SlideShare a Scribd company logo
LinuxCon
Tokyo, Japan 2016
Secure IoT Gateway
Jim Gallagher
Senior Technical Marketing Lead, MontaVista Software
Setting the Stage
• This presentation will
focus on developing
Secure Gateways (Edge
Computing &
Connectivity) in the IoT
Architecutre
• Primarily discussion will
be on Architecture,
Security, and
Maintainence features
Sensors
Gateway
Cloud/Database & Analytics
Applications
L
i
n
u
x
Agenda
Architecture
Connectivity
Security
Maintainability
Summary and Q&A
Architecture:
Modern vs Wild West
Architecture choices
Embedded processor
considerations:
– Processor family
• ARM
• Intel x86
• PowerPC and MIPS possible
but not as popular
– Power consumption
• ARM: low power, advanced
PM features
• Intel x86: limited PM options
Architecture choices (ctd)
Embedded processor considerations:
– Performance
• ARM: Good core performance on lower Ghz
• Intel x86: ”Add Ghz -> more perf”
– Optimizations
• Security offload
• Virtualization
– Deployment model
• SOC model vs. ”generic compute”
• Longevity?
Ecosystem
 Intel vs. ARM really
• PPC and MIPS thin and fading ecosystem
• Ubuntu, Fedora, Debian, OpenSUSE, MontaVista,
WindRiver, and Enea all have/will have x86 and
ARM support for mainstream distros
• LINARO (ARM lead)
 Yocto project (Intel lead)
• Consolidate embedded development on
OE/bitbake
Connectivity
Sensors, Sensors everywhere!
 Simple sensor data drives
the IoT engine
• Fitness trackers, heart
monitors, oil and pressure
temperature gauges, &
packet latency in SDN
Gateway
L
i
n
u
x
 What connects them
• Wireless: Bluetooth, Wi-fi,
Cellular Modem, (3G/4G/5G),
Zigbee, & 6loPAN
• The bus lineup: Canbus,
Profibus, & Modbus
• Serial, SPI, I2C
• Near Field Communication (NFC)
• Prioprietary
 Implications
• Selected architecture must
support (directly or
USB/PCI) ALL
• Drivers as well...possible
port from different
architecture
• Enough performance
• Maintain versions
• Brace for the new
To the Cloud
 Data from sensors is the lifeblood of IoT
• Connects to cloud or database
• Gateways can filter/preprocess data
• Push must be secure (encrypted and
authenticated)
• Connectivity is bi-redirectional so IoT Gateway
must be secure from the cloud
 IoTivity
 Community framework to connect end devices
 Alljoyn Open Source Framework
 Connect and communicate across transports/OSes
Security
Recent Real-World Examples
• DHS confirms Public Sector Control system hacked
– Attacking inadequate perimeter security, an attacker could compromise the SCADA
system with capability to inject commands and read data at will
– The controlled device was brought down for maintenance so no damage done
• Boeing and Airbus
– Hacker used in-flight Wi-Fi connection to hack into flight control systems
– Allegedly controlled thrust for engines, oxygen mask deployment, etc.
• Drones
– Johns Hopkins University research demonstrated 3 different ways to send unwanted
commands
– Could force drones to land or just crash
• Personal vehicles
– Jeep hacked through navigation and Corvette hacked by SMS
– Activate wipers, apply brakes, disable engine & brakes
Design Considerations
• Building security primarily in
the Gateway?
– Edge devices are
constrained on hardened
channel
– Requires encryption for the
channel and two-way
authentication for setup
• Trusted edge vs. Edge
Computing - two polars?
– Moving computing to the
edge can help build end-to-
end efficiency, but requires
edge and gateway devices
to handle the security
– Can also be seen as a way
to fence out security threats
for some layers of the
processing so they cannot
be exploited from the Cloud
• Lifecycle: secure
firmware updates and
CVEs
– The Edge is relying on
the IT-supported backend
to handle the updates,
requires careful
consideration for the
technology and process
• Provide monitoring for
end-to-end data on the
Gateway
