40  IoT Security Visual Resources

Learning Objectives

After reviewing this visual resource gallery, you will be able to:

  • Classify key components of encryption architectures including symmetric, asymmetric, and multi-layer approaches
  • Analyze common IoT attack patterns including botnet architectures, man-in-the-middle, and side-channel attacks
  • Calculate residual breach probability across layered defense-in-depth security architectures
  • Map security concepts across device, network, and cloud layers by interpreting trust boundary diagrams
In 60 Seconds

Visual resources for IoT security translate abstract threat models, attack paths, and defence architectures into diagrams and charts that make complex security relationships immediately comprehensible — a particularly valuable complement to technical documentation for communicating risk to non-technical stakeholders. The most effective security visualisations are attack trees, threat model diagrams, and kill-chain illustrations that connect attacker goals to specific device vulnerabilities.

IoT security threats are the various ways that connected devices and their data can be compromised. Think of your IoT system as a house – you need to understand how burglars might try to get in before you can choose the right locks, alarms, and security cameras. This chapter helps you understand the threats so you can build effective defenses.

“A picture is worth a thousand words!” Lila the LED said, lighting up her brightest display. “Sometimes security concepts are hard to understand just from reading about them. That is why this chapter is full of diagrams and pictures that show how attacks and defenses actually work.”

Sammy the Sensor pointed to an encryption diagram. “Look at this one! It shows how a message gets scrambled into secret code. On one side you have the plain message, then it goes through the encryption machine, and out comes gibberish that only the right key can decode. Seeing it drawn out makes it so much easier to understand than just reading about it!”

“My favorite diagrams are the ones showing attack scenarios,” Max the Microcontroller admitted. “They show step by step how a hacker might try to break in – first they scan for open ports, then they try default passwords, then they move sideways through the network. When you can SEE the attack path, you can figure out where to put your defenses to block it.”

“Think of these visuals like a map of a maze,” Bella the Battery suggested. “The attacker is trying to find a path through to the treasure, and the diagrams help you see all the possible routes so you can put walls and locks in the right places. Explore these pictures and you will understand security concepts much faster!”

Key Concepts

  • Attack tree: A visual representation of an attacker’s goals and the alternative paths to achieve them, arranged in a tree structure with the root as the attacker’s ultimate objective and leaves as individual exploitable conditions.
  • Kill chain diagram: A visual model of the sequential stages of a cyberattack (reconnaissance, weaponisation, delivery, exploitation, installation, C2, actions on objective), used to identify defensive opportunities at each stage.
  • Threat model diagram: A visual representation of an IoT system showing data flows, trust boundaries, and identified threats at each boundary, typically using the STRIDE framework categories.
  • Security architecture diagram: A diagram showing the security controls applied at each tier of an IoT architecture (device, gateway, cloud, management) and how they collectively address identified threats.
  • Risk heat map: A matrix visualising security risks by their likelihood and impact, prioritising which risks require immediate mitigation versus acceptance or monitoring.

40.2 Encryption and Cryptography

Asymmetric encryption architecture showing public key for encryption and private key for decryption, with key pair generation and secure key exchange mechanisms for IoT devices.

Asymmetric Encryption

Asymmetric encryption uses mathematically related key pairs to enable secure communication without shared secrets, essential for IoT device provisioning and authentication.

Diagram of encryption levels for IoT showing E1 device-to-device, E2 device-to-gateway, E3 device-to-cloud, E4 gateway-to-cloud, and E5 key renewal with security trade-offs at each level.

Encryption Levels

IoT systems implement encryption at multiple levels, from local device communication to cloud connectivity, each with different security and performance characteristics.

AES encryption process showing SubBytes, ShiftRows, MixColumns, and AddRoundKey operations repeated across multiple rounds to transform plaintext into ciphertext
Figure 40.1: AES Encryption Process

The AES encryption process transforms data through multiple rounds of confusion and diffusion operations. Each round applies substitution (SubBytes), transposition (ShiftRows), mixing (MixColumns), and key addition (AddRoundKey) to create ciphertext that is computationally infeasible to reverse without the correct key. AES-128 uses 10 rounds, AES-192 uses 12 rounds, and AES-256 uses 14 rounds.

