SlideShare a Scribd company logo
Syam Madanapalli | Chair IEEE P1931.1 - The Roof Computing | June 27, 2020
IoT Security Assessment Framework
A data driven approach for the businesses
1
Complex & uncomprehended
The businesses should know 

• What they are deploying

• A checklist for a calculated risk 

• Potential attack surface

• Risk vs bene
fi
ts
IoT Security
Constrained
Devices
Big Scale
Tech Illiterates
Lack of UI, challenging to
design & con
fi
gure,
update, and prone to
errors
Applications & devices
are personal, and
involves humans &
physical world
Variety of devices,
protocols, &
applications
Big Impact
Safety & economic
risks, loss of
privacy and
business
interruptions
2
Typical IoT Network Segments
Typical networking technologies and corresponding security protocols
3
Cloud
PAN WAN
LAN Internet
IPSec Tunnel IPSec Tunnel
WiFi/
Ethernet
BB/LTE/MPLS
BLE,
802.15.4,
WiFi
SSP
Edge Router Apps
OTAE
CoAP/UDP/DTLS/IPv6
IoT Security Assessment Framework
The proposal
The assessment framework standard will
provide

• A way for the industry to assess IoT
applications consisting of IoT devices and
Edge

• A checklist for devices and edge

• Necessary and su
ffi
cient conditions

• A scoring mechanisms

• Enable decision making

• Data driven analytics for security assessment
A set guidelines for the
device vendors and
application developers
A method for evaluating the
IoT applications for security
needs
Self assessment/IEEE
certi
fi
cation
4
Existing/Ongoing Standards/Work ...
@IEEE-SA
• Healthcare Device Security Assurance Working Group (EMB/Stds Com/
HDSecWG)

• Standard for Wireless Diabetes Device Security Assurance: Product
Security Evaluation Program

• This standard de
fi
nes a framework for a connected electronic product
security evaluation program
P2621.1
P2733
• Clinical IoT Data and Device Interoperability with TIPPSS (EMB/Stds Com/
Clinical IoT DDI with TIPPSS)

• Standard for Clinical Internet of Things (IoT) Data and Device
Interoperability with TIPPSS - Trust, Identity, Privacy, Protection, Safety,
Security

• This standard establishes the framework with TIPPSS principles (Trust,
Identity, Privacy, Protection, Safety, Security) for Clinical Internet of Things
(IoT) data and device validation and interoperability.
5
Existing/Ongoing Standards/Work
Outside IEEE
• GSMA IoT Security Guidelines and Assessment

• Provides recommendations for the secure design, development and
deployment of IoT services

• OneM2M, IoT Alliance Australia, Trusted Connectivity Alliance
GSMA
IoTSF
• IoT Security Foundation - A not-for-pro
fi
t organization

• Provides advice and framework for IoT Security

• Has over 100 members, including ARM, NXP, Microchip, Samsung,
Vodafone, Qualcomm
6
ETSI EN 303 645
• IoT Security requirements for Consumer Devices

• Under development

• A potential candidate to collaborate
Other Established Standards/Compliance Guidelines
These will in
fl
uence the development of any new security standards
Information technology — Security techniques — Evaluation
criteria for IT security
ISO/IEC 15408
GDPR
Regulation on the protection of natural persons with regard to
the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC (Data Protection
Directive)
HIPAA
The Health Insurance Portability and Accountability Act of
1996
PCI DSS Payment Card Industry Data Security Standard
7
IEEE Standard for an Architectural Framework for the Internet
of Things
IEEE 2413
IoT Security Requirements
The capabilities of the end devices should be considered for security assessment
Characteristic Class 0 Class 1 Class 2
RAM, ROM < 10KB, 100KB ~ 10KB, 100KB ~ 50KB, 250KB
Internet No IP CoAP IPv6, HIP
Cryptography Over the air
Symmetric
cryptography
PKI based
Protection One level up
Assisted at one level
up
Self and services at
one level up
Interface IoT Services
Security Provisioning
and Services
Security Services
Applications
Only for trusted
environments
Battery powered
under the Roof
Mains powered &
standalone devices
8
The Need for a New Standard
Data driven; Easy to understand and to be used by Business users
• Training, scaling, reducing costs and making
IoT deployments more secure 