– Using DPI for heuristics-
based detection of
exploits
• Combining types of
security: physical,
networking, system
integrity and isolation of
domains
Architectural Functional
IoT Platform Virtualization & Security
vTPM
Guest VM
Container
Openflow DPDK
LXC/Docker
KVM
EMBEDDED LINUX
SELinux / sVirt
Application
Application
Hardware Platform
LXC/Docker
Application
3rd Party
Container
Monitoring / Auditing
Bootloader
TPM (x86)
Root
of
Trust
CVEFixes
and-Maintenance
Network
Security
- IPSec HW offload
- Policy
Configuration
Live Patching
Policy
Configuration
based on System
Requirements
TrustZone (ARM)
DPDK
FIPS
Types of Security Measures
• Reactive Measures
– Common Vulnerabilities and Exposures (CVEs)
• https://cve.mitre.org/
• The standard list for holes in common systems
• Very important to cover the affected parts in your product; MontaVista will do this for you
– Intrusion-detection systems
• Take action based on perceived attack
• Several systems exist for Linux (LIDS, auditd, inotify, tripwire..)
– Auditing and logging
• Knowing you’ve been attacked prevents further damage
• Collect evidence for litigation against the attacker
• Example tools: Auditd, syslog, inotify, SELinux..
• Proactive Measures
– Mandatory Access Control (MAC)
• Minimizes the damage that unknown exploits can do to your system
• Increases the chances to block 0-day exploits (unknown vulnerabilities)
– System Certification
• Provide Common Criteria or similar
certification for your product or platform
• MontaVista’s Linux is certifiable and we can help with
the process
– Root of Trust
• Full featured and lightweight virtualization solutions
Embedded Linux
Container
Core
Isolation
Application
LXC/Docker
Container
Application
KVM
Application
OS
Guest VM
 KVM
Full virtualization
 Docker
Application containers
 LXC
Full-system
Containers
 Core Isolation
Dataplane and
RT applications
Virtualization Technology for Isolation
• Make Security a Priority
• Implement Mixture
– Reactive
– Proactive
• Stay Current
Maintenance
IoT Maintainability Requirements
• Product life cycle support
• Ability to upgrade application, kernel,
drivers, userland, or whole system
• Upgrades done with little to no “human”
interaction and downtime
– Wireless delivery
• Secure updates
– Authentication
– Encryption
Addressing IoT Maintenance with Linux
• Long Term Support (LTS) Kernel
– Can be extended beyond 10+ years in
commercial Linux distributions
• SMART package manager
– Allows for source or binary distribution
– Flexible to update userland, application, etc.
• Live kernel patching
• Crypto API support
• Trusted Platform Module (TPM) and
TrustZone for secure OTA updates
IoT: Signed OTA Updates
• IoT devices and Gateways have embedded requirements for small footprint but still a
very high demand for security
• The process relies on the Kernel Live Patches, RPMs, or Container images being
hashed and signed by a certificate that can be validated by the TPM or TEE on the
target system if necessary
– Can also support two-way signatures by using standard RPM signing using GPG
keys, potentially enforced by the server-side TPM.
• Such processes are adopted by OSVs like Symantec, Redbend and practically all
product manufacturers that are concerned about running trusted/secure SW on the
devices.
• Without secure updates, the integrity of the platform cannot be maintained.
ServerDevice
Decrypt and
verify signature
Update
Data
Generate, Sign and Encrypt
Host OS
Update
Data
Pubkey-
TPM
SecKey-
Host
PubKey-
Host
SecKey-
TPM
Deliver update
• RPM / deb / IPK
• Docker, VM image
• Kernel (Live) Patch
TPM
TPM/TEE
SDK
Linux
Linux
Summary
• Embedded Linux
offers solid software
platform to IoT
Gateway developers
– Architecture
– Connectivity
• Security is
IMPORTANT to
implement
• High uptime
maintainability
Thank You
Questions/Discussion
jgallagher@mvista.com

