How To Understand The Concept Of Internet Of Things (Iot)
|
|
|
- Ashley Thomas
- 5 years ago
- Views:
Transcription
1 Privacy and Security Challenges in Internet of Things Manik Lal Das DA-IICT, Gandhinagar
2 Disclaimer Many third party copyrighted material is reused within this talk under the 'fair use' approach, for sake of educational purpose only. As a consequence, the usage of this presentation is restricted, and is falling under usual copyrights usage. Thank you for your understanding!
3 Internet of Things (IoT) The definition of Internet of Things (IoT) evolves around the central concept : a world-wide network of interconnected objects, where objects can be addressable through unique identity accessible through Internet (sometimes via intelligent interface) self organized and repairable
4 Internet of Things (IoT) The definition of Internet of Things (IoT) evolves around the central concept : a world-wide network of interconnected objects, where objects can be addressable through unique identity accessible through Internet (sometimes via intelligent interface) self organized and repairable A world of intelligent, adaptive, self organized sensors, actuators, other devices and systems that use various network technologies to connect each and every objects of physical world to web of world.
5 Computing Trends Precomputer era Wired Computing era Wireless Computing era Web of world H2H H2M H2M M2M
6 What is Machine-to-Machine (M2M)? Machine-To-Machine Device (e.g. water meter) which is monitored by means of sensors. Machine-To-Machine Network which facilitates end-to-end connectivity between machines. Composed of radio, access network, gateway, backend server. Machine-To-Machine Device (e.g. valve) which is instructed to actuate. Device (e.g. computer) which automatically controls and instructs other machines.
7 H2M M2M INSTRUMENTED Event capturing and filtering for timely response. Embedded computing delivers innovative solutions. INTERCONNECTED Anytime-Anywhere-Anything connectivity. INTELLIGENT Human-computer-interface, user behaviour, business intelligence
8 Global M2M connections Courtesy: Machina Research
9 Asia M2M connections Courtesy: Machina Research
10 M2M connections: Driven by IB and CE Courtesy: Machina Research
11 M2M
12 M2M WoW
13 M2M WoW IoT
14 IoT Scenario
15 Technological perspectives IoT Perspectives IoT requires context-based technological advancement, keeping consumers convenience as the primary concern. Security, privacy, trusts, ownership of data as well as services are important concerns that would bring significant challenges and opportunities to manufacturers, developers, service providers and service consumers.
16 Business perspectives IoT Perspectives Tremendous potential of electronic business has already been arrived and that is going to be scaled up in multiple folds in IoT scenarios. The factors that could work for adopting IoT in industry are Standards, specification, compliance, interoperability, integration, security, privacy, trusts, and ownership. The maximum beneficiary of IoT infrastructure is industry itself.
17 Economic perspectives IoT Perspectives The economic perspectives of IoT offer two kinds of incentives consumers and suppliers. consumers would benefit from IoT infrastructure in terms of time management (e.g. connecting home appliances to office premises), flexibility (e.g. anytime-anywhere service), security (e.g. door/vehicle-lock/unlock alarm to mobile handset), and revenue (e.g. smart energy, smart transport, smart shopping). suppliers would benefit by generating revenues in terms of smart services, smart devices and smart technology to assess vulnerabilities and addressing them for consumers satisfaction. Small scale service providers can use third party infrastructure for resource sharing/pooling, and large scale providers can make best use of small industries services.
18 Human perspectives IoT Perspectives Intellectual property, technologies, and information on core processes reside in human minds can be used in IoT in a controlled way depending upon consumers and suppliers requirement. Manufacturers can act as a single source and/or a single point of failure for mission-critical application. Security and privacy of objects could pose a serious threat to applications and human as well.
19 IETF IoT Standards/Specificaton 6LoWPAN Working Group (WG) ROLL (Routing Over Low-power Lossy Networks) WG CoRE WG (REST for IoT, CoAP) TLS WG (DTLS) ETSI M2M system standardization (CoAP) IEEE Standard Association IoT
20 IoT actors/applications Smart Home/Office Smart City WSN, RFID Smart Agriculture Internet of Things Smart Retail WSN Smart Metering Smart Transportation
21 Smart shopping carts All items in the shopping centre are RFID tag-enabled. As items add into the cart, items details scanned by the reader. Source:
22 Smart Refrigerator Recognize what s been put in it. Recognize when items are removed. Notify you when items are expired. Shows recipes that most closely match with what is available in it. Access refrigerator from a handheld device (from office or shopping complex). Source:
23 IoT actors Constrained device is a low-cost, low-power device that might have following functionality: communicate on short distances (WSN, RFID) sense environmental data (WSN) perform limited data processing The communication between devices and other entities rely on radio wave, which is susceptible to many attacks.
