SlideShare a Scribd company logo
Privacy and Security in IoT
Pixels Camp 2017
The speaker
Vasco Veloso
vveloso@gmail.com
• Worked from the kernel to the cloud.
• Wrote a book on x86 assembly.
• Built firmware for embedded systems.
• Writing and designing software professionally since 1997.
• Currently a Java software architect at Coriant Portugal.
Privacy and Security in IoT - Pixels Camp 2017 2
Nothing is unbreakable…
… but we can make it more difficult to break!
Privacy and Security in IoT - Pixels Camp 2017 3
Why is this important?
• Old concern
• Regulation attempts date back to 2008 in the EU.
• Remember all the talk around RFID?
• 20 billion connected “Things” in 2020 (Gartner)
• 20 billion new nodes ripe for attacking.
• 20 billion new nodes surveilling each and every one of us.
Privacy and Security in IoT - Pixels Camp 2017 4
Security risks
• Device supply chain
• Devices may be resold pre-programmed with malware.
• Firmware upgrade
• OTA may be abused.
• Applications and services
• Exposed services and end-user applications may be compromised.
• Working network
• User networks are hostile by definition.
• Cloud service impersonation
Privacy and Security in IoT - Pixels Camp 2017 5
Physical risk mitigation
• Remove or limit access to debug and programming ports.
• Some vendors provide authorization on debug ports.
• Re-evaluate vendor designs.
• Remove unnecessary connections and peripherals.
• Study device flash memory protection mechanisms.
• Memory/storage encryption and write control.
• Use cryptographic hardware.
• Detect tampering attempts.
Privacy and Security in IoT - Pixels Camp 2017 6
Software risk mitigation
• Use secure development practices for the platform and language.
• Trim and re-evaluate third-party software and libraries.
• Use sound and proven cryptographic implementations.
• Secure the boot process.
• Authenticate OTA update sources and targets.
• Have distinct device signatures for software updates.
• Pair external devices, such as phones, securely (e.g. secure NFC/Bluetooth).
Privacy and Security in IoT - Pixels Camp 2017 7
Network risk mitigation
• Different default credentials for all devices.
• Security on the protocol level.
• Peer authentication and authorization.
• Secret sharing
• Cryptographic one-way hashing
• Zero knowledge proof
• Nodes act only as clients towards the network.
Privacy and Security in IoT - Pixels Camp 2017 8
Privacy risks
• Identity disclosure
• Device may transmit personally identifiable data.
• Device transmissions may be recognizable.
• Location disclosure
• Device may transmit its explicit location.
• Device may be itself traceable through its communications.
• Data confidentiality
• Cloud services may contain records full of personally identifiable data.
Privacy and Security in IoT - Pixels Camp 2017 9
Privacy risk mitigation
• Identity disclosure
• Pseudonym.
• Connection anonymization.
• Location disclosure
• Pseudonym.
• Data confidentiality
• No direct access to personally identifiable data from devices.
• Secure data center / cloud resources.
Privacy and Security in IoT - Pixels Camp 2017 10
Security and privacy first
• Security and privacy are first-class requirements.
• Design from the start with them in mind.
• Define trust boundaries
• Device/gateway, gateway/cloud, …
• Imagine unlawful ways of interacting with the system
• Threat modeling
Privacy and Security in IoT - Pixels Camp 2017 11
Did it happen before?
120k IP cameras at risk of attack
(September 2017)
Persirai leverages a zero-day vulnerability to gain
access and UPnP to connect to the device.
Privacy and Security in IoT - Pixels Camp 2017 12
https://www.darkreading.com/attacks-breaches/new-iot-botnet-discovered-120k-ip-cameras-at-risk-of-attack/d/d-id/1328839
Did it happen before?
Over 900k routers
compromised in Germany
(November 2016)
Remote management was left enabled for the
world at large.
A variant of the Mirai worm was busy using well
known credentials to change the routers’
firmware.
Privacy and Security in IoT - Pixels Camp 2017 13
http://securityaffairs.co/wordpress/53871/iot/deutsche-telekom-hack.html
Allestoerungen.de and OpenMaps
Did it happen before?
Jeep hacked remotely
(July 2015)
Zero-day vulnerabilities that allowed remote
control of a Jeep Cherokee were
demonstrated to the press.
Privacy and Security in IoT - Pixels Camp 2017 14
https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
Andy Greenberg / Wired
Did it happen before?
Remotely controlled car washes
(July 2017)
Attackers can take control of the machine by leveraging plain text HTTP
connections and default credentials.
Physical damage to property and humans becomes possible.
Privacy and Security in IoT - Pixels Camp 2017 15
https://motherboard.vice.com/en_us/article/bjxe33/car-wash-hack-can-smash-vehicle-trap-passengers-douse-them-with-water
General Data Protection Regulation (EU)
• Privacy by design and by default!
• Minimize data collection.
• Hide data.
• Encrypt.
• Anonymize.
• Pseudonymize.
• Control access to data.
• Have a privacy policy.
• Have means of determining the extent of privacy braches.
Privacy and Security in IoT - Pixels Camp 2017 16
General Data Protection Regulation (EU)
• Data subjects have rights:
• Information
• Access
• Update
• Object
• Erasure
• Export
• Portability
Privacy and Security in IoT - Pixels Camp 2017 17
That’s all folks
Slides and reference papers available at
https://github.com/vveloso/talks
http://linkedin.com/in/vascoveloso
vveloso@gmail.com
Privacy and Security in IoT - Pixels Camp 2017 18