More Related Content

What's hot (20)

PDF
IoT Wireless Technologies
NEXT INDUSTRIES SRL
 
PPTX
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
PPTX
Splunk Enterprise Security
Splunk
 
PPTX
What is Zero Trust
Okta-Inc
 
PPT
firewall.ppt
ssuser530a07
 
PPT
Network Security
forpalmigho
 
PPTX
Zero Trust Network Access
Er. Ajay Sirsat
 
PDF
Endpoint Detection & Response - FireEye
Prime Infoserv
 
PPTX
Firewall
Saurabh Chauhan
 
PDF
A University Network Design Exercise
joelavery
 
PPTX
PACKET Sniffer IMPLEMENTATION
Goutham Royal
 
PPTX
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Vignesh Ganesan I Microsoft MVP
 
PPTX
Watson IOT Platform
Brenda Barrioz, CPDS
 
PDF
Network Security Presentation
Allan Pratt MBA
 
PDF
Splunk-Presentation
PrasadThorat23
 
PPT
SSL & TLS Architecture short
Avirot Mitamura
 
PDF
Security challenges in IoT
Vishnupriya T H
 
PPTX
The Elastic Stack as a SIEM
John Hubbard
 
PDF
Secure Systems Security and ISA99- IEC62443
Yokogawa1
 
PDF
Palo alto networks product overview
Belsoft
 
IoT Wireless Technologies
NEXT INDUSTRIES SRL
 
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
Splunk Enterprise Security
Splunk
 
What is Zero Trust
Okta-Inc
 
firewall.ppt
ssuser530a07
 
Network Security
forpalmigho
 
Zero Trust Network Access
Er. Ajay Sirsat
 
Endpoint Detection & Response - FireEye
Prime Infoserv
 
Firewall
Saurabh Chauhan
 
A University Network Design Exercise
joelavery
 
PACKET Sniffer IMPLEMENTATION
Goutham Royal
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Vignesh Ganesan I Microsoft MVP
 
Watson IOT Platform
Brenda Barrioz, CPDS
 
Network Security Presentation
Allan Pratt MBA
 
Splunk-Presentation
PrasadThorat23
 
SSL & TLS Architecture short
Avirot Mitamura
 
Security challenges in IoT
Vishnupriya T H
 
The Elastic Stack as a SIEM
John Hubbard
 
Secure Systems Security and ISA99- IEC62443
Yokogawa1
 
Palo alto networks product overview
Belsoft
 

Viewers also liked (6)

ODP
Using open source for IoT
Ian Skerrett
 
PDF
Iot gateways march 2015
sgadgil2002
 
PDF
Open source IoT gateway
Henryk Konsek
 
PDF
Simplify Internet of Things with an Intelligent Gateway
Eurotech
 
PDF
Internet of Things - Advantech IoT Gateway Starter Kit
Advantech Europe E-IOT Business Group
 
PDF
Kura M2M IoT Gateway
Eurotech
 
Using open source for IoT
Ian Skerrett
 
Iot gateways march 2015
sgadgil2002
 
Open source IoT gateway
Henryk Konsek
 
Simplify Internet of Things with an Intelligent Gateway
Eurotech
 
Internet of Things - Advantech IoT Gateway Starter Kit
Advantech Europe E-IOT Business Group
 
Kura M2M IoT Gateway
Eurotech
 
Ad

Similar to Secure IOT Gateway (20)

PPTX
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
PDF
[Webinar] Software: The Lifeblood of any Medical Device
ICS
 
