Internet-Draft Secure Access of IoT Smart Terminals March 2021
Wang, et al. Expires 17 September 2021 [Page]
Workgroup:
Internet Engineering Task Force
Internet-Draft:
draft-wang-secure-access-of-iot-terminals-00
Published:
Intended Status:
Standards Track
Expires:
Authors:
B. Wang, Ed.
Hikvision
S. Liu, Ed.
Hikvision
L. Wan, Ed.
Hikvision
X. Wang, Ed.
Hikvision

Technical Requirements for Secure Access and Management of IoT Smart Terminals

Abstract

It is difficult to supervise the great deal of Internet of Things (IoT) smart terminals which are widely distributed. Furthermore, a large number of smart terminals (such as IP cameras, access control terminals, traffic cameras, etc.) running on the network have high security risks in access control. This draft introduces the technical requirements for access management and control of IoT smart terminals, which is used to solve the problem of personate and illegal connection in the access process, and enables users to strengthen the control of devices and discover devices that is offline in time, so as to ensure the safety and stability of smart terminals in the access process.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 17 September 2021.

Table of Contents

1. Introduction

With the rapid development of the IoT and the IP-based communication system, a large number of devices have been interconnected through the network. Due to the large number of branches of IoT network, the scattered geographical location of smart terminals access, the difficulty of human supervision, etc., how to ensure the full control and full time availability of IoT is a brand new problem which is faced by the industry. A large number of smart terminals (such as IP cameras, access controll terminals, traffic cameras and other dumb terminals) running in the network have a large security risk in terms of security access control. With the further development of the convergence of IoT systems and information network, if the IoT smart terminal is once used by hackers, it is very easy for hackers to penetrate the whole network through the IoT smart terminal, causing core business systems to stop and a large amount of confidential information to leak, which will bring significant losses. Therefore, the establishment of a perfect access control mechanism and application control mechanism of smart terminals is an important element of the IoT security system.

This draft outlines the technical requirements for secure access and management of smart terminals in the IoT to address the security threats and challenges that exist in the access process of terminals. We discuss the networking structure of common IoT smart terminals in Section 2; we discuss the security threats and challenges faced in the access process of IoT smart terminals in Section 3; in Section 4, we review the guidelines and regulations related to the access of IoT devices; Section 5 we present the requirements for secure access and management of IoT smart terminals and describes their details; in Section 6 we concludes the whole draft. This draft provides a reference for IoT security access and management.

2. The Network Structure of IoT system

IoT smart terminals are generally connected to the network through IoT gateway, and then the data information of the terminals is reported to the application center through the IoT gateway, thus completing the network building.

A diagram of an IoT system is shown in the figure below. In the perception layer, there are four different types of IoT smart terminals that form four different subsystems, which are video monitoring subsystem, access control subsystem, alarm subsystem and intercom subsystem. The smart terminals in each subsystem are different. In the video monitoring subsystem, the main terminals are IP cameras and intelligent cameras for collecting video and image data. In the access control subsystem, the main terminals are turnstiles and vehicle access control hosts for collecting vehicle information. In the alarm subsystem, the main terminals are alarm hosts, alarm keyboards and wireless alarm hosts, which are used to set alarm policies, issue alarm warnings and report alarm events, etc. In the intercom subsystem, its main terminals are intercom hosts and individual equipment, which are used to collect voice data. Through this figure, we can know that in the IoT system, smart terminals are heterogeneous and complex, and the data are aggregated into the application layer through the transport layer, which greatly increases the difficulty of the application layer to control the terminals in the sensing layer.

