Mark Horowitz - Stanford Engineering - Securing the Internet of Things

Stanford School of Engineering
Stanford School of EngineeringStanford School of Engineering
Securing the Internet of 
Things 
Mark Horowitz 
Stanford School of Engineering 
 
1
It's Worse Than You Think 
Secure Internet of Things 
3
Secure Internet of Things 
Our Goal 
• Embark on a 5-year research project to secure the 
Internet of Things 
▶ Collaboration between Stanford, Berkeley, and Michigan 
• Rethink building IoT systems from the ground up 
▶ Systems, cryptography, applications, analytics, networks, 
hardware, software, HCI 
• Data security: novel cryptography that enables 
analytics on confidential data 
• System security: a software framework for safe 
and secure IoT applications 
4
Secure Internet of Things 
Outline 
• What is the Internet of Things? 
• Why IoT security is so hard 
• What we plan to do about it 
5
The Internet of Things 
Secure Internet of Things 
6
Internet(s) of Things 
Secure Internet of Things 
7 
Networked 
Devices 
Tens/person 
Uncontrolled Environment 
Unlicensed spectrum 
Convenience 
Powered 
WiFi/802.11 
TCP/IP 
IEEE/IETF 
Personal Area 
Networks 
Tens/person 
Personal environment 
Unlicensed spectrum 
Instrumentation 
Fashion vs. function 
Bluetooth, BLE 
3G/LTE 
3GPP/IEEE 
Home Area 
Networks 
Hundreds/person 
Uncontrolled Environment 
Unlicensed spectrum 
Convenience 
Consumer requirements 
ZigBee, Z-Wave 
6lowpan, RPL 
IETF/ZigBee/private 
Industrial 
Automation 
Thousands/person 
Controlled Environment 
High reliability 
Control networks 
Industrial requirements 
WirelessHART, 802.15.4 
6tsch, RPL 
IEEE/IIC/IETF
Internet(s) of Things 
Secure Internet of Things 
8 
Networked 
Devices 
Tens/person 
Uncontrolled Environment 
Unlicensed spectrum 
Convenience 
Powered 
WiFi/802.11 
TCP/IP 
IEEE/IETF 
Personal Area 
Networks 
Tens/person 
Personal environment 
Unlicensed spectrum 
Instrumentation 
Fashion vs. function 
Bluetooth, BLE 
3G/LTE 
3GPP/IEEE 
Home Area 
Networks 
Hundreds/person 
Uncontrolled Environment 
Unlicensed spectrum 
Convenience 
Consumer requirements 
ZigBee, Z-Wave 
6lowpan, RPL 
IETF/ZigBee/private 
Industrial 
Automation 
Thousands/person 
Controlled Environment 
High reliability 
Control networks 
Industrial requirements 
WirelessHART, 802.15.4 
6tsch, RPL 
IEEE/IIC/IETF
IoT: MGC Architecture 
Secure Internet of Things 9
IoT: MGC Architecture 
eMbedded 
devices 
Secure Internet of Things 10
eMbedded 
devices 
Secure Internet of Things 
Gateways 
11 
IoT: MGC Architecture 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi
ZigBee, 
ZWave, 
Bluetooth, 
Secure Internet of Things 
WiFi 
3G/4G, 
TCP/IP 
Gateways 
Cloud 
12 
IoT: MGC Architecture 
eMbedded 
devices
IoT: MGC Architecture 
ZigBee, 
ZWave, 
Bluetooth, 
Secure Internet of Things 
WiFi 
3G/4G, 
TCP/IP 
eMbedded 
devices 
Gateways 
Cloud 
13 User device
IoT: MGC Architecture 
embedded C 
(ARM, avr, msp430) 
Secure Internet of Things 
14 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP
IoT: MGC Architecture 
embedded C 
(ARM, avr, msp430) 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Obj-C/C++, Java, 
Swift, Javascript/HTML 
Secure Internet of Things 15
IoT: MGC Architecture 
3G/4G, 
TCP/IP 
Ruby/Rails, 
Python/Django, 
J2EE, PHP, Node.js 
Obj-C/C++, Java, 
