SlideShare a Scribd company logo
1 of 15
Download to read offline
ECLIPSE SAM IoT
VIRTUAL CONFERENCE, SEPTEMBER 17-18, 2020
Presented by Salim Chehida (University of Grenoble Alpes) at :
Risk Assessment in IoT
Case Study: Collaborative Robots System
AUTHORS : Salim Chehida, Abdelhakim Baouya, Miquel Cantero, Paul-Emmanuel
Brun, and Guillemette Massot
INTRODUCTION
STATE OF THE ART
APPROACH
2
OUTLINE
CASE STUDY
IDENTIFICATION OF ASSETS
IDENTIFICATION OF THREATS AND
VULNERABILITIES
SPECIFICATION OF SECURITY OBJECTIVES
AND REQUIREMENTS
CONCLUSION
3INTRODUCTION
IoT
Systems
Lot of devices
(Actuators, Sensors, etc.)
Lot of communication
Technologies
(NFC, Wi-Fi, LoRa, etc.)
Vulnerabilities
Attacks
Security Risk Assessment
Methodology
Our objective
Mitigate the risks and build a
secure IoT systems
Identify the most
critical threats
Provide the required
measures to avoid
threats
4STATE OF THE ART (SECURITY STANDARDS)
Common
Standards
IoT Security
Standards
ISO/IEC 27002
ISO/IEC 27002, ISO/IEC 27005, AS/NZS 4360, BS7799
(ISO17799), NIST SP 800-30, NIST SP 800-82, IEEE 1686.
- International standard that gives general guidance on the
commonly accepted goals structured around 36 security
objectives and 133 controls.
- ITU-T (Y.2060, Y.2063, Y.2066, Y.2067, Y.2068, Y.2075,etc).
- ISO/IEC 30128: covers IoT security related to sensor network
application interface.
- ETSI TS103645: gives security practices for consumer devices
connected to the Internet.
5STATE OF THE ART (RISK ASSESSMENT METHODS)
- EBIOS is used for the assessment and treatment of risks associated with an Information
System.
- CRAMM is a qualitative risk assessment methodology.
- AURUM methodology that supports the NIST SP 800-30 standard.
- CORAS allows risk assessment, documentation of intermediate results, and presentation
of conclusions.
- MEHARI aims to provide a risk management model compliant to ISO-27005.
- OCTAVE allows to define a risk-based strategic assessment and planning technique for
system security.
- IT-Grundschutz provides methods, processes, procedures, and measures to establish a
system for information security management.
Generic, and they do not consider the
complexity and the dynamic of IoT systems
6APPROACH
Specify threats on
the assets based
on common
threats database
from EBIOS
Build security
requirements that
implement the
security objectives
Identify the assets
considering the
IoT domain model
Extract relevant
objectives for
the system from
ISO-27002
7CASE STUDY (SERVICE ROBOTICS SYSTEM)
- A fleet of robots installed in a warehouse to support the movement of loads.
- Robots are expected to empty continuously an “unload area”.
- Each robot picks item and places it in a specific storage area following some
predefined rules.
8IDENTIFICATION OF ASSETS
- An asset is “any tangible or intangible thing or characteristic that has value to an
organization”. [ISO-27001]
IoT Domain Model
9IDENTIFICATION OF ASSETS (EXAMPLES)
10IDENTIFICATION OF THREATS AND VULNERABILITIES
Threat is “a potential cause of an unwanted incident, which may result in
harm to a system or organization”. [ISO-27001]
Vulnerability is “weakness that is related to the organizations’ assets, which
sometimes could cause an unexpected incident”. [ISO-27001]
EBIOS Threats Database
o Physical damage: T-1010 to T-1050.
o Natural events : T-2010 to T-2050.
o Loss of essential services : T-3010 to T-3030.
o Disturbance due to radiation : T-4010 to T-4030.
o Compromise of information : T-5010 to T-5110.
o Technical failures : T-6010 to T-6050.
o Unauthorized actions : T-7010 to T-7050.
o Compromise of functions :T-8010 to T-8050.
11IDENTIFICATION OF THREATS AND VULNERABILITIES (EXAMPLES)
12SPECIFICATION OF SECURITY OBJECTIVES
- Extract security objectives needed to protect the system assets against the
identified threats from ISO-27002 generic list.
- Map each security objective with the threat list.
13SPECIFICATION OF SECURITY REQUIREMENTS
- Define security requirements needed to ensure each security objective.
14CONCLUSION
Advantage of our method :
- Considers IoT domain model to identify all system assets.
- Follows security standards to define security requirements of IoT
systems.
- Iterative approach that responds to the need for evolution.
Applications :
- Collaborative Robots System
- Water Management Infrastructure
CONTACTS
RESEARCHER, UNIVERSITY OF GRENOBLE ALPES
Salim.Chehida@univ-grenoble-alpes.fr
CONTACTS
SALIM CHEHIDA

More Related Content

What's hot

IoT Reference Architecture and Case Studies
IoT Reference Architecture and Case StudiesIoT Reference Architecture and Case Studies
IoT Reference Architecture and Case StudiesSerhiy (Serge) Haziyev
 
IoT material revised edition
IoT material revised editionIoT material revised edition
IoT material revised editionpavan penugonda
 
Cognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz SaračevićCognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz SaračevićBosnia Agile
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computingeteshagarwal1
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Analytics, Machine Learning and Internet of Things
Analytics, Machine Learning and Internet of ThingsAnalytics, Machine Learning and Internet of Things
Analytics, Machine Learning and Internet of ThingsRoshan Thomas
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptxttyu2
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Securitynoornabi16
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksPriyanka Aash
 
brain computing interfaces
brain computing interfacesbrain computing interfaces
brain computing interfacessai praneeth
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
BRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBhadra Gowdra
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of ThingsAlexandru Radovici
 

What's hot (20)

Iot audit
Iot auditIot audit
Iot audit
 
IoT Reference Architecture and Case Studies
IoT Reference Architecture and Case StudiesIoT Reference Architecture and Case Studies
IoT Reference Architecture and Case Studies
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
IoT material revised edition
IoT material revised editionIoT material revised edition
IoT material revised edition
 
Cognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz SaračevićCognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz Saračević
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
Machine Learning Applications to IoT
Machine Learning Applications to IoTMachine Learning Applications to IoT
Machine Learning Applications to IoT
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Analytics, Machine Learning and Internet of Things
Analytics, Machine Learning and Internet of ThingsAnalytics, Machine Learning and Internet of Things
Analytics, Machine Learning and Internet of Things
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
IoT with Python
IoT with PythonIoT with Python
IoT with Python
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
brain computing interfaces
brain computing interfacesbrain computing interfaces
brain computing interfaces
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
BRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE Documentation
 
Industrial IoT is coming
Industrial IoT is comingIndustrial IoT is coming
Industrial IoT is coming
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 

Similar to ECLIPSE SAM IoT VIRTUAL CONFERENCE

Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsVandana Verma
 
A reliable next generation cyber security architecture for industrial interne...
A reliable next generation cyber security architecture for industrial interne...A reliable next generation cyber security architecture for industrial interne...
A reliable next generation cyber security architecture for industrial interne...IJECEIAES
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSMAU
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Cisco Canada
 
Cyber security and Industry.pptx
Cyber security and Industry.pptxCyber security and Industry.pptx
Cyber security and Industry.pptxSabahat Waheed
 
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Mahmud Hossain
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksIJECEIAES
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTForescout Technologies Inc
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IRJET Journal
 
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...Nabil Bouzerna
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Pierre-Jean Verrando
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by KasperskyL. Duke Golden
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgL. Duke Golden
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...IJECEIAES
 

Similar to ECLIPSE SAM IoT VIRTUAL CONFERENCE (20)

Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
 
A reliable next generation cyber security architecture for industrial interne...
A reliable next generation cyber security architecture for industrial interne...A reliable next generation cyber security architecture for industrial interne...
A reliable next generation cyber security architecture for industrial interne...
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
Cyber security and Industry.pptx
Cyber security and Industry.pptxCyber security and Industry.pptx
Cyber security and Industry.pptx
 
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
 
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktg
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...
 

More from Brain IoT Project

Virtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges AheadVirtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges AheadBrain IoT Project
 
Statistical model checking bip tool
Statistical model checking bip toolStatistical model checking bip tool
Statistical model checking bip toolBrain IoT Project
 
Rigorous system design the bip framework
Rigorous system design the bip frameworkRigorous system design the bip framework
Rigorous system design the bip frameworkBrain IoT Project
 
SAM-IoT: A Cross-Platform Communication Mechanism for ROS-Based Cyber-Physica...
SAM-IoT: A Cross-Platform Communication Mechanism for ROS-Based Cyber-Physica...SAM-IoT: A Cross-Platform Communication Mechanism for ROS-Based Cyber-Physica...
SAM-IoT: A Cross-Platform Communication Mechanism for ROS-Based Cyber-Physica...Brain IoT Project
 
SAM-IoT: Model Based Methodology and Framework for Design and Management of N...
SAM-IoT: Model Based Methodology and Framework for Design and Management of N...SAM-IoT: Model Based Methodology and Framework for Design and Management of N...
SAM-IoT: Model Based Methodology and Framework for Design and Management of N...Brain IoT Project
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...Brain IoT Project
 
Virtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges AheadVirtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges AheadBrain IoT Project
 
IMB Brokerage day - EMALCSA: SICA platform and BRAIN-IoT
IMB Brokerage day -  EMALCSA: SICA platform and BRAIN-IoTIMB Brokerage day -  EMALCSA: SICA platform and BRAIN-IoT
IMB Brokerage day - EMALCSA: SICA platform and BRAIN-IoTBrain IoT Project
 
ROBOT PATH FINDER Case Study
ROBOT PATH FINDER Case StudyROBOT PATH FINDER Case Study
ROBOT PATH FINDER Case StudyBrain IoT Project
 
Overview of the WP4 of BRAIN-IoT
Overview of the WP4 of BRAIN-IoTOverview of the WP4 of BRAIN-IoT
Overview of the WP4 of BRAIN-IoTBrain IoT Project
 
Using Eclipse technologies to develop the BRAIN-IoT model-based framework for...
Using Eclipse technologies to develop the BRAIN-IoT model-based framework for...Using Eclipse technologies to develop the BRAIN-IoT model-based framework for...
Using Eclipse technologies to develop the BRAIN-IoT model-based framework for...Brain IoT Project
 
Brain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overviewBrain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overviewBrain IoT Project
 

More from Brain IoT Project (12)

Virtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges AheadVirtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges Ahead
 
Statistical model checking bip tool
Statistical model checking bip toolStatistical model checking bip tool
Statistical model checking bip tool
 
Rigorous system design the bip framework
Rigorous system design the bip frameworkRigorous system design the bip framework
Rigorous system design the bip framework
 
SAM-IoT: A Cross-Platform Communication Mechanism for ROS-Based Cyber-Physica...
SAM-IoT: A Cross-Platform Communication Mechanism for ROS-Based Cyber-Physica...SAM-IoT: A Cross-Platform Communication Mechanism for ROS-Based Cyber-Physica...
SAM-IoT: A Cross-Platform Communication Mechanism for ROS-Based Cyber-Physica...
 
SAM-IoT: Model Based Methodology and Framework for Design and Management of N...
SAM-IoT: Model Based Methodology and Framework for Design and Management of N...SAM-IoT: Model Based Methodology and Framework for Design and Management of N...
SAM-IoT: Model Based Methodology and Framework for Design and Management of N...
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...
 
Virtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges AheadVirtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges Ahead
 
IMB Brokerage day - EMALCSA: SICA platform and BRAIN-IoT
IMB Brokerage day -  EMALCSA: SICA platform and BRAIN-IoTIMB Brokerage day -  EMALCSA: SICA platform and BRAIN-IoT
IMB Brokerage day - EMALCSA: SICA platform and BRAIN-IoT
 
ROBOT PATH FINDER Case Study
ROBOT PATH FINDER Case StudyROBOT PATH FINDER Case Study
ROBOT PATH FINDER Case Study
 
Overview of the WP4 of BRAIN-IoT
Overview of the WP4 of BRAIN-IoTOverview of the WP4 of BRAIN-IoT
Overview of the WP4 of BRAIN-IoT
 
Using Eclipse technologies to develop the BRAIN-IoT model-based framework for...
Using Eclipse technologies to develop the BRAIN-IoT model-based framework for...Using Eclipse technologies to develop the BRAIN-IoT model-based framework for...
Using Eclipse technologies to develop the BRAIN-IoT model-based framework for...
 
Brain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overviewBrain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overview
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

ECLIPSE SAM IoT VIRTUAL CONFERENCE

  • 1. ECLIPSE SAM IoT VIRTUAL CONFERENCE, SEPTEMBER 17-18, 2020 Presented by Salim Chehida (University of Grenoble Alpes) at : Risk Assessment in IoT Case Study: Collaborative Robots System AUTHORS : Salim Chehida, Abdelhakim Baouya, Miquel Cantero, Paul-Emmanuel Brun, and Guillemette Massot
  • 2. INTRODUCTION STATE OF THE ART APPROACH 2 OUTLINE CASE STUDY IDENTIFICATION OF ASSETS IDENTIFICATION OF THREATS AND VULNERABILITIES SPECIFICATION OF SECURITY OBJECTIVES AND REQUIREMENTS CONCLUSION
  • 3. 3INTRODUCTION IoT Systems Lot of devices (Actuators, Sensors, etc.) Lot of communication Technologies (NFC, Wi-Fi, LoRa, etc.) Vulnerabilities Attacks Security Risk Assessment Methodology Our objective Mitigate the risks and build a secure IoT systems Identify the most critical threats Provide the required measures to avoid threats
  • 4. 4STATE OF THE ART (SECURITY STANDARDS) Common Standards IoT Security Standards ISO/IEC 27002 ISO/IEC 27002, ISO/IEC 27005, AS/NZS 4360, BS7799 (ISO17799), NIST SP 800-30, NIST SP 800-82, IEEE 1686. - International standard that gives general guidance on the commonly accepted goals structured around 36 security objectives and 133 controls. - ITU-T (Y.2060, Y.2063, Y.2066, Y.2067, Y.2068, Y.2075,etc). - ISO/IEC 30128: covers IoT security related to sensor network application interface. - ETSI TS103645: gives security practices for consumer devices connected to the Internet.
  • 5. 5STATE OF THE ART (RISK ASSESSMENT METHODS) - EBIOS is used for the assessment and treatment of risks associated with an Information System. - CRAMM is a qualitative risk assessment methodology. - AURUM methodology that supports the NIST SP 800-30 standard. - CORAS allows risk assessment, documentation of intermediate results, and presentation of conclusions. - MEHARI aims to provide a risk management model compliant to ISO-27005. - OCTAVE allows to define a risk-based strategic assessment and planning technique for system security. - IT-Grundschutz provides methods, processes, procedures, and measures to establish a system for information security management. Generic, and they do not consider the complexity and the dynamic of IoT systems
  • 6. 6APPROACH Specify threats on the assets based on common threats database from EBIOS Build security requirements that implement the security objectives Identify the assets considering the IoT domain model Extract relevant objectives for the system from ISO-27002
  • 7. 7CASE STUDY (SERVICE ROBOTICS SYSTEM) - A fleet of robots installed in a warehouse to support the movement of loads. - Robots are expected to empty continuously an “unload area”. - Each robot picks item and places it in a specific storage area following some predefined rules.
  • 8. 8IDENTIFICATION OF ASSETS - An asset is “any tangible or intangible thing or characteristic that has value to an organization”. [ISO-27001] IoT Domain Model
  • 10. 10IDENTIFICATION OF THREATS AND VULNERABILITIES Threat is “a potential cause of an unwanted incident, which may result in harm to a system or organization”. [ISO-27001] Vulnerability is “weakness that is related to the organizations’ assets, which sometimes could cause an unexpected incident”. [ISO-27001] EBIOS Threats Database o Physical damage: T-1010 to T-1050. o Natural events : T-2010 to T-2050. o Loss of essential services : T-3010 to T-3030. o Disturbance due to radiation : T-4010 to T-4030. o Compromise of information : T-5010 to T-5110. o Technical failures : T-6010 to T-6050. o Unauthorized actions : T-7010 to T-7050. o Compromise of functions :T-8010 to T-8050.
  • 11. 11IDENTIFICATION OF THREATS AND VULNERABILITIES (EXAMPLES)
  • 12. 12SPECIFICATION OF SECURITY OBJECTIVES - Extract security objectives needed to protect the system assets against the identified threats from ISO-27002 generic list. - Map each security objective with the threat list.
  • 13. 13SPECIFICATION OF SECURITY REQUIREMENTS - Define security requirements needed to ensure each security objective.
  • 14. 14CONCLUSION Advantage of our method : - Considers IoT domain model to identify all system assets. - Follows security standards to define security requirements of IoT systems. - Iterative approach that responds to the need for evolution. Applications : - Collaborative Robots System - Water Management Infrastructure
  • 15. CONTACTS RESEARCHER, UNIVERSITY OF GRENOBLE ALPES Salim.Chehida@univ-grenoble-alpes.fr CONTACTS SALIM CHEHIDA