Apply Threat Modeling Frameworks: Use STRIDE, DREAD, and attack trees to systematically identify IoT vulnerabilities
Identify Attack Surfaces: Map device, network, and cloud attack vectors in IoT architectures
Prioritize Security Risks: Assess threat severity based on likelihood, impact, and exploitability
Design Mitigations: Develop countermeasures for identified threats including authentication, encryption, and monitoring
Create Threat Models: Document comprehensive threat models for IoT system designs
Implement Defense in Depth: Apply layered security controls across the IoT stack
In 60 Seconds
IoT security threats encompass the full range of malicious activities that adversaries can direct against connected devices and the systems they participate in — from commodity attacks exploiting default credentials to sophisticated nation-state operations targeting industrial infrastructure. Understanding the IoT threat landscape is the starting point for all security engineering decisions: you cannot defend against threats you have not identified.
What is Threat Modelling? Threat modelling is a structured process for identifying potential security threats to an IoT system before attackers exploit them. Like planning home security based on what you own and your neighborhood’s crime rate, threat modelling systematically identifies: what you’re protecting (assets like devices and data), who might attack (threat actors from script kiddies to nation states), how they’d attack (attack vectors like network exploits or physical tampering), and how to defend (mitigations like encryption and access control).
Why does it matter? Fixing security vulnerabilities after deployment is 100x more expensive than designing security from the start. Threat modelling identifies weaknesses during the design phase when changes are easy and cheap. The STRIDE framework systematically uncovers threats: Spoofing (fake identity), Tampering (data modification), Repudiation (denying actions), Information Disclosure (data leaks), Denial of Service (making systems unavailable), and Elevation of Privilege (gaining unauthorized access). DREAD scoring then prioritizes which threats to fix first based on Damage potential, Reproducibility, Exploitability, Affected users, and Discoverability.
Key terms: | Term | Definition | |——|————| | STRIDE | Microsoft threat model framework: Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege | | DREAD | Risk assessment scoring: Damage, Reproducibility, Exploitability, Affected users, Discoverability (0-10 scale) | | Attack Surface | All possible entry points attackers can exploit (network ports, APIs, physical interfaces, user inputs) | | Attack Tree | Hierarchical diagram showing step-by-step paths attackers take to compromise systems | | Defense in Depth | Layering multiple independent security controls so breaching one doesn’t compromise entire system | | Residual Risk | Remaining risk after implementing mitigations that must be accepted or transferred through insurance |
Sensor Squad: Keeping Your Smart Toys Safe!
Hey there, future cyber heroes! Ever wonder why some smart devices need special protection? Let’s learn with the Sensor Squad!
Sammy the Sensor says: “Think of your smart home like a castle. The bad guys (hackers) are trying to sneak in through any door or window they can find!”
The Castle Defense Game:
Castle Part
Smart Home Part
How to Protect It
Front gate
Wi-Fi password
Use a super-secret password (not “password123”!)
Castle walls
Firewall
The firewall blocks sneaky visitors
Guards
Security cameras
Watch for anything suspicious
Secret codes
Encryption
Scramble messages so bad guys can’t read them
Lila the LED explains: “When you get a new smart toy, it comes with a default password like ‘admin’ or ‘1234’. That’s like leaving your house key under the doormat - everyone knows where to look! Always ask a grown-up to help change it.”
Max the Microcontroller asks: “What’s the easiest thing hackers look for?” Answer: Devices that still have their factory passwords! It’s like finding an unlocked door.
Bella the Battery reminds us: “Even superhero gadgets need updates! When your smart device asks for an update, that’s like giving it new armor to protect against the latest bad-guy tricks.”
Fun Fact: The Mirai botnet attacked over 600,000 devices - most of them had passwords like “admin” or “root”. Don’t let your devices join the bad-guy army!
MVU: Threat Modeling Fundamentals
Core Concept: Threat modeling systematically identifies security vulnerabilities before attackers exploit them by asking: what are we protecting, who might attack, how would they attack, and how do we stop them. Why It Matters: Fixing security flaws after deployment costs 100x more than designing security from the start; threat modeling catches weaknesses when changes are cheap. Key Takeaway: Use STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege) to systematically identify threats, then DREAD scoring to prioritize which to fix first.
