SlideShare a Scribd company logo
1 of 28
© Waher Data AB, 2019.
IoT Security
© Waher Data AB, 2019.
1. Introduction
Ex-Director of National Intelligence
James R. Clapper
http://www.popsci.com/clapper-americas-greatest-threat-is-internet-things
”America's greatest
threat is the
Internet of Things”
Feb 9, 2016
© Waher Data AB, 2019.
IoT systems particularly vulnerable
 Long-term operation
 Technologies become obsolete
 Lack of updates
 Invisible operation
 No visible clues something is wrong
 No human operator (for normal use case)
 Lack of supervision
 Larger scale
 More units and attack surfaces
 Consumers don’t pay for security
Check with https://www.shodan.io/
© Waher Data AB, 2019.
2. Problem Domain
© Waher Data AB, 2019.
Transport Security ≠ Security
Just one aspect
© Waher Data AB, 2019.
Security ≠ Privacy
Privacy
Subject
perspective
Security
Operator
perspective
MQTT
BlockChain
CoAP
LWM2M
XMPP
HTTPS
© Waher Data AB, 2019.
Security must encompass entire Life-Cycle
 Production
 Installation
 Configuration (zero-configuration)
 Discovery / Ownership
 Normal Operation / Interoperability
 Discovery / Usage
 Provisioning / Decision Support
 Smart Contracts / Usage
 Economic Feedback
 Transfer of Ownership
 Decommissioning
Life-Cycle
Just one aspect
© Waher Data AB, 2019.
Open & Transparent Networks
Sealed secure systems?
or
Open, Interoperable, but vulnerable
systems?
or is it possible to have:
Open, Interoperable & secure systems?
© Waher Data AB, 2019.
3. Design Choices
© Waher Data AB, 2019.
Protocol choices affect
 Flexibility
 Network topology
 Interoperability
 Scalability
To overcome limitations in protocols,
vulnerabilities are often built in.
© Waher Data AB, 2019.
Examples of Technology-induced problems
 Topology problem
 Client/Server
 Firewalls
 Centralized Middleware
 Scalability problem
 C10K
 Identity problem
 Reversed roles
© Waher Data AB, 2019.
Identity Problem
 Identity basis for security decisions
 Problematic with centralized technologies
 Good security/privacy require identity scheme
 Interoperability require federation
Server
Client
Client
Client
Client Client
Server
Server
Server
Server
© Waher Data AB, 2019.
Federation
 No single centralized authority
 Domains cooperate
 Improves
 Scalability
 Resilience
 Interoperability
 Reduces
 Risk
© Waher Data AB, 2019.
Centralized processing
 Less attack surfaces
 Value of central nodes is huge
 Value/Effort ratio large
 Difficult to protect
External use
Internal use
 Consequences huge
Massive leaks
© Waher Data AB, 2019.
Decentralization & security
Decentralization has security implications:
 More attack surfaces.
 But value of each node is small.
 Value/Effort ratio small.
 Easier to protect.
 Massive data breaches difficult.
 You don’t put all your eggs into the same basket.
 More resilient.
 End-to-end encryption.
© Waher Data AB, 2019.
4. Industrial IoT
© Waher Data AB, 2019.
Industry 4.0
CPS triggers 4th industrial revolution
© Waher Data AB, 2019.
Paradigm Shift
Industry 3.0 (Automation) Industry 4.0 (CPS)
Centralized (decisions) Decentralized (decisions)
Pre-Planned Ad hoc
Isolated Cross-domain
Local connectivity Inter-connectivity
Proprietary (closed) Interoperable (open)
Reactive Proactive
© Waher Data AB, 2019.
Motivations
 Adapting processes to current demand
 Interconnecting processes
 Better cooperation between companies
 Better overview
 Shorter downtimes
 Energy efficiency
 Distribution of limited resources
© Waher Data AB, 2019.
Examples
 Predictive maintenance reduces downtime
 Local cross-domain cooperation
 Advanced logistics include many parties
 Exchange of interoperable information
 Ad hoc networks
 Processes adapt to current demand
 Open markets for services/operations
 Mining
 Transport
 Agriculture
 Increasing energy efficiency
 Distributed information processing (analytics)
© Waher Data AB, 2019.
Challenges
 Security
 Reliability
 Resilience
 Protection of Intellectual Property
 Standards
 Interoperability
 Open Markets
 Decision Support
 Provisioning
© Waher Data AB, 2019.
5. Smart City/Society
© Waher Data AB, 2019.
Vision of a Smart City/Society
 Ubiquitous access to interoperable
sensors and things.
 Ubiquitous access to data and
information from society’s authorities.
 Access to smart services in all niches of
society.
 Definition of ownership of information.
 Protection of Privacy, by design and by
default.
 Market for access to things and data.
© Waher Data AB, 2019.
6. IEEE 1451.99
IoT Harmonization
Open, Interoperable & Secure
© Waher Data AB, 2019.
IoT Harmonization (IEEE 1451-99)
 Sensor Data
 Control Operations
 Localization (M2M, M2H)
 Tokens for distributed transactions
 Decision Support (for devices)
 Provisioning (for owners)
 Peer-to-Peer communication
 End-to-end encryption
 Concentrator/Bridge (“Thing of things”)
 Discovery
 Ownership
 Clock Synchronization
 Secure Account Creation
 Legal Identities
 Contracts
 Automated provisioning
 Economic feedback
https://gitlab.com/IEEE-SA/XMPPI/IoT
© Waher Data AB, 2019.
Smart City Lectures*
1. How to build a Smart City
2. Privacy in the Smart City
3. An Open and/or Secure Smart City
4. Harmonizing the Internet of Things
5. Introduction to Encryption
6. Earning by Sharing in the Smart City
https://www.youtube.com/watch?v=8G8ewFxE_V8&index=6&l
ist=PLVYZOLUlo74p7I348560JztHN9NaU51Xg
(*) Funded by Swedish Internet Fund.
© Waher Data AB, 2019.
 Raspberry Pi & Arduino
 Sensors, Actuators, Controllers,
Concentrators, Bridges
 Protocols:
MQTT, HTTP, CoAP, LWM2M, XMPP
 Interoperability
 Social Interaction
 Decision Support
 Product Lifecycle
 IoT Service Platforms
 IoT Harmonization
 Security
 Privacy
Amazon
Packt
Microsoft Store
Contact: https://waher.se/, https://littlesister.se/
Mastering Internet of Things

