Web-Based Secure Remote Access to Iot Edge Devices

Web-Based Secure Remote Access to Iot Edge Devices

How to Provide Secure Remote Access to IoT Edge Devices via Web, SSH and Remote Desktop Secure remote access to IoT edge devices is one of the fundamental building blocks of the Internet of Things. End users want to access and manage their devices via web or mobile app, service partners need access to devices installed at remote locations, and product sup- port teams need to be able to log-in to devices installed at customer sites. Web-based user interfaces are standard in IoT edge network devices behind NAT routers or frewalls. How- devices and connected embedded systems, used for ever, as detailed in the table at the end of this white confguration, control and monitoring of devices from paper, both technologies have severe drawbacks relat- PCs, smart phones or tablets. Modern web-based user ed to security and complexity, especially when being interfaces are powerful, visually attractive and easy to used with IoT edge devices. For this reason, Applied use. Since their only requirement is a HTTP(S) connec- Informatics has created a new technology that is a tion between the web browser and the web server great alternative to port forwarding and VPN. running on the device, they are perfectly ftted for re- mote access scenarios. WEB-BASED REMOTE ACCESS TO IOT EDGE DEVICES WITH REMOTE MANAGER However, for this to work, the web browser on the macchina.io Remote Manager enables easy and se- client PC or mobile device must be able to create a cure remote access to the web server and other TCP- network connection to the IoT device’s web server. This based services such as secure shell (SSH) or remote is only possible if the IoT device is located in the same desktop (VNC, RDP) of an IoT device, even if the device network as the device running the web browser, if the is located in a private or mobile network behind a NAT networks containing the client and server are linked, or router or frewall. How this technology works will be if the IoT device can be directly reached over the inter- explained in the following. net. Unfortunately, this is rarely the case in practice. IoT edge devices in the feld are often connected to pri- vate networks behind NAT routers or frewalls. This is Application Scenarios especially true for industrial IoT devices, which are typ- Remote access to IoT gateways, edge computing de- ically located behind a NAT router. Also, devices con- ▶︎ vices, data loggers, metering and monitoring devices, nected to a mobile 4G/LTE network in most cases do e.g. in renewable energy, environmental monitoring, not have public IP addresses and thus are not directly traffic, transportation and infrastructure, etc. reachable. This means that while these devices can ▶︎ Remote access to mobile devices for data acquisition, open connections to servers on the internet, it is not tracking, feet management, etc. possible to access the device’s web server from the ▶︎ Remote support, maintenance and servicing of con- outside, unless additional measures are taken. sumer electronics, home/building automation, HVAC devices, industrial equipment, etc. Port forwarding and Virtual Private Network (VPN) are ▶︎ Remote access to IP network cameras and DVRs widely known and established technologies for en- ▶︎ Remote access to security and access control systems abling internet-based remote access to computers and Firewall / NAT Remote Manager Secure Tunnel HTTP, SSH, VNC Remote Access via Secure Virtual Connection Web/Mobile Clients IoT / Edge Device HOW REMOTE MANAGER WORKS in the HTTP request. The mechanism relies on a wild- card DNS record in the DNS server which resolves all macchina.io Remote Manager is based on standard requests for *.my-devices.net to the Remote Manager internet technologies, specifcally, HTTPS and Web- server remote.my-devices.net. The Remote Manager Sockets. The IoT device needs to run a program called server can then use the Host header in the HTTP re- WebTunnelAgent that opens and maintains a secure, quest together with an internal table to associate the TLS-protected and always-on WebSocket connection request with a device (and its tunnel connection). to the Remote Manager server running in the cloud. Once the connection between the device and the Re- RUNNING THE REMOTE MANAGER SERVER mote Manager server has been established, the Re- mote Manager server uses this connection to send There are multiple options for running the Remote (“tunnel”) HTTP requests and other TCP-based network Manager server. It can be deployed on an internet-fac- traffic to the device. ing server in a private datacenter (on-premises), or it can run on a virtual private server (VPS) provided by a Where do these HTTP requests come from? The Re- cloud service provider such as Amazon (EC2), Azure or mote Manager server also contains a web server, DigitalOcean. Running the Remote Manager server can which accepts requests from clients (web browsers). also be outsourced to a dedicated service provider. These requests are then simply forwarded to the de- Multiple Remote Manager servers