11.2 Prerequisites
Before diving into this chapter, you should be familiar with:
Security and Privacy Overview: Understanding of the CIA triad, basic security principles, and IoT-specific attack surfaces provides essential context for identifying and modeling threats
Networking Basics: Knowledge of network protocols, communication layers, and data flow helps map attack vectors and entry points in IoT systems
Introduction to Privacy: Understanding privacy threats and regulatory requirements ensures threat models address both security and privacy risks
11.3 🌱 Getting Started (For Beginners)
11.3.1 What is Threat Modeling? (Simple Explanation)
Analogy: Think of threat modeling as “planning your home security based on what you own and where you live”.
Just like you wouldn’t install the same security for every home:
The diagram above shows attack vectors organized by entry point: Network, Mobile App, Cloud, and Physical access.
Defense-in-depth security model for IoT showing five concentric protection layers. Layer 1 Perimeter includes firewall, DDoS protection, and rate limiting. Layer 2 Network covers TLS/HTTPS, VPN segmentation, and IDS/IPS. Layer 3 Application handles authentication, input validation, and API security. Layer 4 Data provides encryption at rest, access control, and data masking. Layer 5 Device ensures secure boot, firmware signing, and tamper detection.
Figure 11.1: Defense-in-depth security model showing five layers: Perimeter (firewall, DDoS), Network (TLS, segmentation), Application (auth, validation), Data (encryption, access control), and Device (secure boot, tamper detection)
Attack chain timeline for IoT breach showing four phases: Reconnaissance (port scanning discovers open MQTT), Initial Access (default credentials admin:admin succeed), Lateral Movement (network enumeration, pivot to cloud API), and Data Exfiltration (extract sensor data to C2 server). Highlights detection opportunity windows at each phase where defenders can interrupt the attack.
Figure 11.2: Attack chain timeline showing typical IoT breach: reconnaissance, initial access via default credentials, lateral movement, and data exfiltration with detection opportunity markers
11.3.2.4 Step 4: Mitigate Threats (How to Stop Them?)
Attack Vector
Mitigation Strategy
Cost
Effectiveness
Default credentials
Change all passwords to strong unique ones
$0 (5 min)
⭐⭐⭐⭐⭐ Very High
Wi-Fi password cracking
Use WPA3, strong 20+ char password
$0 (if router supports WPA3)
⭐⭐⭐⭐ High
Phishing
Enable 2FA on all accounts
$0 (5 min)
⭐⭐⭐⭐ High
Physical access
Lock device in secure location, disable debug ports
$20 (lockbox)
⭐⭐⭐ Medium
Man-in-the-middle
Ensure devices use HTTPS/TLS
$0 (verify in settings)
⭐⭐⭐⭐ High
Account takeover
Strong password + 2FA + password manager
$0 (free tools available)
⭐⭐⭐⭐⭐ Very High
80/20 Rule: These 3 simple actions stop 80% of attacks:
✅ Change all default passwords (5 minutes)
✅ Enable two-factor authentication (5 minutes)
✅ Update firmware regularly (10 minutes/month)
11.3.3 Real-World Threat Modeling Failure
11.3.3.1 🏥 The Insulin Pump That Could Kill (2011)
Device: Medtronic insulin pumps (used by diabetic patients)
What security researcher Jay Radcliffe discovered:
The pump communicated wirelessly with a glucose monitor
No encryption on wireless commands
No authentication (any device could send commands)
Wireless commands work from 300 feet (parking lot, next room)
“What’s the impact?”
“Minor inconvenience”
Death (overdose or underdose of insulin)
“What’s the cost to secure it?”
“Too expensive”
Encryption: negligible cost, massive benefit
Lesson: “No one would attack this” is not a valid threat model. If it CAN be attacked, eventually someone WILL attack it.
Knowledge Check: Threat Modeling Basics
Question 1: What is the primary purpose of threat modeling?
To make devices run faster
To identify security vulnerabilities before attackers exploit them
To reduce manufacturing costs
To improve user interface design
Answer
B) To identify security vulnerabilities before attackers exploit them
Threat modeling is a proactive security practice that helps teams systematically identify potential threats during the design phase when fixes are cheapest to implement.
Question 2: In the insulin pump case study, which critical security control was missing?
A mobile app
GPS tracking
Authentication for wireless commands
Longer battery life
Answer
C) Authentication for wireless commands
The Medtronic insulin pump had no authentication, meaning any device could send commands wirelessly. This allowed attackers to potentially deliver lethal insulin doses from 300 feet away.
