SlideShare a Scribd company logo
SECURING INTERACTION AMONG CLOUD SYSTEMS
AND INTERNET OFTHINGS (IOT)
By
Abed Matini
Introduction
• Internet ofThings (IoT) and Cloud Systems
- big part of human life
• Internet ofThings
ubiquitous network
monitoring and controlling our environment
gathering - processing - analyzing Data
• Between 26 to 50 Billion devices will be connected to the internet by 2025.
Problem
• Big SecurityThreat for IoT Devices;
- 70% vulnerable due to lack of encrypted interaction
- 80% failed to require password
- Strongly dependent onWireless & Cellular networks
Most important:
- 90% of IoT devices include at least one personal Information
Main Challenge
• Develop an advanced security Mechanism into IoT devices to interact between
Internet ofThings sensors and Cloud Systems
• Offer a solution for Machine-to-Machine (M2M)
Essential to secure IoT communication
Between Sensor Nodes and Cloud
Case study : Smart Lock Systems
• Three component of Smart Locks:
-An electronically-augmented deadbolt installed onto an exterior door
-A mobile device that can electronically control the lock
-A remote web server
Security Goal in Smart Lock Systems
Prevent Unauthorized access
Two types of network design for smart
Locks
• Device-Gateway-Cloud
rely on users mobile phone – no direct connection between lock and the internet
allow an attacker to evade revocation and access logging.
ex. AirBnB tenant whose lease is expiring
• Direct internet connection between smart lock and the remote server
lock contain a built-in Wi-Fi modem – connected to the home’s Wi-Fi network
revoked attacker still can evade revocation by switching the malicious phone.
Geo-fencing &Touch-to-Unlock
• User exist
• Re-enters the geo-fence boundary, recognize by GPS
• Touch the exterior lock face
• Set time period (after re-entering the boundary)
• Problem : Location spoofing
Locking system components
• Sensor - > wearable node.
• Base Station - > Smart Lock
• Cloud - > System Application
- > Storage
- > Database
The system gets help from Cloud to do all high processing to reduce processing load
on the wearable node.
Wireless Sensor Network (WSN) Key
• Use aWSN key (inWearable Node) to verify the Lock (as a gateway) and Key in a
small distance.
• WhyWSN?
Two Level of Authentication Approach
connecting with cloud
WSN and Cloud
• User
• Wearable Node : Includes GPS Position Data
• Wearable Network Coordinator
• Cloud Service Provider : Managing all member data in which come from sensors
Moreover
• Elliptic Curve Cryptography
a public key cryptography algorithm
Elliptic Curve Diffie-Hellman (ECDH)
use secret Message Authentication Code (MAC)
Therefore:
• Cloud runs Public Key Cryptography (PKC) for authentication between Wearable
Node and Cloud
• Using Message Authentication Code (MAC) as a hashing function to confirm that
the message came from stated sender
• Time synchronization between all parties to prevent reply attack.
• Cloud Generates Private and Public key
• Wearable device and wearable network coordinator are also preloaded with them
Conclusion
• Lack of security in internet of things interaction can be a big threat.
• Encrypted and two authentication level could be offered as a solution in
interaction between Sensors and Cloud system.
THANKYOU

More Related Content

What's hot

Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
VictorYee
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networks
Brockanurag
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Saikiran Panjala
 
Design and implementation of dynamic mobile sensor network platform
Design and implementation of dynamic mobile sensor network platformDesign and implementation of dynamic mobile sensor network platform
Design and implementation of dynamic mobile sensor network platformieeeprojectsbangalore
 
Nfv final[1]
Nfv final[1]Nfv final[1]
Nfv final[1]
NikitaBhavsar8
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
Maulik Patel
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
automatskicorporation
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwayt
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwayt
 
IoT Security
IoT SecurityIoT Security
IoT Security
Tim Groenwals
 
Major presentation
Major presentationMajor presentation
Major presentation
ashishg251
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
priyadharshini murugan
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
Alexandru Radovici
 
Wisenet network
Wisenet networkWisenet network
Wisenet networkbhavithd
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
Tushar Anand
 

What's hot (17)

Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
 
Cheatz
CheatzCheatz
Cheatz
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networks
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
 
Design and implementation of dynamic mobile sensor network platform
Design and implementation of dynamic mobile sensor network platformDesign and implementation of dynamic mobile sensor network platform
Design and implementation of dynamic mobile sensor network platform
 
Nfv final[1]
Nfv final[1]Nfv final[1]
Nfv final[1]
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Major presentation
Major presentationMajor presentation
Major presentation
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
 
