SlideShare a Scribd company logo
1 of 12
ON THE SECURITY AND PRIVACY OF INTERNET
OF THINGS ARCHITECTURES AND SYSTEMS
1
E. Vasilomanolakis, J. Daubert, M. Luthra,
V. Gazis, A. Wiesmaier, P. Kikiras
manisha.luthra@stud.tu-darmstadt.de
2
Outline
 Introduction
 Security Requirements
 Discussion and comparison of IoT architectures
 IOT-A
 BeTaaS
 OpenIoT
 IoT@Work
 Conclusion
manisha.luthra@stud.tu-darmstadt.de
3
Introduction
Motivation
IoT specific properties
 Mobility
 Constrained resources
 Heterogeneity
 Scalability
manisha.luthra@stud.tu-darmstadt.deImage source: Google Images
Security Requirements
4
Confidentiality
Integrity
Authenticity
Availability
Authentication
Authorization
Accountability
Revocation
Data
Privacy
Anonymity
Pseudonimity
Unlinkability
Trust
Device
Trust
Entity
Trust
Data
Trust
Resilience
Robustness
against
attacks
Resilience
against
failures
manisha.luthra@stud.tu-darmstadt.de
Network
Security
Identity
Management
Privacy Trust Resilience
DISCUSSION AND
COMPARISON OF IOT
ARCHITECTURES
5manisha.luthra@stud.tu-darmstadt.de
IoT Architecture (1) – IoT-A
Overview
 Goal : provide Architectural
Reference model (ARM) forming
guidelines for network protocols.
 Successful integration of ARM
to service into IoT.
 EU FP7 project completed in
2013.
 Five logical security
components (SC) mapped to
our security requirements.
Security components
 Dedicated security components
for network security, Identity
Management, privacy and trust.
 Fault tolerance as a dedicated
functional group.
6
Security reqt. Rating
Network security
Identity
Management
Privacy
Trust
Resilience
manisha.luthra@stud.tu-darmstadt.deImage source: http://www.iot-a.eu/public
IoT Architecture (2) – BeTaaS
Overview
 Goal : architecture for IoT and
M2M communication for apps
over cloud of gateways.
 Things as a Service (TaaS)
reference model comprising four
layers.
 Physical layer, Adaptation layer,
TaaS layer, Service layer.
 EU FP7 project completed in
2015.
Security components
 Augments the reference model
of IoT-A – similar security.
 Confidentiality, integrity and
authenticity via PKI.
 OAuth for identity management.
7
Security reqt. Rating
Network security
Identity
Management
Privacy
Trust
Resilience
manisha.luthra@stud.tu-darmstadt.deImage source: http://www.betaas.eu/
IoT Architecture (3) – OpenIoT
Overview
 Goal : Open source with cloud
characteristics – pay-as-you-go
and on-demand services.
 EU FP7 project completed in
2014.
 Based on IoT-A ARM. Specifies
two modules security and privacy.
 However privacy seems not to be
addressed apart from data
privacy.
 Trust is a module addressing
data and device trust.
Security components
 TLS ensures encrypted
messaging.
 Centralized architecture
providing OAuth and RBAC.
 Robustness not addressed.
8
Security reqt. Rating
Network security
Identity
Management
Privacy
Trust
Resilience
manisha.luthra@stud.tu-darmstadt.deImage source: http://www.openiot.eu/
IoT Architecture (4) – IoT@Work
Overview
 Goal : IoT architecture for an
industrial automation domain.
 EU FP7 project completed in
2013.
 Use common technologies such
as EAP and CBAC.
 Privacy and Trust not driving
requirements due to industry
focus.
Security components
 Some data privacy is provided
and access delegation is used
for pseudonyms.
 Trust based reqts. seems not be
addressed.
9
Security reqt. Rating
Network security
Identity
Management
Privacy
Trust
Resilience
manisha.luthra@stud.tu-darmstadt.deImage source: https://www.iot-at-work.eu/
Comparison Summary
10
 Each architecture has a specific focus area.
 IoT@Work works best for the manufacturing domain.
 OpenIoT as open sensor and service marketplace.
 IoT-A and BeTaaS provides an ARM and fulfills most of the requirements.
 Though the actual implementation may vary.
IoT architectures
Security reqt. IoT-A BeTaaS OpenIoT IoT@Work
Network
security
Identity
Management
Privacy
Trust
Resilience
manisha.luthra@stud.tu-darmstadt.de
Conclusion
Architectural Gaps
 Data transmission in constrained
devices and gateway remains
unprotected.
 Focus on enclosed domain, lack
inter-domain capabilities.
 Privacy and Trust in most IoT
architectures seems to be
unaddressed.
11
Future Work
 Accountability mechanisms e.g.,
blind signatures with threshold
cryptography can be adopted.
 We plan to propose framework
for protection at the device,
communication and cloud level,
rather only at one of these.
 To realize the envisioned
marketplace of IoT, transitive trust
can be adopted.
manisha.luthra@stud.tu-darmstadt.de
Thank you
Manisha Luthra (M.Sc Informatik)
manisha.luthra@stud.tu-darmstadt.de
12manisha.luthra@stud.tu-darmstadt.de

