SlideShare a Scribd company logo
1 of 44
Download to read offline
SRGE 2018 Internet of Things workshop – Cairo University, 12 July 2018
1
The Shift from Social Network Security to
the Social IOT Security
Presented By
Dr. Mohamed Torky
PHD in Computer Science (2018), Faculty of Science, Menoufyia University, Egypt.
Member in Scientific Research Group in Egypt (SRGE)
Agenda
2
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
Agenda
3
1
• Introduction.
2
• Privacy Protection in Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
7/13/2018
1- Introduction
Internet of People (IOP) Attacks
5
(IOP)
Agenda
6
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
7/13/2018
2- Privacy Protection of Internet of People (IOP)
Hacking Privacy of IOP
Fake Profiles Attacks Social Bot Attacks
2.1. IOP Privacy Protection against Fake Profile Attacks
(Fake Profile Recognizer (FPR) Model)
8
9
Users’ Identity Generator (UIG) Model
2.1. IOP Privacy Protection against Fake Profile Attacks
(Fake Profile Recognizer (FPR) Model)
10
Identity Verifier Machine (IVM) Model
2.1. IOP Privacy Protection against Fake Profile Attacks
(Fake Profile Recognizer (FPR) Model)
7/13/2018
2-4 Results
Intelligent system and it's application, FCI, Sat 3-12-2016
12
AccuracyF-MeasureRecallPrecisionDataset
03.9501.9594.5395.49Facebook
94.7794.4794.2795.22Google+
94.9394.928.9495.05Twitter
94.9194.8994.5395.25AVG
AUCFNRFall-OutSpecificityDataset
06.9547.547.453.95Facebook
94.785.734.7395.27Google+
94.955.24.9395.07Twitter
94.935.474.7195.29AVG
Results
13
Fig 1 Fig 2
Comparison Results
14
Fig 1 Fig 2
15
16
2.2. IOP Privacy Protection against Social Bot Attacks
(Necklace CAPTCHA Mechanism)
Classical Necklace Graph Modified Necklace Graph
Social Bot
CAPTCHA
17
2.2. IOP Privacy Protection against Social Bot Attacks
(Necklace CAPTCHA Mechanism)
7/13/2018
3-2 Usability Results
19
Effectiveness Results Solution Time Results
3-3 Security Results
20
Fig 1 Fig 2
3-4 Comparison Results
21
3-4 Comparison Results
22
23
24
From IOP to Internet of Things (IOT) !!
IOP IOT
Agenda
25
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
26
According to The Social Internet of Things (SIOT)–
when social networks meet the IOT: Concept,
architecture and network characterization, the term
SIOT (Social internet of Things) has a different
definition from what you might expect. In short, it
doesn’t refer to smart objects that are connected to
social networks,, but rather to intelligent devices that
are able to create social relationships among them,
fact that leads to social networks of their own.
3. Social Internet of Things (SIOT) is the Next Technology.
27
(1) Parental Object Relationship (POR):
is typically established among homogenous
objects - same generation devices made by
the same manufacturer.
3.1 Types of SIOT Relationships
28
(2) Co-location Object Relationship (C-LOR)
Established among heterogeneous or homogenous
objects that share the same environment or goal.
3.1 Types of SIOT Relationships
29
(3) Co-work Object Relationship (C-WOR):
Established between two or more devices whose
functionalities are combined to accomplish a
common goal. This type of relationship occurs
between objects that either need to touch each other
to achieve that goal, or need to be in close proximity
of one another
3.1 Types of SIOT Relationships
30
(4) Ownership Object Relationship (OOR):
Occur between the smart devices of the same user
(smartphones, portable media players, video game
consoles, etc.)
