SlideShare a Scribd company logo
1 of 24
<ALISDAIR RITCHIE>
PETRAS – National IoT Research Hub
University of Warwick
Research:TheAnswerto the Problem of IoT Security
Research: The Answer to the Problem
of IoT Security.
Dr Alisdair Ritchie – PETRAS Impact Champion.
WMG, University of Warwick.
Setting the Scene
• Cyber attacks cost businesses as much as $400 billion a year
(Lloyds London)
• 99.9% of exploited vulnerabilities were compromised more
than a year after the vulnerability was published (Verizon
2017 Data Breach Investigations Report)
• Devices – 20.4 billion connected devices in use by 2020 up
from 8.4 billion in 2017 (Gartner)
• Internet of Things – In 2017, spend on IoT hardware was
$2.09 billion (Gartner)
3
The Internet of Things (IoT)
• Smart technologies make previously unintelligent things (like
home thermostats, white goods, or building management
systems) able to compute and communicate – typically
wirelessly
• Almost all the data that IoT devices send is to other
machines – there are no humans involved: ‘M2M’
communications
• Generic chipsets can be used to provide specific functionality
without consideration for the rest of the functions
• Security can cost more to research and implement than to
make the devices themselves
Applications of IoT – diverse and pervasive
• Households
– Smart thermostats
– White goods
– Televisions
• Building Management Systems (BMS) – sensors and controls
– Heating, ventilation & air conditioning
– Access controls
• Industrial and Utilities control systems
– Sensors and actuators (pumps, heaters, valves, etc.)
• Medical and Hospital equipment
– Patient monitors
– Patient information recording
• Transport
– Condition monitoring
– Asset location
• Retail
The Future Digital World
• Big Data - 90% of all the data in the world has been
created in the last two years (SINTEF ICT)
• The Robot “Birth Rate” is doubling every five years
(International Federation of Robotics)
• AI could add an additional £630bn to the UK Economy by
2035 (Government AI Report – Dame Wendy Hall)
• Regulations to govern these functions don’t exist yet and
research is required to generate this knowledge
What are the Issues that need to be
tackled?
Some examples of threats
• Contactless card skimming
• Hacking Building Management Systems
• Baby monitors
• Smart TVs
• USB devices
• Smart domestic goods
• Smart toys
• Cars, now and in the future
• Healthcare device
– From Fitbit to infusion pumps
Smart Toys
Increasingly, toys are equipped with internet
communications, cameras, geolocation, etc.
• Risk of digital stalking and peeping
(geolocation with picture data)
• Robots, dolls, drones
• Threat not yet fully emergent, but risk is
perceived
• PETRAS project at Lancaster called IoT4Kids
seeks to understand the security and privacy
implications for children using the IoT
See: http://www.cnet.com/news/hello-headaches-barbie-of-the-internet-age-has-even-
more-security-flaws/
The Value of Personal Data
Bagram US Air Base in Afghanistan as lit up by Strava
Source: BBC
Positive for the Future
• Productivity – Research could see machines double their
outputs every four years through rapid decision making and
environmental learning
• Retail and Logistics - Faster / more accurate order delivery on
demand
• Healthcare – Simple devices could provide solutions that
enable elderly people to stay in their homes – NHS Dementia
Test Bed
What is the UK doing about it?
PETRAS – key facts
Projects grouped by type into
‘Constellations’, sample one or
more of the Stream threads
• 11 world leading universities
• Combined hub value: £23m
• More than 50 projects
launched since 2016
• Blackett Review expertise
• 47 partners at submission,
60+ added since, combining
presence in the UK, Central
Europe and America
(giving International links
and perspective)
• Inter– and multi-disciplinary
focus split between social and
technical knowledge spheres
P
E
T
R
A
S
Privacy
Ethics
Trust
Reliability
Acceptability
Security
Social
Technical
Social and physical science challenges
16
Aims
• Deliver real co-produced cross-sectoral, impactful, and
timely technical and socioeconomic benefit;
• Place the UK as world-leader in expertise and deployment
of trusted IoT technology;
• Create a cross-disciplinary environment across research
domains, industries, and government departments;
• Create a social platform for innovation and co-creation
with users and stakeholders;
• Provide an enduring legacy from the PETRAS Hub, beyond
the end of the funded period.
To:
Research into IoT Systems
PETRAS Demonstrators
• IoT in the Home (BRE)
• IoT in Critical National Infrastructure (Airbus /
Costain)
• Data Sharing in the IoT (Cisco)
• IoT in Smart Buildings (Newcastle and Cube Controls)
• Moving in the IoT (Meridian / Costain / JLR)
• Art Connect (Tate)
Around £1m invested, including match funding
‘Safe Deployment of Knowledge in use’
IoT in the Home
The context of the demonstrator project is
BRE’s Innovation Park, which includes
more than 8 domestic buildings, 3 of which
have integrated photovoltaic power
generation (PV) with battery storage and
network import/export management.
Deliverables:
• Real full-scale ‘Smart Home’
• Smart Home simulator
• Use case – Micro energy-
trading in a community
• Report on factors influencing
adoption & acceptability
• Guidelines for secure IoT
deployment
Impact:
• Design, procurement,
deployment and operation
• Government and Industry
policy advice
Art Connect - Tate
• Identify pieces, ensure
provenance
• Monitor location and
movement, temperature
and pressure
• Observe condition across
borders in a seamless,
secure, and cost-effective
way
Protecting the
irreplaceable!
What is the Challenge?
• Increase knowledge of the need for cybersecurity
to address the drive to the cheapest solution
• Provide common knowledge base that allow
government and industry to make informed
decisions
• To move some of the onus for research into
issues which affect us all into the public space
• To build communities that can work together on
the problems of the future
Artificial Intelligence
Today’s Issue or the Future’s?
“the people writing the algorithms for software that will control
many automated aspects of our daily lives in the future are
mainly young, white men.”
“Almost by definition, machine learning algorithms will pick up
on any bias in the data they are given to learn from”
Dame Professor Wendy Hall
University of Southampton and PETRAS
writing in “The Conversation”
“If the Burden for Ensuring Security Falls on Consumers
then we have Failed”
Professor Joe Butler, Former Chief Scientist to the Department for Digital, Culture,
Media and Sport
Thank you!
Dr Alisdair Ritchie (a.ritchie@warwick.ac.uk)
PETRAS Impact Champion - WMG, University of Warwick

