will internet of things (iot) be secure enough?

69
Will Internet of Things be Secure Enough ? https://www.youtube.com/user/dastikop Ravindra Dastikop http://dastikop.blogspot.in

Upload: ravindra-dastikop

Post on 16-Jul-2015

367 views

Category:

Education


1 download

TRANSCRIPT

Page 1: Will Internet of Things (IoT) be secure enough?

Will Internet of Things be Secure Enough ? https://www.youtube.com/user/dastikop

Ravindra Dastikophttp://dastikop.blogspot.in

Page 2: Will Internet of Things (IoT) be secure enough?

Internet of Things A new World of CONNECTED Objects

Page 3: Will Internet of Things (IoT) be secure enough?

IoT SESSIONS

Session 1 Web Architecture for an Internet of Things

Session 2Will IoT be Secure Enough?

Session 3 Applications of IoT

Session 4 Research Directions in IoT

Page 4: Will Internet of Things (IoT) be secure enough?

Will IoT be secure enough?

Session 2

Page 5: Will Internet of Things (IoT) be secure enough?

ISSUE

• Privacy and Security are major

challenge in building IoT ecosystem

• They are source of friction on the

path to adoption.

Page 6: Will Internet of Things (IoT) be secure enough?

AGENDA

• The IoT World Described

• The Security Architecture

• layers

• challenge

• solutions

• Conclusion

Page 7: Will Internet of Things (IoT) be secure enough?

IoT Described

The main concept of IoT is the ability to

connect loosely defined smart objects and

enable them to interact with

• other objects,

• the environment, or

• more complex and legacy computing

devices

Page 8: Will Internet of Things (IoT) be secure enough?

IOT: Communication Infrastructure

The communication infrastructure will be

based on an extension of the Internet,

which will enable transparent use of object

resources across the globe.

Page 9: Will Internet of Things (IoT) be secure enough?

An IOT enabled worldSmart objects will densely populate human life and

human environment, interacting both by providing ,

processing and delivering any sort of information or

command

objects in the environment will be able to tell us about

themselves, their state, or their surroundings and

can be used remotely

Page 10: Will Internet of Things (IoT) be secure enough?

An IOT enabled worldSensors will be integrated in buildings,

vehicles, and common environments, carried

by people and attached to animals and will

communicate among them locally and

remotely in order to provide integrated

services.

Page 11: Will Internet of Things (IoT) be secure enough?

IoT : Examples

• Mobile devices can adopt silent mode when entering a

meeting room if this is the request of the meeting

moderator

• Alert user and turn-off the radio before entering sensitive

medical areas or

• detect when user enters the car and connect to its sound

systems

• Wireless sensors could let people check where their pet is

real-time as well as control the temperature of each room

of their home while they are out

Page 12: Will Internet of Things (IoT) be secure enough?

IoT : Examples• Emergency services could be remotely and

automatically altered if fire is detected in a

building or if a patient’s medical parameters

drop beyond a critical threshold

Page 13: Will Internet of Things (IoT) be secure enough?

The Consequence With such a deep penetration of technology

which will introduce a new kind of

automation and remote interaction, it will

surely pose new security and privacy

challenges.

Page 14: Will Internet of Things (IoT) be secure enough?

Security in IoT

1. In IoT security is inseparable from safety

2. Whether accidental or malicious,

interference in the controls of

1. a pacemaker, or

2. a car or nuclear reactor poses a threat

to life.

Page 15: Will Internet of Things (IoT) be secure enough?

The Interaction Time

You may Pose Questions Now

Page 16: Will Internet of Things (IoT) be secure enough?

The Security Architecture

Page 17: Will Internet of Things (IoT) be secure enough?

Security architecture

Reference: Security in the Internet of Things: A Review

Page 18: Will Internet of Things (IoT) be secure enough?

Perceptual Layer • The most basic level is the perceptual layer (also known

as recognition layer), which collects all kinds of

information through physical equipment and identifies

the physical world, the information includes object

properties, environmental condition etc; and physical

equipments include RFID reader, all kinds of sensors, GPS

and other equipments.