Multi-layer encryption architecture showing application-layer, transport-layer, and link-layer encryption working together to provide comprehensive data protection
Figure 40.2: Multi-Layer Encryption Architecture

Defense-in-depth encryption applies protection at multiple OSI layers. Even if one encryption layer is compromised, other layers continue protecting data integrity and confidentiality. This approach is especially important for IoT systems where data traverses untrusted network segments between constrained devices and cloud endpoints.

40.3 Attack Scenarios

IoT attack scenario visualization showing multiple attack paths from initial compromise through lateral movement to data exfiltration and system disruption
Figure 40.3: IoT Attack Scenarios

Understanding attack scenarios helps security teams anticipate threats and implement appropriate countermeasures. These diagrams trace the complete attack lifecycle from initial reconnaissance through exploitation, lateral movement, and data exfiltration.

Attack tree diagram showing hierarchical decomposition of IoT system compromise into sub-goals including physical access, network exploitation, credential theft, and firmware tampering
Figure 40.4: Attack Tree Analysis

Attack trees provide a structured methodology for analyzing IoT security threats. By decomposing complex attacks into hierarchical sub-goals, security teams can identify critical paths and prioritize countermeasures based on cost, likelihood, and impact.

Man-in-the-Middle attack visualization showing attacker positioned between IoT device and server intercepting, modifying, and forwarding communications without detection
Figure 40.5: Man-in-the-Middle Attack

Man-in-the-Middle attacks exploit the trust relationship between IoT devices and their backend services. Without proper mutual authentication and encrypted channels, attackers can intercept sensor data, inject malicious commands, and compromise entire IoT deployments.

IoT botnet infrastructure showing compromised devices connected to command and control server, illustrating how hundreds of thousands of vulnerable IoT devices can be orchestrated for coordinated attacks
Figure 40.6: Botnet Architecture

The Mirai botnet demonstrated the catastrophic potential of unsecured IoT devices. By exploiting default credentials on cameras, routers, and DVRs, attackers assembled an army of over 600,000 compromised devices capable of generating attack traffic exceeding 1 Tbps in the October 2016 Dyn DNS attack.

Distributed Denial of Service attack visualization showing multiple compromised IoT devices flooding target server with malicious traffic, overwhelming legitimate users' ability to access services
Figure 40.7: DDoS Attack

Distributed Denial of Service attacks leverage the collective bandwidth of thousands of compromised IoT devices to overwhelm target infrastructure. The volumetric nature of these attacks makes them particularly difficult to mitigate without upstream filtering or content delivery network protection.

40.4 Security Architecture

Network micro-segmentation isolates IoT devices into security zones, limiting lateral movement when a device is compromised. Each zone has dedicated firewall rules controlling inter-zone traffic based on the principle of least privilege.

PKI infrastructure provides certificate-based device authentication through a trust hierarchy from Root Certificate Authority through Intermediate CAs to individual device certificates, enabling scalable identity management across large IoT deployments.

Device security bootstrap establishes hardware-based trust during provisioning, chaining verification from the hardware root of trust through firmware integrity checks to secure key provisioning.

IoT compliance framework showing NIST, ISO 27001, IEC 62443, and industry-specific requirements mapped to security controls for regulatory adherence
Figure 40.11: Secure IoT Framework

Compliance frameworks such as NIST SP 800-183, ISO 27001, and IEC 62443 provide structured security requirements for IoT deployments, mapping regulatory obligations to specific technical controls.

40.5 Protocol Security

DTLS (Datagram Transport Layer Security) provides TLS-equivalent security for UDP-based protocols, essential for constrained IoT devices using CoAP. The handshake includes a cookie exchange to prevent denial-of-service amplification, followed by certificate verification and key establishment.

