Unit & Ubiquitous IoT for securing cyberentities

746 views

Published on

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
746
On SlideShare
0
From Embeds
0
Number of Embeds
14
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide
  • Instances of digital shadowing for a doctor. The doctor’s white coat and electronic stethoscope store his virtual identity and act on his behalf.(Top) The coat and doctor’s fingerprints are elements of an authentication method. (Bottom) As the doctor uses the stethoscope, it not only records and stores patient’s heartbeat, but also signs the data on doctors behalf and stores it in the hospital database.
  • RFID based interaction system scenarios among U2IoT cyberentites
  • Unit & Ubiquitous IoT for securing cyberentities

    1. 1. K.C.E.S’s COLLGE OF ENGINEERING & INFORMATION TECHNOLOGY, JALGAON 425001. [2013– 2014] SEMINAR ON GUIDED BY: Prof.. SONALI VASAVE PRESENTED BY : DIKSHANT KRIPALNI BE(Comp) ROLL NO.: 80
    2. 2. Internet ofThings :What is it? … network of objects . . . … a system . . . that would be able to instantaneously identify any kind of object. ...one major next step in this development of the Internet, which is to progressively evolve from a network of interconnected computers to a network of interconnected objects …
    3. 3. … from communicating people (Internet) ... to communicating items … ... from 3-5 computers per person … ... to 10-25 communicating items per person … ... from human triggered communication … ... to event triggered communication … “The Internet ofThings is the network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment.” – Gartner (link)
    4. 4. Generic Scenario of IoT
    5. 5. Internet ofThings: … pervasive - ubiquitous Define: pervasive Define: ubiquitous Technology that will be all around us and therefore “invisible”
    6. 6.  Typical/Possible IoT Application
    7. 7. The Internet ofThings … … is it here already?
    8. 8. The Interent ofThing is becoming true … … without planning …
    9. 9. Are those devices protected? Are the already existing IoT applications protected?  HR-Sensor- wrist watch:Well … No TUG Gate: Smart Card – Reader: No  RFIDTag – Reader: No  RFIDTag – Reader (Mifare et al): No  Ipod – Shoetag: I do not know … Remember: no protection, no $$
    10. 10. Cyber Security Requirements CIA triad basic information security requirements Authority authentication and authorization No repudiation provides proofs of a cyber entity’s behaviours to a trusted third party Privacy preservation aims to protect sensitive information
    11. 11. Obstacles in securing cyberentities in the IoT  Expanding domains The mapping of physical objects in cyberspace, coupled with networking and communication cyberentities, make the scope of cyberentities in the IoT much larger than in the Internet.  Dynamic activity cycle Cyberentities might be simultaneously idle in some scenarios and active in others  Heterogeneous interactions Interactions among cyber entities are not limited to cyber and physical characteristics but also include social attributes, which are particularly important for across- space interactions.
    12. 12. UnitAnd Ubiquitous IoT SystemArchitecture
    13. 13. How can we Secure Cyberentity Interaction?
    14. 14. Securing Cyberentity Interaction - Scenario 1 Secure Data Access
    15. 15. Securing Cyberentity Interaction - Scenario 2 Privacy preserving data sharing
    16. 16. Securing Cyberentity Interaction - Scenario 3 Secure access authority transfer
    17. 17. Future Research for Securing Cyberentites in U2IoT  As the IoT continues to flourish, offering an attractive future networking paradigm, providing security for cyberentities presents increasingly critical challenges.  Future research efforts should focus on providing security in heterogeneous network interactions and applying compatible security mechanisms for cross- network authentication and authorization. “Internet-of-Things (IoT) provides the foundational infrastructure for a smarter planet, and offers significant growth opportunities in IT, infrastructures and services” – IBM (link)

    ×