VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
Securing IoT devices
1. Securing an Intelligent Connected World
Hamdi Charef
Computer Science Engineer Student
2015
Securing IoT Devices
2. Internet of Things to make Cities Smarter
Cities around the world are becoming
increasingly smarter and more connected
to the Internet in an attempt to add
convenience and ease to daily activities
such as:
-Smart street lights
-Smart Public Transportation
-Surveillance cameras
-Traffic control System
-Smart parking application
-Smart Water and Energy Management
3. Smart Dustbins
The bins recorded details of a very
large devices (4,009,676 device) in
the pockets of passers-by.
If your Wi-Fi is on, your MAC
address and movements can be
tracked by the bins. The data is
captured to see which shops you
visit and how long you stay there, in
order to serve up targeted adverts
on screens on the sides of rubbish
receptacles.
4. Secure Internet of Things is important
-By 2020, there will be more than 45 Billion Internet-connected devices.
-New risk and vulnerabilities will be associated with them.
-Attacking easy like eavesdropping, DDos and tampering of network traffic
-IoT complex and distributed systems
-Contain valuable data: personal, location, presence
Security of Internet of Things (IoT) Can’t Be Ignored
5. Encryption for Internet of Things (IoT)
MatrixSSL Tiny: Open source embedded SSL
Make secure communications over the network.
Simple integration
Robust security
PKI: Manage digital certificates for the IoT.
Secure communications between IoT devices.
Encryption, and data integrity
Authentication, confidentiality
6. MILLLLLIONS of Devices Open to Attacks
-There are at least 230 crypto keys are actively being
used by more than 4 Million IoT devices.
-580 unique private cryptographic keys for SSH and
HTTPS are re-shared between multiple devices.
-Insecure default configurations by vendors.
-Automatic port forwarding via UPnP
7. Conclusion
IoT infrastructure is still massively prone to cyber attacks
An application or a firmware, must be verified through a chain of trust.
Multi-layer security measures are needed for IoT devices