Swift, Javascript/HTML 
embedded C 
(ARM, avr, msp430) 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
Secure Internet of Things 16
IoT Security is Hard 
Secure Internet of Things 
3G/4G, 
TCP/IP 
Ruby/Rails, 
Python/Django, 
J2EE, PHP, Node.js 
Obj-C/C++, Java, 
Swift, Javascript/HTML 
embedded C 
(ARM, avr, msp430) 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
Secure Internet of Things 23 
• Complex, distributed systems 
▶ 103-106 differences in resources across tiers 
▶ Many languages, OSes, and networks 
▶ Specialized hardware 
• Just developing applications is hard 
• Securing them is even harder 
▶ Enormous attack surface 
▶ Reasoning across hardware, software, languages, devices, etc. 
▶ What are the threats and attack models? 
• Valuable data: personal, location, presence 
• Rush to development + hard ➔ avoid, deal later 
17
18 
What We're Going To 
Do About it
Secure Internet of Things 
Two Goals 
19 
1.Research and define new cryptographic 
computational models for secure data analytics 
and actuation on enormous streams of real-time 
data from embedded systems. 
2.Research and implement a secure, open source 
hardware/software framework that makes it easy 
to quickly build Internet of Things applications that 
use these new computational models.
Two Kinds of Security 
Secure Internet of Things 
20 
• Data security: data collected and processed by 
IoT applications remains safe 
▶ Home occupancy 
▶ Medical data 
▶ Presence/location 
• System security: elements of MGC architecture 
are hard to compromise 
▶ eMbedded devices 
▶ Gateways 
▶ Cloud systems 
▶ End applications
Secure Internet of Things 
Data Security 
• Security limits what you (or an attacker) can do 
• What do IoT applications need to do? 
▶ Generate data samples 
▶ Process/filter these samples 
▶ Analytics on streams of data, combined with historical data 
▶ Produce results for end applications to view 
• Goal: end-to-end security 
▶ Embedded devices generate encrypted data 
▶ Only end applications can fully decrypt and view data 
▶ Gateways and cloud operate on data without knowing what it is 
21
End-to-End Security 
Secure Internet of Things 
22 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 23
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 23
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 23
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 23
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 23
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 23
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 24
End-to-End Security 
• Sensing device samples data, encrypts it 
• Each processing stage can decrypt or operate on 
encrypted data (increases storage requirements, 
limits potential operations) 
• Possible that only end user can fully view data 
data encrypted encrypted data 
Secure Internet of Things 
25
Homomorphic Encryption 
Secure Internet of Things 
(Gentry, 2009) 
• Take a sensor value S, encrypt it to be Se 
• It is possible to perform arbitrary computations on Se 
▶ But 1,000,000 slower than computations on S 
• So confidential analytics possible, but not yet practical 
▶ But can be fast for specific computations (e.g., addition) 
26
New Computational Models 
• Is it possible for devices to compute aggregate 
statistics without revealing their own data? 