+----------------------------------------------------------------------+
|                                                                      |
| Application                                           +------------+ |
|   Layer                   +--------+                  | Video      | |
|              +--------+   | Storage|    +-------+     | integrated | |
|              |  HOST  |   | system |    |  DVI  +-----+ platform   | |
|              +---+----+   +---+----+    +---+---+     +------+-----+ |
|                  |            |             |                |       |
|                  |            |             |                |       |
+------------------+------------+--+----------+----------------+-------+
|                                  |                                   |
|                                  |                                   |
| Transport                  +-----+----+                              |
|   Layer                    |  router  |                              |
|                            +-----+----+                              |
|                                  |                                   |
|             +------------------+-+------------+----------------+     |
|             |                  |              |                |     |
|           +-+-------+     +----+----+    +----+----+     +-----+---+ |
|           | gateway |     | gateway |    | gateway |     | gateway | |
|           +-+-------+     +----+----+    +----+----+     +-----+---+ |
|             |                  |              |                |     |
|             |                  |              |                |     |
+----------------------------------------------------------------------+
|             |                  |              |                |     |
+-------------+--+ +-------------+--+  +--------+-----+ +--------+-----+
|     Video      | |     Access     |  |    Alarm     | |   Intercom   |
|   surveillance | |     control    |  |  subsystem   | |   subsystem  |
|    subsystem   | |    subsystem   |  | +----------+ | |              |
| +------------+ | | +------------+ |  | |Alarm host| | | +----------+ |
| | IP camera  | | | |  Turnstile | |  | +----------+ | | |Intercom  | |
| +------------+ | | +------------+ |  | |   Alarm  | | | |  host    | |
| | Ip Camera  | | | |   Vehicle  | |  | | keyboard | | | +----------+ |
| +------------+ | | |   access   | |  | +----------+ | | |Individual| |
| |Smart Camera| | | |control host| |  | | Wireless | | | |equipment | |
| +------------+ | | +------------+ |  | |alarm host| | | |          | |
+----------------+ +----------------+  | +----------+ | | +----------+ |
|                                      +--------------+ +--------------+
|   Perception                                                         |
|     Layer                                                            |
|                                                                      |
+----------------------------------------------------------------------+
Figure 1: The Network Structure of an IoT System

3. Security Threats and Challenges

The main security threats and challenges in the process of accessing IoT smart terminals are as follows:

  1. Illegal connection of devices. On the side of IoT smart terminals, there exist illegal devices and illegal hosts to access to the network for probing attacks.There exists the situation that the application layer network is invaded through the network of smart terminals and the sensitive data of the application layer network is illegally stolen, thus causing great damage to the security of IoT.

  2. Counterfeit connection of devices. With wide distribution of IoT smart terminals and the public deployment environment, it is easy for malicious devices to illegally impersonate and replace legitimate devices and upload fake data, which leads to abnormal function of the devices and causes great damage to the security of IoT.

  3. Devices offline. The number of IoT smart terminals is huge and they are very vulnerable to physical attacks, network anomalies, power supply anomalies, and the aging of the device itself, which leads to go offline. And offline devices are difficult to discover, making some of the normal functions of the IoT lost.

  4. Devices management. There are many kinds of IoT smart terminals, and it is often not clear how many IoT smart terminals are owned in the whole IoT network and how many IoT smart terminals have security problems, which leads to problems such as inability to control IoT smart terminals and inability to sort out device assets.

4. Current Technology Level

  1. On the access control of IoT, there already exist many control protocols applied to IoT smart terminals, such as Zigbee [ZB], DALI [DALI], BACNET [BACNET], which do not contribute to the secure access of IoT devices. the UPnP [ISOIEC23941] access protocol defines the access to IoT smart terminals, but does not consider the issue of secure access.

  2. There are many specialized and generic security protocols being used in current IP-based deployments of IoT smart device applications. For example, IPsec [RFC7296], TLS [RFC8446], DTLS [RFC6347], HIP [RFC7401], Kerberos [RFC4120], SASL [RFC4422], and EAP [RFC3748], etc. These also do not protect against illegal connection of devices,counterfeit connection of devices, and device offline encountered during device access.

  3. There are also a number of groups that are also currently focusing on IoT device security . For example, the Cloud Security Alliance (CSA) is recommending that enterprises building the IoT consider strengthening IoT smart device authentication/authorization [CSA];the Global System for Mobile communications Association (GSMA) has published a security guide for IoT systems [GSMA] to bring a set of security guidelines to the research of IoT security product; and the United States Department of Homeland Security(DHS) has proposed six IoT security strategic principles [DHS] to guide IoT developers, manufacturers, service providers, and consumers in considering security issues. These teams give good advice on building security for the IoT, but there is no introduction or description of secure access to the IoT.

