SlideShare a Scribd company logo
1 of 46
Download to read offline
economid@uom.gr
http://conta.uom.gr
• Introduction to IoT & Market
• Smart Applications
• Technology & Research Challenges
• Security Threats
• Wireless Sensor Network Security
• Security Visualization
• Conclusions
Outline of the Presentation
CTTC 2015 seminar by Prof. A.A. Economides 2
Introduction to Internet of Things (IoT)
3CTTC 2015 seminar by Prof. A.A. Economides
2020 forecast :
• 25 - 50 billion devices (Cisco, Ericsson, IDC, ABI, Gartner)
• 26 objects/ person (Intel)
• Economic impact: $ 2 - 5 trillion (Cisco, McKinsey Global Institute,
IDC, GSMA & Machina Research, Gartner, Harbor)
“Worldwide ICT infrastructure that enables ubiquitous services
among interacting humans, machines, data and applications”
75% of companies are already exploring the IoT.
15 % of companies already have an IoT solution in place
(21 % of transportation & logistics companies)
53 % plan to implement one within the next 24 months,
and another 14 % in the next two to five years.
(source: Zebra Technologies / Forrester Consulting).
IoT deployment
CTTC 2015 seminar by Prof. A.A. Economides 4
5CTTC 2015 seminar by Prof. A.A. Economides
Cisco predicts that IoT will cause IP traffic to reach
1.6 zettabytes by 2018 (300% increase compared to 2013).
By 2018,
57% of IP traffic will come from devices other than PCs.
Wi-Fi will generate 49% of IP traffic,
other mobile-connected devices will generate 12% of it.
Cisco will invest $1 billion to build the world's largest
Intercloud network to tackle the IoT.
Cisco plans an Intercloud network
6CTTC 2015 seminar by Prof. A.A. Economides
Healthcare & Wellbeing, e.g. Angel Sensor, Fitbit, Hexoskin, Intraway, Jawbone,
Nymi, InKol Health Hub, Pebble, Philips Lifeline, Withings, Zebra MotionWorks,
Home & Building, e.g. Belkin, Nest, Neurio, Quirky, Sensorflare, SMA, SmartThings,
Vivint, WallyHome, Withings, ZEN Thermostat,
City & Community, e.g. Bigbelly, Bitlock¸ FUKUSHIMA Wheel, Kiunsys, Placemeter,
Silver Spring Networks, Waspmote,
Utilities, e.g. Enevo, Mayflower CMS, MeterNet, Osprey Informatics, Paradox,
Trilliant,
Environment, Agriculture & Livestock, e.g. FilesThruTheAir, Fruition Sciences,
OnFarm, Semios, Topcon Precision Agriculture,
Car & Transportation, e.g. Audi, CarKnow, Connected Rail, Dash drive smart, Delphi
Connect, Ericsson, Libelium, Logitrac, PowerFleet,
Industry & Services, e.g. Argon Underground Mining Safety, Condeco Sense,
DAQRI’s Smart Helmet, Numerex, Perch.
Smart Applications
7CTTC 2015 seminar by Prof. A.A. Economides
83 projects across 12 areas: sensors monitor traffic, parking spaces,
street lights, air pollution, meteorological conditions, humidity of
green spaces in parks, trash bins ...
Street lights in Born are shut down automatically if they don’t detect
any activity nearby. They also monitor humidity, temperature,
pollution, and noise. Expected to have 3,360 lights on 160 streets
by 2015.
The trash cans alert sanitation workers on a tablet that they need to
be emptied.
The irrigation systems in Poblenou Central Park monitor the moisture
in the soil and turning on pop-up sprinklers. Parks employees can
also access meteorological data and rain gauges and adjust the
quantity of water used.
Barcelona Smart City
8CTTC 2015 seminar by Prof. A.A. Economides
Technology
CTTC 2015 seminar by Prof. A.A. Economides 9
Sensors & Actuators
Wireless Communications:
RFID, WiFi, Bluetooth, Cellular, Satellite, etc.
Cloud Computing –
Storage, Processing, Analytics, Security, etc.
Networks (HW & SW)
Addressing
CTTC 2015 seminar by Prof. A.A. Economides 10
Application/Data Layer
Transport Layer
NWK Layer
DataLink Layer
PHY Layer
SEP 2.0
ZigBee
Wi-Fi
IEEE
802.15.4
Bluetooth
4.0
LowEnergy
3GPP
RFID/NFC
IPv6
TCP
HTTP CoAP
RPL
6LoWPAN
TCP/UDP
Application 1 Application 2 Application N° ° ° °
ONEM2M/ETSI M2M Service Layer
CTTC 2015 seminar by Prof. A.A. Economides
Source: IoT-Butler.eu
• AllSeen Alliance
• Eclipse Foundation
• Industrial Internet Consortium
• Internet of Things Consortium
• Internet Protocol for Smart Objects (IPSO) Alliance
• IoT Alliance
• Oasis
• OneM2M
• Open Interconnect Consortium (OIC)
• Thread Group
• ZigBee Alliance
IoT Alliances
12CTTC 2015 seminar by Prof. A.A. Economides
13CTTC 2015 seminar by Prof. A.A. Economides
Source: D.Culler (2011). The Internet of Every
Thing - steps toward sustainability. CWSN.
 Devices (Sensors, Actuators, etc.),
 Networking & Communications,
 Data Management,
 Decision Making,
 Security & Privacy,
 Social & Legal issues,
 Economics,
 Human Behavior & Usability,