▶ You’re in the 85th percentile for saving water today! 
▶ Your house consumed 120% of its average energy today 
• Is it possible to compute complex analytics? 
• Need new cryptographic computation models 
▶ Support computations that IoT applications need 
•)DFXOWZRUNLQJLQWKLVDUHD 
▶ Christopher Ré on analytics 
▶ Dan Boneh on cryptographic computational models 
Secure Internet of Things 
27
Secure Internet of Things 
Two Goals 
28 
1.Research and define new cryptographic 
computational models for secure data analytics 
and actuation on enormous streams of real-time 
data from embedded systems. 
2.Research and implement a secure, open source 
framework that makes it easy to quickly build 
Internet of Things applications that use these new 
computational models.
Building an Application 
• Write a data processing pipeline 
▶ Consists of a set of Models, describing data as it is stored 
▶ Transforms move data between Models 
▶ Instances of Models are bound to devices 
▶ Views can display Models 
▶ Controllers determine how data moves to Transforms 
10Hz ! 
Sampling! 
Secure Internet of Things 
29 
Motion! 
Sensor! Gateway! PC/Server! App/Web! 
Recent! 
History! 
Activity! 
Long! 
History! 
Behavior! 
Analytics,! 
Suggestions! 
Health! 
Views! 
Controllers! 
Models and! 
Transforms! 
Recent! 
History! 
Activity! 
Alarm! Schedule! 
security and privacy !
Secure Internet of Things 
Code Generation 
• Framework generates (working) skeleton code for 
entire pipeline 
▶ All Models, Transforms, and Controllers are written in a 
platform-independent language 
▶ Views are device specific (although many are HTML/JS) 
• Developer can modify this generated code 
▶ Framework detects if modifications violate pipeline description 
▶ E.g., data types, information leakage, encryption 
▶ Generated code compiles down to device OS/system 
•)DFXOWZRUNLQJLQWKLVDUHD 
▶ David Mazières: software abstractions for security 
▶3KLO/HYLV: 5DYHO software VVWHP 
30
The Internet of Things 
• Networking is one of the hardest development 
challenges in IoT applications 
▶ Ultra-low power protocols 
▶ Difficult link layers (4G, BLE) 
▶ Protocol stack mismatches 
▶ Data packing/unpacking 
• Framework handles this automatically 
▶ Novel network algorithms 
•)DFXOWZRUNLQJLQWKLVDUHD 
▶ Keith Winstein, reliability in challenged networks 
▶ Prabal Dutta, low power wireless 
Secure Internet of Things 
31
Software-defined Hardware 
• Hardware (boards, chips, power) is a daunting 
challenge to software developers 
▶ It easier to modify something than create it from scratch 
• The data processing pipeline is sufficient 
information to specify a basic embedded device 
▶ Sensors, networking, storage, processing needed 
•)DFXOWZRUNLQJLQWKLVDUHD 
▶ Mark Horowitz: DXWRPDWLQJFRQVWUDLQHGKDUGZDUHGHVLJQ 
▶ Prabal Dutta: embedded device design 
▶ Björn Hartmann: prototyping new applications 
Secure Internet of Things 
32
Secure Internet of Things 
Making It Easy 
• If it's hard to use, people will work around it 
▶ Set password to password 
▶ Just store data in the clear 
• Must understand development model 
▶ Embrace modification, incorporation, low barrier to entry 
▶ Do so such that prototypes can transition to production 
•)DFXOWZRUNLQJLQWKLVDUHD 
▶ Björn Hartmann: prototyping new applications 
33
1 of 37

