Security and Privacy in IoT Challenges to be won



Similar documents
CONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL

Internet of Things (IoT): A vision, architectural elements, and future directions

Workshop on Building international cooperation WG2 : Network Information Security / cyber security

Associate Prof. Dr. Victor Onomza Waziri

Secure cloud access system using JAR ABSTRACT:

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

USB Portable Storage Device: Security Problem Definition Summary

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Secure Cloud Identity Wallet

International Journal of Advance Research in Computer Science and Management Studies

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

Fundamentals of Network Security - Theory and Practice-

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

Link Layer and Network Layer Security for Wireless Networks

Brainloop Cloud Security

Information Security

Towards Trustworthy Clouds

ATTPS Publication: Trustworthy ICT Taxonomy

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Privacy and Identity Management for Europe

Privacy & Security of Mobile Cloud Computing (MCC)

Information Technology Branch Access Control Technical Standard

Bellevue University Cybersecurity Programs & Courses

Fight fire with fire when protecting sensitive data

An Encrypted File System

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Storm Clouds Rising: Security Challenges for IaaS Cloud Computing

Authentication in WLAN

Cloud Computing: Outsourcing Computation without Outsourcing Control

Security for Ubiquitous and Adhoc Networks

Providing Data Protection as a Service in Cloud Computing

E-Democracy and e-voting

Special Properties of Ad-hoc Wireless Network and Security Models

Cloud security architecture

User authentication in SIP

SCADA SYSTEMS AND SECURITY WHITEPAPER

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

USB Portable Storage Device: Security Problem Definition Summary

IoT R&I on IoT integration and platforms INTERNET OF THINGS FOCUS AREA

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

WWRF Cloud Implications to Security, Privacy, and Trust

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Future cybersecurity threats and research needs.

Today s Cybersecurity Technology: Is Your Business Getting Full Protection?

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Notes on Network Security - Introduction

Public Key Applications & Usage A Brief Insight

Content-Centric Networking Applications For Medical Devices and Healthcare Management Systems

Trust areas: a security paradigm for the Future Internet

Texas Medicaid & Healthcare Partnership (TMHP)

Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment

Firewall and VPN Investigation on Cloud Computing Performance

Introduction to Cyber Security / Information Security

SECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Welcome to Information Systems Security (503009)

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

OASIS Open Reputation Management Systems (ORMS) Technical Committee

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Exam 1 - CSIS 3755 Information Assurance

Securing MANET Using Diffie Hellman Digital Signature Scheme

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

NSF Workshop on Big Data Security and Privacy

INFORMATION SUPPLEMENT. Migrating from SSL and Early TLS. Version 1.0 Date: April 2015 Author: PCI Security Standards Council

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

How To Protect A Wireless Lan From A Rogue Access Point

Packet Level Authentication Overview

RFID Security: Threats, solutions and open challenges

Network Security in Building Networks

Improving SCADA Control Systems Security with Software Vulnerability Analysis

Big Data - Security and Privacy

SecureCom Mobile s mission is to help people keep their private communication private.

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

PUF Physical Unclonable Functions

NATIONAL CYBER SECURITY AWARENESS MONTH

Cyber Security and Privacy

On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems

Security and the Internet of Things

Intrusion Detection for Mobile Ad Hoc Networks

information security and its Describe what drives the need for information security.

What s wrong with SAAS login?

Kangas Cybersecurity strategy

A Method for Eliciting Security Requirements from the Business Process Models

Secure Data Exchange Solution

Cybersecurity for the C-Level

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

a new approach to IT security

Security Visualization Past, Present, Future

Introduction to Security

Cybersecurity Issues for Community Banks

Transcription:

Security and Privacy in IoT Challenges to be won Enrico Del Re University of Florence and CNIT Italy June 16-18, 2015 CHIST-ERA Conference 2015 1

FROM WHERE WE START.. June 16-18, 2015 CHIST-ERA Conference 2015 2

ICT-related activities in Horizon2020 - an Overview June 16-18, 2015 CHIST-ERA Conference 2015 3

ICT-related activities in Horizon2020 June 16-18, 2015 CHIST-ERA Conference 2015 4

IEEE ComSoc Vision of the future top technologies 5G Fiber everywhere Virtualization, SDN & NFV Everywhere connectivity for IoT and IoE Cognitive networks, Big data Cybersecurity Green communications Smarter smartphones and connected devices Network neutrality, Internet governance Molecular communications June 16-18, 2015 CHIST-ERA Conference 2015 5

IEEE CompSoc Vision of the future top technologies June 16-18, 2015 CHIST-ERA Conference 2015 6