 Marketing, etc.
Research Challenges
CTTC 2015 seminar by Prof. A.A. Economides 14
#1 New threats to data / physical security
(42 % responders)
#2 Inability of IT systems to keep pace with change
(38 % responders)
#3 Regulatory or compliance challenges
(32 % responders)
Biggest Drawbacks of IoT (Cisco survey)
15CTTC 2015 seminar by Prof. A.A. Economides
 The Center for Strategic and International Studies
estimated that $100 billion is lost annually to the US
economy, and 508,000 US jobs are lost, because of
malicious online activity.
 Ponemon Institute estimated that the average cost
of an organizational data breach was $5.4 million in
2014 ($4.5 million in 2013).
Losses due to attacks
16CTTC 2015 seminar by Prof. A.A. Economides
Nearly half (46%) of the IT leaders said that they
will invest more next year in:
 access control,
 intrusion prevention,
 identity management,
 virus and malware protection.
ComputerWorld Survey
17CTTC 2015 seminar by Prof. A.A. Economides
 M2M Network Security market will grow at a CAGR
of 22.9 % over the period 2013-2018 (TechNavio)
 IoT and Industrial Security Market to exceed
$ 675 million by 2018 (Infonetics)
Network Security market
18CTTC 2015 seminar by Prof. A.A. Economides
What do you think the greatest threat IoT will
be over the next 5 years?
19CTTC 2015 seminar by Prof. A.A. Economides
source: SANS survey
Where do you consider the greatest risk to be in
“Things” connecting to your network and the Internet?
20CTTC 2015 seminar by Prof. A.A. Economides
source: SANS survey
Given the current state of your security program, how
would you rate your ability to provide security to IoT ?
21CTTC 2015 seminar by Prof. A.A. Economides
source: SANS survey
• 25 % - 50 % of remote workers and IT personnel who work
remotely in critical infrastructure industries report that they
have at least one IoT device connected to corporate
networks.
• 75 % admit to accessing corporate documents from their
home networks.
• only 30 % of IT professionals believe their company has the
technology necessary to adequately evaluate the security of
IoT devices,
• 59 % of IT personnel are concerned that IoT could become
“the most significant security risk on their network.”
• 20 % of respondents state that they have “no visibility” into
current protection levels.
Tripwire & AtomicResearch surveys
22CTTC 2015 seminar by Prof. A.A. Economides
Chief Information Security Officers and Security Operations
executives at 1700 companies in nine countries (2015):
• Only 10% of Internet Explorer users run the latest
version.
• Less than 50% of respondents use standard tools
such as patching and configuration to help prevent
security breaches and ensure that they are running
the latest versions.
Cisco Security Capabilities Benchmark
23CTTC 2015 seminar by Prof. A.A. Economides
• 6 out of the 10 popular IoT devices did not use
encryption when downloading software updates.
• 90 % of the devices collected at least one piece of
personal information via the device, the cloud, or its
mobile application.
• 70 % of the devices used unencrypted network
service and transmitted credentials in plain text.
Hewllet Packard tested 10 IoT devices
24CTTC 2015 seminar by Prof. A.A. Economides
1. Insecure web interface
2. Insufficient authentication
3. Insecure network services
4. Lack of transport encryptions
5. Privacy concerns
6. Insecure cloud interface
7. Insecure mobile interface
8. Insufficient security configurability
9. Insecure software
10. Poor physical security OWASP
Top 10 security problems with IoT devices
25CTTC 2015 seminar by Prof. A.A. Economides
Avast: Routers will be a prime target for hackers.
Hackers may want to take over the local network.
WatchGuard: - criminals stealing billions in digital assets,
- nation states launching long-term attacks.
NOT to worry about IoT security (for now):
NOT much value attacking your watch or TV.
Symantec: Attacks on IoT will focus on smart home.
NOT expect any large-scale attacks, but instead
one-off attacks against connected devices, e.g.
home routers, smart TVs & connected car apps.
Security predictions for 2015
26CTTC 2015 seminar by Prof. A.A. Economides
 A wireless network consisting of a large number of
autonomous sensors that are spatially distributed in area of
interest in order to cooperatively monitor physical or
environmental conditions, such as temperature, sound,
vibration, pressure, motion, pollutants, etc.
 Sensor:
Wireless Sensor Network (WSN)
27CTTC 2015 seminar by Prof. A.A. Economides
Sensors
ADC
Processor
Memory
Transceiver
