Security and Privacy Challenges in the Internet of Things



Similar documents
A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014

RFID System Description for Logistics & Inventory

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

Asset Tracking System

Enabling the secure use of RFID

Evolving Bar Codes. Y398 Internship. William Holmes

How to Build a Comprehensive Roadmap and Strategy for Mobility. Winni Hesel Partner Enowa Consulting

Simplifying IT Management and Data Security with RFID

Information Systems and Electronic Communications in Logistics Management

Distributed Systems. Security concepts; Cryptographic algorithms; Digital signatures; Authentication; Secure Sockets

Introduction Chapter 1. Uses of Computer Networks

Understanding barcodes.

DEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES

Understanding barcodes. White paper

AT&T. Push to Talk over Cellular & Interoperability into LMR networks

CYBER PHYSICAL IIS

Enabling Self Organising Logistics on the Web of Things

Cisco & Big Data Security

Lucent VPN Firewall Security in x Wireless Networks

Internet Connected Devices: Evolving from the Internet of Things to the Internet of Everything. Bill Morelli Associate Director

RFID BASED VEHICLE TRACKING SYSTEM

CPS: Communications. Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD

Introduction of Information Security Research Division

Overview to the Cisco Mobility Services Architecture

HOTEL INFORMATION SYSTEMS. Chapter 6

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Building Value from Visibility

MOTOROLA SOLUTIONS COOL FACTOR SUPPLY CHAIN INNOVATIONS

Big Data in Retail Big Data Analytics Central to Customer Acquisition and Retention Strategies in Retail

Future Directions for Internet of Things Work

Chapter 11 Distribution - Managing Fulfillment Operations

PLANON MEETING MANAGEMENT. For professional, integrated room booking management and related services

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion

The Internet of Things (IoT)

Beyond Retail: The Imperative for Ubiquitous Security in Wireless Printers

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper

Source Type Definitions

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Securing your Linksys Wireless Router BEFW11S4 Abstract

Ariba: A Framework for Developing Decentralized Services

ALL TRACK Provides Solutions for:

Selection Criteria for ZigBee Development Kits

Top Six Considerations

Why MCL-Bridge for SAP

Industry 4.0 and Big Data

Industrial Control System (ICS) Security Market by Technology, by Services, and by Verticals - Global Forecast to 2019

AN INTRODUCTION TO THE GLOBAL INDIVIDUAL ASSET IDENTIFIER (GIAI) TABLE OF CONTENTS

Using Hybrid RFID for Improved Asset Tracking

Make the Smart Choice

M2M & Internet of Things Opportunities

Time Clocks for Employee Attendance Tracking

Manufacturing and the Internet of Everything

Improving Supply Chain Traceability Using RFID Technology

Security Features and Considerations

entigral whitepaper 10 Success Factors for RFID Asset Tracking Deployments

Enterprise Application Enablement for the Internet of Things

10 Reasons to Choose Image-based ID Readers. White Paper

securityserver Unparalleled management and detection of security, environmental, and disaster control resources.

Growth through partnerships and licensing technologies

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things.

WHITE PAPER PALLETS AND RETURNABLE ASSET TRACKING

Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network

A Healthcare/Eldercare Robot based on Skilligent Technology

Internet of Things (IoT): A vision, architectural elements, and future directions

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

T r a n s f o r m i ng Manufacturing w ith the I n t e r n e t o f Things

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

Security and Privacy Issues of Wireless Technologies

Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies

Alcatel-Lucent In-building Wireless Continuity Solution for Healthcare

M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M?

Chapter 9 Communications and Networks

Governance van Mobiele Service Platforms

RFID Design Principles

White Paper. 10 Reasons to Choose Image-based Barcode Readers

smart systems and internet of things forecast

CHAPTER 1 1 INTRODUCTION

Controller board and power supply for vivimat III systems

Discovering Computers Chapter 9 Communications and Networks

A. Background. In this Communication we can read:

Real-time Visibility for SAP in Supply Chain & Logistics:

Transcription:

in the Internet of Things 6. Mar 2009 - KiVS Workshop on Global Sensor Networks (GSN09), (TH) Karlsruhe Institute of Technology (KIT)

Internet of Things a new Era systems per person systems per object Evolution of our technological environment time 1 Merge physical world with digital world Every object has an identity Better sensing of physical world lives in the physical and in the digital world Enable in-depth management of physical world

Is the Internet of Things here already? Wall-Mart uses RFID heavily in supply chain forced suppliers to use RFID (cases, pallets) faster handling in logistics and stores scan pallet of items quickly general: 1.8bn RFID tags produced 2005, 33bn forecast 2010 identity linking Tagging the physical environment with 2D barcodes 2D barcodes encode text, URLs (e.g. QR Code) attach digital information to physical objects physical world entry point to digital world identity linking 2 Monitoring environmental changes /~mayer sensor nodes for distributed monitoring, e.g. volcano activity environmental property linking Integration of different technologies will spawn great value physical-digital world mashups