More Related Content

What's hot

IoT security
IoT securityIoT security
IoT security
YashKesharwani2
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
 
Data Analytics for IoT
Data Analytics for IoT Data Analytics for IoT
Data Analytics for IoT
Muralidhar Somisetty
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
Aakashjit Bhattacharya
 
Internet of things
Internet of thingsInternet of things
Internet of things
Vikrant Negi
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
Jinia Bhowmik
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
eteshagarwal1
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
Dania Purnama Sari
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet
 
Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt
sutrishnakar1995
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
CableLabs
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
Bryan Len
 
Iot
IotIot
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
Ulf Mattsson
 
10 min IoT ppt
10 min IoT ppt10 min IoT ppt
10 min IoT ppt
Vaishnavu Pathayathodi
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
noornabi16
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
Vishnupriya T H
 

What's hot (20)

IoT security
IoT securityIoT security
IoT security
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Data Analytics for IoT
Data Analytics for IoT Data Analytics for IoT
Data Analytics for IoT
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Iot
IotIot
Iot
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Iot
IotIot
Iot
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
 
10 min IoT ppt
10 min IoT ppt10 min IoT ppt
10 min IoT ppt
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 

Similar to Privacy and security in IoT

NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
IRJET Journal
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
ssuserfb92ae
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
African Cyber Security Summit
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
Witekio
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoT
Priyanka Aash
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
Hans Klos
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
Jay Nagar
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
mahendrarm2112
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
AliSalman110
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014Brian Knopf
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
Vrince Vimal
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
AI Frontiers
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
Duo Security
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
cem lale
 
Iot privacy-soscon-2019
Iot privacy-soscon-2019Iot privacy-soscon-2019
Iot privacy-soscon-2019
Phil www.rzr.online.fr
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
Debra Baker, CISSP CSSP
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
sierradeveloper
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Stanford School of Engineering
 

Similar to Privacy and security in IoT (20)

NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoT
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Iot privacy-soscon-2019
Iot privacy-soscon-2019Iot privacy-soscon-2019
Iot privacy-soscon-2019
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 

Recently uploaded

一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
kywwoyk
 
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
kywwoyk
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
perweeng31
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
eemet
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
Amil baba
 
F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptx
ArjunJain44
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
PinkySharma900491
 
Drugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptxDrugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptx
ThalapathyVijay15
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
freshgammer09
 

Recently uploaded (9)

一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
 
F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptx
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
 
Drugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptxDrugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptx
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
 

