SlideShare a Scribd company logo
1 of 38
Security challenges for
Internet of things
A Place Where Machines talk to Machines
Welcome!
 Monika Keerthi
 III B.Tech , InformationTechnology
 Sree Vidyanikethan Engineering College
 Email: monikakeerthi95@gmail.com
What I’m
going to say
1. Internet ofThings
2. State of the Art of IOT
3. Applications of IOT
4. Internet of Things security is Hard!
5. There are some challenges.
6. There are new threats.
7. There are some new technologies to play with.
8. Future of IOT
What is Internet of
Things?
IOT means…A PlaceWhere Machines talk to Machines
Internet of
Things
 A network of Physical Objects that can interact with
each other to share information and take Action.
 The term was first proposed by Kevin Ashton in 1999.
 The concept of IOT first became popular at the Auto-
ID center, MIT.
 IOT can also be pronounced as Machine to Machine
(M2M) Technology.
The state of the art
Some of it, enabling technologies.
Enabling
Technologies
RFID Sensor SmartTech NanoTech
To identify
and track
the data of
things
To collect
and process
the data to
detect the
changes in
the physical
status of
things
To enhance the
power of the
network by
evolving
processing
capabilities to
different part
of the network.
To make the
smaller and
smaller things
have the
ability to
connect and
interact.
Applications of IOT
Some of them are…
Application
Areas
SmartCities
Smart
Environment
Smart
Energy
Smart
Agriculture
E-Health Retail Logistics
Industrial
Control
Smart Home
Smart Cars
E-Healthcare
Smart Farms
Why is IOT security
difficult?
And is there anything we can do about it?
Because…
1. Wireless communication
2. Physical insecurity
3. Constrained devices
4. Potentially sensitive data
5. Lack of standards
6. Heterogeneity: weakest link problem
7. A systems, not software problem
8. Classic web / internet threats
9. Identity management & dynamism
10. Inconvenience and cost
But really…
It’s because we don’t know how to do it.
Yet.
Threats to IOT systems
Adapted from "Security Considerations in the IP-based Internet of
Things“ - Garcia-Morchon et al.
http://tools.ietf.org/html/draft-garcia-core-security-05
Threats • Can be modified (firmware / OS / middleware)
• Can be decompiled to extract credentials
• Can be exhausted (denial of service)
• Eavesdropping
• Man-in-the-middle attacks
• Rerouting traffic
• Theft of bandwidth
• Can be stolen
• Can be modified
• Can be replaced
• Can be cloned
The physical devices
The software
The network
The Insecurity
ofThings
Easy way to crack into IOT networks
• Hackers can find the system they want to attack via Shodan,
a search engine for scada systems and connected devices
• Then they can target the laptop of staff, via phishing emails to inject
malware and take control of the machine that talks to the scada system.
• Use XSS-cross site scripting-infecting a legitimate web page with
malicious client-side Script.
• Go to portforward.com and look up the default username and passwords.
• Possible points of entry for a hacker are through bluetooth, a cellular
network, the monitor and even music files
Google
Hacking
http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/
Securing the
whole
lifecycle
 Design
 Production
 Bootstrapping
 Monitoring
 Reconfiguration
and recovery
 Decommission
TheWebinos approach
An open source, cross device, browser based
web platform for running applications on and across
multiple devices
What does it
give you
 Open Web Application Platform
 Cross Device Communication Protocols
 A privacy framework
27
Internet
PZH
(Personal Zone Hub)
Security Policy
PZH
(Personal Zone Hub)
Security Policy
Hub: Zone
gateway,
24x7 avail.
Inter-zone comm
peer to peer
Getting the most out of personal devices
Multi-screen/multi-device apps
“Getting gadgets talking”
PZP
PZP
PZP
PZP
PZP
PZP
PZP
PZP
PZP
PZP
PZP
Personal Zone
Proxy:
simultaneously
client and server
How it works
Personal zones - Interconnecting devices, apps and resources
• TLS and a device PKI
• Attribute-based access control
• Web identity and authentication
• “Personal zone” model
