SlideShare a Scribd company logo
Franklin Heath Ltd
What Security Do You Need From
Low-Power Wide-Area Networks?
Craig Heath
@heathcr
Mobile360 – Privacy & Security
24 May 2017
© Franklin Heath Ltd c b CC BY 4.0
What Security Do You Need From
Low-Power Wide-Area Networks?
24 May 2017 2
 Why do You Need to Know?
 How do You Work it Out?
 What Features do You Need?
 Which LPWANs Suit You?
White Paper:
LPWA Technology
Security Comparison
franklinheath.co.uk/blog/
© Franklin Heath Ltd c b CC BY 4.0
Why do You Need to Know?
24 May 2017 3
 Low-Power WANs provide benefits for the Internet of Things:
 low BoM cost (← lower device complexity ?)
 extended coverage (← lower data rates ?)
 long battery life (← lower data throughput ?)
 Security features usually have costs, such as:
 more device complexity (→ higher BoM cost ?)
 higher data rates (→ reduced coverage ?)
 higher data throughput (→ reduced battery life ?)
 Trade-offs have to be managed
© Franklin Heath Ltd c b CC BY 4.0
How do You Work it Out?
24 May 2017 4
 You know your use case
 Who / what are the threats? Why?
 Consider the relevant risks:
 S poofing
 T ampering
 R epudiation
 I nformation Disclosure
 D enial of Service
 E levation of Privilege
© Franklin Heath Ltd c b CC BY 4.0
Example Use Case: Utility Metering
24 May 2017 5
 Example threats:
 Utility customer: wants to cheat to reduce their bills?
 Burglar: wants to know when the property is unoccupied?
 STRIDE (and resilience) risks:
 Spoofing (e.g. customer replaces device)
 Tampering (e.g. customer changes the readings sent)
 Information Disclosure (e.g. burglar sees when readings are low)
 Resilience (e.g. blackmail threat of disabling many meters)
(e.g. OTA update required for inaccessible meters)
© Franklin Heath Ltd c b CC BY 4.0
What Features do You Need?
24 May 2017 6
Spoofing Tampering Repudiation Information
Disclosure
Denial of
Service
Elevation of
Privilege
Resilience
Confidentiality 4 / 4
Integrity 1 / 3 2 / 3 1 / 3
Availability 1 / 1 1 / 1 1 / 1
Authentication 3 / 3 1 / 3
Authorization 1 / 1
Assurance 2 / 6 1 / 6 6 / 6
Renewability 2 / 2
© Franklin Heath Ltd c b CC BY 4.0
Utility Metering Example: 6 of 20 Features
24 May 2017 7
LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox
Identity Protection Yes Yes Yes Partial No
Device/Subscriber
Authentication
Subscriber
(opt. Device)
Subscriber
(opt. Device)
Subscriber
(opt. Device)
Either Device
Data Integrity Limited Optional Limited Limited Variable
Updatability
(Device)
Possible Possible Possible Limited No
Updatability
(Keys/Algorithms)
Optional Optional Optional Limited No
Class Break
Resistance
Yes Yes Yes Optional Yes
I
S
T
© Franklin Heath Ltd c b CC BY 4.0
Other Example Use Cases in our Report
24 May 2017 8
LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox
Smart Pallet Good Good * Adequate Good Poor
Smart Agriculture Good Good Good Adequate Adequate
Smart Street Lighting Adequate Good * Adequate Adequate * Adequate
Utility Metering Adequate * Good * Adequate * Adequate Poor
Domestic Smoke Detectors Good Good Good Adequate Adequate
Assessments marked * include some features which are optional to the service provider
© Franklin Heath Ltd c b CC BY 4.0
Thank You!
24 May 2017
craig@franklinheath.co.uk
@heathcr
@franklinheath
9
© Franklin Heath Ltd c b CC BY 3.024 May 2017 10
Backup Slides
© Franklin Heath Ltd c b CC BY 4.0
LPWAN Security Features (1/5)
24 May 2017 11
Confidentiality LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox
Identity Protection Yes Yes Yes Partial No
Data
Confidentiality
Yes Yes Optional Yes No
End-to-Middle
Security
No No Partial Yes No
Forward Secrecy No No No No No
I
I
I
I
© Franklin Heath Ltd c b CC BY 4.0
LPWAN Security Features (2/5)
24 May 2017 12
Integrity LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox
Data Integrity Limited Optional Limited Limited Variable
Control Integrity Yes Yes Optional Yes Unknown
Replay Protection Yes Optional Limited Yes Yes
T
S
T R
T RD
Availability LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox
Reliable Delivery Yes Yes Yes No No
© Franklin Heath Ltd c b CC BY 4.0
LPWAN Security Features (3/5)
24 May 2017 13
Authentication LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox
Globally Unique
Identifiers
Yes Yes Yes Optional Yes
Device/Subscriber
Authentication
Subscriber
(opt. Device)
Subscriber
(opt. Device)
Subscriber
(opt. Device)
Either Device
Network
Authentication
Yes Yes Yes Optional No
Authorisation LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox
Critical
Infrastructure Class
Yes Yes Yes No No
S
S
S
E
R
© Franklin Heath Ltd c b CC BY 4.0
LPWAN Security Features (4/5)
24 May 2017 14
Assurance LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox
Network Monitoring
and Filtering
Yes Yes Yes Limited
Monitoring
only
Key Provisioning
OTA
possible
OTA
possible
OTA
possible
OTA
possible
Not OTA
Algorithm
Negotiation
Yes Yes Yes No No
Class Break
Resistance
Yes Yes Yes Optional Yes
Certified
Equipment
Required Required Required Optional Required
IP Network Optional Optional Yes No No
DE
D
© Franklin Heath Ltd c b CC BY 4.0
LPWAN Security Features (5/5)
24 May 2017 15
Renewability LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox
Updatability
(Device)
Possible Possible Possible Limited No
Updatability
(Keys/Algorithms)
Optional Optional Optional Limited No