Privacy and security in IoT

  • 1. Privacy and Security in IoT Pixels Camp 2017
  • 2. The speaker Vasco Veloso vveloso@gmail.com • Worked from the kernel to the cloud. • Wrote a book on x86 assembly. • Built firmware for embedded systems. • Writing and designing software professionally since 1997. • Currently a Java software architect at Coriant Portugal. Privacy and Security in IoT - Pixels Camp 2017 2
  • 3. Nothing is unbreakable… … but we can make it more difficult to break! Privacy and Security in IoT - Pixels Camp 2017 3
  • 4. Why is this important? • Old concern • Regulation attempts date back to 2008 in the EU. • Remember all the talk around RFID? • 20 billion connected “Things” in 2020 (Gartner) • 20 billion new nodes ripe for attacking. • 20 billion new nodes surveilling each and every one of us. Privacy and Security in IoT - Pixels Camp 2017 4
  • 5. Security risks • Device supply chain • Devices may be resold pre-programmed with malware. • Firmware upgrade • OTA may be abused. • Applications and services • Exposed services and end-user applications may be compromised. • Working network • User networks are hostile by definition. • Cloud service impersonation Privacy and Security in IoT - Pixels Camp 2017 5
  • 6. Physical risk mitigation • Remove or limit access to debug and programming ports. • Some vendors provide authorization on debug ports. • Re-evaluate vendor designs. • Remove unnecessary connections and peripherals. • Study device flash memory protection mechanisms. • Memory/storage encryption and write control. • Use cryptographic hardware. • Detect tampering attempts. Privacy and Security in IoT - Pixels Camp 2017 6
  • 7. Software risk mitigation • Use secure development practices for the platform and language. • Trim and re-evaluate third-party software and libraries. • Use sound and proven cryptographic implementations. • Secure the boot process. • Authenticate OTA update sources and targets. • Have distinct device signatures for software updates. • Pair external devices, such as phones, securely (e.g. secure NFC/Bluetooth). Privacy and Security in IoT - Pixels Camp 2017 7
  • 8. Network risk mitigation • Different default credentials for all devices. • Security on the protocol level. • Peer authentication and authorization. • Secret sharing • Cryptographic one-way hashing • Zero knowledge proof • Nodes act only as clients towards the network. Privacy and Security in IoT - Pixels Camp 2017 8
  • 9. Privacy risks • Identity disclosure • Device may transmit personally identifiable data. • Device transmissions may be recognizable. • Location disclosure • Device may transmit its explicit location. • Device may be itself traceable through its communications. • Data confidentiality • Cloud services may contain records full of personally identifiable data. Privacy and Security in IoT - Pixels Camp 2017 9
  • 10. Privacy risk mitigation • Identity disclosure • Pseudonym. • Connection anonymization. • Location disclosure • Pseudonym. • Data confidentiality • No direct access to personally identifiable data from devices. • Secure data center / cloud resources. Privacy and Security in IoT - Pixels Camp 2017 10
  • 11. Security and privacy first • Security and privacy are first-class requirements. • Design from the start with them in mind. • Define trust boundaries • Device/gateway, gateway/cloud, … • Imagine unlawful ways of interacting with the system • Threat modeling Privacy and Security in IoT - Pixels Camp 2017 11
  • 12. Did it happen before? 120k IP cameras at risk of attack (September 2017) Persirai leverages a zero-day vulnerability to gain access and UPnP to connect to the device. Privacy and Security in IoT - Pixels Camp 2017 12 https://www.darkreading.com/attacks-breaches/new-iot-botnet-discovered-120k-ip-cameras-at-risk-of-attack/d/d-id/1328839
  • 13. Did it happen before? Over 900k routers compromised in Germany (November 2016) Remote management was left enabled for the world at large. A variant of the Mirai worm was busy using well known credentials to change the routers’ firmware. Privacy and Security in IoT - Pixels Camp 2017 13 http://securityaffairs.co/wordpress/53871/iot/deutsche-telekom-hack.html Allestoerungen.de and OpenMaps
  • 14. Did it happen before? Jeep hacked remotely (July 2015) Zero-day vulnerabilities that allowed remote control of a Jeep Cherokee were demonstrated to the press. Privacy and Security in IoT - Pixels Camp 2017 14 https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ Andy Greenberg / Wired
  • 15. Did it happen before? Remotely controlled car washes (July 2017) Attackers can take control of the machine by leveraging plain text HTTP connections and default credentials. Physical damage to property and humans becomes possible. Privacy and Security in IoT - Pixels Camp 2017 15 https://motherboard.vice.com/en_us/article/bjxe33/car-wash-hack-can-smash-vehicle-trap-passengers-douse-them-with-water
  • 16. General Data Protection Regulation (EU) • Privacy by design and by default! • Minimize data collection. • Hide data. • Encrypt. • Anonymize. • Pseudonymize. • Control access to data. • Have a privacy policy. • Have means of determining the extent of privacy braches. Privacy and Security in IoT - Pixels Camp 2017 16
  • 17. General Data Protection Regulation (EU) • Data subjects have rights: • Information • Access • Update • Object • Erasure • Export • Portability Privacy and Security in IoT - Pixels Camp 2017 17
  • 18. That’s all folks Slides and reference papers available at https://github.com/vveloso/talks http://linkedin.com/in/vascoveloso vveloso@gmail.com Privacy and Security in IoT - Pixels Camp 2017 18