How it is useful
Webinos
Security
 Central administration and recovery
 Device authentication
 Identity management
 OpenID and web login mechanisms used
for identity
 Secure communication
 Mutually authentication & encrypted
communication
 Privacy policies to specify data usage
controls
Future of IOT
Some Important Links
 IEEE World Forum
http://sites.ieee.org/wf-iot/
 Cisco World Forum
http://blogs.cisco.com/ioe/
 http://internetofthings.electronicsforu.com
Google’s IoT Projects
 Google Glass : Wearable computer
 Waze : An intelligent GPS navigation
and traffic management tool
 Nest : Smart Thermostat and Smoke
alarm
 Open Automotive Alliance(OAA) :
An android operating system for
automobiles
Case study-
VeraLite
• VeraLite is an embedded device that sits on a home network and can
be used to control other systems connected to it.
• It doesn’t require a username and password. Any one on the local
network can access it.
• Even if the device owner does create a username and password, the
device can still be controlled using the Universal Plug and Play(UPnP)
protocol,which doesn’t have built-in support for authentication.
• If someone has a VeraLite on their home network and they are at
home , they can be tricked into visiting a web page that instructs their
browser to set up a backdoor on theirVeraLite device using UPnP.
• VeraLite’s UPnP functionality allows one to execute arbitrary code on
the device as root,the highest-privileged account type,giving them
complete control over the system
Case study-
Stuxnet-worm
 An infected USB stick is plugged into a system.
 It then infects all the windows machines. A fake digital certificate
is used to avoid detection.
 A check is made to see if a machine is part of the targeted
industrial control system made by siemens.(High speed
centriguges in iran)
 The worm compromises the target systems logic controllers,
exploiting zero day vulnerabilities.
 The worm collects data on the operations of the targeted system.
 This data is used to then take over control of the centrifuges
making them spin endlessly and fail.
 At the same time it provides false information to the monitoring
systems ,so on one suspects something.
My three rules
for IoT security
 1. Don’t be dumb
 The basics of Internet security haven’t gone away
 2.Think about what’s different
 What are the unique challenges of your device?
 3. Do be smart
 Use the best practice from the Internet
Basic
precautions
• Change the default password of the router .Select a password which is
not easy to guess.
• Install trusted and well known anti-virus and spyware’.
• Check your router if any unknown services are running.
• Avoid downloading strange or suspicious files.
• Update your OS and anti-virus regularly.
• Install all patches as provided by the manufacturer.
• Check security certificates in case of doubt
Thoughts to
leave you with.
 Many new technologies and protocols are being developed
 IOT requires systems security
References
1. Rodrigo Roman, Jianying Zhou, Javier Lopez:”On the features and challenges of
security and privacy in distributed internet of things”.Institute for Infocomm
Research,in Elsevier journal,singapore 2013
2. Chakib Bekera:’Security and challenges for IOT”,center for development and
technologies,in Elsevier journal,Baba Hassen,Alger,Algeria,2014.
3. Antonio Marcos Alberti, Dhananjaysingh: “Internetofthings: perspectives.
challenges and opportunities” Instituto nacional de
telecommunicacoes,MinasGerais,Brazil, Department of Electronics
engineering,south korea
4. Hui Suo,Jiafu Wan,Caifeng Zou,Jianqi Liu:”Security in the Internet of things”
Guangzhou,china
5. Kevin Ashton:That ‘‘Internet of Things’’ Thing. In: RFID Journal, 22. Juli 2009.
Abgerufen am 8. April 2011.
6. Tobias Heer,Oscar Garcia-Morchon,Rene Hummen,Sye Loong Keoh,Sandeep
S.Kumar and Klaus Wehrle:”Security challenges in the IP based Internet of
things”, In sringer journal,Netherlands.
7. Cisco: Over 50 billions of devices connected to Internet
http://blogs.cisco.com/news/the-internet-of-things-infographic/
monikakeerthi95@gmail.com