Question 3: According to the “80/20 Rule” mentioned, which THREE actions stop 80% of IoT attacks?
Buy expensive hardware, hire security guards, install antivirus
Use obscure protocols, hide devices, disconnect from internet
Encrypt everything, segment networks, hire penetration testers
Answer
B) Change default passwords, enable 2FA, update firmware regularly
These three simple actions - taking just minutes each - provide the highest return on security investment by eliminating the most common attack vectors used by opportunistic hackers.
11.3.4 The Four Key Questions
Every threat model answers these questions:
🔍 Threat Modeling Framework
What are we protecting? (Assets: data, physical systems, reputation)
Who wants to attack us? (Threat actors: hackers, competitors, nation-states)
How might they attack? (Attack vectors: network, physical, social engineering)
How do we stop them? (Mitigations: encryption, authentication, monitoring)
Bonus question: What happens if they succeed? (Impact assessment)
11.3.5 Quick Self-Check Quiz
🧠 Test Your Understanding
Question 1: You’re deploying 1,000 temperature sensors in a public park. They measure air quality and send data to a cloud dashboard. What’s the MOST likely threat?
Click to reveal answer
Answer:Opportunistic botnet recruitment (attackers scanning for default credentials to add devices to a botnet).
Why?
❌ Not industrial espionage (it’s public air quality data)
❌ Not sophisticated state-level attack (no sensitive data)
✅ Yes automated scans for default passwords (low-skill, high-volume)
Mitigation: Change default credentials, use certificate-based authentication, implement rate limiting.
Question 2: A smart lock manufacturer says: “We don’t need strong security because the lock is only worth $100. Who would bother hacking a $100 lock?”
What’s wrong with this reasoning?
Click to reveal answer
Answer: This ignores the value of what the lock protects (your home, belongings, safety).
Why this reasoning is flawed:
The lock may be $100, but the home it protects contains $50,000+ in belongings
An unlocked door allows physical access to other devices (computers, safes, etc.)
Privacy violation (knowing when you’re home/away)
Attacks scale: One attacker can hack 100,000 locks simultaneously (automated)
Correct threat model: Assess the value of assets protected by the device, not the device itself.
Question 3: You’re building a fitness tracker that collects heart rate and location data. Which regulation MOST likely applies?
Click to reveal answer
Answer:GDPR (if you have EU customers) and/or CCPA (if you have California customers), and potentially HIPAA if marketed for medical use.
Why?
GDPR: Applies to any personal data of EU citizens (location = personal data)
CCPA: Applies to California residents’ personal data
HIPAA: Only if the device is used for medical diagnosis/treatment (most fitness trackers are NOT HIPAA-covered, but medical-grade wearables are)
Lesson: Threat modeling includes regulatory compliance, not just technical threats.
Interactive: IoT Threat Model Builder
How It Works: Threat Modeling Process
Threat modeling systematically identifies security vulnerabilities through a structured five-step process:
Step 1: Define the System
Identify all components (devices, gateways, cloud services, mobile apps)
Map data flows between components
Document trust boundaries (where different security contexts meet)
List assets worth protecting (data, services, physical systems)
Step 2: Identify Threats Using STRIDE For each component and data flow, ask six questions: - Spoofing: Can someone fake an identity? - Tampering: Can data or code be modified? - Repudiation: Can actions be denied? - Information disclosure: Can data leak to unauthorized parties? - Denial of service: Can the system be made unavailable? - Elevation of privilege: Can unauthorized access be gained?
Step 3: Rate Threats with DREAD Score each identified threat on five factors (0-10 scale): - Damage potential - Reproducibility - Exploitability - Affected users - Discoverability Average the scores to get overall risk rating
Step 4: Select Mitigations
Prioritize threats by DREAD score (highest first)
For each threat, identify countermeasures (encryption, authentication, monitoring)
Calculate mitigation cost vs. expected loss
Accept residual risk for threats below acceptable threshold
Step 5: Document and Review
Create threat model document with all identified threats
Record mitigation decisions and residual risks
Review periodically (at least annually or when system changes)
Why This Works: The structured approach ensures no threat categories are overlooked, provides quantitative risk scores for prioritization, and creates an audit trail for security decisions.