• Device capabilities based approach

• De
fi
ning Necessary and Su
ffi
cient conditions

• Scoring/grading mechanism

• Easy to interpret checklist and summary for
for weighing risk vs. bene
fi
ts and decision
making

• Data driven approach (applying ML/AI for
assessment)

• Self assessment/IEEE certi
fi
cation
9
5C
Five Criteria
Broad Market Potential
A standards project authorized by IEEE 802 shall have a broad market potential. Speci
fi
cally, it
shall have the potential for:
11
• Broad sets of applicability

• IoT being adopted almost all business sectors, including residential and government
use. And security and privacy is the number one concern while considering an IoT
application. Hence the output of this project will have broad set of applicability.

• Multiple vendors and numerous users

• The number of devices that would be connected to the Internet is estimated to be in
tens of billions in the near future.

• Balanced costs (LAN versus attached stations)

• This project reduces the cost of IoT applications deployment by providing a repeatable
approach for security assessment and reduces the need for special skilled personnel.
Compatibility
IEEE 802 LMSC de
fi
nes a family of standards. All standards should be in conformance: IEEE Std
802, IEEE 802.1D, and IEEE 802.1Q. If any variances in conformance emerge, they shall be
thoroughly disclosed and reviewed with IEEE 802.1 Working Group. In order to demonstrate
compatibility with this criterion, the Five Criteria statement must answer the following questions.
12
A. Does the PAR mandate that the standard shall comply with IEEE Std 802,
IEEE Std 802.1D and IEEE Std 802.1Q? 

• No. However, the standard would use the IEEE 802 standards.

B. If not, how will the Working Group ensure that the resulting draft standard is
compliant, or if not, receives appropriate review from the IEEE 802.1 Working
Group? 

• Not applicable.
Distinct Identity
Each IEEE 802 standard shall have a distinct identity. To achieve this, each authorized project
shall be:
13
• Substantially di
ff
erent from other IEEE 802 standards

• This standard is not related to IEEE 802 standards.

• One unique solution per problem (not two solutions to a problem)

• There is no standard within IEEE that provides this capability.

• Easy for the document reader to select the relevant speci
fi
cation

• Yes, this project will de
fi
ne an assessment framework for deploying IoT
applications based on best practices for security and privacy.
Technical Feasibility
For a project to be authorized, it shall be able to show its technical feasibility. At a minimum, the
proposed project shall show:
14
• Demonstrated system feasibility

• Security assessment is typically prerequisite for any connected applications in the enterprise,
however the approach is proprietary.

• Proven technology, reasonable testing

• Not applicable.

• Con
fi
dence in reliability

• This standard will not reduce any existing system reliability.

• Coexistence of IEEE 802 LMSC wireless standards specifying devices for unlicensed operation.

• Not applicable.
Economic Feasibility
For a project to be authorized, it shall be able to show economic feasibility (so far as can
reasonably be estimated) for its intended applications. At a minimum, the proposed project shall
show:
15
• Known cost factors, reliable data

• This project will not introduce any new costs, rather will help in reducing
the cost of connected application deployment and maintenance.

• Reasonable cost for performance

• The benefit of security assessment will outweigh the cost of
assessment.

• Consideration of installation costs

• Not applicable.
Questions & Suggestions
16

More Related Content

What's hot

What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
Sameer Ahmed
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AI
Paul O'Hagan
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
Nitin Kumar Yadav
 
Edge computing
Edge computingEdge computing
Edge computing
Biddut Hossain
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTING
Mosin A
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud Computing
AnuveshSachdeva1
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
Chetan Kumar S
 
Edge computing
Edge computingEdge computing
Edge computing
pramiidhaaavula
 
Augmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsAugmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsChetan Kumar S
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetup
Haidee McMahon
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
suthi
 
Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019
Tyrone Systems
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoT
Ian Skerrett
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ?
Samir Bounab
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?
Fastly
 
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
Intellipaat
 
Edge computing -by ChandraShekhar
Edge computing -by ChandraShekharEdge computing -by ChandraShekhar
Edge computing -by ChandraShekhar
ChandraShekhar Patel
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud Computing
Cygnet Infotech
 
How to start your IOT journey
How to start your IOT journeyHow to start your IOT journey
How to start your IOT journey
Chetan Kumar S
 
What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?
Fastly
 

What's hot (20)

What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AI
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTING
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud Computing
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
 
Edge computing
Edge computingEdge computing
Edge computing
 
Augmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsAugmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platforms
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetup
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
 
Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoT
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ?
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?
 