Cloud Computing and Internet of Things Assumption that the recent steady advances in microelectronics, communications and information technology will continue into the foreseeable future CC and IoT potentially can provide breakthroughs and enormous benefits to the society and persons (e.g. e-health applications and services to disabled and elderly people, environment control and security, ) However, technical flaws and threats of intrusions might significantly lower the benefits of the new developments. Traditional protection techniques are insufficient to guarantee users security and privacy within the future framework Users not trusting in the new technologies could refuse partially or totally the new services Or, worse, they could become the new future slaves of a few big players June 16-18, 2015 CHIST-ERA Conference 2015 7

Some Security threats in IoT cloning of smart things by untrusted manufacturers malicious substitution of smart things during installation firmware replacement attack extraction of security parameters since smart things may be physically unprotected eavesdropping attack if the communication channel is not adequately protected man-in-the-middle attack during key exchange routing attacks denial-of-service attacks privacy threats June 16-18, 2015 CHIST-ERA Conference 2015 8

Some EU Statements on IoT Security and Privacy Design from the start to meet: The right of deletion The right to be forgotten Data portability Privacy and data protection principles with two general principles The IoT shall not violate human identity, human integrity, human rights, privacy or individual or public liberties. Individuals shall remain in control of their personal data generated or processed within the IoT, except where this would conflict with the previous principle. June 16-18, 2015 CHIST-ERA Conference 2015 9

Trustworthy user-centric IoT Widely acknowledged need to guarantee both technically and regulatory the neutrality of the future internet All aspects of security and privacy of the user data must be under the control of their original owner by means of as simple and efficient technical solutions as possible (user-controlled security) This challenging technical approach is not the only problem Different security and privacy applicable laws in different countries Different (i.e. opposite) business views from big players A fundamental and unbiased (i.e. public) research action on this topic is necessary built on a holistic view for all IoT elements at all stages Last but not least, user and social involvement since the beginning for two main reasons: Final users education and awareness of their IoT rights Technical solutions to satisfy shared and agreed objectives June 16-18, 2015 CHIST-ERA Conference 2015 10

Information-centric security Shift from protecting data from the outside (system and applications which use the data) to protecting data from within Put intelligence in the data itself Data needs to be self-describing and defending, regardless of the environment Data needs to be encrypted and packaged with a usage policy When accessed, data should consult its policy and attempt to re-create a secure environment using virtualization and reveal itself only if the environment is verified as trustworthy Information-centric security is a natural extension of the trend toward finer, stronger, and more usable data protection R. Chow, et al., Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control, ACM CCSW 09, 2009 June 16-18, 2015 CHIST-ERA Conference 2015 11

.LOOKING FORWARD. June 16-18, 2015 CHIST-ERA Conference 2015 12

Security challenges Secure Communication: Message Security How to protect messages confidentiality and integrity? Lightweight IPsec, Lightweight DTLS, IEEE 802.15.4 Security Secure Network: Intrusion Detection How to protect nets from attacks? new Intrusion Detection Systems (IDSs) Secure Device: Data Security How to securely store data? combining secure storage and communication for IP6LoWPAN networks June 16-18, 2015 CHIST-ERA Conference 2015 13

Encryption Lightweight crypthography efficiency of E2E communication applicability to low resource devices Homomorphic encryption processing carried out on cyphertext, generating an encrypted result that, when decrypted, gives the result of operations performed on the plaintext. Quantum cryptography Optical networks Physical layer cryptography Signature of the wireless channel (including noise) June 16-18, 2015 CHIST-ERA Conference 2015 14

Information and media authentication IoT will be more and more populated with contents directly generated by the users, according to a typical peer-to-peer communication paradigm. The ease with which false information can be diffused on the web increases doubt on the validity of the information gathered on-line as an accurate and trustworthy representation of reality visual signals are the preferred means to get access to information immediacy supposed objectivity But can we trust visual data? manipulation of visual data is becoming common Examples in several fields: propaganda, gossip, fashion June 16-18, 2015 CHIST-ERA Conference 2015 15

Multimedia Forensics It aims at extracting important information on the history of audio-visual contents Idea: inherent traces (like digital fingerprints or footprints) are left behind in a digital media during creation phase and any further successive processing These digital traces are extracted for understanding the history of digital content 2D-3D data protection and anticounterfeiting (watermarking) June 16-18, 2015 CHIST-ERA Conference 2015 16

Necessary Breakthroughs Information retrieval and data mining in a big data scenario contextual and semantic information to help media authentication in the extreme heterogeneity of the data available on the web Social studies what impact on society of counterfeited information in the web and mechanisms to minimize such an impact Social computing social authentication model: technological tools with social computing mechanisms together for information verification Legal aspects Ideally same regulations along the whole web June 16-18, 2015 CHIST-ERA Conference 2015 17

Thank you for your attention June 16-18, 2015 CHIST-ERA Conference 2015 18