Recommended

Privacy and security in IoT by
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
306 views18 slides
IoT Security and Privacy Considerations by
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
1K views21 slides
Security issues and solutions : IoT by
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoTJinia Bhowmik
812 views22 slides
Security and Privacy considerations in Internet of Things by
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
1.2K views15 slides
Technology & Policy Interaction Panel at Inform[ED] IoT Security by
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
305 views46 slides
Security challenges for internet of things by
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
1.6K views38 slides

More Related Content

What's hot

Internet of Things (IoT) Security and Privacy Recommendations by Jason Living... by
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
2.6K views28 slides
Ryan Wilson - ryanwilson.com - IoT Security by
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
865 views45 slides
Practical IoT Security in the Enterprise by
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the EnterpriseDaniel Miessler
392 views49 slides
IoT Security Imperative: Stop your Fridge from Sending you Spam by
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamAmit Rohatgi
2.5K views44 slides
IoT Security by Sanjay Kumar by
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay KumarOWASP Delhi
1.5K views42 slides
A survey in privacy and security in Internet of Things IOT by
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTUniversity of Ontario Institute of Technology (UOIT)
3.8K views75 slides

What's hot(20)

Internet of Things (IoT) Security and Privacy Recommendations by Jason Living... by CableLabs
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
CableLabs2.6K views
Ryan Wilson - ryanwilson.com - IoT Security by Ryan Wilson
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson865 views
Practical IoT Security in the Enterprise by Daniel Miessler
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
Daniel Miessler392 views
IoT Security Imperative: Stop your Fridge from Sending you Spam by Amit Rohatgi
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
Amit Rohatgi2.5K views
IoT Security by Sanjay Kumar by OWASP Delhi
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
OWASP Delhi1.5K views
Security Fundamental for IoT Devices; Creating the Internet of Secure Things by Design World
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Design World1.5K views
IoT Security Briefing FBI 07 23-2017 final by Frank Siepmann
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
Frank Siepmann190 views
Iot security amar prusty by amarprusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
amarprusty238 views
Securing Internet of Things by Rishabh Sharma
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
Rishabh Sharma2.8K views
Will Internet of Things (IoT) be secure enough? by Ravindra Dastikop
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop3.2K views
IoT security and privacy: main challenges and how ISOC-OTA address them by Radouane Mrabet
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet3.1K views
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit... by ClicTest
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest49.2K views
Security challenges for IoT by WSO2
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
WSO23.4K views
Your Thing is Pwned - Security Challenges for the IoT by WSO2
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
WSO21.6K views
Iot Security, Internet of Things by Bryan Len
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
Bryan Len730 views

Viewers also liked

Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W... by
Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...
Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...AWS Germany
832 views37 slides
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI... by
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...APNIC
2.4K views19 slides
Challenges of the io t v1 by
Challenges of the io t v1Challenges of the io t v1
Challenges of the io t v1Incubation & Industry
514 views16 slides
Privacy and Security in the Internet of Things by
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsJeff Katz
614 views24 slides
Automatski - The Internet of Things - Security in IoT by
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
1.1K views19 slides
APrIGF 2015: Security and the Internet of Things by
APrIGF 2015: Security and the Internet of ThingsAPrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of ThingsAPNIC
1.3K views15 slides

Viewers also liked(17)

Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W... by AWS Germany
Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...
Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...
AWS Germany832 views
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI... by APNIC
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
APNIC2.4K views
Privacy and Security in the Internet of Things by Jeff Katz
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
Jeff Katz614 views
Automatski - The Internet of Things - Security in IoT by automatskicorporation
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
APrIGF 2015: Security and the Internet of Things by APNIC
APrIGF 2015: Security and the Internet of ThingsAPrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of Things
APNIC1.3K views
Authorization for Internet of Things using OAuth 2.0 by Hannes Tschofenig
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0
Hannes Tschofenig9.4K views
Connectivity for Smart Home IoT - Brad Kayton by WithTheBest
Connectivity for Smart Home IoT - Brad KaytonConnectivity for Smart Home IoT - Brad Kayton
Connectivity for Smart Home IoT - Brad Kayton
WithTheBest573 views
Track 5 session 1 - st dev con 2016 - need for security for iot by ST_World
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
ST_World 1.2K views
SN-Security Architecture for Mobile Computing and IoT by Sukumar Nayak
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
Sukumar Nayak5K views
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye) by MicheleNati
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
MicheleNati10K views
What exactly is the "Internet of Things"? by Dr. Mazlan Abbas
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
Dr. Mazlan Abbas132K views
What is the Internet of Things? by Felix Grovit
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
Felix Grovit67.1K views
Internet of Things (IoT) - We Are at the Tip of An Iceberg by Dr. Mazlan Abbas
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas302.9K views
IoT architecture by Sumit Sharma
IoT architectureIoT architecture
IoT architecture
Sumit Sharma99.4K views
Internet of Things and its applications by Pasquale Puzio
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
Pasquale Puzio299.6K views

Similar to Mark Horowitz - Stanford Engineering - Securing the Internet of Things

CIRA Labs - Secure Home Gateway Project 2019-03.pptx by
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxssuserfb92ae
15 views40 slides
Gab 2015 aymeric weinbach azure iot by
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot Aymeric Weinbach
3.8K views34 slides
The internet of things (beyond data management and analytics) jonathan cooper... by
The internet of things (beyond data management and analytics) jonathan cooper...The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...Adam Doyle
97 views40 slides
Internet of Things (IoT) by
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)milemadinah
55 views39 slides
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014 by
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014Brian Knopf
663 views50 slides
presentation on Edge computing by
presentation on Edge computingpresentation on Edge computing
presentation on Edge computingsairamgoud16
19.6K views40 slides

