security and privacy challenggpes in open source software

26
Security and Privacy Security and Privacy Challenges in Open Source Software IoT Pl tf kd l k Platforms Arkady Zaslavsky DIGITAL PRODUCTIVITY FLAGSHIP (DPF) Securing Internet of Things (IoT) Workshop UNSW, Sydney, November 18, 2014

Upload: others

Post on 24-Nov-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Security and Privacy Security and Privacy Challenges in Open g pSource Software IoTPl tf

k d l k

PlatformsArkady Zaslavsky

DIGITAL PRODUCTIVITY FLAGSHIP (DPF)

Securing Internet of Things (IoT) WorkshopUNSW, Sydney, November 18, 2014

Outline

Setting the scene Setting the scene - IoT

Privacy & security Privacy & security challenges in IoT

Op I T OpenIoT CAS Demo Conclusion

based  on standard & 

interoperable communication

where physical &

virtual “things” communication protocols

ghave identities, 

physical attributes, 

Internet ofA dynamic global network  infrastructure 

with self

Internet of Thingswith self 

configuringcapabilities 

virtual 

ThingsIoT

are seamlessly

personalities,  use  intelligent interfaces, 

andseamlessly 

integrated into the information 

network.

Why is IoT security challenging ?

Wireless communication

Physical insecurity

Constrained devices 

Potentially sensitive data

Lack of standards Lack of standards

Heterogeneity: weakest link problem

A systems not software problem A systems, not software problem

Classic web / internet threats

Identity management & dynamism 

Inconvenience and cost

Categorisation of topics and technologies in the IoT

7 out of 10 fear security implications of IoT

http://www.techrepublic.com/article/7-out-of-10-fear-security-implications-of-internet-of-things/, Frank Ohlhorst August 20, 2014

IoT security & privacy roadmap – EU takeBefore 2010 Security mechanisms and protocols definedS it h i d t l f RFID d WSN d i Security mechanisms and protocols for RFID and WSN devices

2010‐2015User centric conte t a are pri ac and pri ac policies User centric context‐aware privacy and privacy policies

Privacy aware data processing  Virtualisation and anonymisationy

2015‐2020 Security and privacy profiles selection based on security and privacy needs Privacy needs automatic evaluation Context centric security

Beyond 2020 Self adaptive security mechanisms and protocols

Vision and Challenges for Realising the Internet of Things, March 2010

Privacy Legal Framework

Data Protection Directive 95/46/EC, collecting and processing the personal data of individuals in one of the following (laid down bypersonal data of individuals in one of the following (laid down by Article 7) : … Where the individual concerned, (the 'data subject'), has unambiguously given his or her consent, after being adequately informed; or 

Reform Directive for Data Protection, January 2012: Whenever consent is required for data processing, it will have to be given explicitly, rather than be assumed.p y,

OpenIoT FactsheetContract No.:

http:\\www.openiot.eu

Linked DataCloud ComputingContract No.: 287305Objective: ICT-2011.1.3Internet-connected Objectsj

Coordinator:NUIG-DERI, Galway, Ireland Management

Contact Person:Dr. Martin SerranoDERI NUI GalwayIDA Business

Data Privacyand

SecurityPark Lower Dangan, Galway, Ireland

EC Contribution 2,455,000.00

Sensor Mobility

Open SourceInternet of Things

EC Contribution2,455,000.00 Euro

Project Start Date:01 Dec j2011Duration:36 months

Open Source Cloud Solution for the Internet of Open Source Cloud Solution for the Internet of ThingsThings

OpenIoT General VisionOpenIoT providing a cloud-based middleware infrastructure in order to deliver on-demand access to IoT services, which

ld b f l t d lti l i f t t idcould be formulated over multiple infrastructure providers. (such as smart cities and smart enterprises)

OpenIoT User (Citizen, Corporate)

Step 1: Sensing-as-a-Service

Request

Step 3: Service Provisioning

(Utility Metrics)

Knowledge‐Based Future Internet Step 2:

Sensor/CloudFormulation

Infrastructure’s provider(s) (e.g., Smart City)

Domain #1 Domain #N

OpenIoT Open Source Project

• http://github.com/openiot/OpenIoTl f

Open • Open Source Release of OpenIoT software (1 Oct, 2014, release 2.0)

pSource

• OpenIoT will be released under LGPL  (Business Friendly)License • Ensures compatibility with background libraries/projects

License

• Master‐governed planning• Masters (OpenIoT partners) defined Governance ( p p )for major subprojects

Governance

OpenIoT and Standards

• Use and Enhancement of W3C SSN Ontology• Standardized Solution for Dynamic DiscoveryW3C • Standardized Solution for Dynamic  Discovery of Sensors and Internet‐Connected Objects (ICO)

W3C 

• Open Architecture for IoT/Cloud IntegrationOGC • Best Practice PaperOGC

• RESTful access to sensors and ICO (CoAP)• Implementation of Driver/Virtual Sensor inRESTful • Implementation of Driver/Virtual Sensor in GSN

RESTful

High Level Architecture

Overview of (Supported) OpenIoT Capabilities

Visual IoT Service

What can I do with OpenIoT?

Dynamic 

Service Definition & Deployment IoT Service 

VisualizationSensor/ICO Discovery

Visualization (via 

Mashups)

/

p )

IoT Platform Architecture 

&

Sensor/ICO Deployment 

&

Resource Management 

and& Capabilities

& Registration

and Optimization

Scenarios – Use Cases

Community sensing for large scale (collaborative)   e‐Science ExperimentsScience Experiments  Phenonet

Enabling Service Platform for Resilient City Services  Smart Campus  Silver Angel Silver Angel Crowd Sensing

Intelligent Manufacturing and Logistics  Smart Industry 

OpenIoT IDEse

ntPr

es

e

Dis

cove

r

Con

figur

e

rese

nt

uthe

ntic

ate

D CPAu

tor

efin

e

Mon

it

De

Pres

ent

CAS - Central authorization d h and authentication service

OpenIoT Security and Privacy 

Proper access control by means of “sticky” policies

Accountability on data access through logging of actions

Safe storage by means of encryption and with durability guarantees

Confidentiality through encrypted communication

User‐side privacy leakage control through Privacy EnhancingUser side privacy leakage control through Privacy Enhancing Technologies Automatically configured based on a SLA

OpenIoT Architecture

• WP5‐T5.3 Secure, Trustworthy and Privacy Friendly InteractionsFriendly Interactions 

Security & PrivacyPrivacy Module

Security & Privacy Module

• OpenIoT CAS: CentralisedAuthentication and

OpenIoTCAS

Authentication and Authorisation server

O I T S it C lSecurity & Privacy 

OpenIoTSecurity 

• OpenIoT Security Console: Web application for Users, roles and Permissions 

ModuleConsole

Security 

management

• Security Client API & TagSecu tyClient API & Tag libraries

• Security Client API & Tag Libraries: Enable security and CAS integration in all OpenIoT modules

OpenIoT CAS

• Central authorization and authentication service for all OpenIoT applicationsp pp

• User credentials checked and maintained l b CASonly by CAS

• Token‐based authorization

• Based on OAuth2.0 framework  

OpenIoT Security Management Console

• Registering OpenIoT services• Managing permissions and roles• Assigning/revoking permissions to/from users

OpenIoT Client API & Tag Libraries

• Client API to enable security in all OpenIoT Application and Web Services

• Java classes, provide common authentication and th i ti th dauthorization methods

• CAS interaction and forwardingg

OpenIoT Client API & Tag Libraries

• Tag Libraries for JSF (Java Server Faces) and JSP

• Ready to use in Web applications

• Simple integration CAS interaction behind the scenesSimple integration, CAS interaction behind the scenes

AcceDEMO

ess conttrol using the OpenIooT

CAS

© Copyright 2014OpenIoT Consortium

Thank you !Dr Arkady Zaslavsky, ProfessorSenior Principal Research ScientistEmail: [email protected] y