SlideShare a Scribd company logo
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
.
Raj Samani, EMEA CTO McAfee
Sandhiprakash Bhide, Director of Innovation, Future IOT Solutions,
Application Ready Platform Division, IOT Group
Building a secure future
Cybersecurity and the Internet of Things
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
The Connected Home – The Last Decade
2
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Typical Connected Home, Year 2000
3
20002000
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Typical Connected Home, Year 2000
4
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Typical Connected Home, Year 2000
5
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Typical Connected Home, Year 2000
6
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Typical Connected Home, Year 2000
7
20132013
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Typical Connected Home, Year 2000
8
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Typical Connected Home, Year 2000
9
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Typical Connected Home, Year 2000
10
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
11
50B Devices will connect to Internet by the end of the decade.
They are unprotected and can be hacked  loss of economic value & loss of
innocence (opt-in w/o knowing consequences)
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
New Security Threats to Personal IOT Devices
12
Baby Monitor: Hacker takes over baby monitor and shouts obscenities
at sleeping child. ABC. 13 Aug 2013)
Fridge sending out spam after web attack compromised gadgets. One
of > than 100K devices used in spam campaign. (BBC News. Jan 2014)
“Wearable Computing Equals New Security Risks”, (InformationWeek.
13 Jan 2013)
Medical Devices: We’re starting to attach medical devices to electronic
health records, and they’re not secure.' (Healthcare IT News. May 2013)
Credit Card Information System: “Target Confirms Point-of-Sale
Malware Was Used in Attack” (Security Week. 13 Jan 2014)
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
What is security and implications of not having
security?
13
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Anonymized data may not be as anonymous as is
believed. Or it may be now, but not in the future
14
How To Track Vehicles
Using Speed Data Alone
Carmakers keep data on
drivers' locations
FTC Hearing IoT Privacy
Concerns
Connected Home
Invasion: The Methods
Car insurance companies reduce the cost of insurance
by gathering data about a customer's driving practices.
Report finds automakers keeping info about driver’s
location. Owners can’t demand that info is destroyed
Anyone concerned about privacy would be well advised
to weigh in on this before the issue is taken over.
No incentive to secure products. With resources better
off spending on the features that consumers want
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Data Storage requirements
May 16, 2016
15
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Security Connected
May 16, 2016
16
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
User’s Perspective of Security
Depends end user and the app
17
Person remains
anonymous unless
opted-in
Privacy
Release of
sensitive/ personal
info without
consent
SafetyData Protection
Does not cause any
harm to people
Data safe from
theft or alteration
Identity
TRUST
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Security necessarily segments the IOT market
• Different usages require different security mechanisms
• Cost sensitivity implies different security controls for different IOT
segments, i.e., smart meters
Three types of security technical issues for IOT devices
• How to secure communications?
• How to detect and recover from malware?
• How to defend the physical security of low cost devices?
IOT Security
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Sensor Security Challenge #1
Software-based sensor attack rates rising
• Sensor data left unprotected:
1. By APIs;
2. In system memory (buffers)
• Once access to sensor data is obtained, information can be
directly or indirectly inferred
Source: TapLogger: Inferring User Inputs on Smartphone Touchscreens Using On-board
Motion Sensors, WiSec’12, April, 2012.
http://www.cse.psu.edu/~szhu/papers/taplogger.pdf
Source: PlaceRaider: Virtual Theft in Physical Spaces with Smartphones,
Sept 27, 2012. http://arxiv.org/pdf/1209.5982v1.pdf
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Sensor Security Challenge #2
• Users can’t tell if sensors are on/off and cannot control use
• Sensor data can be faked -- not certified as authentic --allowing
attacks on sensor-data-based uses
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
1. How do we keep the credentials provisioned in IoT devices secret
from attackers with physical access to the device?
• Important for infrastructure IoT devices but perhaps not for
personal devices
2. How do we detect IOT Device being tampered?
• Most IoT designs today assume device functionality is immutable
3. What market segments require device hardening from physical
attack (e.g., will vandalism be common in infrastructure devices)?
Sensor Security Challenge #3
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
1. Sensor data is protected at the source and remains
secure during processing.
2. Provide user an easy to use environment with policies to
control sensor data processing and use.
3. Address problem in a way that is scalable (platform &
sensor types)
Protected Sensor Data Goals
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
What about today?
May 16,
2016
23
Security. Unlike PC-based SCADA systems that are vulnerable to
virus and malware attacks, our system is housed on cloud based
servers. These servers are overseen by highly skilled technicians
negating the need for anti-virus updates and continuous security
vulnerability patches required by PC-based solutions
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
For more information
• White Paper: http://www.mcafee.com/hk/resources/white-
papers/wp-smart-grid-cyber-security.pdf
@Raj_Samani & @CyberGridBook
.
Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014
Q&A

More Related Content

What's hot

Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
Daniel Miessler
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
SecPod Technologies
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
Winston Morton
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
Avinash Sinha
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
Shreya Pohekar
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
CableLabs
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
Edureka!
 
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014. Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014. ebuc
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
Ulf Mattsson
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
ChromeInfo Technologies
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_t
Beau Christensen
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Leonardo
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Ping Identity
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
 
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPTInternet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Multisoft Virtual Academy
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
Cigdem Sengul
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
James Wu
 

What's hot (20)

Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Null who and_where (1)
Null who and_where (1)Null who and_where (1)
Null who and_where (1)
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
 
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014. Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_t
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPTInternet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
 

Viewers also liked

bhide_connected_raleigh2016 (1)
bhide_connected_raleigh2016 (1)bhide_connected_raleigh2016 (1)
bhide_connected_raleigh2016 (1)sandhibhide
 
Matematica motor cc
Matematica motor  ccMatematica motor  cc
Matematica motor cc
univ. pedagogica f.m
 
Social media one-on-one
Social media one-on-oneSocial media one-on-one
Social media one-on-one
Sizzil Choudhury
 
MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...
MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...
MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...sandhibhide
 
Copy of a2 1
Copy of a2 1Copy of a2 1
Copy of a2 1Christina
 
3simplestepsbook
3simplestepsbook3simplestepsbook
3simplestepsbookNina Online
 
Patient application 6 28-10
Patient application 6 28-10Patient application 6 28-10
Patient application 6 28-10Christina
 
Evaluating a row-store data model for full-content dicom management
Evaluating a row-store data model for full-content dicom managementEvaluating a row-store data model for full-content dicom management
Evaluating a row-store data model for full-content dicom management
Alexandre Savaris
 
Becky peterson slideshow 2010
Becky peterson slideshow 2010Becky peterson slideshow 2010
Becky peterson slideshow 2010Leonardfam03
 
SBIR-STTR-Future Trends and Opportunities in Technology-Sandhi Bhide 11142012...
SBIR-STTR-Future Trends and Opportunities in Technology-Sandhi Bhide 11142012...SBIR-STTR-Future Trends and Opportunities in Technology-Sandhi Bhide 11142012...
SBIR-STTR-Future Trends and Opportunities in Technology-Sandhi Bhide 11142012...sandhibhide
 

Viewers also liked (15)

bhide_connected_raleigh2016 (1)
bhide_connected_raleigh2016 (1)bhide_connected_raleigh2016 (1)
bhide_connected_raleigh2016 (1)
 
Matematica motor cc
Matematica motor  ccMatematica motor  cc
Matematica motor cc
 
Social media one-on-one
Social media one-on-oneSocial media one-on-one
Social media one-on-one
 
MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...
MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...
MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...
 
