element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet & Tria Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • About Us
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Internet of Things
  • Technologies
  • More
Internet of Things
Forum Reinventing the Internet of Things: A Thought Experiment
  • Blog
  • Forum
  • Documents
  • Quiz
  • Events
  • Polls
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Internet of Things to participate - click to join for free!
Actions
  • Share
  • More
  • Cancel
Forum Thread Details
  • State Suggested Answer
  • Replies 25 replies
  • Answers 13 answers
  • Subscribers 513 subscribers
  • Views 2575 views
  • Users 0 members are here
  • security
  • internet of things
  • protocols
  • iot
Related

Reinventing the Internet of Things: A Thought Experiment

spannerspencer
spannerspencer over 9 years ago

As discussed in no small part here on element14, and across the big fat Internets, the IoT is simultaneously fantastic, the "next big thing", and also fraught with problems.

 

These include things like security and standardised protocols. Gaps in the IoT concept that are the result of slow, organic evolution rather than systemic design flaws. But flaws they are, nonetheless.

 

And that got me thinking. If we were to invent the Internet of Things today -- deliberately and with forethought -- how would it differ from the ad-hoc network that gradually formed into the IoT we now know?

 

So as something of a thought experiment, I'd be fascinated to hear how you guys would approach it. If you could start afresh with the entire sector and concept of IoT, how would you do it, and what would be yours proceed for putting it all in place?

  • Sign in to reply
  • Cancel

Top Replies

  • spannerspencer
    spannerspencer over 9 years ago in reply to mcb1 +3 suggested
    Certainly I don't mean to suggest it's as essential as water and power, no -- and you're right that it's something we should try not to let ourselves become too reliant on. But right or wrong, I think…
  • crjeder
    crjeder over 9 years ago +3
    Since security is important I'd start reinventing there. But first let us analyse where existing solutions failed. AES is secure and solutions in hard- and software exist. BLE for instance encrypts communication…
  • rsc
    rsc over 9 years ago +2 suggested
    Personally, I have no interest in having my coffee pot, fridge, or microwave connected to the internet. I do have security cameras and such. It'd be nice to know where things went if stolen, so tracking…
Parents
  • crjeder
    0 crjeder over 9 years ago

    Since security is important I'd start reinventing there. But first let us analyse where existing solutions failed. AES is secure and solutions in hard- and software exist. BLE for instance encrypts communication using AES. But it is insecure nevertheless. Why? For encryption both sides need to know the same secret key. Trivial knowledge. But how does the key get there? It would be straight forward to require the user to enter it on both sides. But average users can not be bothered to enter 128 bit keys even on a keyboard and a big screen. Therefore other methods were invented. All of them failed. The security of punching the key into the device completely relies on an adversary being unable to watch and observe the key. By this out of band transfer an adversary needs to literally "look over your shoulder" to get the key. Much easier to the user are in band key transfers like those invented for Bluetooth (pairing) or WiFi (WPS) but without asymmetric cryptography it is impossible to produce a secret key which cannot be observed in band. Therefore all this process failed. Added PINs do not help either, the can easily brute forceed.

    In my opinion including a mandatory key exchange protocol based on asymmetric cryptography is important.

    • Cancel
    • Vote Up +3 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • shabaz
    0 shabaz over 9 years ago in reply to crjeder

    You're totally right, security needs to be built in to solutions and many of the ones we see skip many steps. It is totally feasible today to have the same authentication mechanisms that are used for (say) e-commerce and secure websites, i.e. PKI based. But adopting such things could mean adding another IC to the BoM, and some

    software effort. So it is dispensed with on the cheap solutions we see.

     

    But, even some small low-power consumer products do this already today. Not directly IoT related, but Apple products use a certificate mechanism to authenticate things plugged into iPhones. The official Apple cables contain a tiny chip inside the connector body to do this. It is possible to probe this, and see the exchange.

    It means that official iPhone cables can offer more features than non-official iPhone cables, e.g. video output or whatever.

     

    Provided devices ship with a unique entity (e.g. a unique identifier or a signed cert) and a mechanism exists to validate that it is  genuine (e.g. certificate verification process) then after authentication you could subsequently negotiate new keys and then use AES or any other cipher (i.e. just like HTTPS) would work and fill the product with its actual desired configuration securely.

     

    This is just one aspect however, there are plenty of other issues to resolve with resource constrained devices and radio communications (as mcb1 rightly mentioned a while back, sometimes even the presence of encrypted data can signify an event if someone is listening to it, although there are techniques that (say) make RF data transmissions look buried in the noise) so many other things also need to be considered. It needs more discipline from product and solution vendors. Some solutions do have this discipline in certain industries, we just don't hear about it because IoT means 'fridge alerting when it is empty' according to a lot of people.

    Also, it is right to only invest more in securing data that is sensitive. Not all data needs to be secured to the same level. The difficulty is determining a few things such as putting a value on the data and determining who needs to be the users of the data. But such determinations need to be done when shopping for IoT solutions or for any security solutions.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Verify Answer
    • Reject Answer
    • Cancel
Reply
  • shabaz
    0 shabaz over 9 years ago in reply to crjeder

    You're totally right, security needs to be built in to solutions and many of the ones we see skip many steps. It is totally feasible today to have the same authentication mechanisms that are used for (say) e-commerce and secure websites, i.e. PKI based. But adopting such things could mean adding another IC to the BoM, and some

    software effort. So it is dispensed with on the cheap solutions we see.

     

    But, even some small low-power consumer products do this already today. Not directly IoT related, but Apple products use a certificate mechanism to authenticate things plugged into iPhones. The official Apple cables contain a tiny chip inside the connector body to do this. It is possible to probe this, and see the exchange.

    It means that official iPhone cables can offer more features than non-official iPhone cables, e.g. video output or whatever.

     

    Provided devices ship with a unique entity (e.g. a unique identifier or a signed cert) and a mechanism exists to validate that it is  genuine (e.g. certificate verification process) then after authentication you could subsequently negotiate new keys and then use AES or any other cipher (i.e. just like HTTPS) would work and fill the product with its actual desired configuration securely.

     

    This is just one aspect however, there are plenty of other issues to resolve with resource constrained devices and radio communications (as mcb1 rightly mentioned a while back, sometimes even the presence of encrypted data can signify an event if someone is listening to it, although there are techniques that (say) make RF data transmissions look buried in the noise) so many other things also need to be considered. It needs more discipline from product and solution vendors. Some solutions do have this discipline in certain industries, we just don't hear about it because IoT means 'fridge alerting when it is empty' according to a lot of people.

    Also, it is right to only invest more in securing data that is sensitive. Not all data needs to be secured to the same level. The difficulty is determining a few things such as putting a value on the data and determining who needs to be the users of the data. But such determinations need to be done when shopping for IoT solutions or for any security solutions.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Verify Answer
    • Reject Answer
    • Cancel
Children
  • crjeder
    0 crjeder over 9 years ago in reply to shabaz

    BLE 4.2 specifies Elliptic curve Diffie-Hellman as option. Sadly the vendors didn't feel ready to make it mandatory.

    • Cancel
    • Vote Up +2 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube