SlideShare a Scribd company logo
1 of 25
Download to read offline
Wireless Security and the Internet of Things




                                                                 Nick Hunn
                                                       WiFore Consulting




              Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
The Legal Requirement


   In the EU proposal for the revision of the R&TTE directive, it states that:


                                                   Article 3

   Radio equipment shall be so constructed that it complies with the following essential
   requirements:

   (c) radio equipment incorporates safeguards to ensure that the personal data and
   privacy of the user and of the subscriber are protected;



https://www.gov.uk/government/consultations/radio-equipment-directive-proposal#download
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0584:FIN:EN:PDF




                                    Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
Some examples of what has been hacked



           •   Pacemakers
           •   Insulin Pumps
           •   Weir Gates
           •   Set Top Boxes
           •   Fitness Monitors
           •   Smart Meters




                 Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
The Consequences of Hacking

     •   People know where you are.
     •   People  know  where  you  aren’t.
     •   People  know  who  you’re  with.
     •   People  know  what  you’re  doing.
     •   People  think  you’re  someone  else.
     •   Your lights go out.
     •   Your bills go up.
     •   Things stop working.
     •   Things start working differently.
     •   Your business fails.


                    Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
What is the Internet of Things?

     Some are born with Sensors,
     Some acquire sensors, and
     Some have sensors thrust upon them.




           Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
Machine to Machine (M2M)




                       Many current M2M deployments are cellular


               Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
Appcessories and The Quantified Self




Consumer growth is most likely to come from the world of Appcessories.


                                Find out more about Appcessories at http://www.nickhunn.com/2ubiquity



                       Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
The Smart Home




It will take time coming, but homes will get monitored.



                         Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
To 40 billion and Beyond




                Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
The  missing  25  billion  may  be  “Desirable”

                                    Annual Sales of Appcessories
            14,000



            12,000



            10,000



             8,000
 Millions




             6,000



             4,000



             2,000



               -
                     2014    2015         2016           2017           2018           2019           2020
 Source: WiFore Consulting




                                       Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
Which gives 40 billion opportunities to
  steal  or  corrupt  someone’s  data.

          Every second of every day




             Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
Addressing Security




  Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
The Topology of the Internet of Things




                                                                                                     dB
                                                                                                    & App
  Sensors




  Where cellular is Integrated with sensors it will remove
  some steps in the chain.



                         Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
The Simple Case of the Smart Thermostat



   Senso
                            Gateway                            Router
     r




   Boiler                                                         PC
                                PCT
   Switch


      Installer Supplied                                      Customer Supplied




                   Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
The Backend Environment


  Phone
                                                                                            External
                                              Web Interface                                 Service
                                                                                            Provider




Router
                                       I/O                                               Application
                                     Manager                        dB                   & Analysis
          3rd Party Data
          MDMS, etc.


                                     Device                    Security
 PC                                 Manager                    Manager


                                             Service Provision



                    Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
And  don’t  forget  the  Weak  Link…




                                                                            Phone
                                                                           PC




                  Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
“Elements  of  Security”

• Most IoT architectures consist of a collection of separate,
  connected elements, each of which may have their own
  security.
• Systems  composed  of  “Off  the  Shelf”  components  
  generally have different levels of security, which need to
  be stitched into a whole. This can be trickier than
  designing from scratch.
• The order of installation can be critical. But
  guaranteeing the correct order may be impossible.
• Existing security of wireless may be a false security.



                    Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
The AES128 Datasheet
       Misconception

“But  I’m  using  Wi-Fi / Bluetooth / ZigBee.
         That’s  got  security  built  in.    
  Why  do  I  need  to  do  anything  else?”




            Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
Practical Considerations




     Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
Build a Security Model

•   You MUST develop a complete end-to-end security model. Just
    implementing Wireless security is not enough.
•   Write  an  RMADS  as  soon  as  you’ve  done  your  first  draft  of  system  
    architecture, and then reiterate both until they work and are
    consistent.
•   Consider device management, end to end authentication and link key
    management.


                                                                dB
                                                               & App


          BTS / WPA2                      TLS                                TLS / PW
              Encryption / Authentication



                            Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
Design for Autonomous Operation


                 X                                      X
                 X                                      X
                                                                                      dB
                                                                                     & App




  Think about what happens when:
  • Internal or external comms links or the web service fail
  • The mobile phone goes out of the house
  • The gateway / router fails or is replaced
  • The consumer moves home
  The consumer expects their HVAC and lights to continue working



                         Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
Security & Usability

• No security makes getting to 40 billion devices easy.
• High security makes it very difficult.

But…

• Major security failures scare customers and may kill the
  market altogether.

                            If the reaction to new security threats is
                            simplistically to add even stronger protection, then
                            the costs of that additional security will result in
                            M2M solutions that are not economically viable.
                                                                           Beecham Research 2013
                                                                                  www.beechamresearch.com



                    Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
And…

• Pairing remains the biggest problem for most wireless
  products, both in terms of usability and security.
• Many of these IoT & M2M products will have much longer
  lives than current consumer products. That means that new
  components will be added to the system and existing ones
  replaced. That is a security challenge.
• More security = more processing = shorter battery life.
• Make  sure  that  firmware  updates  don’t  compromise  the  
  security.    Or  that  the  security  model  doesn’t  prevent  them  
  being deployed.
• Remember that many of these devices may have NO user
  interface.




