Looking through the crystal ball: Identifying future security, privacy and social risks in a prospective IoT scenario



Similar documents
Development of the Incorporating System of Automatic Contrast Injector and Radiology Information System (RIS) for Contrast-enhanced CT Examination

A. Background. In this Communication we can read:

2. Is registration with PARAFES free? Yes.

INCO-TRUST. INCO-TRUST: to set up a co-operation framework based on mutual interests & capabilities! Canada US S. Korea Japan.

RECOMMENDATIONS COMMISSION

The RFID Revolution: Your voice on the Challenges, Opportunities and Threats. Online Public Consultation Preliminary Overview of the Results

The RFID agenda of the European Commission. Florent Frederix European Commission Directorate General Information Society and Media

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION. of

IHS Technology. IHS Technology Business Intelligence Enabling market leadership through research, analysis and strategy

Tohoku University and the Great East Japan Earthquake Our Role, Responsibility and Mission. Susumu SATOMI President, Tohoku University

Passenger Flow Management & Technologies Study

Checking in at an airport check-in machine. Checking in at an airport check-in machine

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

Statewatch Briefing ID Cards in the EU: Current state of play

CONNECTing to the Future

NFC in Public Transport

Electronic Citizen Identities and Strong Authentication

What the EU -Japan Centre for Industrial Cooperation can offer to the EU and Japanese Companies? Silviu Jora, General Manager (EU side)

Applying for a Schengen visa

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

SESAR Studies & Demonstration Projects on RPAS & Cyber-Security

Technology Development of GIS Software in Cloud Era. Dr. Wang Kanghong, VP SuperMap Software Co., Ltd Tokyo 17 th Nov. 2015

How To Make A Terrorist Watchlist More Secure

Cyber security in an organization-transcending way

A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014

Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA.

RFIDs and European Policies

cgi.com Delivering Smarter Mobility

Protecting critical infrastructure from Cyber-attack

TERMINAL 2 ANNUAL REPORT 2006/07

Designing federated identity management architectures for addressing the recent attacks against online financial transactions.

Maintenance Training Concepts for the Wind Industry. BZEE Academy GmbH. 26 th of February, 2013, Tokyo

Internet of Things. Hafedh Yahmadi LOGO

Introduction of Japan Science and Technology Agency (JST)

Enabling the secure use of RFID

WWRF Cloud Implications to Security, Privacy, and Trust

Significant Factors Affecting Cross-Border Logistics through the Port of Laredo

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification.

1.2 Some of the figures included in this publication may be provisional only and may be revised in later issues.

Cloud Computing Security Considerations

2nd End-User Group Meeting on 3D Face Recognition

Response to the European Commission s consultation on the legal framework for the fundamental right to protection of personal data

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

FITMAN Future Internet Enablers for the Sensing Enterprise: A FIWARE Approach & Industrial Trialing

AUTOMOBILE LIABILITY SECURITY ACT

Cyber Security: Confronting the Threat

Q A. CWT To Go. Question Categories

IBX Business Network Platform Information Security Controls Document Classification [Public]

POSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND

How To Protect Your Computer From Attack

Information Security Risks when going cloud. How to deal with data security: an EU perspective.

How is the Internet of Things World Forum (IoTWF) different from the Industrial Internet Consortium (IIC) and other IoT-focused organizations?

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

Security through/under Diversity

Two-Factor Authentication: Tailor-Made for SMS

Three significant risks of FTP use and how to overcome them

CASE STUDIES ON CYBER SECURITY

Cloud Computing Governance & Security. Security Risks in the Cloud

BIOMETRIC RESIDENCE PERMIT (BRP) OVERSEAS APPLICANT PROJECT FAQ

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

Smart Transport ITS Norway

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

Securing Internet Payments. The current regulatory state of play

Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World

H2020 "Secure Societies" Work Programme Digital Security 2015

Border control using biometrics in Japan. September 2008 NEC Corporation/Daon

Cloud security architecture

Employee eligibility to work in the UK

National Cyber Security Strategies

Frequently Asked Questions

Privileged user management

In which new or innovative ways do you think RPAS will be used in the future?

Current Situation of Research Nurse Education and Future Perspectives in Japan

Transcription:

Looking through the crystal ball: Identifying future security, privacy and social risks in a prospective IoT scenario SecIoT 2010 29 th November 2010, Tokyo Barbara Daskala, CISSP, CISA, ENISA James Clarke, Waterford Institute of Technology, Ireland Dennis K. Nilsson, Swedish Institute of Computer Science, Sweden

Why a crystal ball? IoT is a prospective vision Considering a possible future IoT scenario on air travel [ENISA study] Using a risk assessment approach to identify potential risks Putting things in context: Covered many different aspects! IoT Vision Security, privacy, social, legal risks???

