How To Understand The Concept Of Internet Of Things (Iot)



Similar documents
Potential Targets - Field Devices

Secure, Efficient, and Open Standard Internet of Things

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Smart Cities are the Internet of Things

Internet of Things based approach to Agriculture Monitoring

Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Internet of Things 2015/2016

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

Internet of Things. Laurent Toutain. June 11, Caen () IPv6 opérateur June 11, / 14

WHITE PAPER Security in M2M Communication What is secure enough?

Key requirements for Interoperable IoT systems

CS5008: Internet Computing

Making Sense of Internet of Things Protocols and Implementations

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Machine-to-Machine Technologies

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

Wireless Sensor Networks Chapter 14: Security in WSNs

A Study on the Security of RFID with Enhancing Privacy Protection

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Home Automation and Cybercrime

ARM mbed IoT Device Platform. November 3 rd, 2014

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

Robust protocols for the Industrial Internet of Things

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

Embedded Java & Secure Element for high security in IoT systems

SECURITY IN THE INTERNET OF THINGS

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

IPv6 Based Sensor Home Networking

Internet of Things (IoT): A vision, architectural elements, and future directions

Thingsquare Technology

Security in ST : From Company to Products

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept.

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

MACHINE TO MACHINE COMMUNICATIONS. ETSI TC M2M Overview June 2011

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT

PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS

Notes on Network Security - Introduction

Device-based Secure Data Management Scheme in a Smart Home

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

SSL BEST PRACTICES OVERVIEW

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Internet of Things (IoT): Middleware. Roch Glitho, PhD Associate Professor and Canada Research Chair My URL -

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

Sectra Communications ensuring security with flexibility

COSC 472 Network Security

Single Sign-On Secure Authentication Password Mechanism

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

Security vulnerabilities in the Internet and possible solutions

Flexible Architecture for Internet of Things Utilizing an Local Manager

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Problems of Security in Ad Hoc Sensor Network

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Back-end Server Reader Tag

Security in Wireless Local Area Network

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

Overview of the Internet of things

How To Write A Transport Layer Protocol For Wireless Networks

Business models in the Internet of Things. Miriam Cordero Head of Strategy - BT

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Tackling Security and Privacy Issues in Radio Frequency Identification Devices

TELE 301 Network Management. Lecture 18: Network Security

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Security Threats on National Defense ICT based on IoT

In the pursuit of becoming smart

Foundation University, Islamabad, Pakistan

Security in Vehicle Networks

Introduction of Information Security Research Division

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

The Future of IoT. Zach Shelby VP Marketing, IoT Feb 3 rd, 2015

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Enabling the secure use of RFID

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP

Wireless Sensor Network: Challenges, Issues and Research

Short range low power wireless devices and Internet of Things (IoT)

The Internet of Things

Network Security Policy

Privacy and Security in library RFID Issues, Practices and Architecture

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

Telecommunication Systems in Smart Cities

SecureCom Mobile s mission is to help people keep their private communication private.

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

MUNICIPAL WIRELESS NETWORK

Human Factors in Information Security

Implementing Existing Management Protocols on Constrained Devices. IETF 81, Quebec,

Transcription:

Privacy and Security Challenges in Internet of Things Manik Lal Das DA-IICT, Gandhinagar

Disclaimer Many third party copyrighted material is reused within this talk under the 'fair use' approach, for sake of educational purpose only. As a consequence, the usage of this presentation is restricted, and is falling under usual copyrights usage. Thank you for your understanding!

Internet of Things (IoT) The definition of Internet of Things (IoT) evolves around the central concept : a world-wide network of interconnected objects, where objects can be addressable through unique identity accessible through Internet (sometimes via intelligent interface) self organized and repairable

Internet of Things (IoT) The definition of Internet of Things (IoT) evolves around the central concept : a world-wide network of interconnected objects, where objects can be addressable through unique identity accessible through Internet (sometimes via intelligent interface) self organized and repairable A world of intelligent, adaptive, self organized sensors, actuators, other devices and systems that use various network technologies to connect each and every objects of physical world to web of world.

Computing Trends Precomputer era Wired Computing era Wireless Computing era Web of world H2H H2M H2M M2M

What is Machine-to-Machine (M2M)? Machine-To-Machine Device (e.g. water meter) which is monitored by means of sensors. Machine-To-Machine Network which facilitates end-to-end connectivity between machines. Composed of radio, access network, gateway, backend server. Machine-To-Machine Device (e.g. valve) which is instructed to actuate. Device (e.g. computer) which automatically controls and instructs other machines.

H2M M2M INSTRUMENTED Event capturing and filtering for timely response. Embedded computing delivers innovative solutions. INTERCONNECTED Anytime-Anywhere-Anything connectivity. INTELLIGENT Human-computer-interface, user behaviour, business intelligence

Global M2M connections 2013-22 Courtesy: Machina Research

Asia M2M connections 2013-22 Courtesy: Machina Research

M2M connections: Driven by IB and CE Courtesy: Machina Research

M2M

M2M WoW

M2M WoW IoT

IoT Scenario

Technological perspectives IoT Perspectives IoT requires context-based technological advancement, keeping consumers convenience as the primary concern. Security, privacy, trusts, ownership of data as well as services are important concerns that would bring significant challenges and opportunities to manufacturers, developers, service providers and service consumers.