                           Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
But…

                                                                                   Annual Sales of Appcessories
                                                            14,000



                                                            12,000



                                                            10,000



                                                             8,000




                                                 Millions
                                                             6,000



                                                             4,000



                                                             2,000



                                                               -
                                                                     2014   2015        2016    2017     2018     2019   2020




 If we get it right, the market is five times bigger than the mobile phone
 market.    It’s  worth  getting  it  right.




                         Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
Questions?




Nick Hunn
CTO
mob: +44 7768 890 148
email: nick@wifore.com
web: www.wifore.com




                           www.wireless-book.com                             Creative Connectivity Blog:
                                                                                www.nickhunn.com




                         Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013

More Related Content

What's hot

Internetofthings 111021131418-phpapp01
Internetofthings 111021131418-phpapp01Internetofthings 111021131418-phpapp01
Internetofthings 111021131418-phpapp01saikiran dabre
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsDodi Saputra
 
Internet of things applications covering industrial domain
Internet of things applications covering industrial domainInternet of things applications covering industrial domain
Internet of things applications covering industrial domainDev Bhattacharya
 
Internet of things
Internet of thingsInternet of things
Internet of thingsSumanto Das
 
Introduction to internet of things
Introduction to internet of thingsIntroduction to internet of things
Introduction to internet of thingsBhargavi Padmaraju
 
Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)FabMinds
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]Sharpe Smith
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 
IoT project: best 30 ideas with cloud, raspberry pi, and arduino
IoT project: best 30 ideas with cloud, raspberry pi, and arduinoIoT project: best 30 ideas with cloud, raspberry pi, and arduino
IoT project: best 30 ideas with cloud, raspberry pi, and arduinoMarkMojumdar
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
Efficient power consumption in wireless communication
Efficient power consumption in wireless communicationEfficient power consumption in wireless communication
Efficient power consumption in wireless communicationNaresh Narayanan
 
Connected Personal Objects: Getting Intimate with the Internet of Things
Connected Personal Objects: Getting Intimate with the Internet of ThingsConnected Personal Objects: Getting Intimate with the Internet of Things
Connected Personal Objects: Getting Intimate with the Internet of ThingsGuthrie Dolin
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...journalBEEI
 
A brief history of how internet of things become a thing - onmywaytoiot
A brief history of how internet of things become a thing - onmywaytoiotA brief history of how internet of things become a thing - onmywaytoiot
A brief history of how internet of things become a thing - onmywaytoiotOn my way to IoT
 

What's hot (20)

Internetofthings 111021131418-phpapp01
Internetofthings 111021131418-phpapp01Internetofthings 111021131418-phpapp01
Internetofthings 111021131418-phpapp01
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things applications covering industrial domain
Internet of things applications covering industrial domainInternet of things applications covering industrial domain
Internet of things applications covering industrial domain
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Introduction to internet of things
Introduction to internet of thingsIntroduction to internet of things
Introduction to internet of things
 
Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
IoT project: best 30 ideas with cloud, raspberry pi, and arduino
IoT project: best 30 ideas with cloud, raspberry pi, and arduinoIoT project: best 30 ideas with cloud, raspberry pi, and arduino
IoT project: best 30 ideas with cloud, raspberry pi, and arduino
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Efficient power consumption in wireless communication
Efficient power consumption in wireless communicationEfficient power consumption in wireless communication
Efficient power consumption in wireless communication
 
The WideNoise Project
The WideNoise ProjectThe WideNoise Project
The WideNoise Project
 
Connected Personal Objects: Getting Intimate with the Internet of Things
Connected Personal Objects: Getting Intimate with the Internet of ThingsConnected Personal Objects: Getting Intimate with the Internet of Things
Connected Personal Objects: Getting Intimate with the Internet of Things
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
 
A brief history of how internet of things become a thing - onmywaytoiot
A brief history of how internet of things become a thing - onmywaytoiotA brief history of how internet of things become a thing - onmywaytoiot
A brief history of how internet of things become a thing - onmywaytoiot
 

Similar to Wireless security and the internet of things nick hunn

2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USACJ Boguszewski
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationIRJET Journal
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryChristian Glover Wilson
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IJNSA Journal
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTMd.Imtiaz Ahmed
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksWilliam Chipman
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyIRJET Journal
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...Brain IoT Project
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
 
Performance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedPerformance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedAlison Reed
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network SecurityIRJET Journal
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSIJNSA Journal
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsSymantec
 
Privacy aware analytics at edge using federated learning
Privacy aware analytics at edge using federated learningPrivacy aware analytics at edge using federated learning
Privacy aware analytics at edge using federated learningArindam Banerjee
 

Similar to Wireless security and the internet of things nick hunn (20)

2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
Performance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedPerformance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax Testbed
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
New world of Wireless
New world of WirelessNew world of Wireless
New world of Wireless
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
 