Location finding system
(optional)
Mobilizer
(optional)
Sensing Unit Processing Unit
Power unit
Communication Unit
WSN Architecture
28CTTC 2015 seminar by Prof. A.A. Economides
Internet,
Satellite
Sink
Sink
Task
Manager
User
Sensor
Field
Sensor
Node
Figure –The big picture
WSNs are vulnerable
to various types of attacks
29
CTTC 2015 seminar by Prof. A.A. Economides
Internet,
Satellite
Sink
Sink
Task
Manager
User
Sensor
Field
Sensor
Node
Spoofed
Routing
information
Wormhole
Attack
 Eavesdropping: an attacker intercepts packets transmitted over the air for further
cryptanalysis or traffic analysis.
 Traffic analysis: allows an attacker to determine that there is activity in the
network, the location of the BSs, and the type of protocols being used.
 Message injection: an adversary injects bogus control information into the data
stream.
 Message modification: a previously captured message is modified before being
retransmitted
 Node capture: An embedded device is considered being compromised when an
attacker, through various means, gains control to the node itself.
 Denial-of-Service (DoS) attacks: can be grouped into two categories
 Service degradation (e.g., collision attack), and
 Service disablement through power exhaustion (e.g. jamming)
Attack Models
30CTTC 2015 seminar by Prof. A.A. Economides
PassiveattacksActiveattacks
Layer-based attack categorization
CTTC 2015 seminar by Prof. A.A. Economides
31
Application Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
FloodingAttack | Desynchronization attacks
ReplayAttack | SybilAttack | Spoofed, altered, or replayed routing
information | Sinkhole, Wormhole Attack | Hello FloodAttack
CollisionAttack | SybilAttack | Node Replication |Acknowledgement
SpoofingAttack
Eavesdropping | Jamming | Battery Exhaustion
PowerManagementPlane
MobilityManagementPlane
TaskManagementPlane
DataAggregation Distortion | Message Injection or Modification
Figure – Sensor Network Protocol Stack
Attacks on specific protocols
Selective forwarding: A malicious node refuses to forward all or a subset of
the packets it receives and simply drops them. If a malicious node drops all
the packets, the attack is then called black hole.
CTTC 2015 seminar by Prof. A.A. Economides
32
Acknowledgement spoofing: Spoof link layer
acknowledgements (ACKs) to trick other
nodes to believe that a link or node is either
dead or alive.
Attack against TinyOS beaconing: The base
station periodically broadcasts beacons or
“route updates”. An attacker can use this
mechanism to create routing loops by
announcing a different node as the BS.
Figure-Attack againstTinyOS beaconing
Spoofed, altered, or replayed routing
information
33
CTTC 2015 seminar by Prof. A.A. Economides
This type of attack may be used for:
 loop construction
 attracting or repelling
traffic,
 extending or shortening
the source route
In this example, an adversary
pollutes the entire network by
sending bogus routing
information stating for instance
that “I am the base station”. Figure -An adversary spoofing a routing update from a
base station
Wormhole and Sinkhole Attacks
The attacker uses two
transceivers and one high
quality out-of-band channel in
order to create a ‘wormhole’.
Then, the attacker tunnels the
packets received at one
location of the network and
replays them in another
location.
The wormhole can drop packets
directly (sinkhole) or more
subtly selectively forward
packets to avoid detection.
CTTC 2015 seminar by Prof. A.A. Economides
34
Wormhole link
Figure -A laptop-class adversary using a wormhole to create a
sinkhole inTinyOS beaconing.
HELLO Flood Attack
CTTC 2015 seminar by Prof. A.A. Economides
35
Every new node broadcasts “Hello messages” to
find its neighbors. Also, it broadcasts its
route to the BS.
Other nodes may choose to route data through
this new node if the path is shorter.
A laptop-class adversary that can retransmit a
routing update with enough power to be
received by the entire network leaves many
nodes stranded.
Target nodes attempt to reply, but the adversary
node is out of radio range. However, they
have chosen this node as their parent
This attack puts the network in a state of
confusion.
Figure - HELLO flood attack.
Sybil Attack
 “a malicious node
illegitimately claims
multiple identities”
 The Sybil attack can
disrupt geographic and
multi-path routing
protocols.
36
Adversary A at actual location (3,2) forges location advertisements for
non-existent nodes A1, A2, and A3 as well as advertising her own
location. After hearing these advertisements, if B wants to send a
message to C: (0,2), it will attempt to do so through A3. This