Security standard
Security standardSecurity standard
Security standard
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
Wisenet network
Wisenet networkWisenet network
Wisenet network
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 

Viewers also liked

The history of felix the cat
The history of felix the catThe history of felix the cat
The history of felix the catsparky123456
 
ANB Promotions Ltd Birmingham's Rising Star Activity | Dragon Boat Racing
ANB Promotions Ltd Birmingham's Rising Star Activity | Dragon Boat RacingANB Promotions Ltd Birmingham's Rising Star Activity | Dragon Boat Racing
ANB Promotions Ltd Birmingham's Rising Star Activity | Dragon Boat Racing
ANB Promotions
 
Risk Management: Client CPE Day 2013
Risk Management: Client CPE Day 2013Risk Management: Client CPE Day 2013
Risk Management: Client CPE Day 2013
Cohen and Company
 
Conventions
ConventionsConventions
Conventions
Awel9790
 
Self-Service Secure Test and Release Pipelines
Self-Service Secure Test and Release PipelinesSelf-Service Secure Test and Release Pipelines
Self-Service Secure Test and Release Pipelines
Salesforce Engineering
 
Fre 2015 webinar
Fre 2015 webinarFre 2015 webinar
Fre 2015 webinar
Sherri Wilson
 
DWP supplier event 23 May 2014 One DWP David Raper and DWP guests
DWP supplier event 23 May 2014 One DWP David Raper and DWP guestsDWP supplier event 23 May 2014 One DWP David Raper and DWP guests
DWP supplier event 23 May 2014 One DWP David Raper and DWP guestsDepartment for Work and Pensions
 
Hey see kai run response
Hey see kai run responseHey see kai run response
Hey see kai run responseMatthew Betz
 
RESULTADOS DE LA CONSULTORÍA Revisión y Fortalecimiento Estratégico de Conex...
RESULTADOS DE LA CONSULTORÍA  Revisión y Fortalecimiento Estratégico de Conex...RESULTADOS DE LA CONSULTORÍA  Revisión y Fortalecimiento Estratégico de Conex...
RESULTADOS DE LA CONSULTORÍA Revisión y Fortalecimiento Estratégico de Conex...
Oportunidad Estratégica Ltda
 
Le ali sotto ai piedi
Le ali sotto ai piediLe ali sotto ai piedi
Le ali sotto ai piedigil6512
 
Creative Staffing Alternatives
Creative Staffing AlternativesCreative Staffing Alternatives
Creative Staffing Alternatives
Cohen and Company
 
Esempio lezione sul corpo umano - Curtis
Esempio lezione sul corpo umano - CurtisEsempio lezione sul corpo umano - Curtis
Esempio lezione sul corpo umano - Curtis
frbrun
 
Connect the dots 2014 National Standards
Connect the dots 2014 National StandardsConnect the dots 2014 National Standards
Connect the dots 2014 National Standards
Sherri Wilson
 
Pxw launch hcc
Pxw launch hccPxw launch hcc
Global Economic Update & Strategic Investment Outlook Q2 2014
Global Economic Update & Strategic Investment Outlook Q2 2014Global Economic Update & Strategic Investment Outlook Q2 2014
Global Economic Update & Strategic Investment Outlook Q2 2014
Cohen and Company
 
Ver r 2015 clinical reviews amelia island (1)
Ver r 2015 clinical reviews amelia island (1)Ver r 2015 clinical reviews amelia island (1)
Ver r 2015 clinical reviews amelia island (1)
Douglas Riegert-Johnson
 
PROPUESTA DE UNA ESTRATEGIA DE CONTRATACIÓN PÚBLICA EN LAS ENTIDADES RESPONSA...
PROPUESTA DE UNA ESTRATEGIA DE CONTRATACIÓN PÚBLICA EN LAS ENTIDADES RESPONSA...PROPUESTA DE UNA ESTRATEGIA DE CONTRATACIÓN PÚBLICA EN LAS ENTIDADES RESPONSA...
PROPUESTA DE UNA ESTRATEGIA DE CONTRATACIÓN PÚBLICA EN LAS ENTIDADES RESPONSA...
Oportunidad Estratégica Ltda
 
What (and How) To Ask Your Parents About Their Estate Planning
What (and How) To Ask Your Parents About Their Estate PlanningWhat (and How) To Ask Your Parents About Their Estate Planning
What (and How) To Ask Your Parents About Their Estate Planning
Cohen and Company
 
DWP SME conference (11 March 2014) - DWP SME Conference Opportunities in DWP...
DWP SME conference (11 March 2014) - DWP SME Conference Opportunities in DWP...DWP SME conference (11 March 2014) - DWP SME Conference Opportunities in DWP...
DWP SME conference (11 March 2014) - DWP SME Conference Opportunities in DWP...
Department for Work and Pensions
 