Similar to Mark Horowitz - Stanford Engineering - Securing the Internet of Things(20)

CIRA Labs - Secure Home Gateway Project 2019-03.pptx by ssuserfb92ae
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
ssuserfb92ae15 views
Gab 2015 aymeric weinbach azure iot by Aymeric Weinbach
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot
Aymeric Weinbach3.8K views
The internet of things (beyond data management and analytics) jonathan cooper... by Adam Doyle
The internet of things (beyond data management and analytics) jonathan cooper...The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...
Adam Doyle97 views
Internet of Things (IoT) by milemadinah
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
milemadinah55 views
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014 by Brian Knopf
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
Brian Knopf663 views
presentation on Edge computing by sairamgoud16
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
sairamgoud1619.6K views
Introduction to Internet of Things.pdf by GVNSK Sravya
Introduction to Internet of Things.pdfIntroduction to Internet of Things.pdf
Introduction to Internet of Things.pdf
GVNSK Sravya6 views
IRJET- Network Monitoring & Network Security by IRJET Journal
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
IRJET Journal9 views
UCT IoT Deployment and Challenges by The IOT Academy
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
The IOT Academy544 views
The Considerations for Internet of Things @ 2017 by Jian-Hong Pan
The Considerations for Internet of Things @ 2017The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017
Jian-Hong Pan1.5K views
Vibro box sitel midih-presentation oc2 by MIDIH_EU
Vibro box sitel midih-presentation oc2Vibro box sitel midih-presentation oc2
Vibro box sitel midih-presentation oc2
MIDIH_EU187 views
Walking through the fog (computing) - Keynote talk at Italian Networking Work... by FBK CREATE-NET
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
FBK CREATE-NET373 views
Minimizing Information Transparency by Usman Arshad
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
Usman Arshad64 views
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig by CloudIDSummit
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit1.4K views
Introduction to IoT Technologies - The need to know basics by Jaco Bester
Introduction to IoT Technologies - The need to know basicsIntroduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basics
Jaco Bester230 views
Internet of things (IoT) and big data- r.nabati by nabati
Internet of things (IoT) and big data- r.nabatiInternet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabati
nabati848 views
Unit 6 Final ppt (1).ppt by nadoje
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
nadoje14 views
Group 5 IoT Architecture Layer by Marcus Maneja
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
Marcus Maneja172 views
Internet of things chapter2.pdf by Rupesh930637
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
Rupesh93063763 views

More from Stanford School of Engineering

Amin Arbabian - Stanford Engineering - Internet of Things as Connected Intell... by
Amin Arbabian - Stanford Engineering - Internet of Things as Connected Intell...Amin Arbabian - Stanford Engineering - Internet of Things as Connected Intell...
Amin Arbabian - Stanford Engineering - Internet of Things as Connected Intell...Stanford School of Engineering
2.4K views23 slides
The Internet of Everything: Tom Lee, Stanford School of Engineering by
The Internet of Everything:  Tom Lee, Stanford School of EngineeringThe Internet of Everything:  Tom Lee, Stanford School of Engineering
The Internet of Everything: Tom Lee, Stanford School of EngineeringStanford School of Engineering
10.2K views20 slides
Turbulence and Computing: Beauty and the Beast - Assistant Professor Gianluca... by
Turbulence and Computing: Beauty and the Beast - Assistant Professor Gianluca...Turbulence and Computing: Beauty and the Beast - Assistant Professor Gianluca...
Turbulence and Computing: Beauty and the Beast - Assistant Professor Gianluca...Stanford School of Engineering
6.7K views78 slides
Lights, Nano, Action! - Assistant Professor Jennifer Dionne by
Lights, Nano, Action! - Assistant Professor Jennifer DionneLights, Nano, Action! - Assistant Professor Jennifer Dionne
Lights, Nano, Action! - Assistant Professor Jennifer DionneStanford School of Engineering
1.5K views77 slides
Fiber Optics - Window on Human Biology: Olav Solgaard by
Fiber Optics - Window on Human Biology:  Olav SolgaardFiber Optics - Window on Human Biology:  Olav Solgaard
Fiber Optics - Window on Human Biology: Olav SolgaardStanford School of Engineering
1.5K views31 slides
The Wonders of Wireless: Phil Levis by
The Wonders of Wireless: Phil LevisThe Wonders of Wireless: Phil Levis
The Wonders of Wireless: Phil LevisStanford School of Engineering
722 views32 slides