More Related Content

What's hot

Monitor8 io t quick facts and solution procurement
Monitor8 io t quick facts and solution procurementMonitor8 io t quick facts and solution procurement
Monitor8 io t quick facts and solution procurementKevin R. Curtis
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architectureElias Hasnat
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides Francisco Maroto
 
Delivering the IoT ecosystem
Delivering the IoT ecosystemDelivering the IoT ecosystem
Delivering the IoT ecosystemTelefónica IoT
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoTIan Skerrett
 
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...South Tyrol Free Software Conference
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforcePriyanka Aash
 
IoT Broker
IoT BrokerIoT Broker
IoT BrokerFIWARE
 
The Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilityThe Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilitySenseware
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecturePaul Fremantle
 
Introduction to Microsoft Azure IoT
Introduction to Microsoft Azure IoTIntroduction to Microsoft Azure IoT
Introduction to Microsoft Azure IoTAltoros
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne AFCEA International
 

What's hot (20)

Monitor8 io t quick facts and solution procurement
Monitor8 io t quick facts and solution procurementMonitor8 io t quick facts and solution procurement
Monitor8 io t quick facts and solution procurement
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
 
Cloud Customer Architecture for IoT
Cloud Customer Architecture for IoTCloud Customer Architecture for IoT
Cloud Customer Architecture for IoT
 
Iot
IotIot
Iot
 
Vodafone Internet of Things
Vodafone Internet of ThingsVodafone Internet of Things
Vodafone Internet of Things
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides
 
Rapid Prototyping for IoT
Rapid Prototyping for IoT Rapid Prototyping for IoT
Rapid Prototyping for IoT
 
Delivering the IoT ecosystem
Delivering the IoT ecosystemDelivering the IoT ecosystem
Delivering the IoT ecosystem
 
Nazmul haq abir
Nazmul haq abirNazmul haq abir
Nazmul haq abir
 
Iot Overview
Iot Overview Iot Overview
Iot Overview
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoT
 
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security Taskforce
 
IoT Broker
IoT BrokerIoT Broker
IoT Broker
 
The Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilityThe Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your Facility
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
Introduction to Microsoft Azure IoT
Introduction to Microsoft Azure IoTIntroduction to Microsoft Azure IoT
Introduction to Microsoft Azure IoT
 
Blockchain in 10 slides
Blockchain in 10 slidesBlockchain in 10 slides
Blockchain in 10 slides
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
IoT Trends
IoT Trends IoT Trends
IoT Trends
 

Similar to IoT Security

Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
Smart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CitySmart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CityPeter Waher
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
Building home security solutions at scale, ft. Comcast - SVC206 - New York AW...
Building home security solutions at scale, ft. Comcast - SVC206 - New York AW...Building home security solutions at scale, ft. Comcast - SVC206 - New York AW...
Building home security solutions at scale, ft. Comcast - SVC206 - New York AW...Amazon Web Services
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedRamin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedHarshitParkar6677
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - ciscoMITEF México
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAAharon Aharon
 
Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CityPeter Waher
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at ScaleWinston Morton
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT ImplementationsTechWell
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinarZscaler
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 