MQTT security architecture showing TLS transport security, username/password authentication, ACL-based topic authorization, and payload encryption options

MQTT Security

MQTT security combines transport encryption (TLS), authentication (username/password or client certificates), and topic-based authorization (ACLs) for pub/sub messaging in IoT systems.

CoAP security diagram showing DTLS binding, PSK and certificate authentication modes, and resource-level access control for constrained devices

CoAP Security

CoAP provides REST-like security for resource-constrained IoT devices with DTLS protection. It supports both pre-shared key (PSK) and certificate-based authentication modes, with resource-level access control.

40.6 Data Protection

Data lifecycle security diagram showing protection requirements at collection, transmission, storage, processing, and disposal phases for IoT data

Data Lifecycle Security

IoT data requires protection throughout its lifecycle – from collection at the sensor through transmission, storage, processing, and eventual disposal. Each phase has distinct security requirements and attack surfaces.

Differential privacy mechanism showing noise injection to protect individual data points while preserving aggregate statistical properties for analytics

Differential Privacy

Differential privacy enables IoT analytics while protecting individual data points by injecting calibrated noise. The privacy guarantee ensures that including or excluding any single record changes query results by at most a bounded amount (\(\epsilon\)).

Homomorphic encryption visualization showing computations performed on encrypted data without decryption, enabling secure cloud processing of sensitive IoT data

Homomorphic Encryption

Homomorphic encryption allows computation on encrypted IoT data in untrusted cloud environments. The cloud processes ciphertexts and returns encrypted results that only the data owner can decrypt, eliminating the need to trust the cloud provider with plaintext data.

40.7 Access Control

Access control matrix visualization showing subjects, objects, and permissions mapped in a grid structure for managing IoT device authorization
Figure 40.13: Access Control Matrix

Access control matrices provide a foundational model for managing IoT device permissions by mapping subjects (users, devices, services) to objects (resources, endpoints, data) with explicit permission assignments.

Authentication flow diagram showing device credential exchange, token generation, and session establishment for secure IoT device communication
Figure 40.14: Authentication Flow

IoT authentication flows must balance security strength with the computational constraints of resource-limited devices. Lightweight token-based approaches reduce per-request overhead while maintaining session integrity.

OAuth 2.0 authentication flow for IoT applications showing authorization code flow from user authentication through token issuance and resource access.
Figure 40.15: OAuth 2.0 Flow

OAuth 2.0 provides delegated authorization for IoT applications, allowing devices to access cloud resources on behalf of users without handling user credentials directly. The Device Authorization Grant (RFC 8628) is specifically designed for input-constrained IoT devices.

40.8 Hardware Security

Hardware trojan circuit showing trigger logic that activates malicious payload when specific input combination is detected, bypassing security functions

Combinational Hardware Trojan

Hardware trojans can be inserted during manufacturing to enable backdoor access when specific conditions are met. Combinational trojans activate based on rare input combinations, making them difficult to detect through standard testing because the trigger condition may never occur during verification.

DPA attack diagram showing power trace collection, statistical correlation, and key recovery process for extracting cryptographic secrets through side-channel analysis

Differential Power Analysis

Differential Power Analysis (DPA) attacks extract cryptographic secrets by statistically correlating power consumption traces with data-dependent operations inside a chip. Collecting thousands of power traces during encryption operations allows attackers to recover secret keys without any knowledge of the algorithm internals.

Hardware Security Module integration showing secure key storage, cryptographic operations, and tamper-resistant boundary protecting sensitive operations from software attacks

HSM Integration

Hardware Security Modules (HSMs) provide tamper-resistant key storage and cryptographic operations for high-security IoT deployments. Keys never leave the HSM boundary, protecting them from software-based extraction attacks.