More Related Content

What's hot

Fortinet
FortinetFortinet
Bridgera enterprise IoT security
Bridgera enterprise IoT securityBridgera enterprise IoT security
Bridgera enterprise IoT security
Ron Pascuzzi
 
New world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter managementNew world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter management
Innovation Assured
 
New world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter managementNew world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter management
Innovation Assured
 
Cloud networking use cases with VNS3
Cloud networking use cases with VNS3Cloud networking use cases with VNS3
Cloud networking use cases with VNS3
Cohesive Networks
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
MITRE - ATT&CKcon
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystem
Mark Oakton
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
Robb Boyd
 
Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki
NetworkCollaborators
 
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software SolutionsBridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
Ron Pascuzzi
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
AirTight Networks
 
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
Nur Shiqim Chok
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
Forcepoint LLC
 
Innovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantageInnovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantage
Thibault Cantegrel
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Forcepoint LLC
 
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...
Cohesive Networks
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
NetworkCollaborators
 
Dominik Boszko - Krocząc doliną ciemności mikroserwisów się nie ulęknę
Dominik Boszko - Krocząc doliną ciemności mikroserwisów się nie ulęknęDominik Boszko - Krocząc doliną ciemności mikroserwisów się nie ulęknę
Dominik Boszko - Krocząc doliną ciemności mikroserwisów się nie ulęknę
SegFaultConf
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
NetworkCollaborators
 

What's hot (20)

Fortinet
FortinetFortinet
Fortinet
 
Bridgera enterprise IoT security
Bridgera enterprise IoT securityBridgera enterprise IoT security
Bridgera enterprise IoT security
 
New world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter managementNew world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter management
 
New world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter managementNew world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter management
 
Cloud networking use cases with VNS3
Cloud networking use cases with VNS3Cloud networking use cases with VNS3
Cloud networking use cases with VNS3
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystem
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki
 
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software SolutionsBridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
 
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
 
Innovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantageInnovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantage
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
 
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
 
Dominik Boszko - Krocząc doliną ciemności mikroserwisów się nie ulęknę
Dominik Boszko - Krocząc doliną ciemności mikroserwisów się nie ulęknęDominik Boszko - Krocząc doliną ciemności mikroserwisów się nie ulęknę
Dominik Boszko - Krocząc doliną ciemności mikroserwisów się nie ulęknę
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 

Similar to What Security Do You Need From Low-Power Wide-Area Networks?

Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS Mitigation
Corero Network Security
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Cohesive Networks
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Canada
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
Cisco Canada
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Canada
 
Cisco Connect 2018 Malaysia - Innovation towards SP transformation
Cisco Connect 2018 Malaysia - Innovation towards SP transformationCisco Connect 2018 Malaysia - Innovation towards SP transformation
Cisco Connect 2018 Malaysia - Innovation towards SP transformation
NetworkCollaborators
 
Biz Model for pureLiFi
Biz Model for pureLiFiBiz Model for pureLiFi
Biz Model for pureLiFi
Jeffrey Funk Business Models
 
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center Assurance
Robb Boyd
 
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationCisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
NetworkCollaborators
 
Cloud Native 下的應用網路設計
Cloud Native 下的應用網路設計Cloud Native 下的應用網路設計
Cloud Native 下的應用網路設計
inwin stack
 
Compliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient MeshCompliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient Mesh
Christian Posta
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
NetworkCollaborators
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
SMAU
 
Welcome to the Multi-cloud world
Welcome to the Multi-cloud worldWelcome to the Multi-cloud world
Welcome to the Multi-cloud world
Lew Tucker
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
NetworkCollaborators
 
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki   let simple work for youCisco Connect Toronto 2017 - Cisco meraki   let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
Cisco Canada
 
XenDesktop Master Class - Virtualising Microsoft Lync - March 2015
XenDesktop Master Class - Virtualising Microsoft Lync - March 2015XenDesktop Master Class - Virtualising Microsoft Lync - March 2015
XenDesktop Master Class - Virtualising Microsoft Lync - March 2015
Lee Bushen
 
Fortinet Tanıtım
Fortinet TanıtımFortinet Tanıtım
Fortinet Tanıtım
Güney Bilişim
 

Similar to What Security Do You Need From Low-Power Wide-Area Networks? (20)

Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS Mitigation
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect 2018 Malaysia - Innovation towards SP transformation
Cisco Connect 2018 Malaysia - Innovation towards SP transformationCisco Connect 2018 Malaysia - Innovation towards SP transformation
Cisco Connect 2018 Malaysia - Innovation towards SP transformation
 
Biz Model for pureLiFi
Biz Model for pureLiFiBiz Model for pureLiFi
Biz Model for pureLiFi
 
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center Assurance
 
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationCisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
 
Cloud Native 下的應用網路設計
Cloud Native 下的應用網路設計Cloud Native 下的應用網路設計
Cloud Native 下的應用網路設計
 
Compliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient MeshCompliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient Mesh
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
Welcome to the Multi-cloud world
Welcome to the Multi-cloud worldWelcome to the Multi-cloud world
Welcome to the Multi-cloud world
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
 
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki   let simple work for youCisco Connect Toronto 2017 - Cisco meraki   let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
 
XenDesktop Master Class - Virtualising Microsoft Lync - March 2015
XenDesktop Master Class - Virtualising Microsoft Lync - March 2015XenDesktop Master Class - Virtualising Microsoft Lync - March 2015
XenDesktop Master Class - Virtualising Microsoft Lync - March 2015
 
Fortinet Tanıtım
Fortinet TanıtımFortinet Tanıtım
Fortinet Tanıtım
 

More from Craig Heath

DC4420 Bluetooth Security
DC4420 Bluetooth SecurityDC4420 Bluetooth Security
DC4420 Bluetooth Security
Craig Heath
 
The Future of Computer Security and Cybercrime
The Future of Computer Security and CybercrimeThe Future of Computer Security and Cybercrime
The Future of Computer Security and Cybercrime
Craig Heath
 
Smartphone Platform Security - What can we learn from Symbian?
Smartphone Platform Security - What can we learn from Symbian?Smartphone Platform Security - What can we learn from Symbian?
Smartphone Platform Security - What can we learn from Symbian?
Craig Heath
 
Security Lessons from Bletchley Park and Enigma
Security Lessons from Bletchley Park and EnigmaSecurity Lessons from Bletchley Park and Enigma
Security Lessons from Bletchley Park and Enigma
Craig Heath
 
Security Lessons from Bletchley Park and Enigma
Security Lessons from Bletchley Park and EnigmaSecurity Lessons from Bletchley Park and Enigma
Security Lessons from Bletchley Park and Enigma
Craig Heath
 
Fund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine SimulatorFund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine Simulator
Craig Heath
 
