SlideShare a Scribd company logo
Digital Security for the
Internet of Things
Columbia University
Vera Ho ■ Wei Cai ■ Salar Fattahi
Why Digital Security?
Many pieces of technology are now becoming
"smart" devices
○ Health Care
○ Appliances (Washers/Dryers, Refrigerators, etc)
○ Locks & Surveillance
These are very personal items but new
technology is typically not very secured
○ For example, when email was first invented, it was
not secure at all and became exploited
○ When these new devices are exploited, people no
longer feel safe in their own homes
Example of Exploited IoT
"Hackers Remotely Kill a Jeep on the Highway
- With Me in It" by Andy Greenberg (Wired)
○ Controlled experiment between 2 hackers and a
driver
○ Hackers used a laptop 10 miles away
○ Took control over climate controls, wipers and
radio settings
Example of Exploited IoT
"Hackers Remotely Kill a Jeep on the Highway
- With Me in It" by Andy Greenberg (Wired)
○ Transmission can be cut and the accelerator no
longer responded to the driver
○ The Jeep slowed to a stop in the middle of highway
traffic
○ The breaks could also be controlled
Why Digital Security?
Our project is to explore how security works for the
Internet of Things. Specifically, we are simulating our own
"smart" lock system because:
○ Locks to our homes represent our trust to keep everything
we hold dear safe from criminals and thieves
○ Locks inherently require a secure functionality and setup
Project Design Overview
There are 3 components to our smart lock:
○ Phone application for the user to communicate with
the lock
○ The lock will authenticate the user before
locking/unlocking
○ Parse is used to store activity as log information
Project Design Details
Raspberry Pi
○ Simulating the GUI of the lock (reporting it's state)
and the user interface of the phone application
○ Connected to WiFi with a dongle
Atmel WINC1500, SAMD21 microcontroller and
CryptoAuthentication Chips
○ Emulating the lock hardware itself
○ Authenticates user
○ Connects hardware to Wi-FI
Parse Cloud Platform
○ Stores login information each time a user attempts
to change the lock state
Atmel Hardware Details
The Atmel microcontroller is programmed using C
○ Micro Control Unit (MCU)
○ USB interface, Virtual COM Port.
Atmel Hardware Details
Atmel WINC1500
○ IEEE 802.11 b/g/n
○ Station mode, AP mode, P2P mode
○ TCP and UDP sockets
Atmel CryptoAuthXplained
○ ATSHA204, ATAES132A, ATECC108A
○ Provides SHA-256 hash algorithm
○ Symmetric/Asymmetric Crypto
○ Store up to 16 keys
Authentication
Key Authentication
User Interface and Interactions
○ User Interface implemented on Raspberry Pi.
○ Entry fields for username and password logins and new user
setup.
○ Login attempts will be pushed to the cloud.
Raspberry Pi Details
When each button is pressed, the GUI will communicate
with either Parse or Atmel
○ Parse via RESTful API using HTTP requests
○ Atmel via TCP sockets
Sample Scenarios
App Interface: User can use his phone to
login and unlock the door
Front Door: Valid users can login on the
front door to lock/unlock the door
Inside the House: Master users can
add temporary users for a limited
time
Parse Cloud Details
Communicates with Raspberry Pi using the RESTful API by
using HTTP requests
○ Create new users and record their login information
○ Log the time and date each user attempts to use the
lock
○ Report information back to the Raspberry Pi if
requested
Parse Cloud Interface
User:
Attempted usernames
isValid:
Validity of
username/password
Locked:
Status of the Lock
updateAt:
Date and time of update
createdAt:
Date and time of creation

More Related Content

What's hot

IOT Overview
IOT OverviewIOT Overview
IOT Overview
Prashanth Nagaraj
 
Robust Din-rail Fanless Embedded System with Intel® Atom™ Processor E3815 as ...
Robust Din-rail Fanless Embedded System with Intel® Atom™ Processor E3815 as ...Robust Din-rail Fanless Embedded System with Intel® Atom™ Processor E3815 as ...
Robust Din-rail Fanless Embedded System with Intel® Atom™ Processor E3815 as ...
Anil Gadi
 