More Related Content

What's hot

Addressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTAddressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTDr.Vetrivelan Pandu
 
PhD Projects in MQTT Research Ideas
PhD Projects in MQTT Research IdeasPhD Projects in MQTT Research Ideas
PhD Projects in MQTT Research IdeasPhD Services
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoTCisco Canada
 
Internet of things
Internet of thingsInternet of things
Internet of thingsSanoj Kumar
 
logistics and the internet of things
logistics and the internet of thingslogistics and the internet of things
logistics and the internet of thingsSergey Zhdanov
 
Arrow Global Village IoT Summit (2016)
Arrow Global Village IoT Summit (2016)Arrow Global Village IoT Summit (2016)
Arrow Global Village IoT Summit (2016)Marc Jadoul
 
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATION
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATIONINTERNET OF THINGS - THE NEXT WAVE OF INNOVATION
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATIONRajat Maheshwari
 
Emerging Technology Trends in the Post-COVID World
Emerging Technology Trends in the Post-COVID WorldEmerging Technology Trends in the Post-COVID World
Emerging Technology Trends in the Post-COVID WorldVincent Lau
 
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaistIot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaistDaeyoung Kim
 
Xively up 2013 v3
Xively up 2013 v3Xively up 2013 v3
Xively up 2013 v3sapenov
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTSemyon Teplisky
 
INTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICSINTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICSCCN
 
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13Rick Holgate
 
Any Time, Anywhere, Any Device (ISASA)
Any Time, Anywhere, Any Device  (ISASA)Any Time, Anywhere, Any Device  (ISASA)
Any Time, Anywhere, Any Device (ISASA)Cathy Oxley
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 

What's hot (20)

Addressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTAddressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoT
 
The connected utility
The connected utilityThe connected utility
The connected utility
 
PhD Projects in MQTT Research Ideas
PhD Projects in MQTT Research IdeasPhD Projects in MQTT Research Ideas
PhD Projects in MQTT Research Ideas
 