ENISA Flying 2.0 Study EC Communication Internet of Things An Action Plan for Europe Main Objective: identify and explore risks in a future air travel scenario, of emerging and future technologies and applications (IoT/ RFID, LBS ) Three different scenarios / three actors

ENISA Study WG Members Alessandro Bassi, Hitachi Europe SAS, France Jim Clarke, Researcher, Waterford Institute of Technology, Ireland France Charles de Couessin, Executive Partner, ID Partners, France Sotiris Ioannidis, Associate Researcher, Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece Eleni Kosta, Legal Researcher, K.U.Leuven - Interdisciplinary Centre for Law & ICT (ICRI), Belgium Paul McCarthy, Research Fellow, Lancaster University, UK Huang Ming-Yuh, Program Manager, Strategic Information Assurance, The Boeing Company, US Eurico Neves, CEO, INOVA+ Serviços de Consultadoria em Inovação Tecnológica SA, Portugal Dennis Nilsson, Consultant at Syncron Japan KK, Tokyo, Japan Milan Petkovic, Philips Research, The Netherlands Pawel Rotter, AGH University of Science and Technology in Krakow, Automatics Department, Poland Markus Tiemann, Human Factors and Cabin/Cargo Operations, AIRBUS Operations, Germany David Wright, Managing Partner, Trilateral Research & Consulting LLP, UK

The Akira scenario When: 2015-5 years into the future Who: Akira, 20 year-old, a Japanese scholarship student Where: airport (London to Japan), on the way to the airport, on the aircraft, arrival What: Use of smart technologies to perform the various steps of air travel

The major phases in the scenario Getting to the airport the Tube, London, RFID enabled card Airport check-in RFID-enabled frequent traveler card, fingerprint check Security & border access controls Waiting to board Social networking [JP- Professionals-unite.com] Boarding seamless In flight Internet in the air [ad-hoc network], Creative Commons Arrival and transfer Frequent flyer card contains luggage tags

The major phases in the scenario (cont d) Boarding seamless, smart boarding process based on verifying 2D barcodes as well as biometrically authenticating passengers In flight Internet in the air Arrival and transfer Personal electronic devices and airport infrastructure guide passengers through immigration control, luggage claim, and onwards to bus, train or rental car

Airline servers Databases PIU Databases On-line check-in Frequent Flyer Card Number VISA RFID tags Electronic Product Code

The risk assessment in brief Methodology based on ISO/IEC 27005:2008 Identify and valuate assets (values, rights, systems, services ): composite asset [data & physical device] Identify and assess vulnerabilities (of assets) and threats Identify and assess major risks in the scenario Make recommendations

What are we trying to protect? The assets INTANGIBLE Automated reservation, checking and boarding procedure Electronic visa issuing process Luggage and goods handling Automated traffic management TANGIBLE Passports and National ID cards Mobile smart devices Health monitoring devices Travel documents (paper) RFID & barcode readers Credit Cards/Debit card/payment cards/'e-wallet' Other RFID cards Scanners & detectors Networks State databases Commercial and other databases Temporary handset airport guides Luggage and goods Check-in infrastructure Airport facilities

Identifying major risk areas Technical High dependency on technology... Overall computing network infrastructure failure service interruption and unavailability Severe Realisation of malicious attacks to compromise systems (e.g. social networking, DoS attacks, cloning of RFID tags, jamming, blocking, side channel attack) Electronic ID failures: identity theft Failure of vehicles and ground transportation infrastructure traffic jams, accidents etc.

Identifying major risk areas (cont d) Policy & organizational Reservation, check-in and boarding procedures rendered unavailable Security screening failure (e.g. scanners malfunction, failure of procedures etc.) Interoperability issues across countries Cannot issue/control electronic visas Inability to travel: loss of paper documents, other delays / failures, check-in / passenger identification Procedures / instructions, devices complex to use not followed Press the???

Identifying major risk areas (cont d) Social (including privacy) Function creep / repurposing of data Loss of privacy Social sorting and social exclusion Increased surveillance Low user acceptance, user frustration data

Identifying major risks (cont d) Legal Lack of common or harmonized data protection legislation Legal vacuum Legislation lagging behind technological advancements Non-compliance with the data protection legislation NOTE Various risks are highly interconnected! Distinction between security, privacy risks not always very clear!

And now what? Addressing the risks requires considering many aspects POLICY Rethink existing business structures and introduce new business models User-friendliness of devices and procedures, include rather than exclude! RESEARCH Data protection and privacy Usability Managing trust Multi-modal person authentication Proposing standards of light cryptography protocols

LEGAL Reevaluate and update data protection legislation Harmonisation of data collection FOR EUROPEAN COMMISSION Enforcement and application of the European regulatory framework Alignment of research with industrial and societal needs promoting participation of industry, and in particular SMEs in research activities as FP7 Ethical limits research Recommendations (cont d) Need for impact assessment and trials of new technologies before deployment

Some conclusions... YES! IoT is a promising vision and may solve many problems! BUT There are important risks posed that need to be addressed SO we need to... - be proactive - weave security & privacy into IoT - work together! [existing EC initiatives on Privacy Impact Assessment framework of RFID applications and IoT Expert group and ]

Thank you! ありがとうございました! barbara.daskala@enisa.europa.eu For the ENISA report, visit: http://www.enisa.europa.eu/act/rm/emerging-and-future-risk/deliverables