Design World

  • Home
  • Articles
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
  • 3D CAD Models
    • PARTsolutions
    • TraceParts
  • Leadership
    • 2020 Winners
    • 2019 Winners
    • 2020 LEAP Awards
  • Resources
    • DIGITAL ISSUES
      • EE World Digital Issues
    • Future of Design Engineering
    • 2020 LEAP Awards
    • MC² Motion Control Classroom
    • Motion Design Guide Library
    • Podcasts
    • Suppliers
    • Webinars
  • Women in Engineering
  • Ebooks / Tech Tips
  • Videos
  • Subscribe
  • COVID-19

April 2019 Special Edition: Internet of Things Handbook

By Reggie Hall | April 17, 2019

Share

Everything you thought you knew about IoT security is wrong

Listen to the advice being given for securing IoT devices and you are likely to be told that the level of security should be scaled to meet the probable threats. Internet-connected home thermostats, for example, should be designed to prevent compromise by hobbyists and serious hackers. But the usual recommendation is that there’s no reason to worry about a nation-state prying into your home thermostat. After all, wouldn’t North Korea have better things to do than screw around with the temperature in your house?

This philosophy about IoT security sounds completely reasonable. And it is completely wrong.

The reason emerged from a presentation by Princeton University researchers at last year’s USENIX Security Symposium. They found that it would be possible for attackers to grab control of high-wattage consumer devices – such as A/C units and heaters – to mount a large-scale coordinated attack on the power grid. The idea is to infiltrate numerous high-wattage IoT loads for the purpose of turning them all on or off simultaneously. Simulation results show these shenanigans could cause everything from local power outages to large-scale blackouts.

There is a precedent for the style of attack the Princeton researchers envision. In 2016, the Mirai botnet virus took down several major websites via a denial-of-service attack. (The botnet moniker arises from Mirai’s control of infected devices from a central set of servers.) Attacks took place via seemingly innocuous IoT devices that included home routers, air-quality monitors, and personal surveillance cameras. Researchers estimate that at its peak, Mirai infected over 600,000 vulnerable IoT devices.

Mirai proved how simple it can be to compromise large numbers of IoT devices. The initial version simply tried a fixed set of 64 well-known default login/password combinations in common use. Mirai found the vulnerable devices by randomly scanning the internet for targets and attacking. Once it got control of an IoT device, Mirai software reported to the attacking servers which then infected the device.

The Princeton researchers found that a sudden 30% rise in demand caused grid generators to trip. They figured an adversary would need access to about 90,000 A/C units or 18,000 water heaters in a target area to pull off this stunt.

Turning on loads in one area and turning them off in another could also cause further havoc. Power flows through the grid according to Kirchhoff’s laws, so the grid operator has almost no control of how power flows once generators kick in. Rising demand in one area can create line overloads and failures which, in turn, may cause further cascading line failures. Particularly at risk, say researchers, are tie lines connecting between neighboring power systems.

Even if hackers don’t succeed in shutting down the grid, they can dramatically drive up the costs of operating it. When demand exceeds planned capacity, the grid operator must purchase additional electric power from reserve generators. Power from these generators usually costs significantly more than that from the usual sources. Researchers ran simulations showing that boosting power demand during peak hours by just 5% can bring a 20% rise in the power generation costs.

All of which should give you pause the next time you hear a security expert smugly claim consumer IoT devices don’t need protection from well-organized cyberwarfare agencies.

LEE TESCHLER | EXECUTIVE EDITOR

MOTION DESIGN GUIDES

“motion

“motion

“motion

“motion

“motion

“motion

Enews Sign Up

Motion Control Classroom

Design World Digital Edition

cover

Browse the most current issue of Design World and back issues in an easy to use high quality format. Clip, share and download with the leading design engineering magazine today.

EDABoard the Forum for Electronics

Top global problem solving EE forum covering Microcontrollers, DSP, Networking, Analog and Digital Design, RF, Power Electronics, PCB Routing and much more

EDABoard: Forum for electronics

Sponsored Content

  • Configuration Management: Configuration Integrity IS A Core Driver for Business Success
  • How to Choose a Linear Actuator
  • Create your perfect machine with Advanced Engineering
  • How a ME/EE turned passion for design into his own bike company
  • Everyone Can Save on Cable Costs. Here’s How
  • How and Why You Should Use a Wave Spring for Bearing Preload
Engineering Exchange

The Engineering Exchange is a global educational networking community for engineers.

Connect, share, and learn today »

Tweets by @DesignWorld
Design World
  • Advertising
  • About us
  • Contact
  • Manage your Design World Subscription
  • Subscribe
  • Design World Digital Network
  • Engineering White Papers
  • LEAP Awards

Copyright © 2021 WTWH Media, LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media. Site Map | Privacy Policy | RSS

Search Design World

  • Home
  • Articles
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
  • 3D CAD Models
    • PARTsolutions
    • TraceParts
  • Leadership
    • 2020 Winners
    • 2019 Winners
    • 2020 LEAP Awards
  • Resources
    • DIGITAL ISSUES
      • EE World Digital Issues
    • Future of Design Engineering
    • 2020 LEAP Awards
    • MC² Motion Control Classroom
    • Motion Design Guide Library
    • Podcasts
    • Suppliers
    • Webinars
  • Women in Engineering
  • Ebooks / Tech Tips
  • Videos
  • Subscribe
  • COVID-19
We use cookies to personalize content and ads, to provide social media features and to analyze our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use this website.OkNoRead more