小程序
传感搜
传感圈

VPNs Add the S to IoT

2023-08-08 01:30:05
关注

Illustration: © IoT For All

As we navigate our way into an increasingly digital realm, the Internet of Things continues to revolutionize how we monitor our environments, control our surroundings, and increase efficiency in everyday life. As our reliance on IoT grows, so does our need for secure communication. Let’s look into the possible design of a secure IoT application using a Virtual Private Network (VPN).

How is My Data Being Routed?

When designing the security implementations of an IoT application, is it essential to know how data is being routed. Understanding the journey of your data helps you craft an IoT security strategy that can effectively safeguard your data.

IoT data typically originates from a device, travels to a base station, then onto the core network of a Mobile (Virtual) Network Operator. Finally, data is routed to a server endpoint for storage and processing.

Monogoto

IoT Device: Communication is often initiated from the end device which spends most of its life in deep-sleep mode to conserve energy. It only wakes up to inform the server about its latest sensor readings or state changes. These devices have a cellular module and a SIM card to authenticate and connect with the cellular network. The device transmits data over the air which is referred to as the radio layer.

Base Station: Devices connect to a specific cell tower, also known as a base station. Base stations demodulate the radio signals and send data over the so-called S1 Interface to the core network of the device’s mobile operator. Base stations review the device’s APN configurations to determine the destination of the data.

Core Network: The core network is responsible for handling functions like user authentication, mobility management, and IP (Internet Protocol) address assignment. It also routes data to its intended destination via the public Internet.

Server: The ultimate destination: the server. The server could be a cloud-based platform or an on-premises private server, for example, hosted in a trusted AWS or Azure domain. Here, the data is stored, processed, and analyzed.

VPNs in IoT

Let’s dive into the role of VPNs in IoT security.

Think of an IoT data packet as a postcard traveling through a mail system. Just like a postcard, data sent over the internet is visible to anyone handling the message if not properly secured. A VPN acts like an envelope, providing a secure wrapper around the message to hide the contents and ensuring that it can’t be read while in transit as it uses private mailboxes inaccessible to the public.

Although VPN clients can be installed on the end device directly, VPNs are commonly used to secure traffic from the core network, up to a private server. This secure connection between two endpoints is what is called a VPN tunnel.

Monogoto

Secure Tunnel

The VPN tunnel is created to connect two IP endpoints, e.g. the Core Network and a private server running in AWS or Azure. This secure tunnel allows data to be transferred through the public internet, without intermediate parties being able to read what’s sent through it. Imagine each data packet being encapsulated in a new message which hides the content of the original message and can only be delivered to one specific postbox. Once delivered at the end of the tunnel (the private server), the data gets decapsulated and the original message is delivered.

Hidden IP address

The encapsulation of the original message not only hides the content of the message but also masks the IP addresses of the original sender and receiver. If the message would get intercepted, only the IP addresses of the VPN tunnel’s endpoints would be shown, not the actual ones.

Additional Encryption

A nice add-on that comes with all VPN services is the additional layer of encryption. VPNs not only create a tunnel between two endpoints, but they also encrypt the payload to further protect their content (for example using the IPSec protocol).

Required Level of Security

Not all data is equal. Some data is highly sensitive, such as personally identifiable information or healthcare data, and requires robust security measures. Other data might be less sensitive but still requires protection to ensure data integrity and authenticity.

When designing the architecture of an IoT application, security needs to be designed from the device, up to the server. Depending on the security needs, one or multiple redundant layers of protection can be implemented. This multi-layered approach – known as defense in depth – ensures ongoing protection even if one layer is compromised.

By default, cellular communication is secure from the IoT device up to the core network as per 3GPP standards. This includes authentication (verifying the device’s identity using AKA or EPS-AKA), radio layer encryption (protecting the data sent over radio waves using EEA algorithms), and a trusted S1 Interface (often using a method called IPSec).

In addition, to ensure end-to-end security, many IoT applications adopt security protocols like DTLS or TLS which secure data traffic between the IoT device and the server.

Now, where do VPNs fit into this IoT architecture? VPNs are often used as an additional security layer, though sometimes VPNs are used instead of DTLS/TLS as data is already secured from the device up to the core network.

Monogoto

The design of your IoT application highly depends on the required level of security. Strategies like defense in depth can significantly enhance the security of IoT applications. However, more complex implementations may demand more resources and add complexity to the IoT solution as a whole.

