SlideShare a Scribd company logo
1 of 68
Download to read offline
Secure IoT Identity and Data Protection
Rubicon Labs Inc.のご紹介
rubiconlabs.io
アメリカシリコンバレー(サンフランシスコ)のサイバーセキュリティの
ソリューションを提供するスタートアップ起業
IOTのセキュリティーの強化のためのソリューションを提供
- 2020年には200億個以上のデバイスがIOTで接続。
ガ-トナー社の予測:6.4 B IoT devices worldwide in 2016,(20.8 B, 2020).
- 製品からサービスへ価値モデルのシフト
- スケーラビリティへの対応が必要(既存の公開鍵でのセキュリティー対応は困難)
Rubicon Labsからよりユニークなセキュリティー技術、高速、ローコストのソリューションの提供
- 対称暗号( symmetric cryptography : AES)
- Zero-Knowledge Keys (シンプル、高速)
- Cloud Identity service (iDaaS)モデルの提供
- ローパワーのIOTデバイスへも対応可能
ー エコシステムの構築 Rubicon IoT ecosystem:Cloud, Gateway, System & Devices,
MCU
強力な組織、人的資源でサポート
- 暗号技術の技術集団 ( Dr. Whitfield Diffie as technical advisor)
- アメリカIT起業でのマネージメント経験者 (Apple ,Broadcom, etc)
- 有力VC、パートナーからのファンド
Third Point Ventures, Pelion Venture Partners, Akamai Technologies, Inc.
Takashi.murayama@rubiconlabs.iowww.rubiconlabs.io
Who is Rubicon?
• A venture backed cybersecurity startup based in
San Francisco, CA
• Institutional investment
• ThirdPoint Ventures
• Pelion Ventures
• Strategic investment from Akamai
• Focused on cryptographic key management for
IoT
What is Rubicon’s
technology?
• A cloud platform that provides identity to low
powered and resource constrained IoT devices
• These devices are the building blocks for IoT, do
not support HTTPS, and are unable to do
traditional PKI key exchanges (RSA and ECC
algorithms) based upon power, memory, and
speed constraints
• Once established, Rubicon identities are
leveraged to define business models for IoT,
secure/encrypt data, and drive the transition of
revenue from Capex to Opex revenue generation
Presentation Overview
• What drives the value of IoT?
• The building blocks of IoT
• Types of cryptographic keys to protect IoT
• An introduction to Rubicon IoT security
• Rubicon’s competitive advantage
• A Rubicon key exchange (session key
establishment)
• How Rubicon integrates into IoT products
• Questions
Where is the value in IoT?
How can it impact so many
industries?
An incredible transition is
happening
Agriculture Construction
Smart Cities Energy
Medical Automotive
Data is the new Oil
Data is replacing oil as the
most sought after
resource on the planet
The Predicted Explosion of Data
Mostly unstructured data
–Hal Varian, Chief Economist at Google
“Between the dawn of civilization and
2003, we only created 5 exabytes of
data;
now we creat that amount every two
days.
By 2020, that figure is predicted to sit at
53 zettabytes (53 trillion gigabytes) every
two days”
Similar to oil, data is
worthless without
proper processing
PackageRefineExtract
Oil Processing
IoT Data Processing
Predictive Maintenance
Automation
Real Time Analytics
Cognitive IoT
Fraud Detection
Remote Health Monitoring
Protection is critical
How do you protect
something so
valuable?
Estimate for United States Middle East Oil Security Co
*United States cost of military force projection in the Persian Gulf, 1976–2007 Roger J. Stern
$7.3 Trillion over previous three decades*
In the digital world we
protect with
cryptography
Cryptography comes
with challenges and
costs
Challenges
• Speed of algorithms
• Power / energy consumption of algorithms
• Memory usage of algorithms
• Key distribution
• Key protection on the device and in the
cloud
Cryptography
protection must be
adapted to match the
IoT targets
The building blocks of IoT
are low powered and
resource constrained
MCUs
The low powered MCU is
the equivalent of the oil
well
Pump Microcontroller
(MCU)
ARM Cortex-M series
4
3
4
4 4
4
2
1
2 2 2
. Billion
1. Billion
2. Billion
3. Billion
4. Billion
5. Billion
Q1 2015 Q2 2015 Q3 2015 Q4 2015 Q1 2016 Q2 2
Total ARM Processors Cortex-M Processors
ARM Quarterly Processor
Shipments
We must build a
protection platform for
our target devices
1. What type of cryptographic key
Symmetric Keys vs. Asymmetric keys
2. Zero Knowledge Key
- Devices can use it.
- Devices cannot know its value.
3. Identity that comes from uniqueness
to be provable
- Proved at scale at IOT
Protection Platform
Symmetric Keys
• Keys are simple to generate
• Two parties must share a
secret to communicate
• Challenges with key
provisioning
• Incredibly fast algorithms
• Power efficient algorithms
rubiconlabs.io
Asymmetric Keys
• Keys are expensive to generate
(mathematical cost)
• Public key is shared
• Private key is kept secret
• Used to solve the key
provisioning problem
• Very slow and large algorithms
rubiconlabs.io
VS
rubiconlabs.io
+
The web was built on
top of asymmetric
cryptography