3.1 Types of SIOT Relationships
31
(4) Social Object Relationship (SOR):
Occur when the devices come in touch whenever
their owners meet. Smart objects belonging to
friends, classmates, coworkers and companions
could establish this type of relationship.
3.1 Types of SIOT Relationships
32
IOT is Dramatically Enlarging
the Attack Surface, So, How to
Secure SIOT Platforms, is an
Open Challenge !!
Agenda
33
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
34
4 .1. SIOT Attacks Surface
Insecure Mobile Interface
Insecure Web Interface
Lack of Encryption Protocol
Insecure Cloud Interface
Insecure Network services
Insecure Software/ Firmware
Poor Physical Security
35
4 .2. SIOT is a Popular Platforms for Attackers
Computational capabilities, Increasing capabilities
of microcomputers and Internet Connection make
IOT devices a popular attack tool to Hackers:
IOT Device can be used to:
• Send Same Messages
• Coordinate an attack against a critical
Infrastructure
• Serve a Malware
• Work as a entry point within a corporate network
36
4 .3. SIOT Attack Patterns
Botnets are already a major Threats…..
• IOT device can send a ThingBot within the
Social Internet of Things.
• Infected device can harm all connected
devices in SIOT network.
• Number of ThingBot software against smart
routers, TVs, network attached storage
devices, gaming devices are increasingly
growing.
Oops….. My refrigerator is sending Spam
Messages
37
4 .3. SIOT Attack Patterns
A Linux worm (Linux.Darlloz) and Spike Botnets is
designed to target IOT Devices through DDoS…..
• Generate random IP Addresses and attempt to
use commonly used credentials to log into the
target device in SIOT .
• It send HTTP posts requests specially crafted ,
once compromised the target device , it
downloads the worm from a remote server and
start searching other target devices in SIOT
network.
• Once the worm has compromised a device, it kills
off access to any telnet service running .
Symantec detected Linux.Darlloz attack as
the first IOT malware
38
4 .3. SIOT Attack Patterns
Hacking Smart watches…..
• Data sent between the Smart watches and an
android mobile phone can be intercepted.
• Easy to crack the authentication of smart watches
by brute force attacks as it use six digit PIN
Hacking Wearable Devices
39
4 .3. SIOT Attack Patterns
Hacking Smart Meters…..
• In Spain, millions of smart meters are susceptible to
cyber attacks due to lack of proper security controls.
• Attacker can exploit the lack of security controls to
perform fraudulent activities with smart meters in
SIOT network
• Smart meters is designed with poor protected
Credentials.
• Attackers can modify device ID to impersonate other
customer or use the smart meter to launch attacks
against power network or harm other devices in the
SIOT of the houses or firms.
Smart meters can be hacked to hit the
National power network
Agenda
40
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
41
 More Than 50 billion Devices by 2020.
 More Than 6 connected devices per
person.
 By 2020 IOT will be more than the size
of smart phones , PC, Tablets,
Connected Cars and wearable devices.
 We are rapidly evolving toward a world
where every thing will be connected
 Number of security attacks will increase.
 Privacy and security must be addressed
with untraditional mechanisms to secure
large SIOT networks.
 PKI-based solution can be used to
improve IOT and SIOT security.
5. Evolution of SIOT: Today, Tomorrow
42
43
Acknowledgment
44