11.3.6 What You’ll Learn in This Chapter
By the end of this chapter, you’ll understand:
✅ How to build a threat model from scratch (step-by-step process)
✅ Security decision trees for different risk levels
✅ Risk assessment frameworks (qualitative and quantitative)
✅ Common IoT attack patterns and how to defend against them
Time to complete: 60-90 minutes
Prerequisites: Basic understanding of security concepts helpful (but not required)
Threat modelling provides a structured approach to identifying, analyzing, and mitigating security vulnerabilities in IoT systems. By understanding attack vectors and implementing systematic defenses, organizations can significantly reduce their risk exposure and build more resilient IoT deployments.
Common Misconception: “Security Through Obscurity Works”
The Misconception: Keeping the system design secret makes it secure.
Why It’s Wrong:
Kerckhoffs’s principle: Security should depend only on keys, not secrecy
Attackers will reverse-engineer (it’s just a matter of time)
Determining the appropriate security level for your IoT deployment is critical for balancing protection, cost, and usability. This decision tree guides you through security requirement selection based on deployment context and risk tolerance.
Graph diagram
Figure 11.3: IoT Security Level Decision Tree: From Data Sensitivity to Cost Analysis
11.4.1 Decision Criteria Explained
1. Data Sensitivity Classification
The type of data your IoT system handles fundamentally determines security requirements:
Public data: Environmental sensors, traffic counts, air quality. No privacy concerns. Integrity and availability matter. Examples: Public weather stations, city traffic monitoring.
Internal/Business data: Operational metrics, equipment telemetry, building occupancy. Confidentiality matters for competitive reasons. Examples: Manufacturing line efficiency, energy usage patterns.
Personal data: User behavior, location, health metrics, identifiable information. Privacy regulations apply. Examples: Smart home devices, wearables, connected vehicles.
Critical/Regulated data: Financial transactions, healthcare records, safety systems, government information. Strict compliance mandatory. Examples: Medical devices, payment terminals, critical infrastructure.
2. Physical Security Context
Device accessibility impacts attack surface:
Exposed deployment: Public spaces, outdoor installations, unattended locations. High risk of physical tampering. Requires: Tamper detection, secure boot, encrypted storage. Examples: Smart city sensors, vending machines.
Controlled access: Buildings with security, restricted areas, supervised environments. Lower physical threat. Can reduce: Some hardware security measures. Examples: Office IoT, factory sensors behind fences.
3. Network Exposure
Connectivity model determines attack vectors:
Internet-facing: Direct cloud connectivity, public APIs. Maximum attack surface. Requires: Strong authentication, DDoS protection, API security. Examples: Consumer IoT, mobile apps.
Internal network only: Private networks, VPNs, air-gapped. Reduced external threat but insider risk remains. Can simplify: Some network security measures. Examples: Industrial OT networks, hospital internal systems.
4. Regulatory Compliance Requirements
Regulations mandate specific security controls:
GDPR (EU General Data Protection Regulation):
Applies to: EU citizens’ data, regardless of company location
Key requirements: Consent, data minimization, right to erasure, breach notification (72 hours)
Security mandates: Encryption, pseudonymization, privacy by design
Penalties: Up to 4% global revenue or 20M EUR
IoT implications: Smart home data, wearable health data, location tracking
HIPAA (Health Insurance Portability and Accountability Act):
Applies to: US healthcare data (Protected Health Information - PHI)
Key requirements: Access controls, audit logs, encryption, Business Associate Agreements
Security mandates: Technical, administrative, and physical safeguards
Penalties: Up to $1.5M per violation category per year
IoT implications: Remote patient monitoring, medical devices, health apps
PCI-DSS (Payment Card Industry Data Security Standard):
Applies to: Systems storing, processing, or transmitting cardholder data
Each level builds on the previous one, adding controls appropriate to the risk.
Basic security applies to public data with low risk, such as weather stations and public display boards. The threat model assumes the data itself is not sensitive, but the device should not be co-opted for attacks. Implementation includes TLS 1.2+ for data in transit, API key authentication, rate limiting, and a regular software update mechanism. At $1-5 per device and 1-2 weeks of implementation effort, this is the minimum viable security for any internet-connected device.