can run in a load- vice, using the device’s tunnel connection. balancing setup, making it possible to handle 100.000s or even millions of connected IoT devices. Setting up the initial tunnel connection between the device and the Remote Manager server is almost al- SECURITY AND PRIVACY GUARANTEED ways possible as long as the device can access the in- Since the Remote Manager server only transparently ternet. Since the tunnel connection opened by the forwards HTTP requests and TCP connections, but does device uses standard HTTPS and WebSocket protocols, not store any data passed through it (except for op- it is very frewall-friendly and even works through an tional caching of images and style sheets in order to intermediate HTTP proxy server. improve performance), macchina.io Remote Manager IDENTIFYING AND ADDRESSING DEVICES does not introduce any additional data security and privacy risks – especially if the Remote Manager server In a typical usage scenario, more than one device will is operated in a private data center. Of course, both the be connected to a Remote Manager server. In fact, ten connection between the device and the Remote Man- thousands of devices could be connected to a single ager server, as well as the connection between the server. Therefore, when the Remote Manager server client (web browser) and the Remote Manager server receives a HTTP request from a client, it needs to fnd are encrypted and secured with state-of-the-art TLS. out to which device the request must be forwarded. This is done via the URL sent from the client to the Re- A great advantage of this technology is that it is inher- mote Manager server (e.g., http://dev1.my-devices.net) ently secure. Since the device does not need to have Technology Advantages Disadvantages macchina.io Remote Manager ▶︎ based on proven and proxy/frewall- ▶︎ macchina.io Remote Manager agent friendly WebSocket protocol software must be integrated into ▶︎ can be used without changes to the device, or a gateway device must be existing network infrastructure used to integrate legacy devices ▶︎ supports secure, encrypted (TLS) ▶︎ some TCP-based protocols cannot and authenticated connections be forwarded (e.g., FTP) ▶︎ secure forwarding of most TCP- ▶︎ cannot be used with UDP-based based protocols, not just HTTP, in- protocols cluding SSH for remote shell and VNC/RDP for remote desktop access ▶︎ the Remote Manager server can be operated in the cloud ▶︎ high scalability, up to ten thousands of devices per Remote Manager server instance (multiple servers can be clustered to increase capacity up to millions of devices) ▶︎ integrated user management and detailed role-and permission-based access control Port Forwarding ▶︎ simple and widely supported by NAT ▶︎ NAT router confguration for port routers forwarding can be complex, espe- ▶︎ allows access to any TCP or UDP- cially if multiple devices must be based network service provided by accessible (every device needs a the device unique public port number) ▶︎ a Dynamic DNS service is needed if the NAT router does not have a static public IP address ▶︎ public IPv4 addresses are becoming scarce ▶︎ the device is directly exposed to the internet – very high risk and danger of denial-of-service and other kinds attacks Virtual Private Network ▶︎ the device is directly integrated into ▶︎ VPNs may be blocked by network a remote network using a secure provider or legally restricted tunnel through the internet ▶︎ necessary network and VPN server ▶︎ secure, encrypted connection infrastructure is difficult to setup ▶︎ proven, standardized and widely and to maintain, especially if lots of available technology devices must be integrated ▶︎ all clients must have access to VPN in order to access the devices – there- fore not suitable for end-user access ▶︎ additional measures must be taken to isolate devices in the VPN from one another and to prevent users from accessing devices they should not have access to any open ports to the internet, there is no danger of Manager server requires proper authentication of the denial-of-service or other kinds of attacks against the user before forwarding requests to the device. Also, device. Requests to the device can only be sent devices must authenticate themselves against the Re- through the Remote Manager server, and the Remote mote Manager server when setting up the tunnel con- nection. Device authentication is done through a The Remote Manager server optionally supports LDAP shared secret (password, or challenge-response) or for user authentication. certifcate. SECURE REMOTE ACCESS MADE EASY USER ACCOUNTS, ROLES AND PERMISSIONS macchina.io Remote Manager is a great and secure The Remote Manager server supports user account alternative to technologies like NAT port forwarding management features and role- and permission-based and virtual private networks to enable easy and secure access control, making it easy to specify which users remote access to IoT devices via web, shell or remote may access and manage which devices.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    4 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us