Similar to IoT Security (20)

IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT_Structure
IoT_StructureIoT_Structure
IoT_Structure
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Fog
FogFog
Fog
 
Fog
FogFog
Fog
 
Smart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CitySmart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart City
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Building home security solutions at scale, ft. Comcast - SVC206 - New York AW...
Building home security solutions at scale, ft. Comcast - SVC206 - New York AW...Building home security solutions at scale, ft. Comcast - SVC206 - New York AW...
Building home security solutions at scale, ft. Comcast - SVC206 - New York AW...
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedRamin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart City
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 

More from Peter Waher

Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Peter Waher
 
Interoperabilidad e Internet
Interoperabilidad e InternetInteroperabilidad e Internet
Interoperabilidad e InternetPeter Waher
 
Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Peter Waher
 
New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0Peter Waher
 
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...Peter Waher
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...Peter Waher
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...Peter Waher
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewPeter Waher
 
Smart contracts for certification of smart devices
Smart contracts for certification of smart devicesSmart contracts for certification of smart devices
Smart contracts for certification of smart devicesPeter Waher
 
Federated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applicationsFederated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applicationsPeter Waher
 
Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Peter Waher
 
Smart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsSmart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsPeter Waher
 
Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CityPeter Waher
 
Smart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DeviceSmart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DevicePeter Waher
 
Privacy for IoT with XMPP
Privacy for IoT with XMPPPrivacy for IoT with XMPP
Privacy for IoT with XMPPPeter Waher
 
XMPP and IoT - an overview
XMPP and IoT - an overviewXMPP and IoT - an overview
XMPP and IoT - an overviewPeter Waher
 
XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)Peter Waher
 
Web 3.0 & IoT (English)
Web 3.0 & IoT (English)Web 3.0 & IoT (English)
Web 3.0 & IoT (English)Peter Waher
 
XSF - XMPP Standards Foundation
XSF - XMPP Standards FoundationXSF - XMPP Standards Foundation
XSF - XMPP Standards FoundationPeter Waher
 

More from Peter Waher (19)

Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
 
Interoperabilidad e Internet
Interoperabilidad e InternetInteroperabilidad e Internet
Interoperabilidad e Internet
 
Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99
 
New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0
 
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
 
Smart contracts for certification of smart devices
Smart contracts for certification of smart devicesSmart contracts for certification of smart devices
Smart contracts for certification of smart devices
 
Federated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applicationsFederated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applications
 
Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...
 
Smart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsSmart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling Actuators
 
Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart City
 
Smart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DeviceSmart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your Device
 
Privacy for IoT with XMPP
Privacy for IoT with XMPPPrivacy for IoT with XMPP
Privacy for IoT with XMPP
 
XMPP and IoT - an overview
XMPP and IoT - an overviewXMPP and IoT - an overview
XMPP and IoT - an overview
 
XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)
 
Web 3.0 & IoT (English)
Web 3.0 & IoT (English)Web 3.0 & IoT (English)
Web 3.0 & IoT (English)
 
XSF - XMPP Standards Foundation
XSF - XMPP Standards FoundationXSF - XMPP Standards Foundation
XSF - XMPP Standards Foundation
 

Recently uploaded

Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 

Recently uploaded (20)

Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 

IoT Security

  • 1. © Waher Data AB, 2019. IoT Security
  • 2. © Waher Data AB, 2019. 1. Introduction
  • 3. Ex-Director of National Intelligence James R. Clapper http://www.popsci.com/clapper-americas-greatest-threat-is-internet-things ”America's greatest threat is the Internet of Things” Feb 9, 2016
  • 4. © Waher Data AB, 2019. IoT systems particularly vulnerable  Long-term operation  Technologies become obsolete  Lack of updates  Invisible operation  No visible clues something is wrong  No human operator (for normal use case)  Lack of supervision  Larger scale  More units and attack surfaces  Consumers don’t pay for security Check with https://www.shodan.io/
  • 5. © Waher Data AB, 2019. 2. Problem Domain
  • 6. © Waher Data AB, 2019. Transport Security ≠ Security Just one aspect
  • 7. © Waher Data AB, 2019. Security ≠ Privacy Privacy Subject perspective Security Operator perspective MQTT BlockChain CoAP LWM2M XMPP HTTPS
  • 8. © Waher Data AB, 2019. Security must encompass entire Life-Cycle  Production  Installation  Configuration (zero-configuration)  Discovery / Ownership  Normal Operation / Interoperability  Discovery / Usage  Provisioning / Decision Support  Smart Contracts / Usage  Economic Feedback  Transfer of Ownership  Decommissioning Life-Cycle Just one aspect
  • 9. © Waher Data AB, 2019. Open & Transparent Networks Sealed secure systems? or Open, Interoperable, but vulnerable systems? or is it possible to have: Open, Interoperable & secure systems?
  • 10. © Waher Data AB, 2019. 3. Design Choices
  • 11. © Waher Data AB, 2019. Protocol choices affect  Flexibility  Network topology  Interoperability  Scalability To overcome limitations in protocols, vulnerabilities are often built in.
  • 12. © Waher Data AB, 2019. Examples of Technology-induced problems  Topology problem  Client/Server  Firewalls  Centralized Middleware  Scalability problem  C10K  Identity problem  Reversed roles
  • 13. © Waher Data AB, 2019. Identity Problem  Identity basis for security decisions  Problematic with centralized technologies  Good security/privacy require identity scheme  Interoperability require federation Server Client Client Client Client Client Server Server Server Server
  • 14. © Waher Data AB, 2019. Federation  No single centralized authority  Domains cooperate  Improves  Scalability  Resilience  Interoperability  Reduces  Risk
  • 15. © Waher Data AB, 2019. Centralized processing  Less attack surfaces  Value of central nodes is huge  Value/Effort ratio large  Difficult to protect External use Internal use  Consequences huge Massive leaks
  • 16. © Waher Data AB, 2019. Decentralization & security Decentralization has security implications:  More attack surfaces.  But value of each node is small.  Value/Effort ratio small.  Easier to protect.  Massive data breaches difficult.  You don’t put all your eggs into the same basket.  More resilient.  End-to-end encryption.
  • 17. © Waher Data AB, 2019. 4. Industrial IoT
  • 18. © Waher Data AB, 2019. Industry 4.0 CPS triggers 4th industrial revolution
  • 19. © Waher Data AB, 2019. Paradigm Shift Industry 3.0 (Automation) Industry 4.0 (CPS) Centralized (decisions) Decentralized (decisions) Pre-Planned Ad hoc Isolated Cross-domain Local connectivity Inter-connectivity Proprietary (closed) Interoperable (open) Reactive Proactive
  • 20. © Waher Data AB, 2019. Motivations  Adapting processes to current demand  Interconnecting processes  Better cooperation between companies  Better overview  Shorter downtimes  Energy efficiency  Distribution of limited resources
  • 21. © Waher Data AB, 2019. Examples  Predictive maintenance reduces downtime  Local cross-domain cooperation  Advanced logistics include many parties  Exchange of interoperable information  Ad hoc networks  Processes adapt to current demand  Open markets for services/operations  Mining  Transport  Agriculture  Increasing energy efficiency  Distributed information processing (analytics)
  • 22. © Waher Data AB, 2019. Challenges  Security  Reliability  Resilience  Protection of Intellectual Property  Standards  Interoperability  Open Markets  Decision Support  Provisioning
  • 23. © Waher Data AB, 2019. 5. Smart City/Society
  • 24. © Waher Data AB, 2019. Vision of a Smart City/Society  Ubiquitous access to interoperable sensors and things.  Ubiquitous access to data and information from society’s authorities.  Access to smart services in all niches of society.  Definition of ownership of information.  Protection of Privacy, by design and by default.  Market for access to things and data.
  • 25. © Waher Data AB, 2019. 6. IEEE 1451.99 IoT Harmonization Open, Interoperable & Secure
  • 26. © Waher Data AB, 2019. IoT Harmonization (IEEE 1451-99)  Sensor Data  Control Operations  Localization (M2M, M2H)  Tokens for distributed transactions  Decision Support (for devices)  Provisioning (for owners)  Peer-to-Peer communication  End-to-end encryption  Concentrator/Bridge (“Thing of things”)  Discovery  Ownership  Clock Synchronization  Secure Account Creation  Legal Identities  Contracts  Automated provisioning  Economic feedback https://gitlab.com/IEEE-SA/XMPPI/IoT
  • 27. © Waher Data AB, 2019. Smart City Lectures* 1. How to build a Smart City 2. Privacy in the Smart City 3. An Open and/or Secure Smart City 4. Harmonizing the Internet of Things 5. Introduction to Encryption 6. Earning by Sharing in the Smart City https://www.youtube.com/watch?v=8G8ewFxE_V8&index=6&l ist=PLVYZOLUlo74p7I348560JztHN9NaU51Xg (*) Funded by Swedish Internet Fund.
  • 28. © Waher Data AB, 2019.  Raspberry Pi & Arduino  Sensors, Actuators, Controllers, Concentrators, Bridges  Protocols: MQTT, HTTP, CoAP, LWM2M, XMPP  Interoperability  Social Interaction  Decision Support  Product Lifecycle  IoT Service Platforms  IoT Harmonization  Security  Privacy Amazon Packt Microsoft Store Contact: https://waher.se/, https://littlesister.se/ Mastering Internet of Things