More Related Content

What's hot

Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationNCS Computech Ltd.
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process EC-Council
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT ArchitectureNaseeba P P
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureDavid Sweigert
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT SecuritySHAAMILIVARSAGV
 
Introduction to Mobile Cloud Computing
Introduction to Mobile Cloud ComputingIntroduction to Mobile Cloud Computing
Introduction to Mobile Cloud ComputingZainoddin Shaikh
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 

What's hot (20)

IoT Security
IoT SecurityIoT Security
IoT Security
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT Architecture
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Intro to AWS IoT
Intro to AWS IoTIntro to AWS IoT
Intro to AWS IoT
 
IoT ecosystem
IoT ecosystemIoT ecosystem
IoT ecosystem
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructure
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
 
Introduction to Mobile Cloud Computing
Introduction to Mobile Cloud ComputingIntroduction to Mobile Cloud Computing
Introduction to Mobile Cloud Computing
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
IoT security
IoT securityIoT security
IoT security
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 

Viewers also liked

Internet of Things and Security challenges
Internet of Things and Security challengesInternet of Things and Security challenges
Internet of Things and Security challengesAnastasios Economides
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsChromeInfo Technologies
 
WHY TO MIGRATE YOUR APPLICATIONS TO CLOUD SERVICES?
WHY TO MIGRATE YOUR APPLICATIONS TO CLOUD SERVICES?WHY TO MIGRATE YOUR APPLICATIONS TO CLOUD SERVICES?
WHY TO MIGRATE YOUR APPLICATIONS TO CLOUD SERVICES?ChromeInfo Technologies
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 3
Building the Internet of Things with Thingsquare and Contiki - day 1, part 3Building the Internet of Things with Thingsquare and Contiki - day 1, part 3
Building the Internet of Things with Thingsquare and Contiki - day 1, part 3Adam Dunkels
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 2
Building the Internet of Things with Thingsquare and Contiki - day 1, part 2Building the Internet of Things with Thingsquare and Contiki - day 1, part 2
Building the Internet of Things with Thingsquare and Contiki - day 1, part 2Adam Dunkels
 
Embedded Security and the IoT
Embedded Security and the IoTEmbedded Security and the IoT
Embedded Security and the IoTteam-WIBU
 
Internet of things –
Internet of things –Internet of things –
Internet of things –Mathews Job
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsDesign World
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1Adam Dunkels
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer scienceSeminar Links
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforcePriyanka Aash
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Keynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring SecurityKeynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring SecurityPriyanka Aash
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 

Viewers also liked (20)

Internet of Things and Security challenges
Internet of Things and Security challengesInternet of Things and Security challenges
Internet of Things and Security challenges
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
WHY TO MIGRATE YOUR APPLICATIONS TO CLOUD SERVICES?
WHY TO MIGRATE YOUR APPLICATIONS TO CLOUD SERVICES?WHY TO MIGRATE YOUR APPLICATIONS TO CLOUD SERVICES?
WHY TO MIGRATE YOUR APPLICATIONS TO CLOUD SERVICES?
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 3
Building the Internet of Things with Thingsquare and Contiki - day 1, part 3Building the Internet of Things with Thingsquare and Contiki - day 1, part 3
Building the Internet of Things with Thingsquare and Contiki - day 1, part 3
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 2
Building the Internet of Things with Thingsquare and Contiki - day 1, part 2Building the Internet of Things with Thingsquare and Contiki - day 1, part 2
Building the Internet of Things with Thingsquare and Contiki - day 1, part 2
 
Embedded Security and the IoT
Embedded Security and the IoTEmbedded Security and the IoT
Embedded Security and the IoT
 
Internet of things –
Internet of things –Internet of things –
Internet of things –
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer science
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security Taskforce
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Keynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring SecurityKeynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring Security
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 