Tweet

Share

Share

Email

  • Cloud Software
  • Cybersecurity
  • Network and Protocols
  • Privacy
  • Security

  • Cloud Software
  • Cybersecurity
  • Network and Protocols
  • Privacy
  • Security

参考译文
VPN 为物联网增添“S”
图示:© IoT For All 当我们迈向日益数字化的世界时,物联网(IoT)持续改变着我们监测环境、控制周边以及提高日常生活效率的方式。随着我们对IoT的依赖程度不断加深,安全通信的重要性也随之提高。让我们一起来探讨如何利用虚拟私人网络(VPN)设计一个安全的IoT应用程序。 我的数据如何传输? 在设计IoT应用程序的安全实现方案时,了解数据如何传输是至关重要的。理解数据的旅程,能帮助你制定一套能够有效保护数据的IoT安全策略。IoT数据通常起源于设备,然后传输到基站,再通过移动(虚拟)网络运营商的核心网络,最终被路由到服务器终端进行存储和处理。 Monogoto IoT设备: 通信通常由终端设备发起,这些设备大部分时间处于深度休眠模式以节省电量。它们仅在需要向服务器报告最新传感器读数或状态变更时才会唤醒。这些设备配有蜂窝模块和SIM卡,用于认证并连接蜂窝网络。设备通过空中传输数据,也称为无线层。 基站: 设备连接到特定的蜂窝基站(也称为基站)。基站解调无线信号,并通过所谓的S1接口将数据发送至设备所属运营商的核心网络。基站会查看设备的APN配置,以确定数据的传输目的地。 核心网络: 核心网络负责处理诸如用户身份验证、移动性管理和IP(互联网协议)地址分配等任务。它还通过公共互联网将数据路由到其预定目的地。 服务器: 最终目的地:服务器。服务器可以是基于云的平台,也可以是本地私有服务器,例如托管在可信的AWS或Azure域中的服务器。在这里,数据被存储、处理和分析。 IoT中的虚拟私人网络(VPN) 让我们深入了解VPN在IoT安全中的作用。想象一下IoT数据包就像一张通过邮递系统传送的明信片。就像明信片一样,如果未经过适当保护,通过互联网发送的数据对所有处理者都是可见的。而VPN则像一个信封,为消息提供一个安全的封装,以隐藏其内容,并确保它在传输过程中无法被阅读,因为它使用了仅限于私人使用的信箱。 虽然VPN客户端可以直接安装在终端设备上,但通常情况下,VPN被用来保护从核心网络到私有服务器的通信流量。这两个终端之间的安全连接被称为**VPN隧道**。 Monogoto安全隧道 VPN隧道用于连接两个IP终端,例如核心网络和AWS或Azure中的私有服务器。这种安全隧道允许数据通过公共互联网传输,而中间方无法读取其中的内容。想象每一条数据包都被封装在一条新的信息中,隐藏了原始信息的内容,并且只能传递给一个特定的信箱。一旦到达隧道的终点(私有服务器),数据将被解封装,原始信息也就会送达。 隐藏的IP地址 原始信息的封装不仅隐藏了消息的内容,还隐藏了原始发送者和接收者的IP地址。如果消息被拦截,仅会显示VPN隧道终端的IP地址,而不是实际的IP地址。 附加加密 所有VPN服务都提供的一个亮点是**附加加密层**。VPN不仅在两个终端之间创建隧道,还对数据内容进行加密,以进一步保护其内容(例如使用IPSec协议)。 所需的安全级别 并非所有数据都是一样的。有些数据非常敏感,例如个人身份信息或医疗数据,需要强有力的安全措施。另一些数据可能不太敏感,但仍需保护以确保数据的完整性和真实性。在设计IoT应用程序的架构时,安全措施需要从设备一直设计到服务器。根据安全需求,可以实现一个或多个冗余的安全层。这种多层安全方法——也称为**纵深防御**——即使某一层遭到破坏,仍能提供持续的保护。 默认情况下,根据**3GPP标准**,从IoT设备到核心网络的蜂窝通信是安全的。这包括**身份验证**(使用AKA或EPS-AKA验证设备的身份)、**无线层加密**(使用EEA算法保护通过无线电波传输的数据),以及一个**可信的S1接口**(通常使用一种称为IPSec的方法)。此外,为了确保端到端的安全性,许多IoT应用程序采用了DTLS或TLS等安全协议,以保护IoT设备和服务器之间的数据传输。 那么,VPN在IoT架构中扮演什么角色呢? VPN通常被用作额外的安全层,有时甚至被用来替代DTLS/TLS,因为数据在从设备传输到核心网络的过程中已经受到保护。 Monogoto 您的IoT应用程序的设计高度依赖于所需的安全部署级别。诸如**纵深防御**这样的策略可以显著增强IoT应用程序的安全性。然而,更复杂的实现可能需要更多的资源,并为整个IoT解决方案增加复杂性。 推特 分享 邮件 云软件 网络安全 网络与协议 隐私 安全
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

广告
提取码
复制提取码
点击跳转至百度网盘