically (O(n²)). Efficient key management strategies are therefore critical for large IoT deployments.

Internet of Things Technology

  1. Securing the Industrial IoT: A Practical Roadmap
  2. Four Critical IoT Security Threats in 2015 — What Developers Need to Know
  3. Two Essential Strategies for IoT Security
  4. 5G’s Backbone at Risk: Insecure IoT Devices Undermine Network Security
  5. IoT Security and Fragmentation Remain Top Challenges, GSMA Survey Reveals
  6. IoT Security – A Practical Guide from Perry Lea
  7. IoT Security – Who Holds the Responsibility?
  8. The Rise of IoT: Why Security Must Be Built In from Day One
  9. IoT Security: Overcoming Deployment Barriers
  10. Protecting IoT Devices with Deception Technology