Achieving higher IOPS for NAS at reasonable cost
Achieving higher IOPS for NAS at reasonable costAchieving higher IOPS for NAS at reasonable cost
Achieving higher IOPS for NAS at reasonable cost
Tyrone Systems India
 

Viewers also liked (20)

The history of felix the cat
The history of felix the catThe history of felix the cat
The history of felix the cat
 
ANB Promotions Ltd Birmingham's Rising Star Activity | Dragon Boat Racing
ANB Promotions Ltd Birmingham's Rising Star Activity | Dragon Boat RacingANB Promotions Ltd Birmingham's Rising Star Activity | Dragon Boat Racing
ANB Promotions Ltd Birmingham's Rising Star Activity | Dragon Boat Racing
 
Risk Management: Client CPE Day 2013
Risk Management: Client CPE Day 2013Risk Management: Client CPE Day 2013
Risk Management: Client CPE Day 2013
 
Conventions
ConventionsConventions
Conventions
 
Self-Service Secure Test and Release Pipelines
Self-Service Secure Test and Release PipelinesSelf-Service Secure Test and Release Pipelines
Self-Service Secure Test and Release Pipelines
 
Fre 2015 webinar
Fre 2015 webinarFre 2015 webinar
Fre 2015 webinar
 
DWP supplier event 23 May 2014 One DWP David Raper and DWP guests
DWP supplier event 23 May 2014 One DWP David Raper and DWP guestsDWP supplier event 23 May 2014 One DWP David Raper and DWP guests
DWP supplier event 23 May 2014 One DWP David Raper and DWP guests
 
Hey see kai run response
Hey see kai run responseHey see kai run response
Hey see kai run response
 
RESULTADOS DE LA CONSULTORÍA Revisión y Fortalecimiento Estratégico de Conex...
RESULTADOS DE LA CONSULTORÍA  Revisión y Fortalecimiento Estratégico de Conex...RESULTADOS DE LA CONSULTORÍA  Revisión y Fortalecimiento Estratégico de Conex...
RESULTADOS DE LA CONSULTORÍA Revisión y Fortalecimiento Estratégico de Conex...
 
Le ali sotto ai piedi
Le ali sotto ai piediLe ali sotto ai piedi
Le ali sotto ai piedi
 
Creative Staffing Alternatives
Creative Staffing AlternativesCreative Staffing Alternatives
Creative Staffing Alternatives
 
Esempio lezione sul corpo umano - Curtis
Esempio lezione sul corpo umano - CurtisEsempio lezione sul corpo umano - Curtis
Esempio lezione sul corpo umano - Curtis
 
Connect the dots 2014 National Standards
Connect the dots 2014 National StandardsConnect the dots 2014 National Standards
Connect the dots 2014 National Standards
 
Pxw launch hcc
Pxw launch hccPxw launch hcc
Pxw launch hcc
 
Global Economic Update & Strategic Investment Outlook Q2 2014
Global Economic Update & Strategic Investment Outlook Q2 2014Global Economic Update & Strategic Investment Outlook Q2 2014
Global Economic Update & Strategic Investment Outlook Q2 2014
 
Ver r 2015 clinical reviews amelia island (1)
Ver r 2015 clinical reviews amelia island (1)Ver r 2015 clinical reviews amelia island (1)
Ver r 2015 clinical reviews amelia island (1)
 
PROPUESTA DE UNA ESTRATEGIA DE CONTRATACIÓN PÚBLICA EN LAS ENTIDADES RESPONSA...
PROPUESTA DE UNA ESTRATEGIA DE CONTRATACIÓN PÚBLICA EN LAS ENTIDADES RESPONSA...PROPUESTA DE UNA ESTRATEGIA DE CONTRATACIÓN PÚBLICA EN LAS ENTIDADES RESPONSA...
PROPUESTA DE UNA ESTRATEGIA DE CONTRATACIÓN PÚBLICA EN LAS ENTIDADES RESPONSA...
 
What (and How) To Ask Your Parents About Their Estate Planning
What (and How) To Ask Your Parents About Their Estate PlanningWhat (and How) To Ask Your Parents About Their Estate Planning
What (and How) To Ask Your Parents About Their Estate Planning
 
DWP SME conference (11 March 2014) - DWP SME Conference Opportunities in DWP...
DWP SME conference (11 March 2014) - DWP SME Conference Opportunities in DWP...DWP SME conference (11 March 2014) - DWP SME Conference Opportunities in DWP...
DWP SME conference (11 March 2014) - DWP SME Conference Opportunities in DWP...
 