40.9 Concept Relationships

How Security Visual Concepts Connect
Visual Category Maps To Security Property Reveals Attack Surface Informs Defense Strategy
Encryption Diagrams Confidentiality Data in transit, at rest TLS/AES implementation decisions
Attack Trees Multiple (CIA + auth) All possible attack paths Defense prioritization by likelihood
Network Segmentation Isolation, least privilege Inter-VLAN communication paths Firewall rule design
Defense-in-Depth All CIA properties Layer boundaries Redundant control placement
Authentication Flows Authentication, non-repudiation Token/session management OAuth/JWT implementation

Critical Insight: Visual security diagrams are tools for threat modeling, not just documentation. They expose implicit assumptions about trust boundaries and reveal attack paths that text descriptions miss.

Common Mistake: Assuming Encryption Diagrams Show Complete Security

The Mistake: Teams look at encryption architecture diagrams showing “TLS” or “AES-256” and conclude the system is secure, without verifying implementation details like key management, certificate validation, or cipher suite selection.

Why Diagrams Can Be Misleading: A diagram showing “Sensor –[TLS]–> Cloud” tells you NOTHING about:

  • Is certificate validation enabled? (Many IoT libraries default to disabled)
  • Which TLS version? (TLS 1.0 and 1.1 are deprecated per RFC 8996; TLS 1.2+ is required)
  • Which cipher suites? (RC4, DES, and 3DES are broken)
  • How are keys managed? (Hardcoded keys = broken)
  • Is certificate pinning used? (Prevents MITM with rogue CAs)

Real-World Failure Example:

Company: Smart camera manufacturer
Diagram Claim: "End-to-end AES-256 encryption from camera to mobile app"

Actual Implementation (discovered in security audit):
1. Camera generates AES-256 key on first boot
2. Key stored in plaintext in /etc/camera/config.txt
3. Camera sends key to mobile app over HTTP (unencrypted) during pairing
4. Attacker on same Wi-Fi intercepts key
5. All video streams decryptable by attacker

Result: "End-to-end encryption" was technically true (AES-256 used),
but implementation was completely broken. Diagram showed encryption,
audit revealed it was security theater.

What to Verify Beyond the Diagram:

Diagram Shows Must Verify in Implementation
“TLS encryption” TLS 1.2+ only? Certificate validation enabled? Proper cipher suites?
“AES-256 encryption” Where are keys stored? How are they generated (RNG quality)? Key rotation schedule?
“End-to-end encryption” Is key exchange authenticated? Is it actually E2EE or just client-server TLS?
“Secure communication” What protocol? What mode (ECB is broken)? Authentication tag verified?

Correct Approach:

  1. Treat diagrams as architecture intent, not implementation proof
  2. Require implementation details: Key lengths, modes, storage, rotation
  3. Demand code review or pentest: Verify crypto actually works as claimed
  4. Check for common anti-patterns:
    • Hardcoded keys in firmware
    • verify=False or InsecureRequestWarning ignored
    • ECB mode (patterns leak information)
    • Null cipher suites accepted

Key Lesson: A beautiful encryption diagram with “AES-256” and “TLS 1.3” labels can represent anything from excellent security to complete snake oil. Always verify the implementation matches the architecture, especially for IoT where developers often disable security features during development and forget to re-enable them for production.

Criterion Link-Layer (802.15.4 AES) Network-Layer (IPsec) Transport-Layer (TLS/DTLS) Application-Layer (AES-GCM) End-to-End (E2EE)
Overhead Low (16-byte MIC per frame) High (ESP header + auth) Medium (TLS record + MAC) Low (16-byte GCM tag) Low (app-specific)
Latency Minimal (<1ms) High (key exchange 100ms+) Medium (handshake 50-200ms) Minimal Minimal
Complexity Low (hardware-accelerated) Very High (kernel-level) Medium (libraries available) Low High (custom)
Interoperability Protocol-specific (Zigbee, Thread) Any IP protocol Any TCP/UDP Application-defined Application-defined
Protection Scope Single wireless hop All network hops Device to server App data only User to user
Best For Zigbee/Thread mesh networks VPNs, site-to-site tunnels Cloud APIs, HTTPS Sensor data payloads Messaging, health data