• The key component in this layer is sensors for capturing

and representing the physical world in the digital world.

Page 19: Will Internet of Things (IoT) be secure enough?

Network Layer• The second level is network layer. Network layer is

responsible for the reliable transmission of information

from perceptual layer, initial processing of information,

classification and polymerization.

• In this layer the information transmission is relied on

several basic networks, which are the internet, mobile

communication network, satellite nets, wireless network,

network infrastructure and communication protocols are

also essential to the information exchange between devices

Page 20: Will Internet of Things (IoT) be secure enough?

Support Layer• The third level is support layer. Support layer will set

up a reliable support platform for the application

layer.

• On this support platform all kind of intelligent

computing powers will be organized through network

grid and cloud computing.

• It plays the role of combining application layer upward

and network layer downward.

Page 21: Will Internet of Things (IoT) be secure enough?

Application Layer• The application layer is the topmost and terminal

level.

• Application layer provides the personalized services

according to the needs of the users.

• Users can access to the internet of thing through the

application layer interface using of television, personal

computer or mobile equipment and so on.

Page 22: Will Internet of Things (IoT) be secure enough?

Security architecture

Reference: Security in the Internet of Things: A Review

Page 23: Will Internet of Things (IoT) be secure enough?

The Interaction Time

You may Pose Questions Now

Page 24: Will Internet of Things (IoT) be secure enough?

The Security Architecture

Challenges

Page 25: Will Internet of Things (IoT) be secure enough?

Perceptual Layer

• Usually perceptual nodes are short of computer power and

storage capacity because they are simple and with less power.

• Therefore it is unable to apply frequency hopping communication

and public key encryption algorithm to security protection.

• And it is very difficult to set up security protection system.

• Meanwhile attacks from the external network such as deny of

service (DOS) also bring new security problems.

• on the other hand sensor data still need the protection for

integrity, authenticity and confidentiality.

Page 26: Will Internet of Things (IoT) be secure enough?

Network Layer• The core network has relatively completely safety

protection ability,

• But Man-in-the-Middle Attack and counterfeit attack

still exist,

• meanwhile junk mail and computer virus cannot be

ignored, a large number of data sending cause

congestion.

Therefore security mechanism in this level is very

important to the IoT.

Page 27: Will Internet of Things (IoT) be secure enough?

Support Layer

This layer does the mass data processing and

intelligent decision of network behavior in

this layer, intelligent processing is limited for

malicious information, so it is a challenge to

improve the ability to recognize the

malicious information.

Page 28: Will Internet of Things (IoT) be secure enough?

Application Layer• In this level security needs for different

application environment are different,

• data sharing is that one of the

characteristics of application layer,

• which creating problems of data privacy,

access control and disclosure of

information.

Page 29: Will Internet of Things (IoT) be secure enough?

The Security Architecture

Requirements

Page 30: Will Internet of Things (IoT) be secure enough?

Security requirements in each level

Page 31: Will Internet of Things (IoT) be secure enough?

Perceptual Layer-1• At first node authentication is necessary to

prevent illegal node access;

• secondly to protect the confidentiality of

information transmission between the

nodes, data encryption is absolute

necessity;

Page 32: Will Internet of Things (IoT) be secure enough?

Perceptual Layer-1• The data encryption key agreement is an important

process in advance; the stronger are the safety

measures, the more is consumption of resources, to

solve this problem, lightweight encryption technology

becomes important, which includes Lightweight

cryptographic algorithm and lightweight cryptographic

protocol.

• At the same time the integrity and authenticity of

sensor data is becoming research focus.

Page 33: Will Internet of Things (IoT) be secure enough?

Network Layer-1• In this layer existing communication security

mechanisms are difficult to be applied.

• Identity authentication is a kind of

mechanism to prevent the illegal nodes, and it

is the premise of the security mechanism,

confidentiality and integrality are of equal

importance, thus we also need to establish

data confidentiality and integrality

mechanism.