transmission can be overheard and handled by the adversary A.
 Confidentiality is provided through the use of encryption technologies.
Cryptographic algorithms such as the DES, RC5, RSA are used to
protect the secrecy of a message.
 MAC (Message Authentication Code) or Digital Signature Algorithms
(DSA) can be used to assure the recipient’s integrity of the data and
authenticity of the message
 Digital Signatures can be used to ensure non-repudiation.
 Availability can be achieved by adding redundant nodes. Multi path and
probabilistic routing can also be used to minimize the impact of
unavailability.
 Data freshness is ensured by adding a counter value in each message.
Overview of Countermeasures
37CTTC 2015 seminar by Prof. A.A. Economides
• SNEP (Secure Network Encryption Protocol)
• μTESLA
• TinySec
1. authenticated encryption (TinySec-AE)
Data payload is encrypted
MAC is used to authenticate packet
2. authentication only (TinySec-Auth)
Standalone Security Protocols for WSNs
38CTTC 2015 seminar by Prof. A.A. Economides
A summary of attacks against routing
protocols
39CTTC 2015 seminar by Prof. A.A. Economides
Protocol Relevant Attacks
Directed diffusion and its multipath
variants
Bogus routing information, selective forwarding,
sinkholes, Sybil attack, wormholes, HELLO floods
Geographic routing (GPSR, GEAR) Bogus routing information, selective forwarding,
Sybil attack
Minimum cost forwarding Bogus routing information, selective forwarding,
sinkholes, wormholes, HELLO floods
Clustering-based protocols
(LEACH, TEEN, PEGASIS)
Selective forwarding, HELLO floods
Rumor routing Bogus routing information, selective forwarding,
sinkholes, Sybil, wormholes
Energy conserving topology
maintenance (SPAN, GAF, CEC, AFECA)
Bogus routing information, Sybil attack, HELLO
floods
• Link layer security
– Simple link layer encryption and authentication using a globally
shared key can prevent the majority of outsider attacks: bogus
routing information, Sybil, Selective Forwarding, Sinkholes.
– Link layer security mechanisms provide little protection against
insiders, HELLO floods, and Wormholes.
• Wormhole and sinkhole attacks
– Routing protocols that construct a topology initiated by a base station
are the most vulnerable against these types of attacks.
 Solution: Geographic protocols that construct topology on demand
using localized node interactions instead of using the base station.
Secure Routing – Countermeasures
40CTTC 2015 seminar by Prof. A.A. Economides
• Various security mechanisms have been proposed to address the
security concerns of WSNs.
• Despite the fast development of computer security mechanisms,
the scale and complexity of the generated wireless data put major
challenges to the representation and understanding of security-
relevant network information.
• To address this issue, efficient visualization techniques have been
adopted by the researchers to bridge the gap.
A new security discipline emerges!
Network Security Visualization
41CTTC 2015 seminar by Prof. A.A. Economides
• Network traffic visualization is one of the first directions to take when it
comes to understanding, and analyzing information in vast amounts of
network data.
• Many visualization tools graphically monitor real-world or simulated
WSNs (e.g. Surge, MoteView, Octopus, SNA, TOSSIM, OPNET, NS-3).
• While these tools offer some form of visualization, they are designed for
applications other than wireless security. Accordingly, these tools:
– lack the specialized techniques in visualizing security-related data.
– tend to miss abnormalities and security attacks that occur
unpredictably.
Until now…Visualization only for
network traffic monitoring
42CTTC 2015 seminar by Prof. A.A. Economides
 The power of visualization should go beyond the simple ”illustration” of network
behavior in order to help the analysts discriminate between normal and
abnormal network activities.
 Network security visualization provides insight into areas that other system fail to
enlighten by integrating visualization and machine learning techniques.
In the near future…
Visualization for network security
43CTTC 2015 seminar by Prof. A.A. Economides
Security Visualization Techniques
44CTTC 2015 seminar by Prof. A.A. Economides
Node Links
Glyphs
Parallel Coordinates
Bundle Diagrams
Radial Panels
 IoT enables dramatic society transformation!
 IoT Security is at risk!
 WSN Security challenge!
Conclusions
CTTC 2015 seminar by Prof. A.A. Economides 45
economid@uom.gr
http://conta.uom.gr
46
CTTC 2015 seminar by Prof. A.A. Economides