Iot overview
Iot overviewIot overview
Iot overview
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
logistics and the internet of things
logistics and the internet of thingslogistics and the internet of things
logistics and the internet of things
 
Arrow Global Village IoT Summit (2016)
Arrow Global Village IoT Summit (2016)Arrow Global Village IoT Summit (2016)
Arrow Global Village IoT Summit (2016)
 
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATION
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATIONINTERNET OF THINGS - THE NEXT WAVE OF INNOVATION
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATION
 
Emerging Technology Trends in the Post-COVID World
Emerging Technology Trends in the Post-COVID WorldEmerging Technology Trends in the Post-COVID World
Emerging Technology Trends in the Post-COVID World
 
IoT13: Xively showcase
IoT13: Xively showcaseIoT13: Xively showcase
IoT13: Xively showcase
 
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaistIot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
 
Xively up 2013 v3
Xively up 2013 v3Xively up 2013 v3
Xively up 2013 v3
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
 
INTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICSINTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICS
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
 
Any Time, Anywhere, Any Device (ISASA)
Any Time, Anywhere, Any Device  (ISASA)Any Time, Anywhere, Any Device  (ISASA)
Any Time, Anywhere, Any Device (ISASA)
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 

Similar to Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security

IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxHadHic
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfImXaib
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalEslam Nader
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptxssuser2cc0d4
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)milemadinah
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Ameer Sameer
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIxonos Plc
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 

Similar to Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security (20)

Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
Blockchain for industry 4.0 HMI 2018
Blockchain for industry 4.0 HMI 2018Blockchain for industry 4.0 HMI 2018
Blockchain for industry 4.0 HMI 2018
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
 
CRMEVOLUTION
CRMEVOLUTIONCRMEVOLUTION
CRMEVOLUTION
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or Everything
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 

More from Pro Mrkt

NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...Pro Mrkt
 
David Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be BreakingDavid Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be BreakingPro Mrkt
 
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefenceAlex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefencePro Mrkt
 
Nicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-AttacksNicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-AttacksPro Mrkt
 
Dave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR JourneyDave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR JourneyPro Mrkt
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingPro Mrkt
 
Matthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its ImpactsMatthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its ImpactsPro Mrkt
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwarePro Mrkt
 
Grant Thomas - Understanding Hardware Security Threats
Grant Thomas - Understanding Hardware Security ThreatsGrant Thomas - Understanding Hardware Security Threats
Grant Thomas - Understanding Hardware Security ThreatsPro Mrkt
 
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18Pro Mrkt
 
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldPro Mrkt
 
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldAlex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldPro Mrkt
 
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Pro Mrkt
 
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Pro Mrkt
 

More from Pro Mrkt (14)

NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
 
David Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be BreakingDavid Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
 
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefenceAlex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
 
Nicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-AttacksNicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-Attacks
 
Dave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR JourneyDave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR Journey
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
 
Matthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its ImpactsMatthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its Impacts
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer Malware
 
Grant Thomas - Understanding Hardware Security Threats
Grant Thomas - Understanding Hardware Security ThreatsGrant Thomas - Understanding Hardware Security Threats
Grant Thomas - Understanding Hardware Security Threats
 
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
 
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
 
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldAlex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
 