Achieving higher IOPS for NAS at reasonable cost
Achieving higher IOPS for NAS at reasonable costAchieving higher IOPS for NAS at reasonable cost
Achieving higher IOPS for NAS at reasonable cost
 

Similar to Securing interactions Among Cloud Systems and Internet of Things (IoT) 

IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
Anujashejwal
 
Internet of things
Internet of thingsInternet of things
Internet of things
Selvaraj Kesavan
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updated
skumartarget
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
Pratik Gohel
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
RahulJain989779
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
Rick G. Garibay
 
2.pdf
2.pdf2.pdf
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & Ecosystem
Harish Vadada
 
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Isam Shahrour
 
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
Nicolas Lesconnec
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's Primer
Rick G. Garibay
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
Mario Drobics
 
Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”
Virendra Thakur
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
gr9293
 
Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]
Shakeeb Ahmad Mohammad Mukhtar
 
Wsn
WsnWsn

Similar to Securing interactions Among Cloud Systems and Internet of Things (IoT)  (20)

IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updated
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
2.pdf
2.pdf2.pdf
2.pdf
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & Ecosystem
 
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
 
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's Primer
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
 
Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]
 
Wsn
WsnWsn
Wsn
 

Recently uploaded

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 

Recently uploaded (20)

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 

Securing interactions Among Cloud Systems and Internet of Things (IoT) 

  • 1. SECURING INTERACTION AMONG CLOUD SYSTEMS AND INTERNET OFTHINGS (IOT) By Abed Matini
  • 2. Introduction • Internet ofThings (IoT) and Cloud Systems - big part of human life • Internet ofThings ubiquitous network monitoring and controlling our environment gathering - processing - analyzing Data • Between 26 to 50 Billion devices will be connected to the internet by 2025.
  • 3. Problem • Big SecurityThreat for IoT Devices; - 70% vulnerable due to lack of encrypted interaction - 80% failed to require password - Strongly dependent onWireless & Cellular networks Most important: - 90% of IoT devices include at least one personal Information
  • 4. Main Challenge • Develop an advanced security Mechanism into IoT devices to interact between Internet ofThings sensors and Cloud Systems • Offer a solution for Machine-to-Machine (M2M) Essential to secure IoT communication Between Sensor Nodes and Cloud
  • 5. Case study : Smart Lock Systems • Three component of Smart Locks: -An electronically-augmented deadbolt installed onto an exterior door -A mobile device that can electronically control the lock -A remote web server
  • 6. Security Goal in Smart Lock Systems Prevent Unauthorized access
  • 7. Two types of network design for smart Locks • Device-Gateway-Cloud rely on users mobile phone – no direct connection between lock and the internet allow an attacker to evade revocation and access logging. ex. AirBnB tenant whose lease is expiring • Direct internet connection between smart lock and the remote server lock contain a built-in Wi-Fi modem – connected to the home’s Wi-Fi network revoked attacker still can evade revocation by switching the malicious phone.
  • 8. Geo-fencing &Touch-to-Unlock • User exist • Re-enters the geo-fence boundary, recognize by GPS • Touch the exterior lock face • Set time period (after re-entering the boundary) • Problem : Location spoofing
  • 9. Locking system components • Sensor - > wearable node. • Base Station - > Smart Lock • Cloud - > System Application - > Storage - > Database The system gets help from Cloud to do all high processing to reduce processing load on the wearable node.
  • 10. Wireless Sensor Network (WSN) Key • Use aWSN key (inWearable Node) to verify the Lock (as a gateway) and Key in a small distance. • WhyWSN? Two Level of Authentication Approach connecting with cloud
  • 11. WSN and Cloud • User • Wearable Node : Includes GPS Position Data • Wearable Network Coordinator • Cloud Service Provider : Managing all member data in which come from sensors Moreover • Elliptic Curve Cryptography a public key cryptography algorithm Elliptic Curve Diffie-Hellman (ECDH) use secret Message Authentication Code (MAC)
  • 12. Therefore: • Cloud runs Public Key Cryptography (PKC) for authentication between Wearable Node and Cloud • Using Message Authentication Code (MAC) as a hashing function to confirm that the message came from stated sender • Time synchronization between all parties to prevent reply attack. • Cloud Generates Private and Public key • Wearable device and wearable network coordinator are also preloaded with them
  • 13. Conclusion • Lack of security in internet of things interaction can be a big threat. • Encrypted and two authentication level could be offered as a solution in interaction between Sensors and Cloud system.