Standard security adds protection for internal business data – operational metrics, equipment telemetry, building occupancy – where confidentiality matters for competitive or operational reasons. Beyond the Basic level, this adds certificate validation on TLS connections, token-based authentication (JWT), encrypted local storage for sensitive data, and centralized logging with monitoring alerts. The cost rises to $5-15 per device with 1-2 months of development, reflecting the additional authentication infrastructure and key management required. Examples include building automation and asset tracking systems.
Enhanced security addresses personal data and business-critical systems where privacy regulations apply. TLS 1.3 with perfect forward secrecy prevents retroactive decryption if keys are later compromised. Certificate pinning blocks man-in-the-middle attacks even if a CA is compromised. OAuth 2.0 with refresh tokens provides robust user authentication, and full disk encryption protects data at rest. Annual security audits and intrusion detection become mandatory at this level. Cost reaches $15-40 per device with 2-4 months of effort. This is the appropriate level for smart home devices, wearables, and fleet management – any system handling personal behavioral data subject to GDPR or CCPA.
High security is required for regulated environments and high-value targets: financial services, critical infrastructure, and enterprise IoT. Mutual TLS (mTLS) ensures both device and server authenticate each other. Hardware Security Modules (HSMs) protect cryptographic keys from extraction even if the device is physically compromised. Hardware-backed secure boot prevents firmware tampering. Tamper detection triggers key erasure if the device enclosure is opened. A Security Operations Center (SOC) monitors for anomalies 24/7, and regular penetration testing validates defenses. At $40-100+ per device and 4-12 months of implementation, this level represents a significant investment justified by the value of the assets being protected.
Critical security applies to safety-critical systems where a security failure could endanger lives: medical implants, autonomous vehicles, defense systems, and nuclear facility controls. This requires FIPS 140-2 Level 3+ validated cryptography, formal mathematical verification of security properties, hardware root of trust with secure enclaves, zero trust architecture that verifies every request, and air-gapped or heavily segmented networks. An incident response team must be available around the clock. Compliance certifications (HIPAA, PCI-DSS, IEC 62443, Common Criteria) are mandatory. Cost reaches $100-500+ per device with 12-36 months of development – reflecting the extraordinary rigor required when human safety is at stake.
Level
Data Type
Auth Method
Key Storage
Cost/Device
Timeline
Basic
Public
API key
Software
$1-5
1-2 weeks
Standard
Internal
JWT tokens
Encrypted file
$5-15
1-2 months
Enhanced
Personal
OAuth 2.0 + MFA
Full disk encryption
$15-40
2-4 months
High
Regulated
mTLS
HSM
$40-100+
4-12 months
Critical
Safety
Formal verified
Secure element
$100-500+
12-36 months
11.4.3 Real-World Application Examples
Example 1: Smart Home Thermostat (Personal Data → Enhanced Security)
Requirements:
Data: Temperature settings, occupancy patterns, user schedules
Sensitivity: Personal data (behavioral patterns)
Exposure: Internet-facing (mobile app control)
Regulation: GDPR (if EU users), CCPA (if California)
Security Implementation:
Transport: TLS 1.3 for cloud communication
Authentication: OAuth 2.0 with Google/Apple Sign-In
Data storage: Encrypted local storage (AES-256)
Updates: Automatic OTA with signature verification
Privacy: Data minimization, user consent, opt-out options
Monitoring: Anomaly detection for unusual access patterns
Cost: $20/device security overhead
Compliance: GDPR-compliant data processing agreement
Example 2: Industrial Vibration Sensor (Critical → Safety-Critical Security)
Requirements:
Data: Machine vibration, temperature, operational status
Focus: Data integrity and availability over confidentiality
Knowledge Check: Regulatory Compliance
Question: A startup is building a wearable glucose monitor that continuously tracks blood sugar levels and sends alerts to patients’ phones. Which regulation(s) MOST likely apply?
GDPR only (it’s personal data)
HIPAA only (it’s health data in the US)
Both GDPR and HIPAA, plus potentially FDA cybersecurity guidance
PCI-DSS (if they accept payments)
Answer
C) Both GDPR and HIPAA, plus potentially FDA cybersecurity guidance
Explanation:
HIPAA: Applies because glucose data is Protected Health Information (PHI) in the US
GDPR: Applies if any EU citizens use the device (health data is “special category” under GDPR Article 9)
FDA: Medical devices require FDA 510(k) clearance and must follow FDA cybersecurity guidance
IEC 62443: May apply if used in clinical settings
Key insight: Medical IoT devices face the most complex regulatory landscape - always consult legal/compliance experts.