  4. In the existing security standards on IoT, such as [RFC8576], the security issues and solutions existing in IoT are introduced, but there is no mention of the problems and solutions existing in the access process of smart terminals.

  5. In other related device access standards, there are 802.1x [ISO88021X] based device access and portal-based authentication, but because IoT smart terminals exist mainly in the form of dumb terminals, they are not suitable for authentication access through 802.1x or portal, and the two authentication methods cannot be used to solve the illegal connection of devices and counterfeit connection of devices .

5. Secure Access and Management of IoT Smart Terminals

5.1. Framework of Secure Access Management

Comparing to three-layer framework of IoT,a layer of access and management is added for the framework of secure access management, which is between transport layer and application layer. The framework of secure access management for IoT smart terminals is shown in the following figure. In this framework, the access process of IoT is divided into four parts, which are sensing&control domain, access&management domain, application&service domain and user domain. Among them, access&management domain is the specific implementation of the secure access and management technical requirements to ensure secure access of smart terminals in terms of smart terminals management, access control, strategy management and access log audit.

+-------------------------------------------------------User Domain----+
|      Application & Service Domain                                    |
| +------------------+    +------------------+   +-------------------+ |
| |Bussiness System 1|    |Bussiness System 2|   |Bussiness System...| |
| +------------------+    +------------------+   +-------------------+ |
+----------------------------------------------------------------------+
           ^                ^                ^
           |                |                |
+----------+----------------+----------------+----------User Domain----+
|                     Access & Management Domain                       |
| +-----------------+-----------------+----------------+-------------+ |
| |      Device     |  Device Access  |  Access Policy |  Log Audit  | |
| |    Management   | +-------------+ |   Management   |             | |
| |                 | |  Unique id  | |                |             | |
| |                 | | information | |                |             | |
| | +-----+-------+ | +-------------+ | +------------+ |             | |
| | | IP  | Port& | | |  Trusted    | | |   IP&MAC   | | +---------+ | |
| | |     |Service| | |communication| | +------------+ | |Exception| | |
| | +-------------+ | |  protocol   | | |IP&MAC&Brand| | +---------+ | |
| | |Type | Brand | | +-------------+ | +------------+ | |Behavior | | |
| | +-------------+ | | Certificate | | |IP&MAC&Brand| | +---------+ | |
| | |Model|  MAC  | | |   access    | | |   &Model   | | |Operation| | |
| | +-------------+ | +-------------+ | +------------+ | +---------+ | |
| +------------------------------------------------------------------+ |
+----------------------------------------------------------------------+
                    Indirect  ^             ^           ^ Direct
                    connection|             |           | connection
+----------------------------------------------------------------------+
| Sensing &                 +-----------+   |           |              |
| Controlling               |IoT Gateway|   |           |              |
|   Domain                  +------^----+   |           |              |
|                                  |        |           |              |
| +------------------------------------------------------------------+ |
| | +---------+   +---------+   +--------+  |  +------+ |   +------+ | |
| | |RS-485   |   |Zigbee   |   |IP/WIFI/|  |  |Video | |   |Smart | | |
| | |RS232    |   |Lora and |   |5G/4G   |  |  |and   | |   |IP    | | |
| | |and other|   |other    |   |smart   +--+  |Audio +-+   |Camera| | |
| | |wired    |   |wireless |   |device  |     |device|     +------+ | |
| | |terminals|   |terminals|   +--------+     |RFID  |              | |
| | +---------+   +---------+                  +------+              | |
| +------------------------------------------------------------------+ |
+----------------------------------------------------------------------+
Figure 2: Framework of Secure Access Management for Smart Terminals

5.1.1. Sensing & Controlling Domain

Smart Terminals: including smart terminals through RS-485, RS-232 and other wired devices, zigberr, Lora and other wireless terminal equipment, smart terminal equipment through IP, WiFi, 5g, 4G access network, audio and video equipment, RFID equipment and intelligent camera equipment, etc.