Business perspectives IoT Perspectives Tremendous potential of electronic business has already been arrived and that is going to be scaled up in multiple folds in IoT scenarios. The factors that could work for adopting IoT in industry are Standards, specification, compliance, interoperability, integration, security, privacy, trusts, and ownership. The maximum beneficiary of IoT infrastructure is industry itself.

Economic perspectives IoT Perspectives The economic perspectives of IoT offer two kinds of incentives consumers and suppliers. consumers would benefit from IoT infrastructure in terms of time management (e.g. connecting home appliances to office premises), flexibility (e.g. anytime-anywhere service), security (e.g. door/vehicle-lock/unlock alarm to mobile handset), and revenue (e.g. smart energy, smart transport, smart shopping). suppliers would benefit by generating revenues in terms of smart services, smart devices and smart technology to assess vulnerabilities and addressing them for consumers satisfaction. Small scale service providers can use third party infrastructure for resource sharing/pooling, and large scale providers can make best use of small industries services.

Human perspectives IoT Perspectives Intellectual property, technologies, and information on core processes reside in human minds can be used in IoT in a controlled way depending upon consumers and suppliers requirement. Manufacturers can act as a single source and/or a single point of failure for mission-critical application. Security and privacy of objects could pose a serious threat to applications and human as well.

IETF IoT Standards/Specificaton 6LoWPAN Working Group (WG) ROLL (Routing Over Low-power Lossy Networks) WG CoRE WG (REST for IoT, CoAP) TLS WG (DTLS) ETSI M2M system standardization (CoAP) IEEE Standard Association IoT http://standards.ieee.org/innovate/iot/

IoT actors/applications Smart Home/Office Smart City WSN, RFID Smart Agriculture Internet of Things Smart Retail WSN Smart Metering Smart Transportation

Smart shopping carts All items in the shopping centre are RFID tag-enabled. As items add into the cart, items details scanned by the reader. Source: http://www.rfidjournal.com/article/articleprint/3868/-1/1/

Smart Refrigerator Recognize what s been put in it. Recognize when items are removed. Notify you when items are expired. Shows recipes that most closely match with what is available in it. Access refrigerator from a handheld device (from office or shopping complex). Source: http://cs.nyu.edu/~jml414/ui/assign3/smart_refrig.html

IoT actors Constrained device is a low-cost, low-power device that might have following functionality: communicate on short distances (WSN, RFID) sense environmental data (WSN) perform limited data processing The communication between devices and other entities rely on radio wave, which is susceptible to many attacks.

Characteristics of Constrained Device Constraints Resource constraints Operation unattended Not tamper-resistant Lack of central control No pre-configured topology Implications Protocol must be energyefficient Adversary can capture any device Adversary can compromise device s data Cooperative data exchange Device does not know neighbours in advance

Network domain Device domain Application domain

CoAP: Constrained Application Protocol[RFC 7252] Constrained Enviroments Sensor Internet Resources CoAP CoAP HTTP HTTP Proxy Server Client UDP 6LoWPAN 802.15.4 Contiki, Tiny OS, 8-bit microcontrollers 100KB of RAM for code CoAP is an application layer protocol that enables web services for constrained devices and networks.

Proxy CoAP CoAP CoAP CoAP Proxy CoAP IoT Hub Proxy Proxy CoAP CoAP CoAP Proxy CoAP CoAP CoAP CoAP CoAP CoAP Healthcare CoAP Proxy

Internet is possibly the victim of its success as far as security is concerned

Security figure out what you mean In an objective sense, security measures the absence of threats to acquired values. In a subjective sense, security measures the absence of fear that such values will be attacked. Security is a system property. Security is much more than a set of functions and mechanisms.

Privacy again figure out what you mean Object Privacy: eavesdropping, tracking, stealing data. Location Privacy: tracking, monitoring, revealing data. On one hand, entity who carries device-enabled does not want to be tracked by the terminal, which could preserve its privacy. On the other hand, one requires tracing device-enabled criminals or suspicious objects in a controlled way, which could save money, national assets and human lives.

Security and Privacy challenges Authentication, Integrity, Confidentiality,, based on application requirement. Universal authentication Identity management Authorized access of data Availability of data (a big challenge in near future!) Lightweight security protocol for constrained environments. Privacy preserving service. Trust and ownership issues.

