to make bidirectional full-duplex comunications securely for iot devices
Project description
Secured IOT Socket Server
- Time based verification
- TLS/SSL
- Device Validation
ABOUT
IOT Socket Server handle multiple clients (with unique deviceID and its key) simultaneously for bidirectional communication.
It is similar to websocket. Here we can handle each client individually from there device id.
IOT devices like Raspberry can also use this module as client with IOTSocketClient module.
How is it secured ?
To prevent Replay attacks and device cloning attacks.
For every data transmission from client to server or vice versa there is a time stamp which is compared with server/client present time. If the time doesn't match (tolerance of -2 sec) or if there is any reused time then socket is closed.
By using these headers for every transmission, IOT devices over WiFi can also be secured.
NOTE:
- Make sure the device time is in sync with server time (use RTC)
- Re-establish client socket connection every 24 hours
- SSL key pinning on client side.
- Verify device id and key from database
- Client socket will be closed if there is no data for 90 sec
Example Server
'''
Developed by Abhijith Boppe - linkedin.com/in/abhijith-boppe/
'''
from IOTSocket import IOTSocketServer, IOTSocketServerSSL, IOTSocket
import time
host = "127.0.0.1"
port = 9000
# give certificate path and key path
certfile_path = "/user/cert.pem"
keyfile_path = "/user/cert.key"
delimiter = '\r\n#*\r\n'
# give some insecure data te be filtered and sanitized to ''
lst_of_data_to_remove = [delimiter]
prev_call = 0
# this function will be called recursively to check if server want to push any data
def from_server_to_client():
'''
create a FIFO named pipe, make your backend application like PHP
to write into it and you return a list. Like: ['id1 data1', 'id2 data2', 'id3 data3', .....]
Ex: ['23234 ON SWITCH 1','23235 OFF LIGHT','232365 GET ALL SENSOR VALUES']
(id must be numaric values only)
'''
return []
class handleEachClientHere(IOTSocket):
def DeviceVerify(self, id_, key): # 'id_' - int , 'key' - string
'''
This method is called when a new client is connected.
Verify whether device id and key matches in database records
and check if it is activated.
(Check from DB)
'''
return 1 #return True if verified successfully else false
def handleMessage(self, id_, data):
'''
handle client id and data for further processing.
create a fifo named pipe and pass the data to your
backed application
(make sure u remove delimeters and other vulnerable strings which effect the backend application)
'''
for i in lst_of_data_to_remove: # remove delimiters/data, if any are present in client data to prevent clashes
data.replace(i, '')
print(id_, data)
def handleClose(self, error_repo=''):
'''
handle error if any during socket handling
error start with "ERROR: "
and normal socket close will end with normal message
'''
if "ERROR:" in str(error_repo):
print(error_repo)
else:
pass
#print(error_repo)
server = IOTSocketServer(host, port, from_server_to_client,handleEachClientHere) # without ssl
# server = IOTSocketServerSSL(host, port, from_server_to_client, handleEachClientHere, certfile = certfile_path, keyfile = keyfile_path)
server.serveforever()
Example client
'''
Developed by Abhijith Boppe - linkedin.com/in/abhijith-boppe/
client for raspberry
'''
from IOTSocket import IOTSocketClient as sock
import time
host = '127.0.0.1'
port = 9000
device_id = '1234567890'
device_key ='1432qrzd23'
certfile_path = "/user/cert.pem" # for key pinning (certificate pinning)
prev_call = 0
def someThingtoSend():
'''
this function is called recursively.
read data from sensor and return data
'''
global prev_call
now = time.time()
if ((now - prev_call) > 10) or prev_call == 0:
example = 'temp=33.5&humid=40%'
prev_call = now
return example
else:
return ''
def handleCmdsFromServer(data):
'''
This function is called when ever there is
data/command from the server.
'''
print(data)
while 1: # reconnect if socket is closed
try:
sock.connectionSet(host,port,device_id,device_key,Encrypt=False, cert_path= certfile_path) # set IOT Socket connection with valid Device ID and Key.
# Continiously check for receiving / tansmiting of data
while 1:
data = someThingtoSend()
if data != '':
sock.sendData(data) # send data to server if data is available to send
rcv_data = sock.recvData() # receive data from server if available
if len(rcv_data) > 5:
handleCmdsFromServer(rcv_data) # handle your data here
except Exception as n:
print(n)
Additional Information
There is no hand shake. Connection is established directly on 1st request from client. Make sure the client and server time are in sync.
Read/Write to your application from using fifo named pipe recursively without closing.
Please go through the code for better understanding of the protocol.
License & copyright
© Abhijith Boppe, Security analyst
linkedin.com/in/abhijith-boppe
Licensed under the MIT License
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file IOTSocket-0.3.3.tar.gz
.
File metadata
- Download URL: IOTSocket-0.3.3.tar.gz
- Upload date:
- Size: 8.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.22.0 setuptools/45.2.0 requests-toolbelt/0.9.1 tqdm/4.42.1 CPython/3.7.4
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | b68cb8796772cfda7dd503f87ada635bb3818548cfb836e5af740f5508e5388f |
|
MD5 | aaacbd06985dadae4eb9bb41846dd2e1 |
|
BLAKE2b-256 | 8b8d149ba1872a0f214c4c8a747dbaec3d86e78c36d969f7ee957d3ac4378503 |
File details
Details for the file IOTSocket-0.3.3-py2-none-any.whl
.
File metadata
- Download URL: IOTSocket-0.3.3-py2-none-any.whl
- Upload date:
- Size: 10.2 kB
- Tags: Python 2
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.22.0 setuptools/45.2.0 requests-toolbelt/0.9.1 tqdm/4.42.1 CPython/3.7.4
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | a3ddcdf5091da756219286a6ca5846741002f66ca809a8082df628ce21409511 |
|
MD5 | 4c97cad648275eff461843a23dba94d2 |
|
BLAKE2b-256 | e48f5c7b7e3a0c84b9893dc1f2bc1d2473f46d988f2cfd3184dde0e4642eee38 |