11.4.4 Edge Cases and Special Considerations
Warning: Over-Engineering Security
Not all IoT systems need maximum security:
Public environmental sensors: TLS + API key sufficient. Don’t need HSM.
Home automation: Enhanced security adequate. Government-grade overkill.
Tradeoff: Hardware Security Module (HSM) vs Software Cryptographic Libraries
Option A (HSM/Secure Element): Dedicated tamper-resistant chip stores keys in hardware (ATECC608A: $0.50-2/unit), provides 100,000+ ECDSA signatures/second, keys never leave silicon (immune to software exploits), FIPS 140-2 Level 3 certification available, adds 2-4ms latency per cryptographic operation, requires I2C/SPI bus integration.
Option B (Software Crypto Libraries): Keys stored in flash/RAM (vulnerable to cold boot attacks, firmware extraction), mbedTLS/wolfSSL run on main MCU, 50-500ms per RSA-2048 operation on Cortex-M4, zero additional BOM cost, flexible algorithm support, keys exposed during memory dumps or debug access.
Decision Factors: Choose HSM when: physical access is possible (outdoor sensors, public kiosks), regulatory compliance requires hardware key protection (PCI-DSS, HIPAA), device lifetime exceeds 5 years, attack surface includes sophisticated adversaries. Choose software crypto when: cost-sensitive high-volume deployments (>100K units), devices are in physically secure environments, rapid prototyping/iteration needed, key compromise impact is low (replaceable API keys).
Tradeoff: Edge Authentication vs Cloud Authentication
Option A (Edge/Gateway Authentication): Device authenticates to local gateway using pre-shared keys or certificates, gateway validates credentials in <5ms (local lookup), works offline when internet unavailable, gateway stores credential database (attack surface: ~100-1000 devices), firmware update required for credential changes, latency: 5-20ms.
Option B (Cloud Authentication): Device authenticates directly to cloud identity provider (AWS IoT Core, Azure IoT Hub), OAuth 2.0/JWT tokens with 1-24hr expiry, centralized policy enforcement across global fleet, requires internet connectivity for every authentication, latency: 100-500ms depending on region, scales to millions of devices with managed infrastructure.
Decision Factors: Choose edge authentication when: operations must continue during internet outages (industrial control, safety systems), latency-critical applications (<50ms response required), bandwidth costs prohibitive (cellular IoT at $0.01/KB), privacy regulations restrict cloud data transmission. Choose cloud authentication when: centralized audit logging required for compliance, fleet spans multiple sites/gateways, rapid credential revocation needed (employee termination), zero-trust architecture mandates continuous verification.
11.4.5 Further Reading
For comprehensive security guidance:
Threat Modeling: See remaining sections in this chapter
Encryption: See Encryption chapter
IoT Security: See IoT Devices and Network Security chapter
Privacy: See Introduction to Privacy chapter
Standards: NIST Cybersecurity Framework, OWASP IoT Top 10
Worked Example: Threat Modeling a Smart Thermostat Deployment
Scenario: A university is deploying 500 smart thermostats (Ecobee SmartThermostat Enhanced) across dormitory rooms and administrative buildings. Each device connects via the campus Wi-Fi network (802.1X enterprise authentication), communicates with Ecobee cloud servers over HTTPS, and exposes a local REST API for building management system integration.
Step 1: Identify Assets
Temperature/occupancy sensor data (reveals room occupancy patterns)
Wi-Fi credentials (802.1X certificate-based, stored in device)
User comfort preferences and schedules (privacy-sensitive behavioral data)
Building HVAC control (safety-critical - prevents overheating/freezing)
Step 2: Apply STRIDE to Each Component
Component
Threat Category
Specific Threat
DREAD Score
Wi-Fi interface
Spoofing
Rogue AP impersonation captures credentials
D=8, R=9, E=6, A=500, D=7 → 7.8
Cloud API
Information Disclosure
Unencrypted occupancy data leaks student schedules
D=6, R=8, E=5, A=500, D=6 → 6.2
Local REST API
Elevation of Privilege
No authentication allows unauthorized temp changes
D=5, R=9, E=9, A=500, D=8 → 7.6
Firmware update
Tampering
Unsigned firmware allows persistent backdoor
D=10, R=7, E=4, A=500, D=3 → 6.0
Step 3: Prioritize and Mitigate
Wi-Fi spoofing (7.8): Implement certificate pinning for Ecobee cloud (prevents MITM even if rogue AP trusted). Estimated cost: $2,000 firmware development.