More Related Content

What's hot

Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Kunal Adhikari
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoTJinia Bhowmik
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and SolutionsUlf Mattsson
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)shubhamyadav613
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Amarjeetsingh Thakur
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computingeteshagarwal1
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 

What's hot (20)

Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
IoT security
IoT securityIoT security
IoT security
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
IoT ecosystem
IoT ecosystemIoT ecosystem
IoT ecosystem
 
iot seminar topic
iot seminar topic iot seminar topic
iot seminar topic
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 

Viewers also liked

The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT securityJulien Vermillard
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process EC-Council
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with FogAchu Anna
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technologyNikhil Sabu
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 

Viewers also liked (20)

The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 

Similar to Overview of IoT and Security issues

Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Internet of things by Mr.Pradeep_Kumar
Internet of things by Mr.Pradeep_KumarInternet of things by Mr.Pradeep_Kumar
Internet of things by Mr.Pradeep_Kumarpradeep kumar
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
 
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14Mark Morley, MBA
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT WorkshopHaider Iqbal
 
IoT and security
IoT and securityIoT and security
IoT and securityIET India
 
TheInternetofThings
TheInternetofThingsTheInternetofThings
TheInternetofThingsKimmiegrif
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxjeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxodiliagilby
 
How many "things" are there in the Internet of Things?
How many "things" are there in the Internet of Things?How many "things" are there in the Internet of Things?
How many "things" are there in the Internet of Things?Swathi Young
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...IJCNCJournal
 

Similar to Overview of IoT and Security issues (20)

Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Internet of things by Mr.Pradeep_Kumar
Internet of things by Mr.Pradeep_KumarInternet of things by Mr.Pradeep_Kumar
Internet of things by Mr.Pradeep_Kumar
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
Varun IOTs PPT
Varun  IOTs PPTVarun  IOTs PPT
Varun IOTs PPT
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
 
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT Workshop
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
IoT and security
IoT and securityIoT and security
IoT and security
 
TheInternetofThings
TheInternetofThingsTheInternetofThings
TheInternetofThings
 
Protecting the Energy Supply Chain - Dubai
Protecting the Energy  Supply Chain - Dubai Protecting the Energy  Supply Chain - Dubai
Protecting the Energy Supply Chain - Dubai
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
How many "things" are there in the Internet of Things?
How many "things" are there in the Internet of Things?How many "things" are there in the Internet of Things?
How many "things" are there in the Internet of Things?
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
 

Recently uploaded

VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 

Recently uploaded (20)

VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 

Overview of IoT and Security issues

  • 2. • Introduction to IoT & Market • Smart Applications • Technology & Research Challenges • Security Threats • Wireless Sensor Network Security • Security Visualization • Conclusions Outline of the Presentation CTTC 2015 seminar by Prof. A.A. Economides 2
  • 3. Introduction to Internet of Things (IoT) 3CTTC 2015 seminar by Prof. A.A. Economides 2020 forecast : • 25 - 50 billion devices (Cisco, Ericsson, IDC, ABI, Gartner) • 26 objects/ person (Intel) • Economic impact: $ 2 - 5 trillion (Cisco, McKinsey Global Institute, IDC, GSMA & Machina Research, Gartner, Harbor) “Worldwide ICT infrastructure that enables ubiquitous services among interacting humans, machines, data and applications”
  • 4. 75% of companies are already exploring the IoT. 15 % of companies already have an IoT solution in place (21 % of transportation & logistics companies) 53 % plan to implement one within the next 24 months, and another 14 % in the next two to five years. (source: Zebra Technologies / Forrester Consulting). IoT deployment CTTC 2015 seminar by Prof. A.A. Economides 4
  • 5. 5CTTC 2015 seminar by Prof. A.A. Economides
  • 6. Cisco predicts that IoT will cause IP traffic to reach 1.6 zettabytes by 2018 (300% increase compared to 2013). By 2018, 57% of IP traffic will come from devices other than PCs. Wi-Fi will generate 49% of IP traffic, other mobile-connected devices will generate 12% of it. Cisco will invest $1 billion to build the world's largest Intercloud network to tackle the IoT. Cisco plans an Intercloud network 6CTTC 2015 seminar by Prof. A.A. Economides
  • 7. Healthcare & Wellbeing, e.g. Angel Sensor, Fitbit, Hexoskin, Intraway, Jawbone, Nymi, InKol Health Hub, Pebble, Philips Lifeline, Withings, Zebra MotionWorks, Home & Building, e.g. Belkin, Nest, Neurio, Quirky, Sensorflare, SMA, SmartThings, Vivint, WallyHome, Withings, ZEN Thermostat, City & Community, e.g. Bigbelly, Bitlock¸ FUKUSHIMA Wheel, Kiunsys, Placemeter, Silver Spring Networks, Waspmote, Utilities, e.g. Enevo, Mayflower CMS, MeterNet, Osprey Informatics, Paradox, Trilliant, Environment, Agriculture & Livestock, e.g. FilesThruTheAir, Fruition Sciences, OnFarm, Semios, Topcon Precision Agriculture, Car & Transportation, e.g. Audi, CarKnow, Connected Rail, Dash drive smart, Delphi Connect, Ericsson, Libelium, Logitrac, PowerFleet, Industry & Services, e.g. Argon Underground Mining Safety, Condeco Sense, DAQRI’s Smart Helmet, Numerex, Perch. Smart Applications 7CTTC 2015 seminar by Prof. A.A. Economides
  • 8. 83 projects across 12 areas: sensors monitor traffic, parking spaces, street lights, air pollution, meteorological conditions, humidity of green spaces in parks, trash bins ... Street lights in Born are shut down automatically if they don’t detect any activity nearby. They also monitor humidity, temperature, pollution, and noise. Expected to have 3,360 lights on 160 streets by 2015. The trash cans alert sanitation workers on a tablet that they need to be emptied. The irrigation systems in Poblenou Central Park monitor the moisture in the soil and turning on pop-up sprinklers. Parks employees can also access meteorological data and rain gauges and adjust the quantity of water used. Barcelona Smart City 8CTTC 2015 seminar by Prof. A.A. Economides
  • 9. Technology CTTC 2015 seminar by Prof. A.A. Economides 9 Sensors & Actuators Wireless Communications: RFID, WiFi, Bluetooth, Cellular, Satellite, etc. Cloud Computing – Storage, Processing, Analytics, Security, etc. Networks (HW & SW) Addressing
  • 10. CTTC 2015 seminar by Prof. A.A. Economides 10
  • 11. Application/Data Layer Transport Layer NWK Layer DataLink Layer PHY Layer SEP 2.0 ZigBee Wi-Fi IEEE 802.15.4 Bluetooth 4.0 LowEnergy 3GPP RFID/NFC IPv6 TCP HTTP CoAP RPL 6LoWPAN TCP/UDP Application 1 Application 2 Application N° ° ° ° ONEM2M/ETSI M2M Service Layer CTTC 2015 seminar by Prof. A.A. Economides Source: IoT-Butler.eu
  • 12. • AllSeen Alliance • Eclipse Foundation • Industrial Internet Consortium • Internet of Things Consortium • Internet Protocol for Smart Objects (IPSO) Alliance • IoT Alliance • Oasis • OneM2M • Open Interconnect Consortium (OIC) • Thread Group • ZigBee Alliance IoT Alliances 12CTTC 2015 seminar by Prof. A.A. Economides
  • 13. 13CTTC 2015 seminar by Prof. A.A. Economides Source: D.Culler (2011). The Internet of Every Thing - steps toward sustainability. CWSN.
  • 14.  Devices (Sensors, Actuators, etc.),  Networking & Communications,  Data Management,  Decision Making,  Security & Privacy,  Social & Legal issues,  Economics,  Human Behavior & Usability,  Marketing, etc. Research Challenges CTTC 2015 seminar by Prof. A.A. Economides 14
  • 15. #1 New threats to data / physical security (42 % responders) #2 Inability of IT systems to keep pace with change (38 % responders) #3 Regulatory or compliance challenges (32 % responders) Biggest Drawbacks of IoT (Cisco survey) 15CTTC 2015 seminar by Prof. A.A. Economides
  • 16.  The Center for Strategic and International Studies estimated that $100 billion is lost annually to the US economy, and 508,000 US jobs are lost, because of malicious online activity.  Ponemon Institute estimated that the average cost of an organizational data breach was $5.4 million in 2014 ($4.5 million in 2013). Losses due to attacks 16CTTC 2015 seminar by Prof. A.A. Economides
  • 17. Nearly half (46%) of the IT leaders said that they will invest more next year in:  access control,  intrusion prevention,  identity management,  virus and malware protection. ComputerWorld Survey 17CTTC 2015 seminar by Prof. A.A. Economides
  • 18.  M2M Network Security market will grow at a CAGR of 22.9 % over the period 2013-2018 (TechNavio)  IoT and Industrial Security Market to exceed $ 675 million by 2018 (Infonetics) Network Security market 18CTTC 2015 seminar by Prof. A.A. Economides
  • 19. What do you think the greatest threat IoT will be over the next 5 years? 19CTTC 2015 seminar by Prof. A.A. Economides source: SANS survey
  • 20. Where do you consider the greatest risk to be in “Things” connecting to your network and the Internet? 20CTTC 2015 seminar by Prof. A.A. Economides source: SANS survey