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
 
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security

  • 1. <ALISDAIR RITCHIE> PETRAS – National IoT Research Hub University of Warwick Research:TheAnswerto the Problem of IoT Security
  • 2. Research: The Answer to the Problem of IoT Security. Dr Alisdair Ritchie – PETRAS Impact Champion. WMG, University of Warwick.
  • 3. Setting the Scene • Cyber attacks cost businesses as much as $400 billion a year (Lloyds London) • 99.9% of exploited vulnerabilities were compromised more than a year after the vulnerability was published (Verizon 2017 Data Breach Investigations Report) • Devices – 20.4 billion connected devices in use by 2020 up from 8.4 billion in 2017 (Gartner) • Internet of Things – In 2017, spend on IoT hardware was $2.09 billion (Gartner) 3
  • 4. The Internet of Things (IoT) • Smart technologies make previously unintelligent things (like home thermostats, white goods, or building management systems) able to compute and communicate – typically wirelessly • Almost all the data that IoT devices send is to other machines – there are no humans involved: ‘M2M’ communications • Generic chipsets can be used to provide specific functionality without consideration for the rest of the functions • Security can cost more to research and implement than to make the devices themselves
  • 5. Applications of IoT – diverse and pervasive • Households – Smart thermostats – White goods – Televisions • Building Management Systems (BMS) – sensors and controls – Heating, ventilation & air conditioning – Access controls • Industrial and Utilities control systems – Sensors and actuators (pumps, heaters, valves, etc.) • Medical and Hospital equipment – Patient monitors – Patient information recording • Transport – Condition monitoring – Asset location • Retail
  • 6. The Future Digital World • Big Data - 90% of all the data in the world has been created in the last two years (SINTEF ICT) • The Robot “Birth Rate” is doubling every five years (International Federation of Robotics) • AI could add an additional £630bn to the UK Economy by 2035 (Government AI Report – Dame Wendy Hall) • Regulations to govern these functions don’t exist yet and research is required to generate this knowledge
  • 7. What are the Issues that need to be tackled?
  • 8. Some examples of threats • Contactless card skimming • Hacking Building Management Systems • Baby monitors • Smart TVs • USB devices • Smart domestic goods • Smart toys • Cars, now and in the future • Healthcare device – From Fitbit to infusion pumps
  • 9. Smart Toys Increasingly, toys are equipped with internet communications, cameras, geolocation, etc. • Risk of digital stalking and peeping (geolocation with picture data) • Robots, dolls, drones • Threat not yet fully emergent, but risk is perceived • PETRAS project at Lancaster called IoT4Kids seeks to understand the security and privacy implications for children using the IoT See: http://www.cnet.com/news/hello-headaches-barbie-of-the-internet-age-has-even- more-security-flaws/
  • 10. The Value of Personal Data Bagram US Air Base in Afghanistan as lit up by Strava Source: BBC
  • 11. Positive for the Future • Productivity – Research could see machines double their outputs every four years through rapid decision making and environmental learning • Retail and Logistics - Faster / more accurate order delivery on demand • Healthcare – Simple devices could provide solutions that enable elderly people to stay in their homes – NHS Dementia Test Bed
  • 12. What is the UK doing about it?
  • 13. PETRAS – key facts Projects grouped by type into ‘Constellations’, sample one or more of the Stream threads • 11 world leading universities • Combined hub value: £23m • More than 50 projects launched since 2016 • Blackett Review expertise • 47 partners at submission, 60+ added since, combining presence in the UK, Central Europe and America (giving International links and perspective) • Inter– and multi-disciplinary focus split between social and technical knowledge spheres
  • 15. Social and physical science challenges
  • 16. 16 Aims • Deliver real co-produced cross-sectoral, impactful, and timely technical and socioeconomic benefit; • Place the UK as world-leader in expertise and deployment of trusted IoT technology; • Create a cross-disciplinary environment across research domains, industries, and government departments; • Create a social platform for innovation and co-creation with users and stakeholders; • Provide an enduring legacy from the PETRAS Hub, beyond the end of the funded period. To:
  • 17. Research into IoT Systems
  • 18. PETRAS Demonstrators • IoT in the Home (BRE) • IoT in Critical National Infrastructure (Airbus / Costain) • Data Sharing in the IoT (Cisco) • IoT in Smart Buildings (Newcastle and Cube Controls) • Moving in the IoT (Meridian / Costain / JLR) • Art Connect (Tate) Around £1m invested, including match funding ‘Safe Deployment of Knowledge in use’
  • 19. IoT in the Home The context of the demonstrator project is BRE’s Innovation Park, which includes more than 8 domestic buildings, 3 of which have integrated photovoltaic power generation (PV) with battery storage and network import/export management. Deliverables: • Real full-scale ‘Smart Home’ • Smart Home simulator • Use case – Micro energy- trading in a community • Report on factors influencing adoption & acceptability • Guidelines for secure IoT deployment Impact: • Design, procurement, deployment and operation • Government and Industry policy advice
  • 20. Art Connect - Tate • Identify pieces, ensure provenance • Monitor location and movement, temperature and pressure • Observe condition across borders in a seamless, secure, and cost-effective way Protecting the irreplaceable!
  • 21. What is the Challenge? • Increase knowledge of the need for cybersecurity to address the drive to the cheapest solution • Provide common knowledge base that allow government and industry to make informed decisions • To move some of the onus for research into issues which affect us all into the public space • To build communities that can work together on the problems of the future
  • 22. Artificial Intelligence Today’s Issue or the Future’s? “the people writing the algorithms for software that will control many automated aspects of our daily lives in the future are mainly young, white men.” “Almost by definition, machine learning algorithms will pick up on any bias in the data they are given to learn from” Dame Professor Wendy Hall University of Southampton and PETRAS writing in “The Conversation”
  • 23. “If the Burden for Ensuring Security Falls on Consumers then we have Failed” Professor Joe Butler, Former Chief Scientist to the Department for Digital, Culture, Media and Sport
  • 24. Thank you! Dr Alisdair Ritchie (a.ritchie@warwick.ac.uk) PETRAS Impact Champion - WMG, University of Warwick