Page 34: Will Internet of Things (IoT) be secure enough?

Network Layer-2Besides distributed denial of service attack

(DDoS) is a common attack method in the

network and is particularly severe in the

internet of thing, so to prevent the DDOS

attack for the vulnerable node is another

problem to be solved in this layer.

Page 35: Will Internet of Things (IoT) be secure enough?

Support Layer• Support layer needs a lot of the application

security architecture such as cloud

computing and

• secure multiparty computation, almost

all of the strong encryption algorithm and

encryption protocol, stronger system

security technology and anti-virus.

Page 36: Will Internet of Things (IoT) be secure enough?

Application LayerTo solve the security problem of application layer, we need

two aspects.

• One is the authentication and key agreement across

the heterogeneous network,

• the other is user’s privacy protection.

• In addition, education and management are very

important to information security, especially password

management

Page 37: Will Internet of Things (IoT) be secure enough?

The Importance of IoT Security

• In summary security technology in the IoT is

very important and full of challenges.

• On the other hand laws and regulations

issues are also significant.

Page 38: Will Internet of Things (IoT) be secure enough?

IOT Security Scenarios- 11. In a factory floor automation, deeply embedded

programmable logic controllers (PLCs) that

operate robotic systems are typically integrated

with the enterprise IT infrastructure

2. How can those PLCs be shielded from human

interferences while at the same time

protecting the investments in the IT

infrastructure and leveraging the security

controls available

Page 39: Will Internet of Things (IoT) be secure enough?

IOT Security Scenario-2 1. Control systems for nuclear reactors are

attached to infrastructure.

2. How can they receive software updates or

security patches in a timely manner

without impairing functional safety or

incurring significant recertification costs

every time a patch is rolled out

Page 40: Will Internet of Things (IoT) be secure enough?

IOT Security Scenarios- 3 1. A smart meter – one which is able to send energy

usage data to the utility operator for dynamic billing

or real-time power grid optimization-

2. This must be able to protect that information from

unauthorized usage or disclosure.

3. Information that power usage has dipped could

indicate that home is empty, making it an ideal

target for a burglary or worse.

Page 41: Will Internet of Things (IoT) be secure enough?

The Interaction Time

You may Pose Questions Now

Page 42: Will Internet of Things (IoT) be secure enough?

The Security Architecture

Features

Page 43: Will Internet of Things (IoT) be secure enough?

Security and privacy issues

● Resilience to attacks

● Data Authentication

● Access Control

● Client privacy

Page 44: Will Internet of Things (IoT) be secure enough?

Security and privacy issues

● Resilience to attacks

○ the system has to avoid single

points of failure and adjust itself

to node failures

Page 45: Will Internet of Things (IoT) be secure enough?

Security and privacy issues

● Data Authentication

○ As a rule, retrieved address and

object information must be

authenticated

Page 46: Will Internet of Things (IoT) be secure enough?

Security and privacy issues

● Access Control

○ Information providers must be

able to implement access control

on the data provided

Page 47: Will Internet of Things (IoT) be secure enough?

Security and privacy issues ● Client privacy

○ measures need to be taken that only the

information provider is able to infer

from observing the use of the lookup

system related to a specific customer; at

least inference should be very hard to

conduct

Page 48: Will Internet of Things (IoT) be secure enough?

The Interaction Time

You may Pose Questions Now

Page 49: Will Internet of Things (IoT) be secure enough?

The Security Architecture

Solutions

Page 50: Will Internet of Things (IoT) be secure enough?

Building Security for IoT1. No one single control is going to adequately protect

a device in an IoT environment.

2. Hence, a multi-layered approach to security that

starts at the beginning when the

1. power is applied,

2. establishes a trusted computing baseline and

3. anchors that trust in something that can not be

tampered with.

Page 51: Will Internet of Things (IoT) be secure enough?

Building Security for IoTSecurity must be addressed throughout the device

lifecycle, from initial design to the operational

environment

1. Secure booting

2. Access control

3. Device authentication

4. Firewalling and IPS

5. Updates and patches

Page 52: Will Internet of Things (IoT) be secure enough?