Multicode remote controls osco gate operator- lineargateaccess
Multicode remote controls  osco gate operator- lineargateaccessMulticode remote controls  osco gate operator- lineargateaccess
Multicode remote controls osco gate operator- lineargateaccess
Mark Jim
 
Datasheet EnGenius ENH700EXT
Datasheet EnGenius ENH700EXTDatasheet EnGenius ENH700EXT
Datasheet EnGenius ENH700EXT
EnGenius Europe
 
Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"cias-elettronica
 
Sierra Wireless Developer Day 2013 - Show&Tell 4 - Smart home gateway
Sierra Wireless Developer Day 2013 - Show&Tell 4 - Smart home gatewaySierra Wireless Developer Day 2013 - Show&Tell 4 - Smart home gateway
Sierra Wireless Developer Day 2013 - Show&Tell 4 - Smart home gateway
Thibault Cantegrel
 
Wireless home security
Wireless home securityWireless home security
Wireless home security
morlesharma
 
Act500
Act500Act500
Act500
Adit Group
 
ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...
ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...
ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...
Zyxel Communications Corp.
 
Internet of Things (IoT) Intro
Internet of Things (IoT) IntroInternet of Things (IoT) Intro
Internet of Things (IoT) Intro
Anna Gerber
 
Internet of things
Internet of thingsInternet of things
Internet of things
Anirban Konar
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
AkshetPatel
 
IoT introduction
IoT introductionIoT introduction
IoT introduction
Anssi Soinu
 
Open source industrial IoT
Open source industrial IoTOpen source industrial IoT
Open source industrial IoT
Manolis Nikiforakis
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
Logitek Solutions
 
Act1000
Act1000Act1000
Act1000
Adit Group
 

What's hot (16)

IOT Overview
IOT OverviewIOT Overview
IOT Overview
 
Robust Din-rail Fanless Embedded System with Intel® Atom™ Processor E3815 as ...
Robust Din-rail Fanless Embedded System with Intel® Atom™ Processor E3815 as ...Robust Din-rail Fanless Embedded System with Intel® Atom™ Processor E3815 as ...
Robust Din-rail Fanless Embedded System with Intel® Atom™ Processor E3815 as ...
 
Multicode remote controls osco gate operator- lineargateaccess
Multicode remote controls  osco gate operator- lineargateaccessMulticode remote controls  osco gate operator- lineargateaccess
Multicode remote controls osco gate operator- lineargateaccess
 
Datasheet EnGenius ENH700EXT
Datasheet EnGenius ENH700EXTDatasheet EnGenius ENH700EXT
Datasheet EnGenius ENH700EXT
 
Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"
 
Sierra Wireless Developer Day 2013 - Show&Tell 4 - Smart home gateway
Sierra Wireless Developer Day 2013 - Show&Tell 4 - Smart home gatewaySierra Wireless Developer Day 2013 - Show&Tell 4 - Smart home gateway
Sierra Wireless Developer Day 2013 - Show&Tell 4 - Smart home gateway
 
Wireless home security
Wireless home securityWireless home security
Wireless home security
 
Act500
Act500Act500
Act500
 
ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...
ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...
ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...
 
Internet of Things (IoT) Intro
Internet of Things (IoT) IntroInternet of Things (IoT) Intro
Internet of Things (IoT) Intro
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
 
IoT introduction
IoT introductionIoT introduction
IoT introduction
 
Open source industrial IoT
Open source industrial IoTOpen source industrial IoT
Open source industrial IoT
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
 
Act1000
Act1000Act1000
Act1000
 

Similar to Digital Security for the IoT Presentation

Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Stanford School of Engineering
 
IoT Domain Naming and Pain Points
IoT Domain Naming and Pain PointsIoT Domain Naming and Pain Points
IoT Domain Naming and Pain Points
David Fowler
 
Brilong Smart lock / Smart home / Smart Access
Brilong Smart lock / Smart home / Smart AccessBrilong Smart lock / Smart home / Smart Access
Brilong Smart lock / Smart home / Smart Access
John Peng
 
