The Internet of Things

Similar documents
The Internet of Things (IoT) and Industrial Networks. Guy Denis Rockwell Automation Alliance Manager Europe 2015

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Industrial Firewalls Endpoint Security

Security Threats on National Defense ICT based on IoT

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS

Alain Fiocco. Sr. Director CTO Office

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

Fog in Support of Emerging IoT Applications

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Reducing Configuration Complexity with Next Gen IoT Networks

Key requirements for Interoperable IoT systems

Secure, Efficient, and Open Standard Internet of Things

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

BlackRidge Technology Transport Access Control: Overview

Innovative Security for an Accelerating World New Approaches for Chief Security Officers

Security Issues with Integrated Smart Buildings

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

The Internet of Things:

Holistic View of Industrial Control Cyber Security

Securing IP Networks with Implementation of IPv6

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

A Systems Engineering Approach to Developing Cyber Security Professionals

The Internet of Everything: The Next Industrial Revolution

DDoS Protection Technology White Paper

OPC & Security Agenda

Life With Big Data and the Internet of Things

Security in Smart Grid / IoT. Nenad Andrejević Comtrade Solutions Engineering

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Musings on IOT. Tim Grance Jeff Voas. Computer Security Division Information Technology Laboratory National Institute of Standards and Technology

Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are

Advanced & Persistent Threat Analysis - I

Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects

Security Business Intelligence Big Data for Faster Detection/Response

What is Really Needed to Secure the Internet of Things?

Project 25 Security Services Overview

Beyond the Hype: Advanced Persistent Threats

Internet of Things based approach to Agriculture Monitoring

Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things

Content Security: Protect Your Network with Five Must-Haves

SCADA / Smart Grid Security Who is really in control of our Control Systems?

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Deploying Firewalls Throughout Your Organization

Chapter 1 The Principles of Auditing 1

Connected Manufacturing

Present and Act Upon. Register. Consume. Stream Analytics. Event Hubs. Field Gateway. Applications Cloud Gateway. Legacy IoT (custom protocols)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Evolving from SCADA to IoT

The Internet of Things Risks and Challenges

Securing Virtual Applications and Servers

In the pursuit of becoming smart

INLICHTINGEN DIENSTEN INLICHTINGEN DIENSTEN

6PANview: A Network Monitoring System for the Internet of Things

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Securing The Connected Enterprise

IBM Security Intrusion Prevention Solutions

Gregg Gerber. Strategic Engagement, Emerging Markets

One software solution to monitor your entire network, including devices, applications traffic and availability.

Cyber and Mobile Landscape, Challenges, & Best Practices

Smart Cities are the Internet of Things

Secure Networking for Critical Infrastructure. Ilan Barda March 2014

Making Sense of Internet of Things Protocols and Implementations

The Cyber Threat Profiler

Designing a security policy to protect your automation solution

What would you like to protect?

RIOT CONTROL The Art of Managing Risk for Internet of Things

Cyber Security for SCADA/ICS Networks

Study of Network Security along with Network Security Tools and Network Simulators

Enabling the SmartGrid through Cloud Computing

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Evolving Optical Transport Network Security

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

13 Courses Quick Guide

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Vulnerabili3es and A7acks

IOTIVITY AND EMBEDDED LINUX SUPPORT. Kishen Maloor Intel Open Source Technology Center

The Future of IoT. Zach Shelby VP Marketing, IoT Feb 3 rd, 2015

Principles of Information Assurance Syllabus

Security Coordination with IF-MAP

The Amazing Future of the IoE

Voice Over IP and Firewalls

Transcription:

The Internet of Things Powe re d by IPv6 Jeff Apcar Distinguished Services Engineer, Cisco Systems March 14 th 2014, ida IPv6 Conference

IoT Definition ** A collection of things Cisco Confidential 2

IoE/IoT/M2M Relationship to IPv6 (Russian Dolls) Cisco Confidential 3

IPv6: Connecting the Unconnected How much is CON Over 70% of humans are NOT connected Things NOT Connected Things Connected Cisco Confidential 4

IoT Rapid Growth 50 ~6 things online per person 50 Billions of Devices 40 30 20 Rapid adoption rate of digital infrastructure 5 x faster than electricity & telephony Inflection Point Billion SmartObjects 10 6.307 World Population 6.721 6.894 7.347 7.83 0 2003 2008 2010 2015 2020 Source: Cisco IBSG projections, UN Economic & Social Affairs http://www.un.org/esa/population/publications/longrange2/worldpop2300final.pdf Cisco Confidential 5