Asymmetric crypto is good
for server to PC
authentication
(one-way authentication)
rubiconlabs.io
IoT is forcing us to
rethink how to do
cryptography for
MCUs
rubiconlabs.io
Rubicon is a symmetric
key based identity and
security platform for
IoT
Zero-knowledge Key
by Rubicon
rubiconlabs.io
A key the device can
use
But never knows the
actual value of
rubiconlabs.io
“Identity” proved at
scale at IOT
By Rubicon
rubiconlabs.io
How do you prove it
at scale?
rubiconlabs.io
Rubicon provides an
authentication
service
rubiconlabs.io
Cloud Mirroring
Mirroring
rubiconlabs.io
(Distributed Device Services )
Device 2Device 1
Secure
Communication
rubiconlabs.io
Security Challenges
rubiconlabs.io
How do we do it?
rubiconlabs.io
Zero-knowledge Key:
CPU never knows the
value
rubiconlabs.io
Static KeySet at
manufacturing
(or some
other trust
point)
rubiconlabs.io
Dynamic Key
Set by
Rubicon cloud
service
Secure
Execution
Environment
rubiconlabs.io
Two doorways into secure environment:
1.Through the keyed one way hash
2.Through the AES interface (encrypt/decrypt)
Keyed one way
hashing
Symmetric
encryption
rubiconlabs.io
Identity
Differentiation
VS
rubiconlabs.io
+
What’s interesting is
that simpler is
stronger
NIST Recommended Key
Sizes
vs
Asymmetric Cryptography
RSA ECC
NIST key size 128 bits 3072 bits 256 bits
Signing Fastest 4176 x slower 125 x slower
Validation Fastest 53 x slower 437 x slower
rubiconlabs.io
vs
Asymmetric Cryptography Power Usage
When generating billions of
keys, key generation time
matters
Rubicon vs Asymmetric Flash
Comparison
Rubicon
Protocol
TLS Protocol
SHA256SHA256
HMACHMAC
AESAES
* draft-ietf-lwig-tls-minimal **Rubicon easily scales to ARM Cortex M0+ and M3
**
Key Exchange
Random number
is generated by
device and hashed
(using blue
devices ZKK) to
generate a
session key
Same random
number is sent to
the cloud and the
exact same
operation is
performed to
generate the
same session key
Random number is generated
by cloud and hashed (using
orange devices ZKK) to
generate a key encryption key
The cloud encrypts
the gold key with
the blue key
(creating gold key in
blue box below)
Second random number and encrypted
gold key in blue box are sent to the
orange device
Random is hashed by orange device (using
ZKK), resulting in the blue key being
derived
Blue key is used to decrypt the gold key
(resulting in gold key being derived at both
devices)
Differentiation with identity from
symmetric cryptography
• Symmetric keys are simpler to provision and revoke
• Easier to protect while being used
(most common attack point)
• Stronger (bit for bit)
• Faster
• Lower power usage
• Lower cost / key to generate and manage
• Requires less memory
(scales for resource constrained IoT)
rubiconlabs.io
Rubicon Integration
Rubicon Integration
TLS
Rubicon Secured Tunnel
Customer IoT
Cloud
Rubicon Cloud
Device Identity
and Rights
Management
Rubicon
Topology
What do you get?
• Software security agent for target
(vendor specific MCU + RTOS + toolchain)
• Security abstraction layer API to utilize
Rubicon ZKK in the device and cloud
• Cloud portal for key management
(revoke keys, black list keys…)
• Cloud interface to the Rubicon cloud to decrypt
data and pass it back to the IoT cloud
IoT opportunities are
real
IoT threats are real
No Device Identity = No
Control
Rubicon is designed to
protect IoT data and
enforce business
models
Excited to learn more
about your IoT use
cases
Ready for proof of
concept projects
Rubicon Labs
Secure Identity for
Everything
Questions
Reserve Slides
Rubicon Labs Inc.のご紹介
rubiconlabs.io
アメリカシリコンバレー(サンフランシスコ)のサイバーセキュリティの
ソリューションを提供するスタートアップ起業
IOTのセキュリティーの強化のためのソリューションを提供
- 2020年には200億個以上のデバイスがIOTで接続。
ガ-トナー社の予測:6.4 B IoT devices worldwide in 2016,(20.8 B, 2020).
- 製品からサービスへ価値モデルのシフト
- スケーラビリティへの対応が必要(既存の公開鍵でのセキュリティー対応は困難)
Rubicon Labsからよりユニークなセキュリティー技術、高速、ローコストのソリューションの提供
- 対称暗号( symmetric cryptography : AES)
- Zero-Knowledge Keys (シンプル、高速)
- Cloud Identity service (iDaaS)モデルの提供
- ローパワーのIOTデバイスへも対応可能
ー エコシステムの構築 Rubicon IoT ecosystem:Cloud, Gateway, System & Devices, MCU
強力な組織、人的資源でサポート
- 暗号技術の技術集団 ( Dr. Whitfield Diffie as technical advisor)
- アメリカIT起業でのマネージメント経験者 (Apple ,Broadcom, etc)
- 有力VC、パートナーからのファンド
Third Point Ventures, Pelion Venture Partners, Akamai Technologies, Inc.
Takashi.murayama@rubiconlabs.iowww.rubiconlabs.io
team
Rod, VP Product
Gary
VP Engineering
Richard
CEO
Wil
Co-Founder, CSO
Whit Diffie
Inventor, Public
Key Cryptography
(Advisor)
Stephen Ludin
Chief Architect,
Akamai
(Advisor)
Dave
Co-Founder,
COO
rubiconlabs.io