IoT Convention Europe - Mechelen June 15th 2017
IoT Convention Europe - Mechelen June 15th 2017IoT Convention Europe - Mechelen June 15th 2017
IoT Convention Europe - Mechelen June 15th 2017
AllBits BVBA (freelancer)
 
6. Iot Training forum Freescale
6. Iot Training forum Freescale6. Iot Training forum Freescale
6. Iot Training forum Freescale
MITEF México
 
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real worldRakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
SORACOM,INC
 
Internet of things
Internet of thingsInternet of things
Internet of things
Arihant Kumar Seraogi
 
Building trust in IoT, by Gemalto
Building trust in IoT, by GemaltoBuilding trust in IoT, by Gemalto
Building trust in IoT, by Gemalto
Haider Iqbal
 
Pulga, a Tiny Open-Source MQTT Broker for Flexible and Secure IoT Deployments
Pulga, a Tiny Open-Source MQTT Broker for Flexible and Secure IoT DeploymentsPulga, a Tiny Open-Source MQTT Broker for Flexible and Secure IoT Deployments
Pulga, a Tiny Open-Source MQTT Broker for Flexible and Secure IoT Deployments
Eyes of Things
 
IRJET - Advanced Internet & Bluetooth based Home Automation using Arduino Mic...
IRJET - Advanced Internet & Bluetooth based Home Automation using Arduino Mic...IRJET - Advanced Internet & Bluetooth based Home Automation using Arduino Mic...
IRJET - Advanced Internet & Bluetooth based Home Automation using Arduino Mic...
IRJET Journal
 
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM France Lab
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
CloudIDSummit
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
George Fletcher
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
Qian JIN
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
vidhanPoddar1
 
Life going beyond the smart home
Life going beyond the smart homeLife going beyond the smart home
Life going beyond the smart home
COMPUTEX TAIPEI
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation Track
Priyanka Aash
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
ssuser2cc0d4
 
Distributed Ledgers meet Mesh Networks
Distributed Ledgers meet Mesh NetworksDistributed Ledgers meet Mesh Networks
Distributed Ledgers meet Mesh Networks
🌍 Norbert Gehrke
 
Neo900: Crafting The Private Phone
Neo900: Crafting The Private PhoneNeo900: Crafting The Private Phone
Neo900: Crafting The Private Phone
Sebastian Krzyszkowiak
 

Similar to Digital Security for the IoT Presentation (20)

Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
IoT Domain Naming and Pain Points
IoT Domain Naming and Pain PointsIoT Domain Naming and Pain Points
IoT Domain Naming and Pain Points
 
Brilong Smart lock / Smart home / Smart Access
Brilong Smart lock / Smart home / Smart AccessBrilong Smart lock / Smart home / Smart Access
Brilong Smart lock / Smart home / Smart Access
 
IoT Convention Europe - Mechelen June 15th 2017
IoT Convention Europe - Mechelen June 15th 2017IoT Convention Europe - Mechelen June 15th 2017
IoT Convention Europe - Mechelen June 15th 2017
 
6. Iot Training forum Freescale
6. Iot Training forum Freescale6. Iot Training forum Freescale
6. Iot Training forum Freescale
 
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real worldRakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Building trust in IoT, by Gemalto
Building trust in IoT, by GemaltoBuilding trust in IoT, by Gemalto
Building trust in IoT, by Gemalto
 
Pulga, a Tiny Open-Source MQTT Broker for Flexible and Secure IoT Deployments
Pulga, a Tiny Open-Source MQTT Broker for Flexible and Secure IoT DeploymentsPulga, a Tiny Open-Source MQTT Broker for Flexible and Secure IoT Deployments
Pulga, a Tiny Open-Source MQTT Broker for Flexible and Secure IoT Deployments
 
IRJET - Advanced Internet & Bluetooth based Home Automation using Arduino Mic...
IRJET - Advanced Internet & Bluetooth based Home Automation using Arduino Mic...IRJET - Advanced Internet & Bluetooth based Home Automation using Arduino Mic...
IRJET - Advanced Internet & Bluetooth based Home Automation using Arduino Mic...
 