RFID Internet of Things RFID is not the Internet of Things one of many enablers for the Internet of Things currently the most popular with large number of deployments looking at security and privacy only from the RFID perspective is wrong! Pitfalls from thinking RFID is all Evolution of an RFID object name service (ONS) other identification techniques need object registries, too what about 2D barcodes, sensor nodes, etc. ONS should be about identities, not bound to identification technology Broken Security&Privacy model for Internet of Things S&P research in RFID, in sensor networks, in think of a system that uses RFID, sensor networks, mobile phones how to integrate? RFID tag and 2D barcode attached to sensor node? will seperate security models prevent a system model? 3 Thinking of the Internet of Things in more general may yield a better security and privacy model

Evolution of Security&Privacy Evolutionary road Did we really learn from the past? S&P integration Growth, need for S&P! build patches and shims Need integrated S&P model for Internet of Things! build patches, integrate This time do it the right way! build S&P into RFID, build S&P into sensor networks today time 4 Beginning of Internet no need for S&P

Evolution of Security&Privacy Is there a better evolutionary road? S&P integration Build an integrated approach to S&P in the Internet of Things today time 5 Take time to develop a system approach for S&P in the Internet of Things

Systematic Approach to Security&Privacy First small steps towards systematic approach 1. Categorization of topics in the Internet of Things Take a step back from the technical perspective What are the generic topics taking part? 2. Assign technologies to topics What technologies fall into which topics? Do technologies appear in several topics? 3. Analyze sensitivity of topics to S&P See how sensitive topics are to S&P properties? Don t analyze technologies, analyze topics! 6 4. Analyze state of research in topics How much research has been done for the S&P properties? Has something been neglected?

Categorization of the Internet of Things What topics make up the Internet of Things Communication Identification Sensors Localization and Tracking Internet of Things Actuators Processing Storage 7 Devices

Categorization of the Internet of Things What technologies are attached to the topics Wireless Wired Cellular Overlays RFID RFID Infrared Video Barcodes Audio 2D Tags Communication Positioning Biometry Acceleration Video RFID GSM GPS Localization and Tracking Identification Internet of Things Sensors Actuators Temperature Proximity RFID reader Sensors Services Sensor Networks Global Sensor Networks Processing Devices Storage DHT Databases In-Network Processing 8 RFID tags RFID reader Mobile Phones Laptops Things Actuators Sensors

Categorization of the Internet of Things What technologies are attached to the topics Internet of Things Sensors Video Audio Positioning Acceleration Temperature Proximity RFID reader 9 Definitely not complete, needs more work but completeness it not the point here! providing a first approach to categorization

The Role of RFID Important point: RFID spans several topics Wireless Wired Cellular Overlays RFID RFID Infrared Video Barcodes Audio 2D Tags Communication Positioning Biometry Acceleration Video RFID Identification Sensors Temperature Proximity RFID reader GSM GPS Localization and Tracking Internet of Things Actuators Sensors Services Processing Storage Sensor Networks Global Sensor Networks Devices DHT Databases In-Network Processing 10 RFID tags RFID reader Things Actuators Mobile Phones Laptops Sensors

The Role of RFID Important point: RFID spans several topics Communication between tag and reader Sensors the reader senses the tag Devices reader and tag are devices Localization/Tracking if you know the reader location, you roughly know the tag and therewith object location 11 Identification the unique identification of the tag through the reader

Categorization of the Internet of Things Mid summary: takeaway points from last slides RFID is assigned to several topics Being unaware of this dual-use can end up badly Same with IP addresses! Used as locator and identifier. Now research into ID/Locator split Point is not to take RFID apart technically, but be aware of the multi-use when developing protocols S&P currently done per technology, not per topic Key question 12 Is it possible to design generic S&P mechanisms for a topic rather than for a technology?

Sensitivity to Security&Privacy Now that we have the general topics how sensitive are they to S&P properties? 13 Example Communication has high sensitivity to confidentiality don t want others to read my data Sensors have low sensitivity to confidentiality can always place my sensor near and sense the same physical property, therefore sensing in itself is not confidential

State of Research State of research in areas highly sensitive research areas that have been neglected? 14 Example Devices highly sensitive to integrity but few research devices that can affect to the physical world physical world DDoS from digital systems

Generic Security&Privacy And what now? categorization and analysis is a first step towards understanding the Internet of Things need to work out details Develop generic S&P mechanisms that work on a topic, not on a technology similar to privacy preserving data-mining makes interworking between technologies easier generic mechanisms with specializing properties can t deploy protocol for RFID and WLAN communication, but what about RFID and 2D barcodes? what are the common, what is different? proving properties of the protocol can be easier 15 Enables to develop an integrated S&P approach for the Internet of Things

Conclusions Summary RFID Internet of Things, need more generic S&P approach looking at topics, not directly at technologies can make it easier to develop a S&P model generic S&P mechanisms can provide better interworking that is required for the Internet of Things 16 Outlook categorization, sensitivity etc. only reflect my opinion, need discussion about these try to develop generic mechanisms, is it possible, is it better? learn from others cryptographic identifiers, privacy preserving data mining, multi-channel protocols (difference between RFID and 2D barcodes? mainly the channel)

Thank you! Question?