Mobile Security Sticks and Carrots
Mobile Security Sticks and CarrotsMobile Security Sticks and Carrots
Mobile Security Sticks and Carrots
Craig Heath
 
People Power in Your Pocket
People Power in Your PocketPeople Power in Your Pocket
People Power in Your Pocket
Craig Heath
 

More from Craig Heath (8)

DC4420 Bluetooth Security
DC4420 Bluetooth SecurityDC4420 Bluetooth Security
DC4420 Bluetooth Security
 
The Future of Computer Security and Cybercrime
The Future of Computer Security and CybercrimeThe Future of Computer Security and Cybercrime
The Future of Computer Security and Cybercrime
 
Smartphone Platform Security - What can we learn from Symbian?
Smartphone Platform Security - What can we learn from Symbian?Smartphone Platform Security - What can we learn from Symbian?
Smartphone Platform Security - What can we learn from Symbian?
 
Security Lessons from Bletchley Park and Enigma
Security Lessons from Bletchley Park and EnigmaSecurity Lessons from Bletchley Park and Enigma
Security Lessons from Bletchley Park and Enigma
 
Security Lessons from Bletchley Park and Enigma
Security Lessons from Bletchley Park and EnigmaSecurity Lessons from Bletchley Park and Enigma
Security Lessons from Bletchley Park and Enigma
 
Fund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine SimulatorFund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine Simulator
 
Mobile Security Sticks and Carrots
Mobile Security Sticks and CarrotsMobile Security Sticks and Carrots
Mobile Security Sticks and Carrots
 
People Power in Your Pocket
People Power in Your PocketPeople Power in Your Pocket
People Power in Your Pocket
 

What Security Do You Need From Low-Power Wide-Area Networks?