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
 
Edge computing -by ChandraShekhar
Edge computing -by ChandraShekharEdge computing -by ChandraShekhar
Edge computing -by ChandraShekhar
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud Computing
 
How to start your IOT journey
How to start your IOT journeyHow to start your IOT journey
How to start your IOT journey
 
What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?
 

Similar to IoT Security Assessment - IEEE PAR Proposal

Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
CableLabs
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
Priyanka Aash
 
Iio t security std
Iio t security stdIio t security std
Iio t security std
Plantconnectiot
 
Securing the IoT Value Chain with AWS
Securing the IoT Value Chain with AWSSecuring the IoT Value Chain with AWS
Securing the IoT Value Chain with AWS
Gabriel Paredes Loza
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
Andy Taylor
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
Rupesh930637
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
Industrial Internet Consortium
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges
Nathan Wallace, PhD, PE
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
Eurotech
 
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTIII SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
RAJESHWARI M
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
Abner Germanow
 
From IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity Divide
Priyanka Aash
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
Ahmed Banafa
 
Cyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy SystemsCyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy Systems
Agence du Numérique (AdN)
 
The-5-Cs-plus-1-of-IoT.pdf
The-5-Cs-plus-1-of-IoT.pdfThe-5-Cs-plus-1-of-IoT.pdf
The-5-Cs-plus-1-of-IoT.pdf
KbNguyen1
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
team-WIBU
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
Onward Security
 
IoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdfIoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdf
NadouShe
 
Industry 4.0 Security
Industry 4.0 SecurityIndustry 4.0 Security
Industry 4.0 Security
Duncan Purves
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
The IOT Academy
 

Similar to IoT Security Assessment - IEEE PAR Proposal (20)

Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
Iio t security std
Iio t security stdIio t security std
Iio t security std
 
Securing the IoT Value Chain with AWS
Securing the IoT Value Chain with AWSSecuring the IoT Value Chain with AWS
Securing the IoT Value Chain with AWS
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
 
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTIII SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
 
From IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity Divide
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Cyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy SystemsCyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy Systems
 
The-5-Cs-plus-1-of-IoT.pdf
The-5-Cs-plus-1-of-IoT.pdfThe-5-Cs-plus-1-of-IoT.pdf
The-5-Cs-plus-1-of-IoT.pdf
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
IoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdfIoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdf
 
Industry 4.0 Security
Industry 4.0 SecurityIndustry 4.0 Security
Industry 4.0 Security
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 

More from Syam Madanapalli

IoT, Careers, and Skills
IoT, Careers, and SkillsIoT, Careers, and Skills
IoT, Careers, and Skills
Syam Madanapalli
 
IEEE P1931.1, The Roof Computing
IEEE P1931.1, The Roof ComputingIEEE P1931.1, The Roof Computing
IEEE P1931.1, The Roof Computing
Syam Madanapalli
 
Embracing the VUCA
Embracing the VUCAEmbracing the VUCA
Embracing the VUCA
Syam Madanapalli
 
Water Distribution Management - A Design by High School Kids
Water Distribution Management - A Design by High School KidsWater Distribution Management - A Design by High School Kids
Water Distribution Management - A Design by High School Kids
Syam Madanapalli
 
Child Safety - A Design by Kids using IoT
Child Safety - A Design by Kids using IoTChild Safety - A Design by Kids using IoT
Child Safety - A Design by Kids using IoT
Syam Madanapalli
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
Syam Madanapalli
 