REST API elevation (7.6): Require API key authentication with IP whitelisting to building management VLAN. Cost: $5,000 network segmentation + $1,500 API gateway.
Data disclosure (6.2): Negotiate data processing agreement with Ecobee limiting occupancy data retention to 24 hours. Cost: $0 legal/contractual.
Firmware tampering (6.0): Enable secure boot and verify Ecobee signs all updates with ECC P-256. Cost: $500 verification testing.
Total security investment: $9,000 for 500 devices = $18/device. Compare to incident response cost: One privacy breach affecting 500 students = estimated $150,000 (notification, credit monitoring, legal fees, reputation damage). Risk reduction ROI = 16:1.
Decision Framework: Selecting Security Level for IoT Deployments
Use this framework to match security investment to deployment risk profile:
Criteria
Basic (Tier 1)
Standard (Tier 2)
Enhanced (Tier 3)
Critical (Tier 4)
Data Sensitivity
Public/Anonymous
Internal business
Personal identifiable
Healthcare/Financial
Physical Access
Controlled facility
Semi-public (retail)
Fully public
Hostile environments
Regulatory
None
GDPR/CCPA
HIPAA/PCI-DSS
FDA/IEC 62443
Device Count
<100
100-10,000
10,000-100,000
>100,000
Cost/Device
$5-15
$15-40
$40-100
$100-500+
Best For
Office sensors
Smart retail
Consumer wearables
Medical implants
Selection Process:
Start with data sensitivity (highest compliance requirement)
Adjust up if physical access is public/hostile
Adjust up if device count >10,000 (scale amplifies impact)
Adjust down if deployment is temporary (<6 months)
Common Mistake: Selecting based on device cost rather than asset value. A $20 smart lock protecting a $500,000 home requires Enhanced security, not Basic.
Common Mistake: Assuming “Air-Gapped” Means Secure
What practitioners do wrong: Deploying IoT sensors on isolated VLANs or physically separated networks and assuming this eliminates security risks, then applying minimal security controls (default passwords, no encryption, outdated firmware).
Why it fails: “Air-gapped” networks are rarely truly isolated. Attackers find bridges: - USB/maintenance ports: Technicians plug infected laptops during maintenance, bridging the gap - Wireless leakage: Wi-Fi/Bluetooth radios that weren’t disabled provide entry points - Supply chain: Devices arrive pre-compromised from manufacturer or distributor - Human error: A single misconfigured VLAN or accidental cross-connection breaks isolation
Real-world example - Stuxnet (2010): Iran’s Natanz nuclear facility used air-gapped networks for centrifuge control. Attackers delivered malware via infected USB drives carried by contractors. Once inside, Stuxnet spread through the isolated network, sabotaging 1,000+ centrifuges. The air gap provided false confidence, reducing detection vigilance.
Correct approach: Defense in depth applies to isolated networks too: 1. Assume breach: Apply same authentication/encryption as internet-facing systems 2. Zero trust architecture: Verify every connection, even internal-to-internal 3. Strict USB policies: Whitelist devices, scan on isolated systems before use 4. Network monitoring: Detect anomalous behavior even within “trusted” zones 5. Regular audits: Verify isolation remains intact (no accidental bridges)
The nuclear facility thought air-gapping was sufficient. Apply the security controls as if the network were exposed to the internet.
Concept Relationships
Concept
Relates To
Nature of Relationship
Threat Modeling
STRIDE Framework
STRIDE provides systematic checklist for threat identification
DREAD Scoring
Risk Prioritization
Numeric scores enable objective comparison of threats
Attack Surface
Entry Points
Each interface (network, physical, API) is potential attack vector
Defense in Depth
Layered Security
Multiple independent controls prevent single point of failure
Security Levels
Data Sensitivity
Protection requirements scale with asset value
Threat Actors
Capability Assessment
Actor skill level informs realistic threat scenarios
1. Focusing on sophisticated threats while neglecting commodity attacks
Nation-state attacks receive significant media coverage but commodity attacks using known exploits against default credentials account for the vast majority of actual IoT incidents. Ensure that defences against common, unsophisticated attacks are solid before investing in advanced threat protection.