PDF
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
ssuser8b324e
 
PPTX
Acceleration_and_Security_draft_v2
Srinivasa Addepalli
 
PDF
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
Rick G. Garibay
 
PPTX
ICS Security 101 by Sandeep Singh
OWASP Delhi
 
PDF
Ch 9: Embedded Operating Systems: The Hidden Threat
Sam Bowne
 
PDF
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Eurotech
 
PDF
Standardizing the tee with global platform and RISC-V
RISC-V International
 
PDF
Stop Wasting Energy on M2M
Eurotech
 
PDF
Is your MQTT broker IoT ready?
Eurotech
 
PDF
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
sequi_inc
 
PDF
Java in the Air: A Case Study for Java-based Environment Monitoring Stations
Eurotech
 
PPT
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
 
PDF
Distributech_Presentation DTECH_2013
Dorian Hernandez
 
PPTX
Industrial Pioneers Days - Machine Learning
VEDLIoT Project
 
PPTX
Gab 2015 aymeric weinbach azure iot
Aymeric Weinbach
 
PPTX
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
nicholas njoroge
 
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
PDF
People Counting: Internet of Things in Motion at JavaOne 2013
Eurotech
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
[Webinar] Software: The Lifeblood of any Medical Device
ICS
 
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
ssuser8b324e
 
Acceleration_and_Security_draft_v2
Srinivasa Addepalli
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
Rick G. Garibay
 
ICS Security 101 by Sandeep Singh
OWASP Delhi
 
Ch 9: Embedded Operating Systems: The Hidden Threat
Sam Bowne
 
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Eurotech
 
Standardizing the tee with global platform and RISC-V
RISC-V International
 
Stop Wasting Energy on M2M
Eurotech
 
Is your MQTT broker IoT ready?
Eurotech
 
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
sequi_inc
 
Java in the Air: A Case Study for Java-based Environment Monitoring Stations
Eurotech
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
 
Distributech_Presentation DTECH_2013
Dorian Hernandez
 
Industrial Pioneers Days - Machine Learning
VEDLIoT Project
 
Gab 2015 aymeric weinbach azure iot
Aymeric Weinbach
 
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
nicholas njoroge
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
People Counting: Internet of Things in Motion at JavaOne 2013
Eurotech
 
Ad

More from LF Events (16)

PDF
Feature rich BTRFS is Getting Richer with Encryption
LF Events
 
PDF
KASan in a Bare-Metal Hypervisor
LF Events
 
PDF
Efficient kernel backporting
LF Events
 
PDF
Raspberry pi Update - Encourage your IOT
LF Events
 
PDF
Introduction to Open-O
LF Events
 
PDF
CNCF and Fujitsu
LF Events
 
PDF
SR-IOV ixgbe Driver Limitations and Improvement
LF Events
 
PDF
NVMe Over Fabrics Support in Linux
LF Events
 
PDF
Linxu conj2016 96boards
LF Events
 
PDF
Taking over to the Next Generation
LF Events
 
PDF
Learning From Real Practice of Providing Highly Available Hybrid Cloud Servic...
LF Events
 
PDF
Generating a Reproducible and Maintainable Embedded Linux Environment with Po...
LF Events
 
PDF
Trading Derivatives on Hyperledger
LF Events
 
PDF
Introducing Oracle Linux and Securing It With ksplice
LF Events
 
PDF
Boost UDP Transaction Performance
LF Events
 
PDF
Containers: Don't Skeu Them Up, Use Microservices Instead
LF Events
 
Feature rich BTRFS is Getting Richer with Encryption
LF Events
 
KASan in a Bare-Metal Hypervisor
LF Events
 
Efficient kernel backporting
LF Events
 
Raspberry pi Update - Encourage your IOT
LF Events
 
Introduction to Open-O
LF Events
 
CNCF and Fujitsu
LF Events
 
SR-IOV ixgbe Driver Limitations and Improvement
LF Events
 
NVMe Over Fabrics Support in Linux
LF Events
 
Linxu conj2016 96boards
LF Events
 
Taking over to the Next Generation
LF Events
 
Learning From Real Practice of Providing Highly Available Hybrid Cloud Servic...
LF Events
 