Realizing the Potential of Connected World
Realizing the Potential of Connected WorldRealizing the Potential of Connected World
Realizing the Potential of Connected World
Syam Madanapalli
 
The Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & AnalyticsThe Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & Analytics
Syam Madanapalli
 
Building Smart Cities with Everything as a Service
Building Smart Cities with Everything as a ServiceBuilding Smart Cities with Everything as a Service
Building Smart Cities with Everything as a Service
Syam Madanapalli
 
Innovating the Smart Cities
Innovating the Smart CitiesInnovating the Smart Cities
Innovating the Smart Cities
Syam Madanapalli
 
IoT Primer for High School Students
IoT Primer for High School StudentsIoT Primer for High School Students
IoT Primer for High School Students
Syam Madanapalli
 
IoT for a Better World by Syam Madanapalli
IoT for a Better World by Syam MadanapalliIoT for a Better World by Syam Madanapalli
IoT for a Better World by Syam Madanapalli
Syam Madanapalli
 
Internet of Things, Innovation and India by Syam Madanapalli
Internet of Things, Innovation and India by Syam MadanapalliInternet of Things, Innovation and India by Syam Madanapalli
Internet of Things, Innovation and India by Syam Madanapalli
Syam Madanapalli
 
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
Syam Madanapalli
 
IoT - Make in India: Challenges and Opportunities
IoT - Make in India: Challenges and OpportunitiesIoT - Make in India: Challenges and Opportunities
IoT - Make in India: Challenges and Opportunities
Syam Madanapalli
 
iRam Innovation - Automate Your Home With Just a Switch
iRam Innovation - Automate Your Home With Just a SwitchiRam Innovation - Automate Your Home With Just a Switch
iRam Innovation - Automate Your Home With Just a Switch
Syam Madanapalli
 
India, Internet of things and the role of government
India, Internet of things and the role of governmentIndia, Internet of things and the role of government
India, Internet of things and the role of government
Syam Madanapalli
 
The internet of things
The internet of thingsThe internet of things
The internet of things
Syam Madanapalli
 
Next Generation Emergency Warning System
Next Generation Emergency Warning SystemNext Generation Emergency Warning System
Next Generation Emergency Warning System
Syam Madanapalli
 
Smart Grid With I Pv6 For India
Smart Grid With I Pv6 For IndiaSmart Grid With I Pv6 For India
Smart Grid With I Pv6 For India
Syam Madanapalli
 

More from Syam Madanapalli (20)

IoT, Careers, and Skills
IoT, Careers, and SkillsIoT, Careers, and Skills
IoT, Careers, and Skills
 
IEEE P1931.1, The Roof Computing
IEEE P1931.1, The Roof ComputingIEEE P1931.1, The Roof Computing
IEEE P1931.1, The Roof Computing
 
Embracing the VUCA
Embracing the VUCAEmbracing the VUCA
Embracing the VUCA
 
Water Distribution Management - A Design by High School Kids
Water Distribution Management - A Design by High School KidsWater Distribution Management - A Design by High School Kids
Water Distribution Management - A Design by High School Kids
 
Child Safety - A Design by Kids using IoT
Child Safety - A Design by Kids using IoTChild Safety - A Design by Kids using IoT
Child Safety - A Design by Kids using IoT
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Realizing the Potential of Connected World
Realizing the Potential of Connected WorldRealizing the Potential of Connected World
Realizing the Potential of Connected World
 
The Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & AnalyticsThe Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & Analytics
 
Building Smart Cities with Everything as a Service
Building Smart Cities with Everything as a ServiceBuilding Smart Cities with Everything as a Service
Building Smart Cities with Everything as a Service
 
Innovating the Smart Cities
Innovating the Smart CitiesInnovating the Smart Cities
Innovating the Smart Cities
 
IoT Primer for High School Students
IoT Primer for High School StudentsIoT Primer for High School Students
IoT Primer for High School Students
 
IoT for a Better World by Syam Madanapalli
IoT for a Better World by Syam MadanapalliIoT for a Better World by Syam Madanapalli
IoT for a Better World by Syam Madanapalli
 