A Two-party game Who are you? I m Bob Prover Verifier Authentication, integrity

A Two-party game contd. Challenge c Response f(x,c) Prover Confirmation f(x,c ) Verifier (mutual)authentication, integrity, transient key establishment,

Privacy-preserved data --> avoiding link or trace. Authentication-preserved data --> avoiding impersonation. Integrity-preserved data --> avoiding data alteration. Confidentiality-preserved data --> avoiding unauthorized access to data

Privacy-preserved data --> avoiding link or trace. Authentication-preserved data --> avoiding impersonation. Integrity-preserved data --> avoiding data alteration. Confidentiality-preserved data --> avoiding unauthorized access to data

Privacy is the goal Prover key, idv Compute challenge Challenge(T) C r Verifier key, idp Response (R) C r = PRF key (idp idv T R) C t = PRF key (idv idp R T) C t Privacy preserving

IoT scenarios/applications Home appliances Transport E-Governance Social networking Defense

Privacy-preserved data --> avoiding link or tracing. Authentication-preserved data --> avoiding impersonation. Integrity-preserved data --> avoiding data alteration. Confidentiality-preserved data --> avoiding unauthorized access to data

Privacy, authentication are golas Prover key, idv Compute challenge C r = PRF key (idp idv T R) Check whether C r = C r C t = PRF key (idv idp R T) Challenge(T) C r C t Verifier key, idp Response (R) C r = PRF key (idp idv T R) Prover authentication Verifier authentication Privacy preserving Check whether C t = PRF key (idv idp R T) = C t

IoT scenarios/applications Home appliances Transport E-Governance Social networking Banking Enterprise systems Telecommunication Education Agriculture Defense

Privacy-preserved data --> avoiding link or tracing. Authentication-preserved data --> avoiding impersonation. Integrity-preserved data --> avoiding data alteration. Confidentiality-preserved data --> avoiding unauthorized access to data

Privacy, authentication, confidentiality Prover key, idv Compute challenge C r = PRF key (idp idv T R) Check whether C r = C r C t = PRF key (idv idp R T) Challenge(T) C r C t Verifier key, idp Response (R) C r = PRF key (idp idv T R) Prover authentication Verifier authentication Privacy preserving Traffic confidentiality SK = PRF(C, R, ) Check whether C t = PRF key (idv idp R T) = C t

IoT scenarios/applications Home appliances Transport E-Governance Social networking Defense Home appliances Transport E-Governance Social networking Defense Banking Consumer Electronics Telecommunication Smart grids Healthcare Home appliances Transport E-Governance Social networking Defense Banking Consumer Electronics Smart Grids Healthcare

Adversarial Capability Assume that the adversary is capable of intercepting communication between Prover and Verifier, and can inject data, alter content and delete data. The adversary can execute some queries like sendprover, sendverifier, corruptprover.

Security of the protocol Correctness: legitimate Prover must be accepted. Soundness: fake Prover should be rejected.

Security claim For every set of inputs the result of a real execution of the protocol with Adversary should not give non-negligible advantage in the security parameter of the keying material. Security is guaranteed if the protocol is sound against a reasonably acceptable adversarial model.

Privacy of the protocol Learning Phase: Adversary gathers enough (T, C t ) and (R, C r ) by sendprover and sendverifier queries with many provers. Assume that the adversary has compromised all provers except 2 provers, say P 1 and P 2. Challenge Phase: Challenger submits the following to the adversary: Exp b S, A(k): 1. t b R Z q 2. T b, C b, real SendProver real (., x b ) 3. Return P b, real Exp b S, A(k): 1. t b R Z q 2. T b, C b, random SendProver random (., x b ) 3. Return P b, random Adversary s task is to guess whether P b,t {P 1, P 2 }, where t {real, random}.

Privacy claim For every set of inputs the result of a real execution of the protocol with Adversary is computationally indistinguishable from the result of a random execution with Adversary. Privacy is guaranteed if the adversary cannot distinguish with which one of two provers, he is interacting through a large set of gathered queries.

Finally, Efficiency is equally important Gate Equivalent (GE), a standard measurement unit Example: On a constraint chip the implementation of: - the ECDSA takes roughly 10000 GE - the AES encryption takes roughly 3600 GE - the hash algorithm SHA-1 takes roughly 8120 GE - the EC point multiplication takes roughly 1000 GE With this, the cost of the protocol discussed here would be: for privacy-preserving feature ~ 5600 GE at each side. for privacy, authentication-preserving feature ~ 9200 GE at each side. for privacy, authentication, confidentiality-preserving feature ~ 11200 GE. Courtesy: D. M. Hein, J. Wolkerstorfer, and N. Felber. ECC is ready for RFID - a proof in silicon. In proc. of International Workshop on Selected Areas in Cryptography, LNCS 5381, Springer, pp. 401 413, 2009.

Conclusions The reality of IoT is not far, around the corner. enormous scope, challenges, and opportunities Internet along with high speed mobile communication would become communication backbone for IoT infrastructure. Manufacturers, service providers need to agree on a set of solutions based on functional and financial goals.

Conclusions Security and privacy issues need more emphasis on constrained environments (traditional solution may not work!) - Lightweight crypto primitive - Proxy security, data ownership, trust, - Denial of service, lock/unlock service, destroying data, Finally, regulatory issues, political factors have to be resolved. Thanks!