  • 1. Franklin Heath Ltd What Security Do You Need From Low-Power Wide-Area Networks? Craig Heath @heathcr Mobile360 – Privacy & Security 24 May 2017
  • 2. © Franklin Heath Ltd c b CC BY 4.0 What Security Do You Need From Low-Power Wide-Area Networks? 24 May 2017 2  Why do You Need to Know?  How do You Work it Out?  What Features do You Need?  Which LPWANs Suit You? White Paper: LPWA Technology Security Comparison franklinheath.co.uk/blog/
  • 3. © Franklin Heath Ltd c b CC BY 4.0 Why do You Need to Know? 24 May 2017 3  Low-Power WANs provide benefits for the Internet of Things:  low BoM cost (← lower device complexity ?)  extended coverage (← lower data rates ?)  long battery life (← lower data throughput ?)  Security features usually have costs, such as:  more device complexity (→ higher BoM cost ?)  higher data rates (→ reduced coverage ?)  higher data throughput (→ reduced battery life ?)  Trade-offs have to be managed
  • 4. © Franklin Heath Ltd c b CC BY 4.0 How do You Work it Out? 24 May 2017 4  You know your use case  Who / what are the threats? Why?  Consider the relevant risks:  S poofing  T ampering  R epudiation  I nformation Disclosure  D enial of Service  E levation of Privilege
  • 5. © Franklin Heath Ltd c b CC BY 4.0 Example Use Case: Utility Metering 24 May 2017 5  Example threats:  Utility customer: wants to cheat to reduce their bills?  Burglar: wants to know when the property is unoccupied?  STRIDE (and resilience) risks:  Spoofing (e.g. customer replaces device)  Tampering (e.g. customer changes the readings sent)  Information Disclosure (e.g. burglar sees when readings are low)  Resilience (e.g. blackmail threat of disabling many meters) (e.g. OTA update required for inaccessible meters)
  • 6. © Franklin Heath Ltd c b CC BY 4.0 What Features do You Need? 24 May 2017 6 Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of Privilege Resilience Confidentiality 4 / 4 Integrity 1 / 3 2 / 3 1 / 3 Availability 1 / 1 1 / 1 1 / 1 Authentication 3 / 3 1 / 3 Authorization 1 / 1 Assurance 2 / 6 1 / 6 6 / 6 Renewability 2 / 2
  • 7. © Franklin Heath Ltd c b CC BY 4.0 Utility Metering Example: 6 of 20 Features 24 May 2017 7 LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox Identity Protection Yes Yes Yes Partial No Device/Subscriber Authentication Subscriber (opt. Device) Subscriber (opt. Device) Subscriber (opt. Device) Either Device Data Integrity Limited Optional Limited Limited Variable Updatability (Device) Possible Possible Possible Limited No Updatability (Keys/Algorithms) Optional Optional Optional Limited No Class Break Resistance Yes Yes Yes Optional Yes I S T
  • 8. © Franklin Heath Ltd c b CC BY 4.0 Other Example Use Cases in our Report 24 May 2017 8 LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox Smart Pallet Good Good * Adequate Good Poor Smart Agriculture Good Good Good Adequate Adequate Smart Street Lighting Adequate Good * Adequate Adequate * Adequate Utility Metering Adequate * Good * Adequate * Adequate Poor Domestic Smoke Detectors Good Good Good Adequate Adequate Assessments marked * include some features which are optional to the service provider
  • 9. © Franklin Heath Ltd c b CC BY 4.0 Thank You! 24 May 2017 craig@franklinheath.co.uk @heathcr @franklinheath 9
  • 10. © Franklin Heath Ltd c b CC BY 3.024 May 2017 10 Backup Slides
  • 11. © Franklin Heath Ltd c b CC BY 4.0 LPWAN Security Features (1/5) 24 May 2017 11 Confidentiality LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox Identity Protection Yes Yes Yes Partial No Data Confidentiality Yes Yes Optional Yes No End-to-Middle Security No No Partial Yes No Forward Secrecy No No No No No I I I I
  • 12. © Franklin Heath Ltd c b CC BY 4.0 LPWAN Security Features (2/5) 24 May 2017 12 Integrity LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox Data Integrity Limited Optional Limited Limited Variable Control Integrity Yes Yes Optional Yes Unknown Replay Protection Yes Optional Limited Yes Yes T S T R T RD Availability LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox Reliable Delivery Yes Yes Yes No No
  • 13. © Franklin Heath Ltd c b CC BY 4.0 LPWAN Security Features (3/5) 24 May 2017 13 Authentication LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox Globally Unique Identifiers Yes Yes Yes Optional Yes Device/Subscriber Authentication Subscriber (opt. Device) Subscriber (opt. Device) Subscriber (opt. Device) Either Device Network Authentication Yes Yes Yes Optional No Authorisation LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox Critical Infrastructure Class Yes Yes Yes No No S S S E R
  • 14. © Franklin Heath Ltd c b CC BY 4.0 LPWAN Security Features (4/5) 24 May 2017 14 Assurance LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox Network Monitoring and Filtering Yes Yes Yes Limited Monitoring only Key Provisioning OTA possible OTA possible OTA possible OTA possible Not OTA Algorithm Negotiation Yes Yes Yes No No Class Break Resistance Yes Yes Yes Optional Yes Certified Equipment Required Required Required Optional Required IP Network Optional Optional Yes No No DE D
  • 15. © Franklin Heath Ltd c b CC BY 4.0 LPWAN Security Features (5/5) 24 May 2017 15 Renewability LTE-M NB-IoT EC-GSM-IoT LoRaWAN Sigfox Updatability (Device) Possible Possible Possible Limited No Updatability (Keys/Algorithms) Optional Optional Optional Limited No

Editor's Notes

  1. 1
  2. 2
  3. Security features may be omitted, or optional to network service provider, for different LPWAN technologies. Not simply a case of using the one with the best security – there isn’t a overall “best”.
  4. threats = “actors”; risks are how they might try to abuse your system design. Also need to consider how resilient the system needs to be.
  5. There are judgement calls involved here as to whether specific risks are sufficiently relevant and, in turn, how much resilience is required. This is why this part needs to be a business decision.
  6. This is the first point at which it’s appropriate to hand the responsibility over to a “security guy”. We looked at 20 individual features within these categories.
  7. We are only considering the features that a relevant for this particular use case (I, S, T from STRIDE, others for resilience) For this use case only Sigfox is being ruled out, the others depend on options.
  8. All are good for something, none are always good for everything (even NB-IoT depends on MNO options).
  9. Note that none implement forward secrecy, would have to be implemented at application layer.
  10. Note that Sigfox control integrity details have not been published.
  11. All these features are likely to affect resilience.
  12. All these features are likely to affect resilience.