More Related Content

What's hot

Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
 
Review on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT SecurityReview on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT Securityijtsrd
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoTJinia Bhowmik
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Dr. Michael Agbaje
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoTExosite
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTBarcoding, Inc.
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of ThingsTushar Sharma
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmIJSRED
 

What's hot (19)

Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 
Review on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT SecurityReview on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT Security
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoT
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of Things
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
Iot Market Readiness
Iot Market ReadinessIot Market Readiness
Iot Market Readiness
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 

Similar to The shift from social network security to the social iot security

A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfImXaib
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...AIRCC Publishing Corporation
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...AIRCC Publishing Corporation
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsDodi Saputra
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon Bob Snyder
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksIJECEIAES
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
 

Similar to The shift from social network security to the social iot security (20)

mypresentation.pdf
mypresentation.pdfmypresentation.pdf
mypresentation.pdf
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Internet of Things.
Internet of Things.Internet of Things.
Internet of Things.
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
 

More from Aboul Ella Hassanien

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdfAboul Ella Hassanien
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...Aboul Ella Hassanien
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...Aboul Ella Hassanien
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...Aboul Ella Hassanien
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxAboul Ella Hassanien
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdfAboul Ella Hassanien
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات Aboul Ella Hassanien
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي Aboul Ella Hassanien
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى Aboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنيةAboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنيةAboul Ella Hassanien
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفالAboul Ella Hassanien
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالAboul Ella Hassanien
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىAboul Ella Hassanien
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية Aboul Ella Hassanien
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...Aboul Ella Hassanien
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةAboul Ella Hassanien
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى Aboul Ella Hassanien
 

More from Aboul Ella Hassanien (20)

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptx
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdf
 
SRGE photo.pdf
SRGE photo.pdfSRGE photo.pdf
SRGE photo.pdf
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفال
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفال
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
 
اقتصاد ميتافيرس
اقتصاد ميتافيرساقتصاد ميتافيرس
اقتصاد ميتافيرس
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