Editor's Notes

  1. Cars, planes, homes, cities, and even animals are being connected. We are putting software everywhere. In today's world, it’s important that technology is available, protected and secure. Interdisciplinary engineering incorporates the knowledge and skills associated with other disciplines. This type of engineering has a broader scope than traditional engineering. Cyber Security is developing into a core subject
  2. Big Data - Look to massive research centres created by internet companies such as Facebook and Google. The rate of expansion for date is increasing IoT devices market in 2017 represents some 8.4 million devices which are worth almost $1.7 trillion. Meanwhile the rapidly growing IoT services market was worth $273bn in 2017. This is a huge market for a technology which has existed for less than 20 years. This market is forecast to expand to more than 20 billion connected devices with a value of $3 trillion by 2020 Robotics – there are around 1,8 million industrial robots in the world today but with the robot birth rate doubling, this is expected to more than 3 million units in 2020
  3. Productivity – As Industry 4.0 and smart factories evolve this will lead to lower costs, greater production capacity, faster and more accurate production with higher quality and reliability where all the robots in a factory are able to learn changes in conditions and evolve processes together. Indeed it has been said that The factory of the future will have only two employees, a man, and a dog.  The man will be there to feed the dog.  The dog will be there to keep the man from touching the equipment. Currently many of these processes sit in manufacturing but as this extends to food production and water management, it could help to offer a solution to what will be one of the big issues of the future – food and water. Retail and Logistics – 3D printing will allow for the production of low volume items on demand whilst the smart inks will impact in tracking and tracing products. This will allow traders to track products at an individual unit level by where they were manufactured, for what market, what level of tax was paid as it crossed borders so that the logistical and quality assurance chain can be determined throughout the life of every product. Healthcare – Perhaps one of the most dramatic changes that connected technologies will ring is to the healthcare industry. Could this be the answer to problem that has become increasingly evidence. People getting older and sicker – Dementia and long term illness whilst traditional killers like heart disease are more preventable Not able to look after themselves and so not able to stay in their own homes – could technology provide the bridge that allows them to remain in home? Devces which can detect people’s location, if they have fallen Used the bathroom more than usual – URT Unusual sleeping, eating or drinking patterns Issues can be followed up by a clinician
  4. So what does PETRAS stand for P E T R A S – it is around this core of cyber security issues that the hub’s research is based. The hub also looks at all of these aspects from both a social and a technical aspect. My own role as Impact Champion is to engage and build partnerships, develop socioeconomic impact in its widest sense and secure a future legacy for the hub beyond its initial three year funded period.
  5. Research into all areas of the cyber security of the internet of things including: Connected and autonomous vehicles – both between vehicles and to their environment and the surrounding infrastructure The smart buildings, homes and factories of the future and how they come together to form Smart Cities and Public Spaces that we will live in And Healthcare including implantable medical devices and social care And often how many of these individual systems interact to form a systems of systems If anyone wants to discuss PETRAS with me then please do contact me
  6. Id and track -> reassembly, nature of the object, how it feels, history background audience and researcher  reception history impact on culture sociocultural impact . Audiences device to pick up data object context aware. Insurance premiums other conversion rates…