The Internet of things (IoT) and Information security are two rapidly growing markets, This presentation demonstrates an innovative solution for product development to leverage the opportunity and capture these markets.
2. Pradeep Jeswani (MTech IIT Madras)
● Managed products at
various levels of
abstraction & domains
● Founder healthtard.com
for curated health &
biomedical content
3. Idea Inception
● Market demand analysis on trends in
technology driven model
● Business value prospects
6. IoT Security
Authentication for Iot devices -the way users
want
➔ Identity and access
management (IAM) solution
This segment dominated the market in
2018 with 24.5% share of the overall
revenue.
7. Solution strength Reason
User Experience (UX) Simple Passwordless biometric strong
authentication using mobile
Strong Security Robust encrypted PKI infrastructure &
signed JWT tokens as proof of possession
Features of the solution
8. Authentication
● IoT Device (Need to authenticate user commands)
→ Low power
→ Low memory
→ Bandwidth constraint
9. Authentication
● Smart phone (Serves as Authenticator)
→User owns it
→Comes with inherent capabilities for example,
❖ Internet
❖ BLE connectivity
❖ Biometric authentication
❖ Hardware backed Keystore, etc.
11. Authentication
● User (Wants to operate on IoT device)
→ In possession of smart device
→ Uses his/her biometric to authenticate
→ UX is essential
12. Registration one time
3. Signs (Random
challenge + public
key + lock Id +
device ID) using
attestation key &
sends back to
server
1. Authenticator
Generates key pair,
sends registration
request
2. Receive random
challenge from
server
Registration flow
13. Authentication flow
3. Signs (Random
challenge) using
private key &
sends back to
server for
validation
1. User
Scans fingerprint using
a simple gesture
2. On success
request to server
with user identifier
& receives random
challenge
Authentication
flow
14. Authentication to IoT device
● Smartphone signs the command using private key.
● JWT token has public key from server.
● JWT signed using key injected out of band one time to
IoT device and metadata is available to server
16. Security & communication
● Communication between IoT authenticator based on BLE
(Bluetooth low energy)
● PKI RSA or Elliptic Curve Digital Signature Algorithm
for communication security
● Research shows ECDSA performs better than RSA, good
for IoT resource constrained devices
17. Marketing of solution
Easy to integrate,
customizable to
various needs
and collaboration
With this
authentication
solution, stronger
security is
assured
User Experience
is very delightful
To increase early adoption and get initial feedback