2. Assuming IoT threat landscape is static
IoT attack techniques, tools, and threat actors evolve continuously. A threat assessment from 2020 is incomplete in 2025. Review the threat landscape at least annually and update threat models when significant new attack techniques emerge.
3. Treating IoT threats as purely technical problems
Many IoT security incidents have social engineering, supply chain, or operational security (OpSec) components. A purely technical defence that ignores human factors and physical security leaves significant attack surface unaddressed.
4. Not considering the attacker’s goal when assessing threats
The same vulnerability (default credentials) is exploited for very different goals (botnet recruitment vs industrial espionage) by different attackers. Understanding attacker goals is essential for prioritising which threats matter most for your specific deployment.
Label the Diagram
💻 Code Challenge
Order the Steps
Match the Concepts
11.5 Summary
This chapter introduced the fundamentals of threat modeling for IoT systems:
Key Concepts Covered:
Threat Modeling Process: Systematically identifying what you’re protecting (assets), who might attack (threat actors), how they’d attack (attack vectors), and how to defend (mitigations)
STRIDE Framework: Microsoft’s six threat categories - Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege
DREAD Scoring: Risk prioritization based on Damage, Reproducibility, Exploitability, Affected users, Discoverability
Security Decision Tree: Matching security levels (Basic to Critical) with data sensitivity, deployment context, and regulatory requirements
Critical Takeaways:
“No one would attack this” is never valid - If it CAN be attacked, someone WILL attack it
80/20 Rule: Change default passwords, enable 2FA, and update firmware regularly to stop 80% of attacks
Value what you protect, not the device - A $100 smart lock protects a $50,000+ home
Defense in Depth: Layer security controls so breaching one doesn’t compromise the entire system
Security through obscurity fails - Use proven standards (TLS, AES) and assume attackers know everything except your keys
Real-World Lessons:
Mirai botnet: 600,000+ devices compromised due to default credentials
Medtronic insulin pump: No authentication allowed life-threatening remote attacks
Fix security during design (cheap) not after deployment (100x more expensive)
Final Knowledge Check: Security Level Selection
Scenario: You’re deploying smart energy meters in residential homes that collect real-time electricity usage data (showing when people are home/away). The meters connect via cellular to a cloud dashboard. Which security level is most appropriate?
Basic Security (TLS + API key)
Standard Security (JWT tokens + encrypted storage)
Not Critical: Not safety-critical or healthcare data, so FIPS certification overkill
Enhanced security provides: TLS 1.3 for transport, OAuth 2.0 for authentication, encrypted storage, annual security audits - appropriate protection for the risk level without over-engineering.
11.6 Knowledge Check
Quiz: Threat Modeling Fundamentals
Putting Numbers to It: Threat Landscape Quantification
Attack frequency follows a Poisson distribution for opportunistic attacks, modeled as:
\[P(k \text{ attacks in time } t) = \frac{(\lambda t)^k e^{-\lambda t}}{k!}\]
where \(\lambda\) = attack rate (attacks per unit time).
Worked Calculation: Expected Attacks on 10,000 IoT Devices
Given: Internet-exposed IoT deployment scanned by automated attack tools
Step 1: Establish baseline attack rate - Industry data (Shodan + honeypot analysis): \(\lambda = 2.4\) attacks/device/day
Step 2: Calculate probability of at least one attack in 30 days \[P(k \geq 1) = 1 - P(k = 0) = 1 - e^{-\lambda t}\]\[P(k \geq 1) = 1 - e^{-2.4 \times 30} = 1 - e^{-72} \approx 1.0\]
Result: 100% probability of attack within 30 days per device
Result: Preventive security investment yields 20:1 return by avoiding compromise costs. Attack probability approaches 1.0 for internet-exposed devices, making “if” questions into “when” questions.
In practice: Traditional IT assumes attacks are rare events. IoT devices face continuous automated scanning (Shodan indexes 500M+ devices). Mathematical modeling proves that default credentials guarantee compromise, not just increase risk.
Interactive Calculator: IoT Attack Risk & ROI
Try adjusting the parameters to see how different deployment scenarios affect attack probability and security investment ROI:
This interactive calculator demonstrates how attack frequency, device count, and security investment interact to determine both risk exposure and the economic value of preventive security measures.
::
::
11.7 What’s Next
If you want to…
Read this
Learn systematic threat modelling to address this landscape