24 Characteristics of Constrained Device Constraints Resource constraints Operation unattended Not tamper-resistant Lack of central control No pre-configured topology Implications Protocol must be energyefficient Adversary can capture any device Adversary can compromise device s data Cooperative data exchange Device does not know neighbours in advance
25 Network domain Device domain Application domain
26 CoAP: Constrained Application Protocol[RFC 7252] Constrained Enviroments Sensor Internet Resources CoAP CoAP HTTP HTTP Proxy Server Client UDP 6LoWPAN Contiki, Tiny OS, 8-bit microcontrollers 100KB of RAM for code CoAP is an application layer protocol that enables web services for constrained devices and networks.
27 Proxy CoAP CoAP CoAP CoAP Proxy CoAP IoT Hub Proxy Proxy CoAP CoAP CoAP Proxy CoAP CoAP CoAP CoAP CoAP CoAP Healthcare CoAP Proxy
28 Internet is possibly the victim of its success as far as security is concerned
29 Security figure out what you mean In an objective sense, security measures the absence of threats to acquired values. In a subjective sense, security measures the absence of fear that such values will be attacked. Security is a system property. Security is much more than a set of functions and mechanisms.
30 Privacy again figure out what you mean Object Privacy: eavesdropping, tracking, stealing data. Location Privacy: tracking, monitoring, revealing data. On one hand, entity who carries device-enabled does not want to be tracked by the terminal, which could preserve its privacy. On the other hand, one requires tracing device-enabled criminals or suspicious objects in a controlled way, which could save money, national assets and human lives.
31 Security and Privacy challenges Authentication, Integrity, Confidentiality,, based on application requirement. Universal authentication Identity management Authorized access of data Availability of data (a big challenge in near future!) Lightweight security protocol for constrained environments. Privacy preserving service. Trust and ownership issues.
32 A Two-party game Who are you? I m Bob Prover Verifier Authentication, integrity
33 A Two-party game contd. Challenge c Response f(x,c) Prover Confirmation f(x,c ) Verifier (mutual)authentication, integrity, transient key establishment,
34 Privacy-preserved data --> avoiding link or trace. Authentication-preserved data --> avoiding impersonation. Integrity-preserved data --> avoiding data alteration. Confidentiality-preserved data --> avoiding unauthorized access to data
35 Privacy-preserved data --> avoiding link or trace. Authentication-preserved data --> avoiding impersonation. Integrity-preserved data --> avoiding data alteration. Confidentiality-preserved data --> avoiding unauthorized access to data
36 Privacy is the goal Prover key, idv Compute challenge Challenge(T) C r Verifier key, idp Response (R) C r = PRF key (idp idv T R) C t = PRF key (idv idp R T) C t Privacy preserving
37 IoT scenarios/applications Home appliances Transport E-Governance Social networking Defense
38 Privacy-preserved data --> avoiding link or tracing. Authentication-preserved data --> avoiding impersonation. Integrity-preserved data --> avoiding data alteration. Confidentiality-preserved data --> avoiding unauthorized access to data
39 Privacy, authentication are golas Prover key, idv Compute challenge C r = PRF key (idp idv T R) Check whether C r = C r C t = PRF key (idv idp R T) Challenge(T) C r C t Verifier key, idp Response (R) C r = PRF key (idp idv T R) Prover authentication Verifier authentication Privacy preserving Check whether C t = PRF key (idv idp R T) = C t
40 IoT scenarios/applications Home appliances Transport E-Governance Social networking Banking Enterprise systems Telecommunication Education Agriculture Defense
41 Privacy-preserved data --> avoiding link or tracing. Authentication-preserved data --> avoiding impersonation. Integrity-preserved data --> avoiding data alteration. Confidentiality-preserved data --> avoiding unauthorized access to data
42 Privacy, authentication, confidentiality Prover key, idv Compute challenge C r = PRF key (idp idv T R) Check whether C r = C r C t = PRF key (idv idp R T) Challenge(T) C r C t Verifier key, idp Response (R) C r = PRF key (idp idv T R) Prover authentication Verifier authentication Privacy preserving Traffic confidentiality SK = PRF(C, R, ) Check whether C t = PRF key (idv idp R T) = C t
43 IoT scenarios/applications Home appliances Transport E-Governance Social networking Defense Home appliances Transport E-Governance Social networking Defense Banking Consumer Electronics Telecommunication Smart grids Healthcare Home appliances Transport E-Governance Social networking Defense Banking Consumer Electronics Smart Grids Healthcare
44 Adversarial Capability Assume that the adversary is capable of intercepting communication between Prover and Verifier, and can inject data, alter content and delete data. The adversary can execute some queries like sendprover, sendverifier, corruptprover.