More from Stanford School of Engineering(13)

Recently uploaded

_MAKRIADI-FOTEINI_diploma thesis.pptx by
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptxfotinimakriadi
12 views32 slides
Design_Discover_Develop_Campaign.pptx by
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptxShivanshSeth6
49 views20 slides
Robotics in construction enterprise by
Robotics in construction enterpriseRobotics in construction enterprise
Robotics in construction enterpriseKhalid Abdel Naser Abdel Rahim
5 views1 slide
Pitchbook Repowerlab.pdf by
Pitchbook Repowerlab.pdfPitchbook Repowerlab.pdf
Pitchbook Repowerlab.pdfVictoriaGaleano
6 views12 slides
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx by
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptxlwang78
180 views19 slides
Ansari: Practical experiences with an LLM-based Islamic Assistant by
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic AssistantM Waleed Kadous
9 views29 slides

Recently uploaded(20)

_MAKRIADI-FOTEINI_diploma thesis.pptx by fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi12 views
Design_Discover_Develop_Campaign.pptx by ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth649 views
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx by lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78180 views
Ansari: Practical experiences with an LLM-based Islamic Assistant by M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous9 views
Design of machine elements-UNIT 3.pptx by gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy37 views
MongoDB.pdf by ArthyR3
MongoDB.pdfMongoDB.pdf
MongoDB.pdf
ArthyR349 views
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf by AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure8 views
GDSC Mikroskil Members Onboarding 2023.pdf by gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil63 views
Créativité dans le design mécanique à l’aide de l’optimisation topologique by LIEGE CREATIVE
Créativité dans le design mécanique à l’aide de l’optimisation topologiqueCréativité dans le design mécanique à l’aide de l’optimisation topologique
Créativité dans le design mécanique à l’aide de l’optimisation topologique
LIEGE CREATIVE8 views
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... by csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn8 views
REACTJS.pdf by ArthyR3
REACTJS.pdfREACTJS.pdf
REACTJS.pdf
ArthyR337 views