Secure Booting•When power is first introduced to the device, the

authenticity and integrity of the software on the device is

verified using cryptographically generated digital

signature.

•A digital signature attached to the software image and

verified by the device ensures that only the software that has

been authorized to run on that device, and signed by the

entity that authorized it , will be loaded

•The foundation of trust has been established , but the

device still needs protection from various run-time threats

and malicious intentions

Page 53: Will Internet of Things (IoT) be secure enough?

Access Control• Different forms of resource and access

control are applied.

•Mandatory or role-based access controls

built into the operating system limit the

privileges' of device component and

applications so they access only the

resources they need to do their jobs.

Page 54: Will Internet of Things (IoT) be secure enough?

Device authentication• When a device is plugged into network, it

should authenticate itself prior receiving

or transmitting data.

• Machine authentication is similar to user

authentication

Page 55: Will Internet of Things (IoT) be secure enough?

Firewalling and IPS

The device needs a firewall or deep packet

inspection capability to control traffic that

is destined to terminate at the devices.

Example: smart energy grid

Page 56: Will Internet of Things (IoT) be secure enough?

Updates and patches Once the device is in operation, it will start

receiving hot patches and software

updates. software updates security patches

must be delivered in such a way that

conserves the limited bandwidth and

internet connectivity of an embedded device.

Page 57: Will Internet of Things (IoT) be secure enough?

The Interaction Time

You may Pose Questions Now

Page 58: Will Internet of Things (IoT) be secure enough?

Security requirements in each level

Page 59: Will Internet of Things (IoT) be secure enough?

Conclusions

• Privacy and security are essential features

of modern networks.

• Internet of Things is no exception

• Industry has built different security

approaches to ensure security and privacy

Page 60: Will Internet of Things (IoT) be secure enough?

The Security Architecture

Additional Dimensions

Page 61: Will Internet of Things (IoT) be secure enough?

Secure Multi-party computations( SMC)-1• Internet of Things will create tremendous

opportunities to improve people’s lives. The core

property of most ubiquitous applications is the ability

to perform joint cooperative tasks involving

computations with inputs supplied by separate parts or

things.

• These computations are performed by mutually

untrusting parties on inputs containing private

information containing user’s daily activities.

Page 62: Will Internet of Things (IoT) be secure enough?

Secure Multi-party computations( SMC)-2• Secure Multi-party computations may become a

relevant and practial approach that should be

considered as a technological enforcement to protect

user’s privacy

• Secure multi-party computation (also known as

secure computation or multi-party computation

(MPC)) is a subfield of cryptography with the goal to

create methods for parties to jointly compute a

function over their inputs, and keeping these inputs

private.

Page 63: Will Internet of Things (IoT) be secure enough?

Privacy enhancing Technologies ( PET)

• Virtual Private network(VPN)

• Transport layer Security ( TLS)

• DNS Security Extensions

• Onion Routing

• Private Information Retrieval (PIR)

Page 64: Will Internet of Things (IoT) be secure enough?

IoT in Action

The Conclusion

Page 65: Will Internet of Things (IoT) be secure enough?

Conclusions• IoT security design should enable an open, pervasive

and interoperable yet secure infrastructure

• For the sake of privacy and flexibility, IoT or smart

objects must be capable of implementing individual,

user set policies

• Infrastructural security services should be accessible

transparently and regardless of the connection uses by

nomadic smart IoT objects

Page 66: Will Internet of Things (IoT) be secure enough?

References

• An Overview of Privacy and security Issues in the

Internet of Things- Carlo Maria Medaglia and

Alexandru Serbanati

• Internet of Things and Privacy Preserving

Technologies- Vladimir Oleshchuk

• Internet of Things- New Security and Privacy

Challenges- Rolf H. Weber

Page 67: Will Internet of Things (IoT) be secure enough?

End of Session 2Questions

Page 68: Will Internet of Things (IoT) be secure enough?

Upcoming SESSIONS

Session 3

Applications of IoT