IOT Gateway: an entity used to connect smart terminals and terminals of upper layer.

Among them, smart terminals can be directly connected with the access&management domain, or indirectly connected with the access and management domain through the Internet of things gateway.

5.1.2. Access & Management Domain

Access and management domain is the core, which is used to manage and control the access of smart terminals, including four parts: device management, device access, access policy management and log audit.

The contents of each part clarified as follows:

Device Management: It mainly manages equipment asset information, including IP address, MAC address, type of device, brand, model, open port and service of smart terminal equipment.

Device Access: Refers to the device access mode supported by smart terminals, including access based on unique identification information of smart terminal (the composition of unique identification information of device can be one or more sets of device asset information managed by device), access based on trusted communication protocol of smart terminal and access based on certificate authentication.

Access Policy Management: Refers to the access policy management based on the unique identification information of smart terminals, including: IP, MAC access policy; IP, MAC, manufacturer access policy; IP, MAC, manufacturer, model access policy.

Log Audit: Used to record, store and audit the log information generated in the access process of smart terminals, including exception log audit, behavior log audit and operation log audit.

5.1.3. Application & Service Domain

Application & service domain is the core business system, which provides informational application services for information collecting, exchanging and processing. The information provided by the smart terminals that verified by the access & management domain to ensure security and stability of the system.

5.1.4. User Domain

User domain is the users of smart terminals, they can directly access the core business system in the application & service domain, and access & management domain to view the access condition of smart terminals and manage them.

5.2. Requirements for Equipment Access

5.2.1. Requirements for devices access authentication identity information

The identity information of devices access authentication should include one or more of the following characteristics:

  1. IP address

  2. address

  3. brand

  4. type

  5. model

  6. firmware version

5.2.2. Requirements for Access Status of Devices

There should be at least four types of access status:

  1. Online: The device that has passed authentication and the device is working well.

  2. Offline: The device that has passed authentication and the device is not working.

  3. Counterfeit: A device that fails authentication and its authentication identity information is the same as that of the authenticated device before.

  4. Illegal connection: The authentication identity information of the device that fails to pass the authentication is completely different from the identity information of the device that has passed the authentication

5.2.3. Recommendation of Access Policy

  1. The device access policy can be at least five combinations:

    1. IP + MAC

    2. IP + Mac + manufacturer

    3. IP + Mac + manufacturer + model

    4. IP + Mac + manufacturer + model + type

    5. IP + Mac + manufacturer + model + type + firmware version

  2. Quickly discover the access of counterfeit and illegal connection, and prevent illegal control of devices.

  3. The configuration of access policy can be done manually and automatically

  4. Device access policy can be customized as any combination of recommendation of access policy shown in requirement 3.

5.3. Requirements for Equipment Management

Device management requires the ability to monitor device status in real time, to profile devices, to identify and manage applications running on terminals, to identify and manage device asset information of terminals, and to manage IP addresses of terminals.

  1. Requirements for equipment condition monitoring and management

    1. It should be ability to monitor the offline and online status of smart terminals in real time

    2. It should be ability to discover whether there is weak password information of the smart terminal

    3. It should be ability to discover the risky ports of smart terminals

    4. It should be ability to alert offline devices, devices with weak passwords and risky ports

  2. Requirements for the management of terminal profiling

    1. It should be ability to visualize device information of smart terminals, including device type, IP address, open ports, etc.
  3. Requirements for the management of identifying applications

    1. It should be ability to automatically identify and manage the device's open services and service ports

    2. It should be ability to automatically discover and identify the application system of B/S architecture or CS architecture running in the network where the IoT smart terminal is located, including: service IP, service port, application name

  4. Requirements for the management of identifying asset information of the device

    1. It should be ability to manage IP address, MAC address, device manufacturer, device model, device type, device firmware version number, device open port, and device online time for smart terminals

    2. It should be ability to manage the communication protocol information of smart terminals and geographic location information of devices

5.4. Requirements for Access Log Audit

Access log audit requires the ability to audit all types of operations as well as abnormal and malicious behavior of access devices.