Similar to Security challenges for internet of things

The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxInfosectrain3
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisDaksh Raj Chopra
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014Brian Knopf
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Information security questions
Information security questions Information security questions
Information security questions gamemaker762
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Duo Security
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)HITCON GIRLS
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerProduct of Things
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxalanfhall8953
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecturePaul Fremantle
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudWSO2
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsJay Nagar
 

Similar to Security challenges for internet of things (20)

The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Information security questions
Information security questions Information security questions
Information security questions
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docx
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
 

Recently uploaded

Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 

Security challenges for internet of things

  • 1. Security challenges for Internet of things A Place Where Machines talk to Machines
  • 2. Welcome!  Monika Keerthi  III B.Tech , InformationTechnology  Sree Vidyanikethan Engineering College  Email: monikakeerthi95@gmail.com
  • 3. What I’m going to say 1. Internet ofThings 2. State of the Art of IOT 3. Applications of IOT 4. Internet of Things security is Hard! 5. There are some challenges. 6. There are new threats. 7. There are some new technologies to play with. 8. Future of IOT
  • 4. What is Internet of Things? IOT means…A PlaceWhere Machines talk to Machines
  • 5. Internet of Things  A network of Physical Objects that can interact with each other to share information and take Action.  The term was first proposed by Kevin Ashton in 1999.  The concept of IOT first became popular at the Auto- ID center, MIT.  IOT can also be pronounced as Machine to Machine (M2M) Technology.
  • 6. The state of the art Some of it, enabling technologies.
  • 7. Enabling Technologies RFID Sensor SmartTech NanoTech To identify and track the data of things To collect and process the data to detect the changes in the physical status of things To enhance the power of the network by evolving processing capabilities to different part of the network. To make the smaller and smaller things have the ability to connect and interact.
  • 8. Applications of IOT Some of them are…
  • 14. Why is IOT security difficult? And is there anything we can do about it?
  • 15. Because… 1. Wireless communication 2. Physical insecurity 3. Constrained devices 4. Potentially sensitive data 5. Lack of standards 6. Heterogeneity: weakest link problem 7. A systems, not software problem 8. Classic web / internet threats 9. Identity management & dynamism 10. Inconvenience and cost
  • 16. But really… It’s because we don’t know how to do it. Yet.
  • 17. Threats to IOT systems Adapted from "Security Considerations in the IP-based Internet of Things“ - Garcia-Morchon et al. http://tools.ietf.org/html/draft-garcia-core-security-05
  • 18. Threats • Can be modified (firmware / OS / middleware) • Can be decompiled to extract credentials • Can be exhausted (denial of service) • Eavesdropping • Man-in-the-middle attacks • Rerouting traffic • Theft of bandwidth • Can be stolen • Can be modified • Can be replaced • Can be cloned The physical devices The software The network
  • 19. The Insecurity ofThings Easy way to crack into IOT networks • Hackers can find the system they want to attack via Shodan, a search engine for scada systems and connected devices • Then they can target the laptop of staff, via phishing emails to inject malware and take control of the machine that talks to the scada system. • Use XSS-cross site scripting-infecting a legitimate web page with malicious client-side Script. • Go to portforward.com and look up the default username and passwords. • Possible points of entry for a hacker are through bluetooth, a cellular network, the monitor and even music files
  • 20.
  • 21.
  • 24. Securing the whole lifecycle  Design  Production  Bootstrapping  Monitoring  Reconfiguration and recovery  Decommission
  • 25. TheWebinos approach An open source, cross device, browser based web platform for running applications on and across multiple devices