More Related Content

What's hot

What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoTAhmed Banafa
 
Small startup, big impact in IoT by Mensur Đogić
Small startup, big impact in IoT by Mensur ĐogićSmall startup, big impact in IoT by Mensur Đogić
Small startup, big impact in IoT by Mensur ĐogićBosnia Agile
 
Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Manolis Nikiforakis
 
Watson IoT Platform Sizing & Pricing - Sept 2016
Watson IoT Platform Sizing & Pricing - Sept 2016Watson IoT Platform Sizing & Pricing - Sept 2016
Watson IoT Platform Sizing & Pricing - Sept 2016Jason Lu
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesAsim Rais Siddiqui
 
Intelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and CommunicationsIntelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and CommunicationsRaghu Nandy
 
Expert mobility managing wi-fi wearables sensors iot for availability quality...
Expert mobility managing wi-fi wearables sensors iot for availability quality...Expert mobility managing wi-fi wearables sensors iot for availability quality...
Expert mobility managing wi-fi wearables sensors iot for availability quality...Priyanka Aash
 
The Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilityThe Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilitySenseware
 
The Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoTThe Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoTJim McKeeth
 
Watson IoT @Ryerson University - IEEE Chapter
Watson IoT  @Ryerson University - IEEE Chapter  Watson IoT  @Ryerson University - IEEE Chapter
Watson IoT @Ryerson University - IEEE Chapter Markus Van Kempen
 
Internet of Things (IoT) is a King, Big data is a Queen and Cloud is a Palace
Internet of Things (IoT) is a King, Big data is a Queen and Cloud is a PalaceInternet of Things (IoT) is a King, Big data is a Queen and Cloud is a Palace
Internet of Things (IoT) is a King, Big data is a Queen and Cloud is a PalaceDr.-Ing Abdur Rahim Biswas
 
IoT Strategy Pillars
IoT Strategy PillarsIoT Strategy Pillars
IoT Strategy PillarsIBTECAR
 
Device to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in OracleDevice to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in OracleJunSeok Seo
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Den Reymer
 

What's hot (20)

What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoT
 
Enterprise, Architecture and IoT
Enterprise, Architecture and IoTEnterprise, Architecture and IoT
Enterprise, Architecture and IoT
 
Small startup, big impact in IoT by Mensur Đogić
Small startup, big impact in IoT by Mensur ĐogićSmall startup, big impact in IoT by Mensur Đogić
Small startup, big impact in IoT by Mensur Đogić
 
Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days
 
Watson IoT Platform Sizing & Pricing - Sept 2016
Watson IoT Platform Sizing & Pricing - Sept 2016Watson IoT Platform Sizing & Pricing - Sept 2016
Watson IoT Platform Sizing & Pricing - Sept 2016
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
 
Intelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and CommunicationsIntelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and Communications
 
Iot
IotIot
Iot
 
Expert mobility managing wi-fi wearables sensors iot for availability quality...
Expert mobility managing wi-fi wearables sensors iot for availability quality...Expert mobility managing wi-fi wearables sensors iot for availability quality...
Expert mobility managing wi-fi wearables sensors iot for availability quality...
 