45 Security of the protocol Correctness: legitimate Prover must be accepted. Soundness: fake Prover should be rejected.
46 Security claim For every set of inputs the result of a real execution of the protocol with Adversary should not give non-negligible advantage in the security parameter of the keying material. Security is guaranteed if the protocol is sound against a reasonably acceptable adversarial model.
47 Privacy of the protocol Learning Phase: Adversary gathers enough (T, C t ) and (R, C r ) by sendprover and sendverifier queries with many provers. Assume that the adversary has compromised all provers except 2 provers, say P 1 and P 2. Challenge Phase: Challenger submits the following to the adversary: Exp b S, A(k): 1. t b R Z q 2. T b, C b, real SendProver real (., x b ) 3. Return P b, real Exp b S, A(k): 1. t b R Z q 2. T b, C b, random SendProver random (., x b ) 3. Return P b, random Adversary s task is to guess whether P b,t {P 1, P 2 }, where t {real, random}.
48 Privacy claim For every set of inputs the result of a real execution of the protocol with Adversary is computationally indistinguishable from the result of a random execution with Adversary. Privacy is guaranteed if the adversary cannot distinguish with which one of two provers, he is interacting through a large set of gathered queries.
49 Finally, Efficiency is equally important Gate Equivalent (GE), a standard measurement unit Example: On a constraint chip the implementation of: - the ECDSA takes roughly GE - the AES encryption takes roughly 3600 GE - the hash algorithm SHA-1 takes roughly 8120 GE - the EC point multiplication takes roughly 1000 GE With this, the cost of the protocol discussed here would be: for privacy-preserving feature ~ 5600 GE at each side. for privacy, authentication-preserving feature ~ 9200 GE at each side. for privacy, authentication, confidentiality-preserving feature ~ GE. Courtesy: D. M. Hein, J. Wolkerstorfer, and N. Felber. ECC is ready for RFID - a proof in silicon. In proc. of International Workshop on Selected Areas in Cryptography, LNCS 5381, Springer, pp , 2009.
50 Conclusions The reality of IoT is not far, around the corner. enormous scope, challenges, and opportunities Internet along with high speed mobile communication would become communication backbone for IoT infrastructure. Manufacturers, service providers need to agree on a set of solutions based on functional and financial goals.
51 Conclusions Security and privacy issues need more emphasis on constrained environments (traditional solution may not work!) - Lightweight crypto primitive - Proxy security, data ownership, trust, - Denial of service, lock/unlock service, destroying data, Finally, regulatory issues, political factors have to be resolved. Thanks!