  • 26. What does it give you  Open Web Application Platform  Cross Device Communication Protocols  A privacy framework
  • 27. 27 Internet PZH (Personal Zone Hub) Security Policy PZH (Personal Zone Hub) Security Policy Hub: Zone gateway, 24x7 avail. Inter-zone comm peer to peer Getting the most out of personal devices Multi-screen/multi-device apps “Getting gadgets talking” PZP PZP PZP PZP PZP PZP PZP PZP PZP PZP PZP Personal Zone Proxy: simultaneously client and server How it works Personal zones - Interconnecting devices, apps and resources • TLS and a device PKI • Attribute-based access control • Web identity and authentication • “Personal zone” model
  • 28. How it is useful
  • 29. Webinos Security  Central administration and recovery  Device authentication  Identity management  OpenID and web login mechanisms used for identity  Secure communication  Mutually authentication & encrypted communication  Privacy policies to specify data usage controls
  • 31. Some Important Links  IEEE World Forum http://sites.ieee.org/wf-iot/  Cisco World Forum http://blogs.cisco.com/ioe/  http://internetofthings.electronicsforu.com Google’s IoT Projects  Google Glass : Wearable computer  Waze : An intelligent GPS navigation and traffic management tool  Nest : Smart Thermostat and Smoke alarm  Open Automotive Alliance(OAA) : An android operating system for automobiles
  • 32. Case study- VeraLite • VeraLite is an embedded device that sits on a home network and can be used to control other systems connected to it. • It doesn’t require a username and password. Any one on the local network can access it. • Even if the device owner does create a username and password, the device can still be controlled using the Universal Plug and Play(UPnP) protocol,which doesn’t have built-in support for authentication. • If someone has a VeraLite on their home network and they are at home , they can be tricked into visiting a web page that instructs their browser to set up a backdoor on theirVeraLite device using UPnP. • VeraLite’s UPnP functionality allows one to execute arbitrary code on the device as root,the highest-privileged account type,giving them complete control over the system
  • 33. Case study- Stuxnet-worm  An infected USB stick is plugged into a system.  It then infects all the windows machines. A fake digital certificate is used to avoid detection.  A check is made to see if a machine is part of the targeted industrial control system made by siemens.(High speed centriguges in iran)  The worm compromises the target systems logic controllers, exploiting zero day vulnerabilities.  The worm collects data on the operations of the targeted system.  This data is used to then take over control of the centrifuges making them spin endlessly and fail.  At the same time it provides false information to the monitoring systems ,so on one suspects something.
  • 34. My three rules for IoT security  1. Don’t be dumb  The basics of Internet security haven’t gone away  2.Think about what’s different  What are the unique challenges of your device?  3. Do be smart  Use the best practice from the Internet
  • 35. Basic precautions • Change the default password of the router .Select a password which is not easy to guess. • Install trusted and well known anti-virus and spyware’. • Check your router if any unknown services are running. • Avoid downloading strange or suspicious files. • Update your OS and anti-virus regularly. • Install all patches as provided by the manufacturer. • Check security certificates in case of doubt
  • 36. Thoughts to leave you with.  Many new technologies and protocols are being developed  IOT requires systems security
  • 37. References 1. Rodrigo Roman, Jianying Zhou, Javier Lopez:”On the features and challenges of security and privacy in distributed internet of things”.Institute for Infocomm Research,in Elsevier journal,singapore 2013 2. Chakib Bekera:’Security and challenges for IOT”,center for development and technologies,in Elsevier journal,Baba Hassen,Alger,Algeria,2014. 3. Antonio Marcos Alberti, Dhananjaysingh: “Internetofthings: perspectives. challenges and opportunities” Instituto nacional de telecommunicacoes,MinasGerais,Brazil, Department of Electronics engineering,south korea 4. Hui Suo,Jiafu Wan,Caifeng Zou,Jianqi Liu:”Security in the Internet of things” Guangzhou,china 5. Kevin Ashton:That ‘‘Internet of Things’’ Thing. In: RFID Journal, 22. Juli 2009. Abgerufen am 8. April 2011. 6. Tobias Heer,Oscar Garcia-Morchon,Rene Hummen,Sye Loong Keoh,Sandeep S.Kumar and Klaus Wehrle:”Security challenges in the IP based Internet of things”, In sringer journal,Netherlands. 7. Cisco: Over 50 billions of devices connected to Internet http://blogs.cisco.com/news/the-internet-of-things-infographic/

