Connected, but protected

Monday, May 1, 2017

If hackers made their way into your Fitbit and messed with your daily step count 鈥 you might be confused and annoyed.

But what if a hacker altered the heart rhythms in your pacemaker or the brakes on your connected car? What if someone found a way to empty cash from your bank account by hacking the embedded chip in the digital device you carry around to make automatic payments?

With more personal information flowing through devices connected to the Internet, researchers are looking for new ways to protect personal privacy in the ever-expanding Internet of Things.

Catherine Gebotys

Catherine Gebotys, a professor in the Department of Electrical and Computer Engineering, is creating countermeasures to thwart two different techniques commonly used by information thieves.

Hackers use electromagnetic waves, laser beams, or a combination of the two, to produce information that helps them decode the encryption key in an embedded chip on a device.

鈥淐urrently, most labs focus on one type of attack and a countermeasure for that one particular attack, but we look at the impact of the combinations of attacks and develop countermeasures for a range of attacks,鈥 Gebotys says. 鈥淭his advantage allows us to develop more efficient countermeasures for companies to put in their devices.鈥

Gebotys, whose passion is solving real-world problems, has collaborated with industry for decades. She developed countermeasures for BlackBerry early in the game, which helped the company become a pioneer in protecting corporate and government smartphone data.

These days, Gebotys works with Canada鈥檚 Department of National Defence. 鈥淚t鈥檚 especially important for military devices,鈥 explains Gebotys. 鈥淚f an adversary got hold of one of Canada鈥檚 military devices and was able to extract keys from it, then all of our communications would no longer be private.鈥

Everyone should be concerned about the cryptography in all devices that are connected through the Internet ... It鈥檚 a very high-risk area.

CATHERINE GEBOTYS

It鈥檚 forecast that by 2020 there will be 50 billion devices connected to the Internet of Things. While it might be fun to imagine a refrigerator that orders milk when you run out, or a vehicle that orders your latte before you get to the coffee shop, Gebotys warns that some consumer devices have cheap processors that can be easy targets for high-tech criminals.

鈥淏ecause there are so many of these devices built by so many different companies, we want to make sure the algorithms people use are secure and that people in the tech field will be able to know if there are any leakages of information,鈥 Gebotys says.

The challenge, she says, is to develop countermeasures that are safe, reliable and affordable. With so many companies building small devices and so many consumers using them in their daily lives 鈥 you can鈥檛 have a security measure that costs too much or is so complex that it drains battery life.

鈥淓veryone should be concerned about the cryptography in all devices that are connected through the Internet. If a company is designing a device that uses sensitive personal data, they should be required to have appropriate levels of secure cryptography in their devices,鈥 Gebotys says. 鈥淚t鈥檚 a very high-risk area and they should have resistance to these kinds of attacks.鈥

Staying secure from the start

Before buying a connected device, ask questions to ensure it was designed with security front of mind.

Smart consumers routinely change their passwords but they should also be asking questions about how secure their private information is whenever they buy devices connected to the Internet, says a 蓝莓视频 math alumnus.

Mark Malchiondo

鈥淚t鈥檚 really no different than purchasing a cellphone,鈥 says Mark Malchiondo, co-founder of ecobee, a Toronto company that sells smart thermostats. 鈥淵ou want to look at customer reviews. You want to understand if the company or products have been exposed to attacks in the past. You need to know if they do frequent upgrades.鈥

Ecobee鈥檚 servers are in a facility with tight security 鈥 everything from fingerprint identification to bullet-resistant doors. Certificate-based authentication is used to verify both the server and the device and there are no inbound connections into the device. Everything is outbound to the servers only, says Malchiondo.

鈥淭hat really limits an attacker鈥檚 ability to gain access to the device, either over the home鈥檚 Wi-Fi or over the Internet.鈥

This article was originally featured on University of 蓝莓视频 Magazine.