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
Life going beyond the smart home
Life going beyond the smart homeLife going beyond the smart home
Life going beyond the smart home
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation Track
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
 
Distributed Ledgers meet Mesh Networks
Distributed Ledgers meet Mesh NetworksDistributed Ledgers meet Mesh Networks
Distributed Ledgers meet Mesh Networks
 
Neo900: Crafting The Private Phone
Neo900: Crafting The Private PhoneNeo900: Crafting The Private Phone
Neo900: Crafting The Private Phone
 

Digital Security for the IoT Presentation

  • 1. Digital Security for the Internet of Things Columbia University Vera Ho ■ Wei Cai ■ Salar Fattahi
  • 2. Why Digital Security? Many pieces of technology are now becoming "smart" devices ○ Health Care ○ Appliances (Washers/Dryers, Refrigerators, etc) ○ Locks & Surveillance These are very personal items but new technology is typically not very secured ○ For example, when email was first invented, it was not secure at all and became exploited ○ When these new devices are exploited, people no longer feel safe in their own homes
  • 3. Example of Exploited IoT "Hackers Remotely Kill a Jeep on the Highway - With Me in It" by Andy Greenberg (Wired) ○ Controlled experiment between 2 hackers and a driver ○ Hackers used a laptop 10 miles away ○ Took control over climate controls, wipers and radio settings
  • 4. Example of Exploited IoT "Hackers Remotely Kill a Jeep on the Highway - With Me in It" by Andy Greenberg (Wired) ○ Transmission can be cut and the accelerator no longer responded to the driver ○ The Jeep slowed to a stop in the middle of highway traffic ○ The breaks could also be controlled
  • 5. Why Digital Security? Our project is to explore how security works for the Internet of Things. Specifically, we are simulating our own "smart" lock system because: ○ Locks to our homes represent our trust to keep everything we hold dear safe from criminals and thieves ○ Locks inherently require a secure functionality and setup
  • 6. Project Design Overview There are 3 components to our smart lock: ○ Phone application for the user to communicate with the lock ○ The lock will authenticate the user before locking/unlocking ○ Parse is used to store activity as log information
  • 7. Project Design Details Raspberry Pi ○ Simulating the GUI of the lock (reporting it's state) and the user interface of the phone application ○ Connected to WiFi with a dongle Atmel WINC1500, SAMD21 microcontroller and CryptoAuthentication Chips ○ Emulating the lock hardware itself ○ Authenticates user ○ Connects hardware to Wi-FI Parse Cloud Platform ○ Stores login information each time a user attempts to change the lock state
  • 8. Atmel Hardware Details The Atmel microcontroller is programmed using C ○ Micro Control Unit (MCU) ○ USB interface, Virtual COM Port.
  • 9. Atmel Hardware Details Atmel WINC1500 ○ IEEE 802.11 b/g/n ○ Station mode, AP mode, P2P mode ○ TCP and UDP sockets Atmel CryptoAuthXplained ○ ATSHA204, ATAES132A, ATECC108A ○ Provides SHA-256 hash algorithm ○ Symmetric/Asymmetric Crypto ○ Store up to 16 keys
  • 11. User Interface and Interactions ○ User Interface implemented on Raspberry Pi. ○ Entry fields for username and password logins and new user setup. ○ Login attempts will be pushed to the cloud.
  • 12. Raspberry Pi Details When each button is pressed, the GUI will communicate with either Parse or Atmel ○ Parse via RESTful API using HTTP requests ○ Atmel via TCP sockets
  • 13. Sample Scenarios App Interface: User can use his phone to login and unlock the door Front Door: Valid users can login on the front door to lock/unlock the door Inside the House: Master users can add temporary users for a limited time
  • 14. Parse Cloud Details Communicates with Raspberry Pi using the RESTful API by using HTTP requests ○ Create new users and record their login information ○ Log the time and date each user attempts to use the lock ○ Report information back to the Raspberry Pi if requested
  • 15. Parse Cloud Interface User: Attempted usernames isValid: Validity of username/password Locked: Status of the Lock updateAt: Date and time of update createdAt: Date and time of creation