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
Secure, Efficient, and Open Standard Internet of Things
Secure, Efficient, and Open Standard Internet of Things Zach Shelby Director of Technology, IoT ARM acknowledges the trademarks and copyrights of 3 rd parties included in this presentation What is the
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Smart Cities are the Internet of Things
June 20th, 2013 Smart Cities are the Internet of Things Zach Shelby, Chief Nerd 1 About Sensinode Vision The Internet of Things (IoT) is the next evolution of the Internet where devices of all types and
Internet of Things based approach to Agriculture Monitoring
Internet of Things based approach to Agriculture Monitoring A. Paventhan ERNET India Regional Centre, Bangalore Asia-Pacific Advanced Network (APAN) 36th Meeting 20th August 2013 1 / 19 Outline 1 IP-based
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects Fabien Castanier STMicroelectronics IPSO Promoter M2M Forum - Milan, May 20,
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
Internet of Things 2015/2016
Internet of Things 2015/2016 The Things Johan Lukkien John Carpenter, 1982 1 What makes up the IoT? IoT versus WSN What are examples? Guiding questions 2 Some definitions of IoT (march 2015) Whatis.com:
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
Internet of Things. Laurent Toutain. June 11, 2013. Caen () IPv6 opérateur June 11, 2013 1 / 14
Internet of Things Laurent Toutain June 11, 2013 Caen () IPv6 opérateur June 11, 2013 1 / 14 Internet of Things? Internet of Things Caen () IPv6 opérateur June 11, 2013 2 / 14 Internet of Things? Internet
WHITE PAPER Security in M2M Communication What is secure enough?
WHITE PAPER Security in M2M Communication What is secure enough? Motivation Wireless Machine-To-Machine (M2M) communication has grown dramatically over the past decade and is still growing rapidly. In
Key requirements for Interoperable IoT systems
Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Making Sense of Internet of Things Protocols and Implementations
Making Sense of Internet of Things Protocols and Implementations Author: Kim Rowe, RoweBots Higher level protocols for Internet of Things have various features and offer different capabilities. Most of
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Machine-to-Machine Technologies
Machine-to-Machine Technologies Vision, Standards and Applications Mischa Dohler Coordinator of Research, CTTC Distinguished Lecturer, IEEE Editor-in-Chief, ETT BoD, Worldsensing Chair Professor, KCL (1
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era
Sponsored by Oracle Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Introduction About Survey Respondents The Internet of Things (IoT) and the rise of
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
Home Automation and Cybercrime
Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7
ARM mbed IoT Device Platform. November 3 rd, 2014
ARM mbed IoT Device Platform November 3 rd, 2014 1 The Big Picture What? At TechCon 2014 we announced the ARM mbed IoT Device Platform consisting of: An expanded partner ecosystem spanning silicon to the
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea
Robust protocols for the Industrial Internet of Things
Robust protocols for the Industrial Internet of Things Elvis Vogli Politecnico di Bari,Telematics Lab - Dipartimento di Ingegneria Elettrica e dell Informazione Via Edoardo Orabona 4, 70125 Bari, Italy
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Seyed Mohammad Alavi 1, Karim Baghery 2 and Behzad Abdolmaleki 3 1 Imam Hossein Comprehensive University Tehran, Iran
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
SECURITY IN THE INTERNET OF THINGS
Lessons from the Past for the Connected Future INNOVATORS START HERE. EXECUTIVE SUMMARY Although it has been with us in some form and under different names for many years, the Internet of Things (IoT)
Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC
Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC As wireless standards develop and IPv6 gains widespread adoption, more and more developers are creating smart devices
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation
IPv6 Based Sensor Home Networking
KRNET 2005 IPv6 Based Sensor Home Networking KRNET 2005 Soohong Daniel Park Mobile Platform Laboratory, SAMSUNG Electronics. [email protected] KRNET 2005 2/29 Trend of Home Networking Digital World
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
Thingsquare Technology
Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.
Security in ST : From Company to Products
Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately
M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.
M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: [email protected] WHAT IS EURECOM A graduate school & research centre in communication
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID
MACHINE TO MACHINE COMMUNICATIONS. ETSI TC M2M Overview June 2011
MACHINE TO MACHINE COMMUNICATIONS ETSI TC M2M Overview June 2011 About the ETSI TC M2M ETSI: the European Telecommunication Standards Institute One of the 3 European SDOs (CEN, CENELEC, ETSI). ETSI is
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT
Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chih-Yuan Lee Department of CSIE National Taipei University 1 Outline Abstract Introduction Background System
PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS
PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS TABLE OF CONTENTS 2 EXECUTIVE SUMMARY 3 THE EMERGENCE OF THE INTERNET OF THINGS 4 SECURITY RISKS IN NETWORKED DEVICES 6 PKI S FOUNDATION OF STRONG
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
Device-based Secure Data Management Scheme in a Smart Home
Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
Internet of Things (IoT): Middleware. Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.