Decision Tree:

  1. Is data human-readable (PHI, PII, credentials)?
    • YES: Require Transport-Layer (TLS) or End-to-End minimum
    • NO: Continue to step 2
  2. Is device extremely constrained (<32 KB RAM, <1% power budget for crypto)?
    • YES: Use Link-Layer (hardware AES) or lightweight Application-Layer
    • NO: Continue to step 3
  3. Must protect against untrusted network infrastructure (public Wi-Fi, cellular)?
    • YES: Use Transport-Layer (TLS) or End-to-End
    • NO: Continue to step 4
  4. Is device using IP-based protocol (Wi-Fi, Ethernet, cellular)?
    • YES: Use Transport-Layer (TLS/DTLS) – industry standard
    • NO: Use Link-Layer (802.15.4 AES) for Zigbee/Thread

Example Applications:

  • Smart thermostat (Wi-Fi, cloud API): Transport-Layer (TLS) – Standard HTTPS, broad support
  • Zigbee door sensor (mesh network, constrained): Link-Layer (802.15.4 AES-128) – Protocol built-in
  • Medical wearable (sensitive health data): End-to-End (E2EE) – Privacy regulation (HIPAA)
  • Industrial sensor (Modbus TCP, sensitive SCADA data): Network-Layer (IPsec) – Site-to-site VPN

Multi-Layer Recommendation: For sensitive data (medical, financial), use Transport-Layer PLUS Application-Layer (defense-in-depth). Example: TLS for network protection + AES-GCM for data-at-rest encryption in database.

Scenario: A security consultant is auditing a smart hospital deployment with 1,200 IoT medical devices. The network architect provides a segmentation diagram showing 4 VLANs. Calculate whether the segmentation adequately protects patient safety devices from compromise.

Network Diagram Analysis:

VLAN 10 (Guest Wi-Fi):        200 devices - Patient/visitor smartphones
VLAN 20 (Medical IoT):         800 devices - Infusion pumps, patient monitors
VLAN 30 (Non-Critical IoT):    400 devices - Smart thermostats, occupancy sensors
VLAN 40 (Admin/Corporate):     150 devices - Staff workstations, EHR servers

Firewall Rules:

Rule 1: VLAN 10 -> VLAN 20: DENY ALL (guests cannot reach medical devices)
Rule 2: VLAN 20 -> VLAN 40: ALLOW port 443 (medical devices send data to EHR)
Rule 3: VLAN 30 -> VLAN 20: ALLOW port 1883 (MQTT broker for sensor data)
Rule 4: VLAN 40 -> ALL: ALLOW (admins can reach all devices)

Security Assessment:

Finding 1: Critical Vulnerability in Rule 3

Issue: Non-critical IoT (thermostats) can communicate with medical IoT
Attack Path:
1. Attacker compromises smart thermostat (VLAN 30) via known vulnerability
2. From thermostat, attacker pivots to MQTT broker (port 1883)
3. MQTT broker has access to medical device network (VLAN 20)
4. Attacker injects malicious commands to infusion pumps

Risk Calculation:
- Probability: 15% (thermostats have poor security, vendors slow to patch)
- Impact: CRITICAL (patient safety - incorrect medication dosage)
- Risk Score: 0.15 x 10 (max severity) = 1.5 / 10 (HIGH RISK)

Finding 2: Overprivileged Admin Access (Rule 4)

Issue: Admin workstations have unrestricted access to ALL VLANs
Attack Path:
1. Phishing email compromises admin laptop (VLAN 40)
2. Attacker has full access to medical devices (VLAN 20)
3. Can disable life-support systems, exfiltrate patient data

Risk Calculation:
- Probability: 25% (phishing success rate in healthcare)
- Impact: CRITICAL (patient safety + HIPAA breach)
- Risk Score: 0.25 x 10 = 2.5 / 10 (CRITICAL RISK)

Recommended Segmentation (defense-in-depth):