Mark Horowitz - Stanford Engineering - Securing the Internet of Things

  • 1. Securing the Internet of Things Mark Horowitz Stanford School of Engineering 1
  • 2. It's Worse Than You Think Secure Internet of Things 3
  • 3. Secure Internet of Things Our Goal • Embark on a 5-year research project to secure the Internet of Things ▶ Collaboration between Stanford, Berkeley, and Michigan • Rethink building IoT systems from the ground up ▶ Systems, cryptography, applications, analytics, networks, hardware, software, HCI • Data security: novel cryptography that enables analytics on confidential data • System security: a software framework for safe and secure IoT applications 4
  • 4. Secure Internet of Things Outline • What is the Internet of Things? • Why IoT security is so hard • What we plan to do about it 5
  • 5. The Internet of Things Secure Internet of Things 6
  • 6. Internet(s) of Things Secure Internet of Things 7 Networked Devices Tens/person Uncontrolled Environment Unlicensed spectrum Convenience Powered WiFi/802.11 TCP/IP IEEE/IETF Personal Area Networks Tens/person Personal environment Unlicensed spectrum Instrumentation Fashion vs. function Bluetooth, BLE 3G/LTE 3GPP/IEEE Home Area Networks Hundreds/person Uncontrolled Environment Unlicensed spectrum Convenience Consumer requirements ZigBee, Z-Wave 6lowpan, RPL IETF/ZigBee/private Industrial Automation Thousands/person Controlled Environment High reliability Control networks Industrial requirements WirelessHART, 802.15.4 6tsch, RPL IEEE/IIC/IETF
  • 7. Internet(s) of Things Secure Internet of Things 8 Networked Devices Tens/person Uncontrolled Environment Unlicensed spectrum Convenience Powered WiFi/802.11 TCP/IP IEEE/IETF Personal Area Networks Tens/person Personal environment Unlicensed spectrum Instrumentation Fashion vs. function Bluetooth, BLE 3G/LTE 3GPP/IEEE Home Area Networks Hundreds/person Uncontrolled Environment Unlicensed spectrum Convenience Consumer requirements ZigBee, Z-Wave 6lowpan, RPL IETF/ZigBee/private Industrial Automation Thousands/person Controlled Environment High reliability Control networks Industrial requirements WirelessHART, 802.15.4 6tsch, RPL IEEE/IIC/IETF
  • 8. IoT: MGC Architecture Secure Internet of Things 9
  • 9. IoT: MGC Architecture eMbedded devices Secure Internet of Things 10
  • 10. eMbedded devices Secure Internet of Things Gateways 11 IoT: MGC Architecture ZigBee, ZWave, Bluetooth, WiFi
  • 11. ZigBee, ZWave, Bluetooth, Secure Internet of Things WiFi 3G/4G, TCP/IP Gateways Cloud 12 IoT: MGC Architecture eMbedded devices
  • 12. IoT: MGC Architecture ZigBee, ZWave, Bluetooth, Secure Internet of Things WiFi 3G/4G, TCP/IP eMbedded devices Gateways Cloud 13 User device
  • 13. IoT: MGC Architecture embedded C (ARM, avr, msp430) Secure Internet of Things 14 ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP
  • 14. IoT: MGC Architecture embedded C (ARM, avr, msp430) ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Obj-C/C++, Java, Swift, Javascript/HTML Secure Internet of Things 15
  • 15. IoT: MGC Architecture 3G/4G, TCP/IP Ruby/Rails, Python/Django, J2EE, PHP, Node.js Obj-C/C++, Java, Swift, Javascript/HTML embedded C (ARM, avr, msp430) ZigBee, ZWave, Bluetooth, WiFi Secure Internet of Things 16
  • 16. IoT Security is Hard Secure Internet of Things 3G/4G, TCP/IP Ruby/Rails, Python/Django, J2EE, PHP, Node.js Obj-C/C++, Java, Swift, Javascript/HTML embedded C (ARM, avr, msp430) ZigBee, ZWave, Bluetooth, WiFi Secure Internet of Things 23 • Complex, distributed systems ▶ 103-106 differences in resources across tiers ▶ Many languages, OSes, and networks ▶ Specialized hardware • Just developing applications is hard • Securing them is even harder ▶ Enormous attack surface ▶ Reasoning across hardware, software, languages, devices, etc. ▶ What are the threats and attack models? • Valuable data: personal, location, presence • Rush to development + hard ➔ avoid, deal later 17
  • 17. 18 What We're Going To Do About it
  • 18. Secure Internet of Things Two Goals 19 1.Research and define new cryptographic computational models for secure data analytics and actuation on enormous streams of real-time data from embedded systems. 2.Research and implement a secure, open source hardware/software framework that makes it easy to quickly build Internet of Things applications that use these new computational models.
  • 19. Two Kinds of Security Secure Internet of Things 20 • Data security: data collected and processed by IoT applications remains safe ▶ Home occupancy ▶ Medical data ▶ Presence/location • System security: elements of MGC architecture are hard to compromise ▶ eMbedded devices ▶ Gateways ▶ Cloud systems ▶ End applications