More Related Content

What's hot

IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay KumarOWASP Delhi
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsDesign World
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process EC-Council
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challengesHadi Fadlallah
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot deviceMayank Pandey
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 

What's hot (20)

IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
IoT security
IoT securityIoT security
IoT security
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 

Viewers also liked

Security, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile NetworksSecurity, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile NetworksJosef Noll
 
Privacy on the Series of Tubes of Things
Privacy on the Series of Tubes of ThingsPrivacy on the Series of Tubes of Things
Privacy on the Series of Tubes of ThingsEFF-Austin
 
Security & privacy on the internet: things you should now
Security & privacy on the internet: things you should nowSecurity & privacy on the internet: things you should now
Security & privacy on the internet: things you should nowMediaraven vzw
 
What hope for privacy in an IoT world?
What hope for privacy in an IoT world? What hope for privacy in an IoT world?
What hope for privacy in an IoT world? kotahinet
 
OPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATIONOPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATIONRitwick Halder
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 

Viewers also liked (7)

Security, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile NetworksSecurity, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile Networks
 
Privacy on the Series of Tubes of Things
Privacy on the Series of Tubes of ThingsPrivacy on the Series of Tubes of Things
Privacy on the Series of Tubes of Things
 
Security & privacy on the internet: things you should now
Security & privacy on the internet: things you should nowSecurity & privacy on the internet: things you should now
Security & privacy on the internet: things you should now
 
What hope for privacy in an IoT world?
What hope for privacy in an IoT world? What hope for privacy in an IoT world?
What hope for privacy in an IoT world?
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
OPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATIONOPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATION
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 

Similar to ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES

Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersSecure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersIRJET Journal
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...ijtsrd
 
Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Dr. Aloknath De
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsMario Drobics
 
GridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateGridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateAndy Bochman
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET Journal
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET Journal
 
Privacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkPrivacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkIJECEIAES
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptxSyedSaqlain32
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at ScaleWinston Morton
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...Brain IoT Project
 

Similar to ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES (20)

Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersSecure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and Computers
 
76 s201918
76 s20191876 s201918
76 s201918
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
 
Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
 
GridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateGridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security Update
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 
Privacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkPrivacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor network
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES

  • 1. ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES AND SYSTEMS 1 E. Vasilomanolakis, J. Daubert, M. Luthra, V. Gazis, A. Wiesmaier, P. Kikiras manisha.luthra@stud.tu-darmstadt.de
  • 2. 2 Outline  Introduction  Security Requirements  Discussion and comparison of IoT architectures  IOT-A  BeTaaS  OpenIoT  IoT@Work  Conclusion manisha.luthra@stud.tu-darmstadt.de
  • 3. 3 Introduction Motivation IoT specific properties  Mobility  Constrained resources  Heterogeneity  Scalability manisha.luthra@stud.tu-darmstadt.deImage source: Google Images
  • 5. DISCUSSION AND COMPARISON OF IOT ARCHITECTURES 5manisha.luthra@stud.tu-darmstadt.de
  • 6. IoT Architecture (1) – IoT-A Overview  Goal : provide Architectural Reference model (ARM) forming guidelines for network protocols.  Successful integration of ARM to service into IoT.  EU FP7 project completed in 2013.  Five logical security components (SC) mapped to our security requirements. Security components  Dedicated security components for network security, Identity Management, privacy and trust.  Fault tolerance as a dedicated functional group. 6 Security reqt. Rating Network security Identity Management Privacy Trust Resilience manisha.luthra@stud.tu-darmstadt.deImage source: http://www.iot-a.eu/public
  • 7. IoT Architecture (2) – BeTaaS Overview  Goal : architecture for IoT and M2M communication for apps over cloud of gateways.  Things as a Service (TaaS) reference model comprising four layers.  Physical layer, Adaptation layer, TaaS layer, Service layer.  EU FP7 project completed in 2015. Security components  Augments the reference model of IoT-A – similar security.  Confidentiality, integrity and authenticity via PKI.  OAuth for identity management. 7 Security reqt. Rating Network security Identity Management Privacy Trust Resilience manisha.luthra@stud.tu-darmstadt.deImage source: http://www.betaas.eu/
  • 8. IoT Architecture (3) – OpenIoT Overview  Goal : Open source with cloud characteristics – pay-as-you-go and on-demand services.  EU FP7 project completed in 2014.  Based on IoT-A ARM. Specifies two modules security and privacy.  However privacy seems not to be addressed apart from data privacy.  Trust is a module addressing data and device trust. Security components  TLS ensures encrypted messaging.  Centralized architecture providing OAuth and RBAC.  Robustness not addressed. 8 Security reqt. Rating Network security Identity Management Privacy Trust Resilience manisha.luthra@stud.tu-darmstadt.deImage source: http://www.openiot.eu/
  • 9. IoT Architecture (4) – IoT@Work Overview  Goal : IoT architecture for an industrial automation domain.  EU FP7 project completed in 2013.  Use common technologies such as EAP and CBAC.  Privacy and Trust not driving requirements due to industry focus. Security components  Some data privacy is provided and access delegation is used for pseudonyms.  Trust based reqts. seems not be addressed. 9 Security reqt. Rating Network security Identity Management Privacy Trust Resilience manisha.luthra@stud.tu-darmstadt.deImage source: https://www.iot-at-work.eu/
  • 10. Comparison Summary 10  Each architecture has a specific focus area.  IoT@Work works best for the manufacturing domain.  OpenIoT as open sensor and service marketplace.  IoT-A and BeTaaS provides an ARM and fulfills most of the requirements.  Though the actual implementation may vary. IoT architectures Security reqt. IoT-A BeTaaS OpenIoT IoT@Work Network security Identity Management Privacy Trust Resilience manisha.luthra@stud.tu-darmstadt.de
  • 11. Conclusion Architectural Gaps  Data transmission in constrained devices and gateway remains unprotected.  Focus on enclosed domain, lack inter-domain capabilities.  Privacy and Trust in most IoT architectures seems to be unaddressed. 11 Future Work  Accountability mechanisms e.g., blind signatures with threshold cryptography can be adopted.  We plan to propose framework for protection at the device, communication and cloud level, rather only at one of these.  To realize the envisioned marketplace of IoT, transitive trust can be adopted. manisha.luthra@stud.tu-darmstadt.de
  • 12. Thank you Manisha Luthra (M.Sc Informatik) manisha.luthra@stud.tu-darmstadt.de 12manisha.luthra@stud.tu-darmstadt.de