The shift from social network security to the social iot security

  • 1. SRGE 2018 Internet of Things workshop – Cairo University, 12 July 2018 1 The Shift from Social Network Security to the Social IOT Security Presented By Dr. Mohamed Torky PHD in Computer Science (2018), Faculty of Science, Menoufyia University, Egypt. Member in Scientific Research Group in Egypt (SRGE)
  • 2. Agenda 2 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 3. Agenda 3 1 • Introduction. 2 • Privacy Protection in Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 5. Internet of People (IOP) Attacks 5 (IOP)
  • 6. Agenda 6 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 7. 7/13/2018 2- Privacy Protection of Internet of People (IOP) Hacking Privacy of IOP Fake Profiles Attacks Social Bot Attacks
  • 8. 2.1. IOP Privacy Protection against Fake Profile Attacks (Fake Profile Recognizer (FPR) Model) 8
  • 9. 9 Users’ Identity Generator (UIG) Model 2.1. IOP Privacy Protection against Fake Profile Attacks (Fake Profile Recognizer (FPR) Model)
  • 10. 10 Identity Verifier Machine (IVM) Model 2.1. IOP Privacy Protection against Fake Profile Attacks (Fake Profile Recognizer (FPR) Model)
  • 12. 2-4 Results Intelligent system and it's application, FCI, Sat 3-12-2016 12 AccuracyF-MeasureRecallPrecisionDataset 03.9501.9594.5395.49Facebook 94.7794.4794.2795.22Google+ 94.9394.928.9495.05Twitter 94.9194.8994.5395.25AVG AUCFNRFall-OutSpecificityDataset 06.9547.547.453.95Facebook 94.785.734.7395.27Google+ 94.955.24.9395.07Twitter 94.935.474.7195.29AVG
  • 15. 15
  • 16. 16 2.2. IOP Privacy Protection against Social Bot Attacks (Necklace CAPTCHA Mechanism) Classical Necklace Graph Modified Necklace Graph Social Bot CAPTCHA
  • 17. 17 2.2. IOP Privacy Protection against Social Bot Attacks (Necklace CAPTCHA Mechanism)
  • 19. 3-2 Usability Results 19 Effectiveness Results Solution Time Results
  • 23. 23
  • 24. 24 From IOP to Internet of Things (IOT) !! IOP IOT
  • 25. Agenda 25 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 26. 26 According to The Social Internet of Things (SIOT)– when social networks meet the IOT: Concept, architecture and network characterization, the term SIOT (Social internet of Things) has a different definition from what you might expect. In short, it doesn’t refer to smart objects that are connected to social networks,, but rather to intelligent devices that are able to create social relationships among them, fact that leads to social networks of their own. 3. Social Internet of Things (SIOT) is the Next Technology.
  • 27. 27 (1) Parental Object Relationship (POR): is typically established among homogenous objects - same generation devices made by the same manufacturer. 3.1 Types of SIOT Relationships
  • 28. 28 (2) Co-location Object Relationship (C-LOR) Established among heterogeneous or homogenous objects that share the same environment or goal. 3.1 Types of SIOT Relationships
  • 29. 29 (3) Co-work Object Relationship (C-WOR): Established between two or more devices whose functionalities are combined to accomplish a common goal. This type of relationship occurs between objects that either need to touch each other to achieve that goal, or need to be in close proximity of one another 3.1 Types of SIOT Relationships
  • 30. 30 (4) Ownership Object Relationship (OOR): Occur between the smart devices of the same user (smartphones, portable media players, video game consoles, etc.) 3.1 Types of SIOT Relationships
  • 31. 31 (4) Social Object Relationship (SOR): Occur when the devices come in touch whenever their owners meet. Smart objects belonging to friends, classmates, coworkers and companions could establish this type of relationship. 3.1 Types of SIOT Relationships
  • 32. 32 IOT is Dramatically Enlarging the Attack Surface, So, How to Secure SIOT Platforms, is an Open Challenge !!
  • 33. Agenda 33 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 34. 34 4 .1. SIOT Attacks Surface Insecure Mobile Interface Insecure Web Interface Lack of Encryption Protocol Insecure Cloud Interface Insecure Network services Insecure Software/ Firmware Poor Physical Security
  • 35. 35 4 .2. SIOT is a Popular Platforms for Attackers Computational capabilities, Increasing capabilities of microcomputers and Internet Connection make IOT devices a popular attack tool to Hackers: IOT Device can be used to: • Send Same Messages • Coordinate an attack against a critical Infrastructure • Serve a Malware • Work as a entry point within a corporate network
  • 36. 36 4 .3. SIOT Attack Patterns Botnets are already a major Threats….. • IOT device can send a ThingBot within the Social Internet of Things. • Infected device can harm all connected devices in SIOT network. • Number of ThingBot software against smart routers, TVs, network attached storage devices, gaming devices are increasingly growing. Oops….. My refrigerator is sending Spam Messages
  • 37. 37 4 .3. SIOT Attack Patterns A Linux worm (Linux.Darlloz) and Spike Botnets is designed to target IOT Devices through DDoS….. • Generate random IP Addresses and attempt to use commonly used credentials to log into the target device in SIOT . • It send HTTP posts requests specially crafted , once compromised the target device , it downloads the worm from a remote server and start searching other target devices in SIOT network. • Once the worm has compromised a device, it kills off access to any telnet service running . Symantec detected Linux.Darlloz attack as the first IOT malware
  • 38. 38 4 .3. SIOT Attack Patterns Hacking Smart watches….. • Data sent between the Smart watches and an android mobile phone can be intercepted. • Easy to crack the authentication of smart watches by brute force attacks as it use six digit PIN Hacking Wearable Devices
  • 39. 39 4 .3. SIOT Attack Patterns Hacking Smart Meters….. • In Spain, millions of smart meters are susceptible to cyber attacks due to lack of proper security controls. • Attacker can exploit the lack of security controls to perform fraudulent activities with smart meters in SIOT network • Smart meters is designed with poor protected Credentials. • Attackers can modify device ID to impersonate other customer or use the smart meter to launch attacks against power network or harm other devices in the SIOT of the houses or firms. Smart meters can be hacked to hit the National power network
  • 40. Agenda 40 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 41. 41  More Than 50 billion Devices by 2020.  More Than 6 connected devices per person.  By 2020 IOT will be more than the size of smart phones , PC, Tablets, Connected Cars and wearable devices.  We are rapidly evolving toward a world where every thing will be connected  Number of security attacks will increase.  Privacy and security must be addressed with untraditional mechanisms to secure large SIOT networks.  PKI-based solution can be used to improve IOT and SIOT security. 5. Evolution of SIOT: Today, Tomorrow
  • 42. 42
  • 44. 44