Editor's Notes

  1. I’m going to start by telling you what you probably already know. Indeed, I’m going to start by talking about challenges Then I’m going to talk about specific IoT threats and attacks. Then I’m going to drop into a few technologies.
  2. INTERNET-a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols. We used to feel that we are dependent on internet but let me interpret the fact is reverse fashion-Today computers—and, therefore, the Internet—are almost wholly dependent on human beings for information. Nearly all of the roughly 50 petabytes (a petabyte is 1,024 terabytes) of data available on the Internet were first captured and created by human beings.
  3. IOT- a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data
  4. 1) Wireless communication – lots of wifi devices in IOT, all broadcasting all communication. 2) Physical insecurity – In many scenarios, the devices are placed in areas where the owner isn’t in physical control or possession. E.g., sensors places in public locations, or in buildings with lots of people nearby. 3) Constrained devices – the “internet connected devices” may be too constrained to enforce security controls or do heavy-weight cryptography. Constrained in terms of power, bandwidth, memory… 4) Healthcare, cameras, etc. 5) No clear standards, so no defence in using a “best practice” solution. Everything is adhoc. Can’t stand on the shoulder of any giants. 6) The fact that you have lots of different devices, means that you have a ‘weakest link’ problem. The weakest device may be an attack surface to compromise the rest of the system 7) IOT involves people, hardware, software, systems, businesses, and more. It isn’t a software problem, and doesn’t have just software solutions. 8) Chances are, your IOT system is also a Web system. At least for control. You’ve therefore got all the classic web threats to deal with – XSS, CSRF, content injection, etc. You’ve also got attackers from across the world. 9) Security would be easier if we could identify all security principles, all the things, ahead of time. But in IOT we can’t. 10) Adding security functionality costs more, and is inconvenient. Buying sensors and constrained devices with encryption coprocessors is expensive and hard. The most secure way is not the default.
  5. We’re going to find out a lot of ways *not* to do it. We’re going to need to share experiences, experiment, and feed back information. If security isn’t going to be your big selling point, then you need to make it a collective task. That’s a good argument for openness. We could argue that this is like the 90s, or the dot-com bubble. Lots of great technology, huge potential, but also all the same naivety and lack of security thinking We needs to apply our current security and privacy attitudes to IOT, not the ones we had 10-20 years ago.
  6. Having talked about why it’s hard, lets think about the threats we’ll have to deal with These are threats specifically around IOT, largely take from the IETF core working group, and a document written by Garcia-Morchon et al.
  7. Pd: Anyone could steal or modify a thing Anyone could replace a particular thing with an alternative model A manufacturer could “clone the physical characteristics, firmware/software, or security configuration of the thing”. s/w: An attacker with physical or remote access could plausibly update or modify firmware - there’s a proof-of-concept exploit for routers through web browsers for this The software you deploy to the device could be decompiled to obtain any keys or credentials it holds. The software is likely to be vulnerable to Denial of Service attacks. These might be used to make it malfunction. n/w:Rerouting traffic – exploit the network protocol to make the connection via your node look more favourable, thus gathering traffic from all sources. A useful attack if you only control a small part of the network.
  8. To highlight the fun that can be had in this subject, I want to show you what happens when the Internet of Things happens by mistake. This is *old* now – but essentially this website searches for IP cameras in places like car parks, offices, and so on.
  9. There are security challenges at all of the following stages…
  10. Open framework for developing multi device web applications, using open standards Web friendly open protocols for discovering and sharing services over cloud, local networks and even proprietary networking schemes 3.Consumer data sovereignty You Own Your Data A universal mechanism for exerting direct control over your data, devices and services
  11. Re-establishing control over your devices and personal data..
  12. Device authentication: All devices are part of a personal zone key infrastructure Each device has a unique private key Personal zone hub is a certification authority Certificate exchange for connections between zones Works offline and online
  13. It should be obvious that IOT is current a voyage into the unknown There’s way too much uncertainty and new technology floating around Generic solutions wont help that much – it’s a systems problem The only way progress will be made is through sharing results, making data and reports open, and collaboration. Please take this opportunity.