  • 20. Secure Internet of Things Data Security • Security limits what you (or an attacker) can do • What do IoT applications need to do? ▶ Generate data samples ▶ Process/filter these samples ▶ Analytics on streams of data, combined with historical data ▶ Produce results for end applications to view • Goal: end-to-end security ▶ Embedded devices generate encrypted data ▶ Only end applications can fully decrypt and view data ▶ Gateways and cloud operate on data without knowing what it is 21
  • 21. End-to-End Security Secure Internet of Things 22 ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data
  • 22. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 23
  • 23. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 23
  • 24. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 23
  • 25. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 23
  • 26. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 23
  • 27. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 23
  • 28. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 24
  • 29. End-to-End Security • Sensing device samples data, encrypts it • Each processing stage can decrypt or operate on encrypted data (increases storage requirements, limits potential operations) • Possible that only end user can fully view data data encrypted encrypted data Secure Internet of Things 25
  • 30. Homomorphic Encryption Secure Internet of Things (Gentry, 2009) • Take a sensor value S, encrypt it to be Se • It is possible to perform arbitrary computations on Se ▶ But 1,000,000 slower than computations on S • So confidential analytics possible, but not yet practical ▶ But can be fast for specific computations (e.g., addition) 26
  • 31. New Computational Models • Is it possible for devices to compute aggregate statistics without revealing their own data? ▶ You’re in the 85th percentile for saving water today! ▶ Your house consumed 120% of its average energy today • Is it possible to compute complex analytics? • Need new cryptographic computation models ▶ Support computations that IoT applications need •)DFXOWZRUNLQJLQWKLVDUHD ▶ Christopher Ré on analytics ▶ Dan Boneh on cryptographic computational models Secure Internet of Things 27
  • 32. Secure Internet of Things Two Goals 28 1.Research and define new cryptographic computational models for secure data analytics and actuation on enormous streams of real-time data from embedded systems. 2.Research and implement a secure, open source framework that makes it easy to quickly build Internet of Things applications that use these new computational models.
  • 33. Building an Application • Write a data processing pipeline ▶ Consists of a set of Models, describing data as it is stored ▶ Transforms move data between Models ▶ Instances of Models are bound to devices ▶ Views can display Models ▶ Controllers determine how data moves to Transforms 10Hz ! Sampling! Secure Internet of Things 29 Motion! Sensor! Gateway! PC/Server! App/Web! Recent! History! Activity! Long! History! Behavior! Analytics,! Suggestions! Health! Views! Controllers! Models and! Transforms! Recent! History! Activity! Alarm! Schedule! security and privacy !
  • 34. Secure Internet of Things Code Generation • Framework generates (working) skeleton code for entire pipeline ▶ All Models, Transforms, and Controllers are written in a platform-independent language ▶ Views are device specific (although many are HTML/JS) • Developer can modify this generated code ▶ Framework detects if modifications violate pipeline description ▶ E.g., data types, information leakage, encryption ▶ Generated code compiles down to device OS/system •)DFXOWZRUNLQJLQWKLVDUHD ▶ David Mazières: software abstractions for security ▶3KLO/HYLV: 5DYHO software VVWHP 30
  • 35. The Internet of Things • Networking is one of the hardest development challenges in IoT applications ▶ Ultra-low power protocols ▶ Difficult link layers (4G, BLE) ▶ Protocol stack mismatches ▶ Data packing/unpacking • Framework handles this automatically ▶ Novel network algorithms •)DFXOWZRUNLQJLQWKLVDUHD ▶ Keith Winstein, reliability in challenged networks ▶ Prabal Dutta, low power wireless Secure Internet of Things 31
  • 36. Software-defined Hardware • Hardware (boards, chips, power) is a daunting challenge to software developers ▶ It easier to modify something than create it from scratch • The data processing pipeline is sufficient information to specify a basic embedded device ▶ Sensors, networking, storage, processing needed •)DFXOWZRUNLQJLQWKLVDUHD ▶ Mark Horowitz: DXWRPDWLQJFRQVWUDLQHGKDUGZDUHGHVLJQ ▶ Prabal Dutta: embedded device design ▶ Björn Hartmann: prototyping new applications Secure Internet of Things 32
  • 37. Secure Internet of Things Making It Easy • If it's hard to use, people will work around it ▶ Set password to password ▶ Just store data in the clear • Must understand development model ▶ Embrace modification, incorporation, low barrier to entry ▶ Do so such that prototypes can transition to production •)DFXOWZRUNLQJLQWKLVDUHD ▶ Björn Hartmann: prototyping new applications 33