Shift In Dominant End Points Tablets, Laptops, Phones Human Interactions Energy Saving Smart Grid Sensors, Smart Objects, Device Clustered Systems Machine to machine interactions Transport and Connected Vehicles Analytics and Modelling Intelligent Buildings Safety & Security Improve Productivity Precision Agriculture Healthcare Predictive Maintenance Smart Home S+CC Cisco Confidential 6

Technology and Architecture Cisco Confidential 7

IoT Technology Drivers Cisco Confidential 8

IoT Architectural Philosophy Closed Systems (Little external interaction) Various Protocols (Modbus, SCADA, BACnet, LON, HART) Standardized Interfaces (Wireless/Wired) Standardized Networks (IP Based/ISO Stack) Protocol Gateways (Inherently complex, inefficient and fragmented networks) Proprietary Networks (Usually layer 2 based) From Distributed Intelligence (e.g. Fog Computing) To Cisco Confidential 9

IoT Architecture Data Points, Variety & Velocity, Security, Resiliency, Latency Hundreds Data Centre/Cloud Hosting IoT Analytics Thousands Backhaul IP/MPLS, Security, QoS, Multicast Data Centre/Cloud Core Network Transactional response times Infinite TB-PB Tens of Thousands to Millions Multi- Service Edge 3G/3G/LTE/WiFi/RF Mesh/PLC Te ns of Millions to Billions Embedded Systems & Sensors Low power, low bandwidth Sensing Correlation Control Fog Network Smart Objects/Endpoints Millsecond /seconds response GB-TB KB-GB Cisco Confidential 10

Fog Computing Field Area Networks Cisco Confidential 11

City Infrastructure Synchronize Signals for Emergency Vehicles Improve Congestion Management Better Profitability Cisco Confidential 12

Protocols for IoT Networks Various protocols applied to IoT networks Relevant Protocols for different layers Link Layer (eg., 802.15.4, PLC) Adaption Layer (6LowPAN) Routing (eg., RPL) Messaging (eg., CoAP) Security: (D)TLS, 802.1AR, 802.1X Designed for IPv6 Smart Grid Protocol Stack Example Cisco Confidential 13

IoT Device Characteristics Cisco Confidential 14

IoT Threats Cisco Confidential 15

IPv6 Protocol Is Subject To The Usual Attack Suspects Routing Attacks Reconnaissance Ping Ponging Flooding L4 Spoofing Fragm ent ation Viruses & Worms Sm urfing L3 Spoofing Denial of Service Rogue Devices Unauthorised access Man in the middle attacks Sniffing Neighbour Discovery Attacks DHCP Attacks Cisco Confidential 16

IoT: Where The Internet Meets The Physical World Internet of Yesterday Inf or mat ion Internet of Things Act uat ion From Closed systems Modbus SCADA CIP Modbus TCP SCADA TCP/IP Ether/IP To IP based systems IoT Extends the attack surface Cisco Confidential 17

Some IoT Threats Too many to mention, here are a few Common worms jumping from ICT to Io T Generally limited to things running consumer O/S: Windows, Linux, ios, Android Script Kiddies * or other targeting at residential IoT Unprotected webcams Stealing content Breaking into home control systems Organised Crime Access to intellectual property Sabotage and espionage Cyber Terrorism Nuclear plants (Stuxnet virus) Traffic monitoring Railways Critical infrastructure * Unskilled individuals who use scripts or programs developed by others to assemble attacks Source: Eric Vynke, Cisco Systems Cisco Confidential 18

Shodan: The Google for hackers Vulne ra b ilitie s g o we ll b e yond jus t IP p rotoc ols Cisco Confidential 19

IoT Security Framework Dynamic distributed intelligence Role Based Security Anti-tamper & Detection Data Protection & Confidentiality IP Protection Distributed Analytics & Management Network Enforcement/Segmentation Authenticated Encryption Connectivity Standards Stateful application visibility Auto enrollment & Provisioning Device Classification Standards for actuator & Sensors Cisco Confidential 20

What Next? The problem is more than IPv6 IoE industry is still evolving, large potential for zero-day attacks Opportunity to drive the security at the appropriate layer Embedded Endpoint layer comprises highly constrained devices So far has limited the growth of malware to this layer Growth of IP based sensors corresponds to attack surface growth New security protocols and identification techniques required Corresponding to the capabilities of the device endpoint IoT presents new challenges to network & security architects Learning machines will play a big part in this area Managed threat detection, anomaly detection, predictive analysis Cisco Confidential 21

Some Food For Thought Cisco Confidential 22

Near Enough IS Good Enough IoT Cisco Confidential 23

Near Enough Is Good Enough IoT Cisco Confidential 24

Thank you.