Internet of Things, Innovation and India by Syam Madanapalli
Internet of Things, Innovation and India by Syam MadanapalliInternet of Things, Innovation and India by Syam Madanapalli
Internet of Things, Innovation and India by Syam Madanapalli
 
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
 
IoT - Make in India: Challenges and Opportunities
IoT - Make in India: Challenges and OpportunitiesIoT - Make in India: Challenges and Opportunities
IoT - Make in India: Challenges and Opportunities
 
iRam Innovation - Automate Your Home With Just a Switch
iRam Innovation - Automate Your Home With Just a SwitchiRam Innovation - Automate Your Home With Just a Switch
iRam Innovation - Automate Your Home With Just a Switch
 
India, Internet of things and the role of government
India, Internet of things and the role of governmentIndia, Internet of things and the role of government
India, Internet of things and the role of government
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Next Generation Emergency Warning System
Next Generation Emergency Warning SystemNext Generation Emergency Warning System
Next Generation Emergency Warning System
 
Smart Grid With I Pv6 For India
Smart Grid With I Pv6 For IndiaSmart Grid With I Pv6 For India
Smart Grid With I Pv6 For India
 

Recently uploaded

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 

Recently uploaded (20)

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 

IoT Security Assessment - IEEE PAR Proposal

  • 1. Syam Madanapalli | Chair IEEE P1931.1 - The Roof Computing | June 27, 2020 IoT Security Assessment Framework A data driven approach for the businesses 1
  • 2. Complex & uncomprehended The businesses should know • What they are deploying • A checklist for a calculated risk • Potential attack surface • Risk vs bene fi ts IoT Security Constrained Devices Big Scale Tech Illiterates Lack of UI, challenging to design & con fi gure, update, and prone to errors Applications & devices are personal, and involves humans & physical world Variety of devices, protocols, & applications Big Impact Safety & economic risks, loss of privacy and business interruptions 2
  • 3. Typical IoT Network Segments Typical networking technologies and corresponding security protocols 3 Cloud PAN WAN LAN Internet IPSec Tunnel IPSec Tunnel WiFi/ Ethernet BB/LTE/MPLS BLE, 802.15.4, WiFi SSP Edge Router Apps OTAE CoAP/UDP/DTLS/IPv6
  • 4. IoT Security Assessment Framework The proposal The assessment framework standard will provide • A way for the industry to assess IoT applications consisting of IoT devices and Edge • A checklist for devices and edge • Necessary and su ffi cient conditions • A scoring mechanisms • Enable decision making • Data driven analytics for security assessment A set guidelines for the device vendors and application developers A method for evaluating the IoT applications for security needs Self assessment/IEEE certi fi cation 4
  • 5. Existing/Ongoing Standards/Work ... @IEEE-SA • Healthcare Device Security Assurance Working Group (EMB/Stds Com/ HDSecWG) • Standard for Wireless Diabetes Device Security Assurance: Product Security Evaluation Program • This standard de fi nes a framework for a connected electronic product security evaluation program P2621.1 P2733 • Clinical IoT Data and Device Interoperability with TIPPSS (EMB/Stds Com/ Clinical IoT DDI with TIPPSS) • Standard for Clinical Internet of Things (IoT) Data and Device Interoperability with TIPPSS - Trust, Identity, Privacy, Protection, Safety, Security • This standard establishes the framework with TIPPSS principles (Trust, Identity, Privacy, Protection, Safety, Security) for Clinical Internet of Things (IoT) data and device validation and interoperability. 5
  • 6. Existing/Ongoing Standards/Work Outside IEEE • GSMA IoT Security Guidelines and Assessment • Provides recommendations for the secure design, development and deployment of IoT services • OneM2M, IoT Alliance Australia, Trusted Connectivity Alliance GSMA IoTSF • IoT Security Foundation - A not-for-pro fi t organization • Provides advice and framework for IoT Security • Has over 100 members, including ARM, NXP, Microchip, Samsung, Vodafone, Qualcomm 6 ETSI EN 303 645 • IoT Security requirements for Consumer Devices • Under development • A potential candidate to collaborate
  • 7. Other Established Standards/Compliance Guidelines These will in fl uence the development of any new security standards Information technology — Security techniques — Evaluation criteria for IT security ISO/IEC 15408 GDPR Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (Data Protection Directive) HIPAA The Health Insurance Portability and Accountability Act of 1996 PCI DSS Payment Card Industry Data Security Standard 7 IEEE Standard for an Architectural Framework for the Internet of Things IEEE 2413