Generating a Reproducible and Maintainable Embedded Linux Environment with Po...
LF Events
 
Trading Derivatives on Hyperledger
LF Events
 
Introducing Oracle Linux and Securing It With ksplice
LF Events
 
Boost UDP Transaction Performance
LF Events
 
Containers: Don't Skeu Them Up, Use Microservices Instead
LF Events
 

Recently uploaded (20)

PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 

Secure IOT Gateway

  • 1. LinuxCon Tokyo, Japan 2016 Secure IoT Gateway Jim Gallagher Senior Technical Marketing Lead, MontaVista Software
  • 2. Setting the Stage • This presentation will focus on developing Secure Gateways (Edge Computing & Connectivity) in the IoT Architecutre • Primarily discussion will be on Architecture, Security, and Maintainence features Sensors Gateway Cloud/Database & Analytics Applications L i n u x
  • 5. Architecture choices Embedded processor considerations: – Processor family • ARM • Intel x86 • PowerPC and MIPS possible but not as popular – Power consumption • ARM: low power, advanced PM features • Intel x86: limited PM options
  • 6. Architecture choices (ctd) Embedded processor considerations: – Performance • ARM: Good core performance on lower Ghz • Intel x86: ”Add Ghz -> more perf” – Optimizations • Security offload • Virtualization – Deployment model • SOC model vs. ”generic compute” • Longevity?
  • 7. Ecosystem  Intel vs. ARM really • PPC and MIPS thin and fading ecosystem • Ubuntu, Fedora, Debian, OpenSUSE, MontaVista, WindRiver, and Enea all have/will have x86 and ARM support for mainstream distros • LINARO (ARM lead)  Yocto project (Intel lead) • Consolidate embedded development on OE/bitbake
  • 9. Sensors, Sensors everywhere!  Simple sensor data drives the IoT engine • Fitness trackers, heart monitors, oil and pressure temperature gauges, & packet latency in SDN Gateway L i n u x  What connects them • Wireless: Bluetooth, Wi-fi, Cellular Modem, (3G/4G/5G), Zigbee, & 6loPAN • The bus lineup: Canbus, Profibus, & Modbus • Serial, SPI, I2C • Near Field Communication (NFC) • Prioprietary  Implications • Selected architecture must support (directly or USB/PCI) ALL • Drivers as well...possible port from different architecture • Enough performance • Maintain versions • Brace for the new
  • 10. To the Cloud  Data from sensors is the lifeblood of IoT • Connects to cloud or database • Gateways can filter/preprocess data • Push must be secure (encrypted and authenticated) • Connectivity is bi-redirectional so IoT Gateway must be secure from the cloud  IoTivity  Community framework to connect end devices  Alljoyn Open Source Framework  Connect and communicate across transports/OSes
  • 12. Recent Real-World Examples • DHS confirms Public Sector Control system hacked – Attacking inadequate perimeter security, an attacker could compromise the SCADA system with capability to inject commands and read data at will – The controlled device was brought down for maintenance so no damage done • Boeing and Airbus – Hacker used in-flight Wi-Fi connection to hack into flight control systems – Allegedly controlled thrust for engines, oxygen mask deployment, etc. • Drones – Johns Hopkins University research demonstrated 3 different ways to send unwanted commands – Could force drones to land or just crash • Personal vehicles – Jeep hacked through navigation and Corvette hacked by SMS – Activate wipers, apply brakes, disable engine & brakes
  • 13. Design Considerations • Building security primarily in the Gateway? – Edge devices are constrained on hardened channel – Requires encryption for the channel and two-way authentication for setup • Trusted edge vs. Edge Computing - two polars? – Moving computing to the edge can help build end-to- end efficiency, but requires edge and gateway devices to handle the security – Can also be seen as a way to fence out security threats for some layers of the processing so they cannot be exploited from the Cloud • Lifecycle: secure firmware updates and CVEs – The Edge is relying on the IT-supported backend to handle the updates, requires careful consideration for the technology and process • Provide monitoring for end-to-end data on the Gateway – Using DPI for heuristics- based detection of exploits • Combining types of security: physical, networking, system integrity and isolation of domains Architectural Functional