Copy of a2 1
Copy of a2 1Copy of a2 1
Copy of a2 1
 
3simplestepsbook
3simplestepsbook3simplestepsbook
3simplestepsbook
 
A2 1
A2 1A2 1
A2 1
 
Patient application 6 28-10
Patient application 6 28-10Patient application 6 28-10
Patient application 6 28-10
 
Fafsaws01bw
Fafsaws01bwFafsaws01bw
Fafsaws01bw
 
Swcclopi
SwcclopiSwcclopi
Swcclopi
 
Evaluating a row-store data model for full-content dicom management
Evaluating a row-store data model for full-content dicom managementEvaluating a row-store data model for full-content dicom management
Evaluating a row-store data model for full-content dicom management
 
Becky peterson slideshow 2010
Becky peterson slideshow 2010Becky peterson slideshow 2010
Becky peterson slideshow 2010
 
Nitrogen
NitrogenNitrogen
Nitrogen
 
SBIR-STTR-Future Trends and Opportunities in Technology-Sandhi Bhide 11142012...
SBIR-STTR-Future Trends and Opportunities in Technology-Sandhi Bhide 11142012...SBIR-STTR-Future Trends and Opportunities in Technology-Sandhi Bhide 11142012...
SBIR-STTR-Future Trends and Opportunities in Technology-Sandhi Bhide 11142012...
 
Rapport de stage
Rapport de stageRapport de stage
Rapport de stage
 

Similar to Tsensors - Munich Sept. 15-17, 2014 - Sandhi Bhide-Samani

Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
sandhibhide
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
IRJET Journal
 
Personal Healthcare IOT on PCF using Spring
Personal Healthcare IOT on PCF using SpringPersonal Healthcare IOT on PCF using Spring
Personal Healthcare IOT on PCF using Spring
Jim Shingler
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
Usman Anjum
 
Cybersecurity Management Programs - Industrialcyber.co
Cybersecurity Management Programs - Industrialcyber.coCybersecurity Management Programs - Industrialcyber.co
Cybersecurity Management Programs - Industrialcyber.co
Industrial Cyber
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
Daksh Raj Chopra
 
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
hanumayamma
 
Security and Privacy Challenges for IoT
Security and Privacy Challenges for IoTSecurity and Privacy Challenges for IoT
Security and Privacy Challenges for IoT
Jason Hong
 
A Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxA Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptx
TurboAnchor
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Product of Things
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
NowSecure
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
online Marketing
 
76 s201917
76 s20191776 s201917
76 s201917
IJRAT
 
IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
SudhanshiBakre1
 
Business Productivity and Automated Security Controls
Business Productivity and Automated Security ControlsBusiness Productivity and Automated Security Controls
Business Productivity and Automated Security ControlsHeather Axworthy
 
Personal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using SpringPersonal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using Spring
VMware Tanzu
 
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
JoAnna Cheshire
 
IoT and security
IoT and securityIoT and security
IoT and security
IET India
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
AngelGomezRomero
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Amazon Web Services
 

Similar to Tsensors - Munich Sept. 15-17, 2014 - Sandhi Bhide-Samani (20)

Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Personal Healthcare IOT on PCF using Spring
Personal Healthcare IOT on PCF using SpringPersonal Healthcare IOT on PCF using Spring
Personal Healthcare IOT on PCF using Spring
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Cybersecurity Management Programs - Industrialcyber.co
Cybersecurity Management Programs - Industrialcyber.coCybersecurity Management Programs - Industrialcyber.co
Cybersecurity Management Programs - Industrialcyber.co
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
 
Security and Privacy Challenges for IoT
Security and Privacy Challenges for IoTSecurity and Privacy Challenges for IoT
Security and Privacy Challenges for IoT
 
A Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxA Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptx
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
76 s201917
76 s20191776 s201917
76 s201917
 
IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
 
Business Productivity and Automated Security Controls
Business Productivity and Automated Security ControlsBusiness Productivity and Automated Security Controls
Business Productivity and Automated Security Controls
 
Personal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using SpringPersonal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using Spring
 
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
 
IoT and security
IoT and securityIoT and security
IoT and security
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
 

More from sandhibhide

Taking innovations to product reality using nav principles
Taking innovations to product reality using nav principlesTaking innovations to product reality using nav principles
Taking innovations to product reality using nav principles
sandhibhide
 
Digital transformation and application of iot to healthcare
Digital transformation and application of iot to healthcareDigital transformation and application of iot to healthcare
Digital transformation and application of iot to healthcare
sandhibhide
 