  • 8. IoT Security Requirements The capabilities of the end devices should be considered for security assessment Characteristic Class 0 Class 1 Class 2 RAM, ROM < 10KB, 100KB ~ 10KB, 100KB ~ 50KB, 250KB Internet No IP CoAP IPv6, HIP Cryptography Over the air Symmetric cryptography PKI based Protection One level up Assisted at one level up Self and services at one level up Interface IoT Services Security Provisioning and Services Security Services Applications Only for trusted environments Battery powered under the Roof Mains powered & standalone devices 8
  • 9. The Need for a New Standard Data driven; Easy to understand and to be used by Business users • Training, scaling, reducing costs and making IoT deployments more secure • Device capabilities based approach • De fi ning Necessary and Su ffi cient conditions • Scoring/grading mechanism • Easy to interpret checklist and summary for for weighing risk vs. bene fi ts and decision making • Data driven approach (applying ML/AI for assessment) • Self assessment/IEEE certi fi cation 9
  • 11. Broad Market Potential A standards project authorized by IEEE 802 shall have a broad market potential. Speci fi cally, it shall have the potential for: 11 • Broad sets of applicability • IoT being adopted almost all business sectors, including residential and government use. And security and privacy is the number one concern while considering an IoT application. Hence the output of this project will have broad set of applicability. • Multiple vendors and numerous users • The number of devices that would be connected to the Internet is estimated to be in tens of billions in the near future. • Balanced costs (LAN versus attached stations) • This project reduces the cost of IoT applications deployment by providing a repeatable approach for security assessment and reduces the need for special skilled personnel.
  • 12. Compatibility IEEE 802 LMSC de fi nes a family of standards. All standards should be in conformance: IEEE Std 802, IEEE 802.1D, and IEEE 802.1Q. If any variances in conformance emerge, they shall be thoroughly disclosed and reviewed with IEEE 802.1 Working Group. In order to demonstrate compatibility with this criterion, the Five Criteria statement must answer the following questions. 12 A. Does the PAR mandate that the standard shall comply with IEEE Std 802, IEEE Std 802.1D and IEEE Std 802.1Q? • No. However, the standard would use the IEEE 802 standards. B. If not, how will the Working Group ensure that the resulting draft standard is compliant, or if not, receives appropriate review from the IEEE 802.1 Working Group? • Not applicable.
  • 13. Distinct Identity Each IEEE 802 standard shall have a distinct identity. To achieve this, each authorized project shall be: 13 • Substantially di ff erent from other IEEE 802 standards • This standard is not related to IEEE 802 standards. • One unique solution per problem (not two solutions to a problem) • There is no standard within IEEE that provides this capability. • Easy for the document reader to select the relevant speci fi cation • Yes, this project will de fi ne an assessment framework for deploying IoT applications based on best practices for security and privacy.
  • 14. Technical Feasibility For a project to be authorized, it shall be able to show its technical feasibility. At a minimum, the proposed project shall show: 14 • Demonstrated system feasibility • Security assessment is typically prerequisite for any connected applications in the enterprise, however the approach is proprietary. • Proven technology, reasonable testing • Not applicable. • Con fi dence in reliability • This standard will not reduce any existing system reliability. • Coexistence of IEEE 802 LMSC wireless standards specifying devices for unlicensed operation. • Not applicable.
  • 15. Economic Feasibility For a project to be authorized, it shall be able to show economic feasibility (so far as can reasonably be estimated) for its intended applications. At a minimum, the proposed project shall show: 15 • Known cost factors, reliable data • This project will not introduce any new costs, rather will help in reducing the cost of connected application deployment and maintenance. • Reasonable cost for performance • The benefit of security assessment will outweigh the cost of assessment. • Consideration of installation costs • Not applicable.