Internet of Things (IoT): Middleware Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ A Fence Surveillance System Y. Kim et al, Autonomics
OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE
OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,
Sectra Communications ensuring security with flexibility
Panthon Sectra Communications ensuring security with flexibility Sectra has more than 30 years of experience in developing secure communications. We know what is required to meet the toughest demands.
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption
White Paper Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption Today s Encryption Environments The number of cyber attacks targeting US organizational data has doubled over
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Flexible Architecture for Internet of Things Utilizing an Local Manager
, pp.235-248 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.24 Flexible Architecture for Internet of Things Utilizing an Local Manager Patrik Huss, Niklas Wigertz, Jingcheng Zhang, Allan Huynh, Qinzhong Ye
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Back-end Server Reader Tag
A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags Shucheng Yu, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, MA 01609 {yscheng, wjlou}@wpi.edu
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing
E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business
Overview of the Internet of things
Overview of the Internet of things Tatiana Kurakova, International Telecommunication Union Place des Nations CH-1211 Geneva, Switzerland Abstract. This article provides an overview of the Internet of things
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
Business models in the Internet of Things. Miriam Cordero Head of Strategy - BT Group @miricoru
Business models in the Internet of Things Miriam Cordero Head of Strategy - BT Group @miricoru IoT applications bring a set of benefits Increase efficiency Scarce resources New services End to end supply
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Tackling Security and Privacy Issues in Radio Frequency Identification Devices
Tackling Security and Privacy Issues in Radio Frequency Identification Devices Dirk Henrici and Paul Müller University of Kaiserslautern, Department of Computer Science, PO Box 3049 67653 Kaiserslautern,
TELE 301 Network Management. Lecture 18: Network Security
TELE 301 Network Management Lecture 18: Network Security Haibo Zhang Computer Science, University of Otago TELE301 Lecture 18: Network Security 1 Security of Networks Security is something that is not
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
In the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
Foundation University, Islamabad, Pakistan [email protected]
Kerberos Authentication in Wireless Sensor Networks Qasim Siddique Foundation University, Islamabad, Pakistan [email protected] ABSTRACT We proposed an authentication mechanism in the wireless sensor
Security in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
Introduction of Information Security Research Division
Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group Contents Overview - Secure u-it KOREA - Organization of ETRI
Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks
Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table
The Future of IoT. Zach Shelby VP Marketing, IoT Feb 3 rd, 2015
The Future of IoT Zach Shelby VP Marketing, IoT Feb 3 rd, 2015 1 Internet of (really nerdy) People 1980s 2 Internet of (content silo) People 1990s 3 Internet of (Web) People 2000s 4 Internet of (really
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP
SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP WHO ARE WE? Tobias Zillner Senior IS Auditor @Cognosec in Vienna Penetration Testing, Security Audits, Security Consulting Breaking stuff
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
Short range low power wireless devices and Internet of Things (IoT)
Short range low power wireless devices and Internet of Things (IoT) White paper Author Mats Andersson Senior Director Technology, Product Center Short Range Radio, u-blox Abstract This paper discusses
The Internet of Things
The Internet of Things Powe re d by IPv6 Jeff Apcar Distinguished Services Engineer, Cisco Systems March 14 th 2014, ida IPv6 Conference IoT Definition ** A collection of things Cisco Confidential 2 IoE/IoT/M2M
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
Telecommunication Systems in Smart Cities
Telecommunication Systems in Smart Cities Hitachi Review Vol. 61 (2012), No. 3 152 Kazuko Hamaguchi Yuanchen Ma May Takada Takayuki Nishijima Takanori Shimura OVERVIEW: Telecommunication systems play a
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu
MUNICIPAL WIRELESS NETWORK
MUNICIPAL WIRELESS NETWORK May 2009 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Human Factors in Information Security
University of Oslo INF3510 Information Security Spring 2014 Workshop Questions Lecture 2: Security Management, Human Factors in Information Security QUESTION 1 Look at the list of standards in the ISO27000
Implementing Existing Management Protocols on Constrained Devices. IETF 81, Quebec, 2011-07-26
Implementing Existing Management Protocols on Constrained Devices Jürgen Schönwälder IETF 81, Quebec, 2011-07-26 1 / 22 SNMP on Constrained Devices 1 SNMP on Constrained Devices 2 NETCONF on Constrained