Presentation to vishwakarma07242013
Presentation to vishwakarma07242013Presentation to vishwakarma07242013
Presentation to vishwakarma07242013
sandhibhide
 
T sensor summit-emerging iot usages & apps for trillion+ sensors-sandhi b...
T sensor summit-emerging iot usages & apps for trillion+ sensors-sandhi b...T sensor summit-emerging iot usages & apps for trillion+ sensors-sandhi b...
T sensor summit-emerging iot usages & apps for trillion+ sensors-sandhi b...
sandhibhide
 
T sensor tokyo japan-panel discussion- sandhi bhide-feb21, 2014
T sensor tokyo japan-panel discussion- sandhi bhide-feb21, 2014T sensor tokyo japan-panel discussion- sandhi bhide-feb21, 2014
T sensor tokyo japan-panel discussion- sandhi bhide-feb21, 2014
sandhibhide
 
Wyoming technology business conference sandhi bhide, may 13, 2015
Wyoming technology business conference sandhi bhide, may 13, 2015Wyoming technology business conference sandhi bhide, may 13, 2015
Wyoming technology business conference sandhi bhide, may 13, 2015
sandhibhide
 
Smart cities and the internet of things 2015 - Sandhiprakash Bhide
Smart cities and the internet of things  2015 - Sandhiprakash BhideSmart cities and the internet of things  2015 - Sandhiprakash Bhide
Smart cities and the internet of things 2015 - Sandhiprakash Bhide
sandhibhide
 
Pitching a new idea within your company oemba-may 19, 2017
Pitching a new idea within your company oemba-may 19, 2017Pitching a new idea within your company oemba-may 19, 2017
Pitching a new idea within your company oemba-may 19, 2017
sandhibhide
 
Modeling waves in random media the 3 d case egolf-howell-bhide03201984
Modeling waves in random media the 3 d case egolf-howell-bhide03201984Modeling waves in random media the 3 d case egolf-howell-bhide03201984
Modeling waves in random media the 3 d case egolf-howell-bhide03201984
sandhibhide
 
Sandhi bhide intel semicon west 2012
Sandhi bhide intel semicon west 2012Sandhi bhide intel semicon west 2012
Sandhi bhide intel semicon west 2012
sandhibhide
 
Monetizing the iot by Sandhiprakash Bhide generic-01-24-2017
Monetizing the iot by Sandhiprakash Bhide generic-01-24-2017Monetizing the iot by Sandhiprakash Bhide generic-01-24-2017
Monetizing the iot by Sandhiprakash Bhide generic-01-24-2017
sandhibhide
 
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
sandhibhide
 
TSensorSummit-Emerging IOT Usages & Apps for Trillion+ Sensors-Bhide-Oct25-20...
TSensorSummit-Emerging IOT Usages & Apps for Trillion+ Sensors-Bhide-Oct25-20...TSensorSummit-Emerging IOT Usages & Apps for Trillion+ Sensors-Bhide-Oct25-20...
TSensorSummit-Emerging IOT Usages & Apps for Trillion+ Sensors-Bhide-Oct25-20...sandhibhide
 
Minn 2016 Industry 4.0 Presentation Sandhi Bhide (09-22-2016)
Minn 2016 Industry 4.0 Presentation Sandhi Bhide (09-22-2016)Minn 2016 Industry 4.0 Presentation Sandhi Bhide (09-22-2016)
Minn 2016 Industry 4.0 Presentation Sandhi Bhide (09-22-2016)sandhibhide
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)sandhibhide
 

More from sandhibhide (15)

Taking innovations to product reality using nav principles
Taking innovations to product reality using nav principlesTaking innovations to product reality using nav principles
Taking innovations to product reality using nav principles
 
Digital transformation and application of iot to healthcare
Digital transformation and application of iot to healthcareDigital transformation and application of iot to healthcare
Digital transformation and application of iot to healthcare
 
Presentation to vishwakarma07242013
Presentation to vishwakarma07242013Presentation to vishwakarma07242013
Presentation to vishwakarma07242013
 
T sensor summit-emerging iot usages & apps for trillion+ sensors-sandhi b...
T sensor summit-emerging iot usages & apps for trillion+ sensors-sandhi b...T sensor summit-emerging iot usages & apps for trillion+ sensors-sandhi b...
T sensor summit-emerging iot usages & apps for trillion+ sensors-sandhi b...
 
