On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016



Similar documents
SECURITY IN THE DISTRIBUTED INTERNET OF THINGS

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Internet of Things (IoT): A vision, architectural elements, and future directions

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Single Sign-On Secure Authentication Password Mechanism

WLAN Security is in the Architecture ICEFIN Workshop presentation Arch Red Oy, Karri Huhtanen, managing director

How To Secure Wireless Networks

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

Introduction to Cyber Security / Information Security

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

Data Security using Encryption in SwiftStack

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

Privacy & Security of Mobile Cloud Computing (MCC)

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

Service-Oriented Security Architecture for CII based on Sensor Networks

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Network Security Guidelines. e-governance

About the Authors Preface Acknowledgements List of Acronyms

Monitoring for network security and management. Cyber Solutions Inc.

Industrial Communication. Securing Industrial Wireless

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Performance Gathering and Implementing Portability on Cloud Storage Data

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Goals. Understanding security testing

Secure Networks for Process Control

CONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL

Release: 1. ICANWK607A Design and implement wireless network security

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Managing Data Storage in the Public Cloud. October 2009

Horizontal IoT Application Development using Semantic Web Technologies

Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

Cloud Computing Security Considerations

Security & Privacy Issues in Mobile Cloud Computing

Wireless Sensor Networks Chapter 14: Security in WSNs

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

CLOUD FRAMEWORK & SECURITY OVERVIEW

NIST s Guide to Secure Web Services

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Seminar: Security Metrics in Cloud Computing ( se)

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Who Controls Your Information in the Cloud?

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

A COMPREHENSIVE ANALYSIS OF SECURITY REQUIREMENTS AND APPROACHES FOR INTERNET OF THINGS

Security and Privacy Issues in Wireless Sensor Networks for Healthcare

Cesario Di Sarno. Security Information and Event Management in Critical Infrastructures

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

CHAPTER 7 SUMMARY AND CONCLUSION

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Enhancing the Security of Corporate Wi-Fi Networks Using DAIR. Example : Rogue AP. Challenges in Building an Enterprise-scale WiFi Monitoring System

An introduction to Cryptosoft

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

An Architecture for Video Surveillance Service based on P2P and Cloud Computing

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Unisys Security Solutions

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Security Threats on National Defense ICT based on IoT

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Wireless Local Area Network Deployment and Security Practices

Using etoken for SSL Web Authentication. SSL V3.0 Overview

How To Achieve Pca Compliance With Redhat Enterprise Linux

Penta Security 3rd Generation Web Application Firewall No Signature Required.

COSC 472 Network Security

Applying Cryptography as a Service to Mobile Applications

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

White Paper: Librestream Security Overview

How we keep harmful apps out of Google Play and keep your Android device safe

SCADA SYSTEMS AND SECURITY WHITEPAPER

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

SCADA System Security, Complexity, and Security Proof

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Trusted Network Connect (TNC)

Architecting Information Security Services for Federate Satellite Systems

VMware vsphere: [V5.5] Admin Training

Evaluating IaaS security risks

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Evaluation of different Open Source Identity management Systems

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

A Security Integrated Data Storage Model for Cloud Environment

SAN Conceptual and Design Basics

Access Control patient centric selective sharing Emergency Access Information Exchange

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

Wireless Sensor Network: Challenges, Issues and Research

KEY STEPS FOLLOWING A DATA BREACH

Transcription:

On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016

Outline Introduction IoT (Internet of Things) A distributed IoT Security and Privacy in IoT Conclusions

Introduction Internet of Things - A worldwide network of interconnected entities Eg: WSN, Mobiles, Cloud, Cars etc. Open a communication channel with other entities Two types of IoT Centralized Acquire information from entities and stored in Cloud Distributed Various platforms collaborate with each other like a P2P network

Distributed IoT and its taxonamy Edge Intelligence - Location of the intelligence and the provisioning of services at the edge of the network Collaboration - Collaboration between diverse entities in order to achieve a common goal Multiple entities collaborate with each other and appear as single system

Centralized IoT Networks are passive provide data All data is retrieved by single central entity and provides to consumers If users want to use IoT services they have to connect using this Centralized server Central entity Single server of cluster of machines is a cloud

Collaborative IoT Intelligence of network still Centralized Various entities generate or exchange data creating new services or modifying old services

Connected Intranet of Things Process information and also provide it to local entitites and central entities Even if central entities fail, local entities will work

Distributed IoT All the entities have the ability to retrieve, process, combine and provide information and services to other entities Collaborate with each other and with other IoT architectures

Analysis of IoT features Openness Flexible enough to allow 3 rd parties to develop new applications Viability business model and vendor lock in Reliability Assure certain level of availability and performance to specific needs Scalability Able to support or handle more data and devices Interoperability Interact with each other, service and semantic interoperability Data Management Where data should be stored and which data?

Analysis of Distributed IoT Superior scalability, Infrastructure complexity and limited vendor lock-in Data Management can be done only when it is needed Availability depends on number of resources invested in maintaining IoT Failure in one system doesn t affect the whole as in case of Centralized IoT

Security Issues in IoT Protocol and Network Security Identity Management Privacy Trust and Governance Fault Tolerance

Attacker models and Threats DoS Exhaust resources and bandwidth, jamming the channels in wireless Physical Damage Instead of trying to break a heavy encrypted system they just break it and cause loss of data Eavesdropping Listen to communication channels, Insider attackers gain access to infrastructure and monitor it Node Capture Extract information from things by taking it Controlling If a thing is in attackers control, he can use it for malicious purposes Users misconfiguration

Identity and Authentication How to authenticate the users to create a trustable service In Centralized IoT, central server takes this responsibility In Distributed IoT, no single point of authentication Promising approaches: 2 factor authentication Using social media accounts Use local identity providers and create a circle od trust with external resource providers

Access Controls Who is accessing what and is he allowed to? Centralized IoT data is managed by central entity, it implements the access control policies Distributed IoT multiple enforcement policies Promising approaches: Use of RBAC Authenticate themselves in the first position and then access must be granted

Protocol and Network Security Secure communication channel for credentials and certificates Distributed IoT key management becomes a problem Negotiate cryptographic algorithms, protection mechanisms as constrained devices might not be able to implement certain configurations Adaptability criticality of data Promising approaches: Support for existing protocols Local group should manage credentials If two servers know each other well known use symmetric encryption for exchange

Privacy Distributed IoT has benefits since every entity has command over the data it generated and processed Centralized IoT central server makes the decision to make the data available or not Promising approaches: User centric access control policies Study of privacy preserving data mining algorithms Incoming and Outgoing item must be scanned for rogue and malicious software that threatens privacy of the user

Trust and Governance Centralized IoT Which data is reliable and fresh, reads all data from entities and provides to other services Distributed IoT Who can give me robust and timely service, need to consider multiple devices for data Limit countries that access data in Distributed IoT for governance Promising approaches: Patterns of information signed and owned by a group User trusts this group he can access data and ratings from other users

Fault Tolerance Centralized IoT Points out other links if one link fails Distributed IoT Need to discover mechanism for one link to another Promising approaches: Create a model of surroundings to identify links For detection of bogus data uses of IDS which focus on insider threats but not consider external entities Centralized IoT uses existing clustering mechanisms to detect intrusions

Summary

Conclusions Addresses different security and privacy issues in IoT Centralized and Distributed IoT can coexist for a full fledged IoT

Ref: [RZL2013] Rodrigo Roman, Jianying Zhou, and Javier Lopez, On the features and challenges of security and privacy in distributed internet of things, Computer Networks, Volume 57, Issue 10, pp. 2266 2279, July 2013 Thanks Any Questions?