  • 21. Given the current state of your security program, how would you rate your ability to provide security to IoT ? 21CTTC 2015 seminar by Prof. A.A. Economides source: SANS survey
  • 22. • 25 % - 50 % of remote workers and IT personnel who work remotely in critical infrastructure industries report that they have at least one IoT device connected to corporate networks. • 75 % admit to accessing corporate documents from their home networks. • only 30 % of IT professionals believe their company has the technology necessary to adequately evaluate the security of IoT devices, • 59 % of IT personnel are concerned that IoT could become “the most significant security risk on their network.” • 20 % of respondents state that they have “no visibility” into current protection levels. Tripwire & AtomicResearch surveys 22CTTC 2015 seminar by Prof. A.A. Economides
  • 23. Chief Information Security Officers and Security Operations executives at 1700 companies in nine countries (2015): • Only 10% of Internet Explorer users run the latest version. • Less than 50% of respondents use standard tools such as patching and configuration to help prevent security breaches and ensure that they are running the latest versions. Cisco Security Capabilities Benchmark 23CTTC 2015 seminar by Prof. A.A. Economides
  • 24. • 6 out of the 10 popular IoT devices did not use encryption when downloading software updates. • 90 % of the devices collected at least one piece of personal information via the device, the cloud, or its mobile application. • 70 % of the devices used unencrypted network service and transmitted credentials in plain text. Hewllet Packard tested 10 IoT devices 24CTTC 2015 seminar by Prof. A.A. Economides
  • 25. 1. Insecure web interface 2. Insufficient authentication 3. Insecure network services 4. Lack of transport encryptions 5. Privacy concerns 6. Insecure cloud interface 7. Insecure mobile interface 8. Insufficient security configurability 9. Insecure software 10. Poor physical security OWASP Top 10 security problems with IoT devices 25CTTC 2015 seminar by Prof. A.A. Economides
  • 26. Avast: Routers will be a prime target for hackers. Hackers may want to take over the local network. WatchGuard: - criminals stealing billions in digital assets, - nation states launching long-term attacks. NOT to worry about IoT security (for now): NOT much value attacking your watch or TV. Symantec: Attacks on IoT will focus on smart home. NOT expect any large-scale attacks, but instead one-off attacks against connected devices, e.g. home routers, smart TVs & connected car apps. Security predictions for 2015 26CTTC 2015 seminar by Prof. A.A. Economides
  • 27.  A wireless network consisting of a large number of autonomous sensors that are spatially distributed in area of interest in order to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion, pollutants, etc.  Sensor: Wireless Sensor Network (WSN) 27CTTC 2015 seminar by Prof. A.A. Economides Sensors ADC Processor Memory Transceiver Location finding system (optional) Mobilizer (optional) Sensing Unit Processing Unit Power unit Communication Unit
  • 28. WSN Architecture 28CTTC 2015 seminar by Prof. A.A. Economides Internet, Satellite Sink Sink Task Manager User Sensor Field Sensor Node Figure –The big picture
  • 29. WSNs are vulnerable to various types of attacks 29 CTTC 2015 seminar by Prof. A.A. Economides Internet, Satellite Sink Sink Task Manager User Sensor Field Sensor Node Spoofed Routing information Wormhole Attack
  • 30.  Eavesdropping: an attacker intercepts packets transmitted over the air for further cryptanalysis or traffic analysis.  Traffic analysis: allows an attacker to determine that there is activity in the network, the location of the BSs, and the type of protocols being used.  Message injection: an adversary injects bogus control information into the data stream.  Message modification: a previously captured message is modified before being retransmitted  Node capture: An embedded device is considered being compromised when an attacker, through various means, gains control to the node itself.  Denial-of-Service (DoS) attacks: can be grouped into two categories  Service degradation (e.g., collision attack), and  Service disablement through power exhaustion (e.g. jamming) Attack Models 30CTTC 2015 seminar by Prof. A.A. Economides PassiveattacksActiveattacks
  • 31. Layer-based attack categorization CTTC 2015 seminar by Prof. A.A. Economides 31 Application Layer Transport Layer Network Layer Data Link Layer Physical Layer FloodingAttack | Desynchronization attacks ReplayAttack | SybilAttack | Spoofed, altered, or replayed routing information | Sinkhole, Wormhole Attack | Hello FloodAttack CollisionAttack | SybilAttack | Node Replication |Acknowledgement SpoofingAttack Eavesdropping | Jamming | Battery Exhaustion PowerManagementPlane MobilityManagementPlane TaskManagementPlane DataAggregation Distortion | Message Injection or Modification Figure – Sensor Network Protocol Stack
  • 32. Attacks on specific protocols Selective forwarding: A malicious node refuses to forward all or a subset of the packets it receives and simply drops them. If a malicious node drops all the packets, the attack is then called black hole. CTTC 2015 seminar by Prof. A.A. Economides 32 Acknowledgement spoofing: Spoof link layer acknowledgements (ACKs) to trick other nodes to believe that a link or node is either dead or alive. Attack against TinyOS beaconing: The base station periodically broadcasts beacons or “route updates”. An attacker can use this mechanism to create routing loops by announcing a different node as the BS. Figure-Attack againstTinyOS beaconing
  • 33. Spoofed, altered, or replayed routing information 33 CTTC 2015 seminar by Prof. A.A. Economides This type of attack may be used for:  loop construction  attracting or repelling traffic,  extending or shortening the source route In this example, an adversary pollutes the entire network by sending bogus routing information stating for instance that “I am the base station”. Figure -An adversary spoofing a routing update from a base station