T sensor tokyo japan-panel discussion- sandhi bhide-feb21, 2014
T sensor tokyo japan-panel discussion- sandhi bhide-feb21, 2014T sensor tokyo japan-panel discussion- sandhi bhide-feb21, 2014
T sensor tokyo japan-panel discussion- sandhi bhide-feb21, 2014
 
Wyoming technology business conference sandhi bhide, may 13, 2015
Wyoming technology business conference sandhi bhide, may 13, 2015Wyoming technology business conference sandhi bhide, may 13, 2015
Wyoming technology business conference sandhi bhide, may 13, 2015
 
Smart cities and the internet of things 2015 - Sandhiprakash Bhide
Smart cities and the internet of things  2015 - Sandhiprakash BhideSmart cities and the internet of things  2015 - Sandhiprakash Bhide
Smart cities and the internet of things 2015 - Sandhiprakash Bhide
 
Pitching a new idea within your company oemba-may 19, 2017
Pitching a new idea within your company oemba-may 19, 2017Pitching a new idea within your company oemba-may 19, 2017
Pitching a new idea within your company oemba-may 19, 2017
 
Modeling waves in random media the 3 d case egolf-howell-bhide03201984
Modeling waves in random media the 3 d case egolf-howell-bhide03201984Modeling waves in random media the 3 d case egolf-howell-bhide03201984
Modeling waves in random media the 3 d case egolf-howell-bhide03201984
 
Sandhi bhide intel semicon west 2012
Sandhi bhide intel semicon west 2012Sandhi bhide intel semicon west 2012
Sandhi bhide intel semicon west 2012
 
Monetizing the iot by Sandhiprakash Bhide generic-01-24-2017
Monetizing the iot by Sandhiprakash Bhide generic-01-24-2017Monetizing the iot by Sandhiprakash Bhide generic-01-24-2017
Monetizing the iot by Sandhiprakash Bhide generic-01-24-2017
 
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
 
TSensorSummit-Emerging IOT Usages & Apps for Trillion+ Sensors-Bhide-Oct25-20...
TSensorSummit-Emerging IOT Usages & Apps for Trillion+ Sensors-Bhide-Oct25-20...TSensorSummit-Emerging IOT Usages & Apps for Trillion+ Sensors-Bhide-Oct25-20...
TSensorSummit-Emerging IOT Usages & Apps for Trillion+ Sensors-Bhide-Oct25-20...
 
Minn 2016 Industry 4.0 Presentation Sandhi Bhide (09-22-2016)
Minn 2016 Industry 4.0 Presentation Sandhi Bhide (09-22-2016)Minn 2016 Industry 4.0 Presentation Sandhi Bhide (09-22-2016)
Minn 2016 Industry 4.0 Presentation Sandhi Bhide (09-22-2016)
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 