  • 14. IoT Platform Virtualization & Security vTPM Guest VM Container Openflow DPDK LXC/Docker KVM EMBEDDED LINUX SELinux / sVirt Application Application Hardware Platform LXC/Docker Application 3rd Party Container Monitoring / Auditing Bootloader TPM (x86) Root of Trust CVEFixes and-Maintenance Network Security - IPSec HW offload - Policy Configuration Live Patching Policy Configuration based on System Requirements TrustZone (ARM) DPDK FIPS
  • 15. Types of Security Measures • Reactive Measures – Common Vulnerabilities and Exposures (CVEs) • https://cve.mitre.org/ • The standard list for holes in common systems • Very important to cover the affected parts in your product; MontaVista will do this for you – Intrusion-detection systems • Take action based on perceived attack • Several systems exist for Linux (LIDS, auditd, inotify, tripwire..) – Auditing and logging • Knowing you’ve been attacked prevents further damage • Collect evidence for litigation against the attacker • Example tools: Auditd, syslog, inotify, SELinux.. • Proactive Measures – Mandatory Access Control (MAC) • Minimizes the damage that unknown exploits can do to your system • Increases the chances to block 0-day exploits (unknown vulnerabilities) – System Certification • Provide Common Criteria or similar certification for your product or platform • MontaVista’s Linux is certifiable and we can help with the process – Root of Trust
  • 16. • Full featured and lightweight virtualization solutions Embedded Linux Container Core Isolation Application LXC/Docker Container Application KVM Application OS Guest VM  KVM Full virtualization  Docker Application containers  LXC Full-system Containers  Core Isolation Dataplane and RT applications Virtualization Technology for Isolation
  • 17. • Make Security a Priority • Implement Mixture – Reactive – Proactive • Stay Current
  • 19. IoT Maintainability Requirements • Product life cycle support • Ability to upgrade application, kernel, drivers, userland, or whole system • Upgrades done with little to no “human” interaction and downtime – Wireless delivery • Secure updates – Authentication – Encryption
  • 20. Addressing IoT Maintenance with Linux • Long Term Support (LTS) Kernel – Can be extended beyond 10+ years in commercial Linux distributions • SMART package manager – Allows for source or binary distribution – Flexible to update userland, application, etc. • Live kernel patching • Crypto API support • Trusted Platform Module (TPM) and TrustZone for secure OTA updates
  • 21. IoT: Signed OTA Updates • IoT devices and Gateways have embedded requirements for small footprint but still a very high demand for security • The process relies on the Kernel Live Patches, RPMs, or Container images being hashed and signed by a certificate that can be validated by the TPM or TEE on the target system if necessary – Can also support two-way signatures by using standard RPM signing using GPG keys, potentially enforced by the server-side TPM. • Such processes are adopted by OSVs like Symantec, Redbend and practically all product manufacturers that are concerned about running trusted/secure SW on the devices. • Without secure updates, the integrity of the platform cannot be maintained. ServerDevice Decrypt and verify signature Update Data Generate, Sign and Encrypt Host OS Update Data Pubkey- TPM SecKey- Host PubKey- Host SecKey- TPM Deliver update • RPM / deb / IPK • Docker, VM image • Kernel (Live) Patch TPM TPM/TEE SDK Linux Linux
  • 22. Summary • Embedded Linux offers solid software platform to IoT Gateway developers – Architecture – Connectivity • Security is IMPORTANT to implement • High uptime maintainability