Editor's Notes

  1. (30 sec)
  2. 30 sec Say about, why choose these architectures?
  3. 1.5 minutes Talk about not only at level of device but overall iot ecosystem
  4. Add bullet requirements derived from properties Show main level -> then sub reqts No “we check”! Say more about privacy and trust 1.5 minutes Give egs to explain the sub reqts avoid defn! Shift teh image up Make eg of a automated bus statio
  5. 10 sec
  6. (2 – 2.5 min) IoT-A, namely IoT architecture provides an architectural reference model as mainly guidelines for the network protocols of iot architectures. Also provides mechanisms for integrating the ARM to service into IoT. This is an EU funded project which was completed in 2013. KEM -> manages the cryptographic keys that are used for conf. And integrity in combn with authenticity. However, KEM doesnt address availability in the context of the network connections. IM is being addressed by three components namely IM, AuthZ and AuthN. AuthN module covers the authentication reqts for the user and service as well as accountability with non repudiation (assurance that someone cannot deny something). AuthZ module cover the authorization via access controls namely role based (RBAC) and attribute based access control (ABAC). Revocation depends on the ACM used. Accountability doesnt seems to be addressed by any of these security comp in IM. Pseudonymisation security (PN) componet addresses our privacy requirements. As the name suggests IoT-A replaces original identities obtained KEM by pseudonyms. It used different pseudonyms different actions that accounts for unlinkability. It doesnt seems to address anonymity on the whole. And, data privacy is not addressed by the PN component however, some means of access granurality is provided by AuthZ. Trust and reputation component provides device and entity trust but data trust in particular is not addressed. (collection of user reputation to calculate service trust) Outside the security functional group, fault tolerance is done as a separate functional group called fault handling-> is divided into four func components namely predicting the potential failures, detecting existing failures, reduction of effects of failures and repairing the system. So first address our first requirement of robustness against attacks and latter three the other ie. Resilience against attacks.
  7. (2 – 2.5 min) First, the Physical Layer contains the M2M systems connected to the platform. Second, the Adaptation Layer handles the connection to the physical layer, abstracting from peculiarities of the individual M2M systems. The third layer, namely the TaaS Layer, relies on the abstraction layer and provides networkwide access to the devices in the M2M layer. Finally, the Service layer manages the functionalities and services of BeTaaS applications. KM performs authentication, manages user sessions, and provides encrypted communication. Uses pki in combn with CA that ensures conf, integrity and authenticity. Authentication module addresses our IM security requirements by providing two level authentication (gateway level and app or service level auth). Auth module makes use of KM component and Oauth is adapted for authen and author. However, the accountability requirement remains unclear. While Privacy is stated as a key aspect of the security mechanisms in BeTaaS [6], there is no evidence of how this requirement is fulfilled. Trust is handled by Trust & Reputation component. The model retrieves input from individual trust aspects: security mechanisms (which for instance include information regarding the encryption algorithms, the certificates, etc.), QoS fulfillment, dependability performance, battery load and stability in provided data. Lastly, the aspect of resilience is handled via four different pillars: fault prevention, removal, tolerance and forecasting
  8. (2 – 2.5 min) Opposed to the specification, privacy features are not present in the public code. IPSec tunnels established by gateways to ensure confidentiality, integrity and authenticity. Availability is not mentioned in the context of network security. OpenIoT uses a centralized security and privacy module-> Oauth handles authentication and role based access control model for AuthZ. The fulfillment of further requirements, e.g., accountability, remains unclear. trust module is an independent module in OpenIoT. Addresses the requirements of data and device trust and entity trust remains unclear. OpenIoT does not address robustness in terms of failure avoidance, but rather places the focus on resilience in terms of mitigation
  9. (2 – 2.5 min) With other Iot arch we have discussed focuses eithr on domestic domain or both domestic and industry domain. Now we discuss Iot@Work that focuses only on industrial automation domain that shifts the security focus also. Privacy and Trust are not driving requirement due to industry focus. Network security is handled mainly mainly by commonly used technologies such as Extensible authentication protocol. However integrity or network integrity is not addressed. The concept of network slices allows for network virtualization, and thus fast network link fail-over to protect availability. Authentication is mainly provided by network security in IoT@Work. Furthermore, authorization is realized via Capability-Based Access Control (CBAC) with support for delegation, accountability, and revocation. CBAC works well with many entities as well as under connection failure to the central authorization service. Some data privacy is provided and access delegation is used for pseudonyms. Anonymity can be achieved by proving capabilities through Zero Knowledge Proofs (ZKPs). The network slice approach uses virtual network links that are robust against failures. In addition, live reconfiguration is possible and thus allows for recovery in the sense of resilience.
  10. (1 min) Remove highlighting BeTaaS inherits from the high level abstraction reference model of IoT-A. Thus, similarly to IoT-A, access control mechanisms enforce data privacy by restricting unauthorized access. The identity management component is responsible for managing the way identities of sensors or gateways are presented in their interaction with BeTaaS instances. Apart from data privacy being maintained by centralized access control, data anonymization and pseudonymity is not elaborated in OpenIoT The IoT scenarios described in IoT@Work do not introduce a need to deal with trust issues, so the model does not provide any mechanisms to cope with trust
  11. 1 min