Instances of digital shadowing for a doctor. The doctor’s white coat and electronic stethoscope store his virtual identity and act on his behalf.(Top) The coat and doctor’s fingerprints are elements of an authentication method. (Bottom) As the doctor uses the stethoscope, it not only records and stores patient’s heartbeat, but also signs the data on doctors behalf and stores it in the hospital database.
RFID based interaction system scenarios among U2IoT cyberentites
Unit & Ubiquitous IoT for securing cyberentities
K.C.E.S’s COLLGE OF
GUIDED BY: Prof.. SONALI VASAVE
PRESENTED BY : DIKSHANT KRIPALNI
BE(Comp) ROLL NO.: 80
Internet ofThings :What is it?
… network of objects . . .
… a system . . . that would be able to instantaneously
identify any kind of object.
...one major next step in this development of the
Internet, which is to progressively evolve from a
network of interconnected computers to a network of
interconnected objects …
… from communicating people (Internet)
... to communicating items …
... from 3-5 computers per person …
... to 10-25 communicating items per person …
... from human triggered communication …
... to event triggered communication …
“The Internet ofThings is the network of physical objects that
contain embedded technology to communicate and sense or
interact with their internal states or the external environment.”
– Gartner (link)
The Interent ofThing is becoming true …
… without planning …
Are those devices protected?
Are the already existing
IoT applications protected?
HR-Sensor- wrist watch:Well … No
TUG Gate: Smart Card – Reader: No
RFIDTag – Reader: No
RFIDTag – Reader (Mifare et al): No
Ipod – Shoetag: I do not know …
no protection, no $$
Cyber Security Requirements
basic information security requirements
authentication and authorization
provides proofs of a cyber entity’s
behaviours to a trusted third party
aims to protect sensitive information
Obstacles in securing cyberentities in the IoT
The mapping of physical objects in cyberspace, coupled
with networking and communication cyberentities,
make the scope of cyberentities in the IoT much larger
than in the Internet.
Dynamic activity cycle
Cyberentities might be simultaneously idle in some
scenarios and active in others
Interactions among cyber entities are not limited to
cyber and physical characteristics but also include social
attributes, which are particularly important for across-
Future Research for Securing Cyberentites
As the IoT continues to flourish, offering an
attractive future networking paradigm, providing
security for cyberentities presents increasingly
Future research efforts should focus on providing
security in heterogeneous network interactions and
applying compatible security mechanisms for cross-
network authentication and authorization.
“Internet-of-Things (IoT) provides the foundational infrastructure
for a smarter planet, and offers significant growth opportunities in
IT, infrastructures and services” – IBM (link)