  • 34. Wormhole and Sinkhole Attacks The attacker uses two transceivers and one high quality out-of-band channel in order to create a ‘wormhole’. Then, the attacker tunnels the packets received at one location of the network and replays them in another location. The wormhole can drop packets directly (sinkhole) or more subtly selectively forward packets to avoid detection. CTTC 2015 seminar by Prof. A.A. Economides 34 Wormhole link Figure -A laptop-class adversary using a wormhole to create a sinkhole inTinyOS beaconing.
  • 35. HELLO Flood Attack CTTC 2015 seminar by Prof. A.A. Economides 35 Every new node broadcasts “Hello messages” to find its neighbors. Also, it broadcasts its route to the BS. Other nodes may choose to route data through this new node if the path is shorter. A laptop-class adversary that can retransmit a routing update with enough power to be received by the entire network leaves many nodes stranded. Target nodes attempt to reply, but the adversary node is out of radio range. However, they have chosen this node as their parent This attack puts the network in a state of confusion. Figure - HELLO flood attack.
  • 36. Sybil Attack  “a malicious node illegitimately claims multiple identities”  The Sybil attack can disrupt geographic and multi-path routing protocols. 36 Adversary A at actual location (3,2) forges location advertisements for non-existent nodes A1, A2, and A3 as well as advertising her own location. After hearing these advertisements, if B wants to send a message to C: (0,2), it will attempt to do so through A3. This transmission can be overheard and handled by the adversary A.
  • 37.  Confidentiality is provided through the use of encryption technologies. Cryptographic algorithms such as the DES, RC5, RSA are used to protect the secrecy of a message.  MAC (Message Authentication Code) or Digital Signature Algorithms (DSA) can be used to assure the recipient’s integrity of the data and authenticity of the message  Digital Signatures can be used to ensure non-repudiation.  Availability can be achieved by adding redundant nodes. Multi path and probabilistic routing can also be used to minimize the impact of unavailability.  Data freshness is ensured by adding a counter value in each message. Overview of Countermeasures 37CTTC 2015 seminar by Prof. A.A. Economides
  • 38. • SNEP (Secure Network Encryption Protocol) • μTESLA • TinySec 1. authenticated encryption (TinySec-AE) Data payload is encrypted MAC is used to authenticate packet 2. authentication only (TinySec-Auth) Standalone Security Protocols for WSNs 38CTTC 2015 seminar by Prof. A.A. Economides
  • 39. A summary of attacks against routing protocols 39CTTC 2015 seminar by Prof. A.A. Economides Protocol Relevant Attacks Directed diffusion and its multipath variants Bogus routing information, selective forwarding, sinkholes, Sybil attack, wormholes, HELLO floods Geographic routing (GPSR, GEAR) Bogus routing information, selective forwarding, Sybil attack Minimum cost forwarding Bogus routing information, selective forwarding, sinkholes, wormholes, HELLO floods Clustering-based protocols (LEACH, TEEN, PEGASIS) Selective forwarding, HELLO floods Rumor routing Bogus routing information, selective forwarding, sinkholes, Sybil, wormholes Energy conserving topology maintenance (SPAN, GAF, CEC, AFECA) Bogus routing information, Sybil attack, HELLO floods
  • 40. • Link layer security – Simple link layer encryption and authentication using a globally shared key can prevent the majority of outsider attacks: bogus routing information, Sybil, Selective Forwarding, Sinkholes. – Link layer security mechanisms provide little protection against insiders, HELLO floods, and Wormholes. • Wormhole and sinkhole attacks – Routing protocols that construct a topology initiated by a base station are the most vulnerable against these types of attacks.  Solution: Geographic protocols that construct topology on demand using localized node interactions instead of using the base station. Secure Routing – Countermeasures 40CTTC 2015 seminar by Prof. A.A. Economides
  • 41. • Various security mechanisms have been proposed to address the security concerns of WSNs. • Despite the fast development of computer security mechanisms, the scale and complexity of the generated wireless data put major challenges to the representation and understanding of security- relevant network information. • To address this issue, efficient visualization techniques have been adopted by the researchers to bridge the gap. A new security discipline emerges! Network Security Visualization 41CTTC 2015 seminar by Prof. A.A. Economides
  • 42. • Network traffic visualization is one of the first directions to take when it comes to understanding, and analyzing information in vast amounts of network data. • Many visualization tools graphically monitor real-world or simulated WSNs (e.g. Surge, MoteView, Octopus, SNA, TOSSIM, OPNET, NS-3). • While these tools offer some form of visualization, they are designed for applications other than wireless security. Accordingly, these tools: – lack the specialized techniques in visualizing security-related data. – tend to miss abnormalities and security attacks that occur unpredictably. Until now…Visualization only for network traffic monitoring 42CTTC 2015 seminar by Prof. A.A. Economides
  • 43.  The power of visualization should go beyond the simple ”illustration” of network behavior in order to help the analysts discriminate between normal and abnormal network activities.  Network security visualization provides insight into areas that other system fail to enlighten by integrating visualization and machine learning techniques. In the near future… Visualization for network security 43CTTC 2015 seminar by Prof. A.A. Economides
  • 44. Security Visualization Techniques 44CTTC 2015 seminar by Prof. A.A. Economides Node Links Glyphs Parallel Coordinates Bundle Diagrams Radial Panels
  • 45.  IoT enables dramatic society transformation!  IoT Security is at risk!  WSN Security challenge! Conclusions CTTC 2015 seminar by Prof. A.A. Economides 45