IoT-Use-Case-eBook
IoT-Use-Case-eBookIoT-Use-Case-eBook
IoT-Use-Case-eBook
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 
The Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilityThe Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your Facility
 
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George IosifIoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
 
The Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoTThe Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoT
 
Watson IoT @Ryerson University - IEEE Chapter
Watson IoT  @Ryerson University - IEEE Chapter  Watson IoT  @Ryerson University - IEEE Chapter
Watson IoT @Ryerson University - IEEE Chapter
 
Internet of Things (IoT) is a King, Big data is a Queen and Cloud is a Palace
Internet of Things (IoT) is a King, Big data is a Queen and Cloud is a PalaceInternet of Things (IoT) is a King, Big data is a Queen and Cloud is a Palace
Internet of Things (IoT) is a King, Big data is a Queen and Cloud is a Palace
 
Data Analytics for IoT
Data Analytics for IoT Data Analytics for IoT
Data Analytics for IoT
 
IoT Strategy Pillars
IoT Strategy PillarsIoT Strategy Pillars
IoT Strategy Pillars
 
Device to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in OracleDevice to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in Oracle
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
 

Viewers also liked

機械学習とこれを支える並列計算: ディープラーニング・スーパーコンピューターの応用について
機械学習とこれを支える並列計算: ディープラーニング・スーパーコンピューターの応用について機械学習とこれを支える並列計算: ディープラーニング・スーパーコンピューターの応用について
機械学習とこれを支える並列計算: ディープラーニング・スーパーコンピューターの応用についてハイシンク創研 / Laboratory of Hi-Think Corporation
 
Using Spark and Riak for IoT Apps—Patterns and Anti-Patterns: Spark Summit Ea...
Using Spark and Riak for IoT Apps—Patterns and Anti-Patterns: Spark Summit Ea...Using Spark and Riak for IoT Apps—Patterns and Anti-Patterns: Spark Summit Ea...
Using Spark and Riak for IoT Apps—Patterns and Anti-Patterns: Spark Summit Ea...Spark Summit
 
Ensayo transformadores
Ensayo transformadoresEnsayo transformadores
Ensayo transformadoresdanilala96
 
Ppt ppp pressentation versio keynote
Ppt ppp pressentation versio keynotePpt ppp pressentation versio keynote
Ppt ppp pressentation versio keynotePauline Hollinger
 
Presentacion maiko
Presentacion maikoPresentacion maiko
Presentacion maikomaiko reyes
 
Etica,bioetica,deontologia,valores y antivalores
Etica,bioetica,deontologia,valores y antivaloresEtica,bioetica,deontologia,valores y antivalores
Etica,bioetica,deontologia,valores y antivaloresIRENE OLIVARES
 
interview Luchtvaartnieuws jan 2017
interview Luchtvaartnieuws jan 2017interview Luchtvaartnieuws jan 2017
interview Luchtvaartnieuws jan 2017Ans Oosterman
 

Viewers also liked (19)

IoTの社会応用への展望とその課題
IoTの社会応用への展望とその課題IoTの社会応用への展望とその課題
IoTの社会応用への展望とその課題
 
IoTの社会応用への展望とその課題
IoTの社会応用への展望とその課題IoTの社会応用への展望とその課題
IoTの社会応用への展望とその課題
 
機械学習とこれを支える並列計算: ディープラーニング・スーパーコンピューターの応用について
機械学習とこれを支える並列計算: ディープラーニング・スーパーコンピューターの応用について機械学習とこれを支える並列計算: ディープラーニング・スーパーコンピューターの応用について
機械学習とこれを支える並列計算: ディープラーニング・スーパーコンピューターの応用について
 
1 開会の挨拶と本シンポジウムの意義(lhc 巽)
1 開会の挨拶と本シンポジウムの意義(lhc 巽)1 開会の挨拶と本シンポジウムの意義(lhc 巽)
1 開会の挨拶と本シンポジウムの意義(lhc 巽)
 