  1. It should be ability to record abnormal behavior log information of access devices in real time and to provide analysis and audit functions.

  2. It should be ability to record malicious behavior log information of access devices in real time and to provide analysis and audit functions.

  3. It should be ability to record the management, access and blocking of access devices and other types of operations in real time , and can provide analysis and audit functions

6. Security Considerations

This entire memo deals with security issues.

7. IANA Considerations

This documents has no IANA actions.

8. Informative References

[BACNET]
American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE), "BACnet", <http://www.bacnet.org>.
[CSA]
"Security Guidance for Early Adopters of the Internet of Things (IoT)", , <https://downloads.cloudsecurityalliance.org/whitepapers/Security_Guidance_for_Early_Adopters_of_the_Internet_of_Things.pdf>.
[DALI]
"DALI Explained", <http://www.dalibydesign.us/dali.html>.
[DHS]
"Strategic Principles For Securing the Internet of Things (IoT)", , <https://www.dhs.gov/sites/default/files/publications/Strategic_Principles_for_Securing_the_Internet_of_Things-2016-1115-FINAL....pdf>.
[GSMA]
"GSMA IoT Security Guidelines and Assessment", <http://www.gsma.com/connectedliving/future-iot-networks/iot-security-guidelines>.
[ISO88021X]
ISO/IEC/IEEE, "Telecommunications and exchange between information technology systems - Requirements for local and metropolitan area networks - Part 1X: Port-based network access control".
[ISOIEC23941]
ISO/IEC, "IoT management and control device control protocol".
[RFC3748]
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. Levkowetz, Ed., "Extensible Authentication Protocol (EAP)", DOI 10.17487/RFC3748, , <https://www.rfc-editor.org/info/rfc3748>.
[RFC4120]
Neuman, C., Yu, T., Hartman, S., and K. Raeburn, "The Kerberos Network Authentication Service (V5)", DOI 10.17487/RFC4120, , <https://www.rfc-editor.org/info/rfc4120>.
[RFC4422]
Melnikov, A., Ed. and K. Zeilenga, Ed., "Simple Authentication and Security Layer (SASL)", DOI 10.17487/RFC4422, , <https://www.rfc-editor.org/info/rfc4422>.
[RFC6347]
Rescorla, E. and N. Modadugu, "Datagram Transport Layer Security Version 1.2", DOI 10.17487/RFC6347, , <https://www.rfc-editor.org/info/rfc6347>.
[RFC7296]
Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and T. Kivinen, "Internet Key Exchange Protocol Version 2 (IKEv2)", DOI 10.17487/RFC7296, , <https://www.rfc-editor.org/info/rfc7296>.
[RFC7401]
Moskowitz, R., Ed., Heer, T., Jokela, P., and T. Henderson, "Host Identity Protocol Version 2 (HIPv2)", DOI 10.17487/RFC7401, , <https://www.rfc-editor.org/info/rfc7401>.
[RFC8446]
Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", DOI 10.17487/RFC8446, , <https://www.rfc-editor.org/info/rfc8446>.
[RFC8576]
Garcia-Morchon, O., Kumar, S., and M. Sethi, "Internet of Things (IoT) Security: State of the Art and Challenges", DOI 10.17487/RFC8576, , <https://www.rfc-editor.org/info/rfc8576>.
[ZB]
"Zigbee Alliance", , <http://www.zigbee.org/>.

Authors' Addresses

Bin Wang (editor)
Hikvision
555 Qianmo Road, Binjiang District
Hangzhou
310051
China
Song Liu (editor)
Hikvision
555 Qianmo Road, Binjiang District
Hangzhou
310051
China
Li Wan (editor)
Hikvision
555 Qianmo Road, Binjiang District
Hangzhou
310051
China
Xing Wang (editor)
Hikvision
555 Qianmo Road, Binjiang District
Hangzhou
310051
China