VLAN 10 (Guest):            -> INTERNET ONLY (no internal access)
VLAN 20 (Critical Medical): -> Isolated, no inbound except from VLAN 50
VLAN 30 (Non-Critical IoT): -> Isolated, separate MQTT broker from VLAN 20
VLAN 40 (Corporate):        -> NO direct access to VLAN 20
VLAN 50 (Jump Server):      -> Gateway for admin access with MFA + audit logging

Updated Firewall Rules:
Rule 1: VLAN 10 -> ALL: DENY (except internet gateway)
Rule 2: VLAN 20 -> VLAN 40: ALLOW port 443 OUTBOUND ONLY
Rule 3: VLAN 30 -> VLAN 20: DENY ALL (separate MQTT brokers)
Rule 4: VLAN 40 -> VLAN 50: ALLOW (admins go through jump server)
Rule 5: VLAN 50 -> VLAN 20: ALLOW with MFA + session recording

Risk Reduction After Fixes:

Critical Medical Device Compromise Probability:
Before: ~36% combined attack surface (union of thermostat and admin paths)
After: <5% (only through hardened jump server with MFA)

Cost to Implement:
- Jump server VM: $200/month
- MFA licenses: $5/user x 50 admins = $250/month
- Firewall rule changes: 4 hours x $150/hr = $600 one-time
Total annual cost: $5,400 + $600 = $6,000

Avoided Cost (single breach):
- HIPAA violation: $50,000-$1.5M fine
- Patient harm lawsuit: $500K-$10M
- Reputational damage: Estimated $5M+ in lost patients
Expected annual savings: 0.31 x $2M (median breach cost) = $620,000

ROI: $620,000 / $6,000 = 10,333% return in year one

Key Insight: Visual network diagrams reveal attack paths that text descriptions miss. The thermostat-to-MQTT-to-medical-device path was non-obvious until diagram analysis showed the transitive trust relationship. Segmentation without proper firewall rules is security theater.

40.10 Knowledge Check

Common Pitfalls

Security diagrams intended for risk assessment must accurately reflect the implemented architecture, not the intended or aspirational design. Diagrams showing controls that are not actually deployed create a false impression of security.

Trust boundaries — where data crosses from one security zone to another — are where the most critical security controls are needed. Architecture diagrams without explicit trust boundaries miss the most important security design decisions.

Security diagrams that use complex symbols, excessive detail, or misleading colour coding make risk harder to understand rather than easier. Design security visualisations for the audience: simplified risk heat maps for executives, detailed threat models for engineers.

40.11 Summary

This chapter presented visual resources spanning six key areas of IoT security: encryption architectures, attack scenarios, security architecture patterns, protocol security, data protection mechanisms, and hardware security. The central theme across all diagrams is that visual analysis reveals trust boundaries and attack paths that text descriptions alone can miss.

Key takeaways:

  • Defense-in-depth provides multiplicative protection: four layers with 20%, 15%, 10%, and 5% bypass probabilities yield a combined breach probability of just 0.015%
  • Encryption diagrams show intent, not implementation – always verify TLS versions, cipher suites, key storage, and certificate validation behind the diagram labels
  • Network segmentation diagrams expose transitive trust relationships that create non-obvious attack paths, as demonstrated in the hospital VLAN analysis
  • Attack trees decompose complex threats into prioritizable sub-goals, making systematic defense planning possible
  • Hardware security concerns (trojans, side-channel attacks) require physical-layer defenses that complement software security measures

40.12 Further Reading

  • NIST SP 800-183: Networks of ‘Things’ – reference architecture and security model for IoT systems
  • OWASP IoT Security Project – community-maintained testing guides and vulnerability catalogs
  • IEC 62443 – industrial automation and control system security standard
  • RFC 6749: OAuth 2.0 Authorization Framework – delegated authorization for connected devices
  • NIST Cybersecurity Framework – visual risk management guides applicable to IoT deployments

40.13 What’s Next

Continue exploring IoT security topics:

Network Segmentation Security Fundamentals