IoTの社会応用への展望とその課題 : AI技術とIoT
IoTの社会応用への展望とその課題 : AI技術とIoTIoTの社会応用への展望とその課題 : AI技術とIoT
IoTの社会応用への展望とその課題 : AI技術とIoT
 
機械学習とこれを支える並列計算 : 並列計算の現状と産業応用について
機械学習とこれを支える並列計算 : 並列計算の現状と産業応用について機械学習とこれを支える並列計算 : 並列計算の現状と産業応用について
機械学習とこれを支える並列計算 : 並列計算の現状と産業応用について
 
Using Spark and Riak for IoT Apps—Patterns and Anti-Patterns: Spark Summit Ea...
Using Spark and Riak for IoT Apps—Patterns and Anti-Patterns: Spark Summit Ea...Using Spark and Riak for IoT Apps—Patterns and Anti-Patterns: Spark Summit Ea...
Using Spark and Riak for IoT Apps—Patterns and Anti-Patterns: Spark Summit Ea...
 
Ensayo transformadores
Ensayo transformadoresEnsayo transformadores
Ensayo transformadores
 
The urban dance
The urban dance The urban dance
The urban dance
 
Ppt ppp pressentation versio keynote
Ppt ppp pressentation versio keynotePpt ppp pressentation versio keynote
Ppt ppp pressentation versio keynote
 
la comunicación en Internet
la comunicación en Internet la comunicación en Internet
la comunicación en Internet
 
Presentacion maiko
Presentacion maikoPresentacion maiko
Presentacion maiko
 
Power sofas
Power sofasPower sofas
Power sofas
 
Awais mohammad's cv
Awais mohammad's cvAwais mohammad's cv
Awais mohammad's cv
 
CV OF RAJESH PANDIT
CV OF RAJESH PANDITCV OF RAJESH PANDIT
CV OF RAJESH PANDIT
 
Etica,bioetica,deontologia,valores y antivalores
Etica,bioetica,deontologia,valores y antivaloresEtica,bioetica,deontologia,valores y antivalores
Etica,bioetica,deontologia,valores y antivalores
 
Semtrio LEED sertifikası & Yeşil Bina Sertifikası
Semtrio LEED sertifikası & Yeşil Bina SertifikasıSemtrio LEED sertifikası & Yeşil Bina Sertifikası
Semtrio LEED sertifikası & Yeşil Bina Sertifikası
 
interview Luchtvaartnieuws jan 2017
interview Luchtvaartnieuws jan 2017interview Luchtvaartnieuws jan 2017
interview Luchtvaartnieuws jan 2017
 
Daisy Company_Profile
Daisy Company_ProfileDaisy Company_Profile
Daisy Company_Profile
 

Similar to 社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術

Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationHans Klos
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Mirco Vanini
 
The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial ThingsSenrio
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 
Introduction to iot and arduino uno r3
Introduction to iot and arduino uno r3Introduction to iot and arduino uno r3
Introduction to iot and arduino uno r3Saurav Chaudhary
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Blockchain solutions leading to better security practices
Blockchain solutions leading to better security practicesBlockchain solutions leading to better security practices
Blockchain solutions leading to better security practicesEric Larcheveque
 
Copy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfCopy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfSeynji
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsMario Drobics
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Securityshiriskumar
 
Azure iot edge and AI enabling the intelligent edge
Azure iot edge and AI  enabling the intelligent edgeAzure iot edge and AI  enabling the intelligent edge
Azure iot edge and AI enabling the intelligent edgeMarco Dal Pino
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsJay Nagar
 
IoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and mlIoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and mlMarco Dal Pino
 

Similar to 社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術 (20)

Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
eMsecure
eMsecureeMsecure
eMsecure
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
 
Iot Security
Iot SecurityIot Security
Iot Security
 
The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial Things
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Introduction to iot and arduino uno r3
Introduction to iot and arduino uno r3Introduction to iot and arduino uno r3
Introduction to iot and arduino uno r3
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Blockchain solutions leading to better security practices
Blockchain solutions leading to better security practicesBlockchain solutions leading to better security practices
Blockchain solutions leading to better security practices
 
Copy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfCopy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdf
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Azure iot edge and AI enabling the intelligent edge
Azure iot edge and AI  enabling the intelligent edgeAzure iot edge and AI  enabling the intelligent edge
Azure iot edge and AI enabling the intelligent edge
 
A chip to protect IOT
A chip to protect IOTA chip to protect IOT
A chip to protect IOT
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
 
IoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and mlIoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and ml
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術