Tsensors - Munich Sept. 15-17, 2014 - Sandhi Bhide-Samani

  • 1. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 . Raj Samani, EMEA CTO McAfee Sandhiprakash Bhide, Director of Innovation, Future IOT Solutions, Application Ready Platform Division, IOT Group Building a secure future Cybersecurity and the Internet of Things
  • 2. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 The Connected Home – The Last Decade 2
  • 3. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Typical Connected Home, Year 2000 3 20002000
  • 4. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Typical Connected Home, Year 2000 4
  • 5. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Typical Connected Home, Year 2000 5
  • 6. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Typical Connected Home, Year 2000 6
  • 7. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Typical Connected Home, Year 2000 7 20132013
  • 8. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Typical Connected Home, Year 2000 8
  • 9. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Typical Connected Home, Year 2000 9
  • 10. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Typical Connected Home, Year 2000 10
  • 11. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 11 50B Devices will connect to Internet by the end of the decade. They are unprotected and can be hacked  loss of economic value & loss of innocence (opt-in w/o knowing consequences)
  • 12. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 New Security Threats to Personal IOT Devices 12 Baby Monitor: Hacker takes over baby monitor and shouts obscenities at sleeping child. ABC. 13 Aug 2013) Fridge sending out spam after web attack compromised gadgets. One of > than 100K devices used in spam campaign. (BBC News. Jan 2014) “Wearable Computing Equals New Security Risks”, (InformationWeek. 13 Jan 2013) Medical Devices: We’re starting to attach medical devices to electronic health records, and they’re not secure.' (Healthcare IT News. May 2013) Credit Card Information System: “Target Confirms Point-of-Sale Malware Was Used in Attack” (Security Week. 13 Jan 2014)
  • 13. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 What is security and implications of not having security? 13
  • 14. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Anonymized data may not be as anonymous as is believed. Or it may be now, but not in the future 14 How To Track Vehicles Using Speed Data Alone Carmakers keep data on drivers' locations FTC Hearing IoT Privacy Concerns Connected Home Invasion: The Methods Car insurance companies reduce the cost of insurance by gathering data about a customer's driving practices. Report finds automakers keeping info about driver’s location. Owners can’t demand that info is destroyed Anyone concerned about privacy would be well advised to weigh in on this before the issue is taken over. No incentive to secure products. With resources better off spending on the features that consumers want
  • 15. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Data Storage requirements May 16, 2016 15
  • 16. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Security Connected May 16, 2016 16
  • 17. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 User’s Perspective of Security Depends end user and the app 17 Person remains anonymous unless opted-in Privacy Release of sensitive/ personal info without consent SafetyData Protection Does not cause any harm to people Data safe from theft or alteration Identity TRUST
  • 18. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Security necessarily segments the IOT market • Different usages require different security mechanisms • Cost sensitivity implies different security controls for different IOT segments, i.e., smart meters Three types of security technical issues for IOT devices • How to secure communications? • How to detect and recover from malware? • How to defend the physical security of low cost devices? IOT Security
  • 19. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Sensor Security Challenge #1 Software-based sensor attack rates rising • Sensor data left unprotected: 1. By APIs; 2. In system memory (buffers) • Once access to sensor data is obtained, information can be directly or indirectly inferred Source: TapLogger: Inferring User Inputs on Smartphone Touchscreens Using On-board Motion Sensors, WiSec’12, April, 2012. http://www.cse.psu.edu/~szhu/papers/taplogger.pdf Source: PlaceRaider: Virtual Theft in Physical Spaces with Smartphones, Sept 27, 2012. http://arxiv.org/pdf/1209.5982v1.pdf
  • 20. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Sensor Security Challenge #2 • Users can’t tell if sensors are on/off and cannot control use • Sensor data can be faked -- not certified as authentic --allowing attacks on sensor-data-based uses
  • 21. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 1. How do we keep the credentials provisioned in IoT devices secret from attackers with physical access to the device? • Important for infrastructure IoT devices but perhaps not for personal devices 2. How do we detect IOT Device being tampered? • Most IoT designs today assume device functionality is immutable 3. What market segments require device hardening from physical attack (e.g., will vandalism be common in infrastructure devices)? Sensor Security Challenge #3
  • 22. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 1. Sensor data is protected at the source and remains secure during processing. 2. Provide user an easy to use environment with policies to control sensor data processing and use. 3. Address problem in a way that is scalable (platform & sensor types) Protected Sensor Data Goals
  • 23. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 What about today? May 16, 2016 23 Security. Unlike PC-based SCADA systems that are vulnerable to virus and malware attacks, our system is housed on cloud based servers. These servers are overseen by highly skilled technicians negating the need for anti-virus updates and continuous security vulnerability patches required by PC-based solutions
  • 24. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 For more information • White Paper: http://www.mcafee.com/hk/resources/white- papers/wp-smart-grid-cyber-security.pdf @Raj_Samani & @CyberGridBook
  • 25. . Intel Corporation, Sandhiprakash (Sandhi) Bhide, Raj Samani, Tsensor Summit, Sept. 15-17, 2014 Q&A