Privacy aware analytics at edge using federated learning
Privacy aware analytics at edge using federated learningPrivacy aware analytics at edge using federated learning
Privacy aware analytics at edge using federated learning
 

More from 3GDR

HorseTech Conference Cheltenham 15/16 March 2022
HorseTech Conference Cheltenham 15/16 March 2022HorseTech Conference Cheltenham 15/16 March 2022
HorseTech Conference Cheltenham 15/16 March 20223GDR
 
DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...
DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...
DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...3GDR
 
How would the Born Mobile redesign Medicine and the future role of the Doctor.
How would the Born Mobile redesign Medicine and the future role of the Doctor.How would the Born Mobile redesign Medicine and the future role of the Doctor.
How would the Born Mobile redesign Medicine and the future role of the Doctor.3GDR
 
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 20193GDR
 
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 20193GDR
 
Mobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered PatientsMobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered Patients3GDR
 
Mobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered PatientsMobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered Patients3GDR
 
The Future Role of the Doctor
The Future Role of the DoctorThe Future Role of the Doctor
The Future Role of the Doctor3GDR
 
How would the Born Mobile redesign Medicine
How would the Born Mobile redesign MedicineHow would the Born Mobile redesign Medicine
How would the Born Mobile redesign Medicine3GDR
 
Introduction to gdpr
Introduction to gdprIntroduction to gdpr
Introduction to gdpr3GDR
 
Irish HSE EHR strategic business case master briefing deck v1.4
Irish HSE EHR strategic business case master briefing deck v1.4Irish HSE EHR strategic business case master briefing deck v1.4
Irish HSE EHR strategic business case master briefing deck v1.43GDR
 
Alan Connor, eHealth Ireland
Alan Connor, eHealth IrelandAlan Connor, eHealth Ireland
Alan Connor, eHealth Ireland3GDR
 
Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)
Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)
Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)3GDR
 
Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)
Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)
Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)3GDR
 
Things you need to know about info governance to sell healthtech products int...
Things you need to know about info governance to sell healthtech products int...Things you need to know about info governance to sell healthtech products int...
Things you need to know about info governance to sell healthtech products int...3GDR
 
5G World: Better Networks for Better Healthcare
5G World: Better Networks for Better Healthcare 5G World: Better Networks for Better Healthcare
5G World: Better Networks for Better Healthcare 3GDR
 
Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...
Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...
Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...3GDR
 
Digital Health a call for Government Leadership and cooperation between ICT a...
Digital Health a call for Government Leadership and cooperation between ICT a...Digital Health a call for Government Leadership and cooperation between ICT a...
Digital Health a call for Government Leadership and cooperation between ICT a...3GDR
 
The importance of post-marketing registries for payers and regulators to mana...
The importance of post-marketing registries for payers and regulators to mana...The importance of post-marketing registries for payers and regulators to mana...
The importance of post-marketing registries for payers and regulators to mana...3GDR
 
Deriving more value from real world evidence to ensure timely access of medic...
Deriving more value from real world evidence to ensure timely access of medic...Deriving more value from real world evidence to ensure timely access of medic...
Deriving more value from real world evidence to ensure timely access of medic...3GDR
 

More from 3GDR (20)

HorseTech Conference Cheltenham 15/16 March 2022
HorseTech Conference Cheltenham 15/16 March 2022HorseTech Conference Cheltenham 15/16 March 2022
HorseTech Conference Cheltenham 15/16 March 2022
 
DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...
DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...
DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...
 
How would the Born Mobile redesign Medicine and the future role of the Doctor.
How would the Born Mobile redesign Medicine and the future role of the Doctor.How would the Born Mobile redesign Medicine and the future role of the Doctor.
How would the Born Mobile redesign Medicine and the future role of the Doctor.
 
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
 
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
 
Mobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered PatientsMobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered Patients
 
Mobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered PatientsMobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered Patients
 
The Future Role of the Doctor
The Future Role of the DoctorThe Future Role of the Doctor
The Future Role of the Doctor
 
How would the Born Mobile redesign Medicine
How would the Born Mobile redesign MedicineHow would the Born Mobile redesign Medicine
How would the Born Mobile redesign Medicine
 
Introduction to gdpr
Introduction to gdprIntroduction to gdpr
Introduction to gdpr
 
Irish HSE EHR strategic business case master briefing deck v1.4
Irish HSE EHR strategic business case master briefing deck v1.4Irish HSE EHR strategic business case master briefing deck v1.4
Irish HSE EHR strategic business case master briefing deck v1.4
 
Alan Connor, eHealth Ireland
Alan Connor, eHealth IrelandAlan Connor, eHealth Ireland
Alan Connor, eHealth Ireland
 
Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)
Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)
Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)
 
Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)
Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)
Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)
 
Things you need to know about info governance to sell healthtech products int...
Things you need to know about info governance to sell healthtech products int...Things you need to know about info governance to sell healthtech products int...
Things you need to know about info governance to sell healthtech products int...
 
5G World: Better Networks for Better Healthcare
5G World: Better Networks for Better Healthcare 5G World: Better Networks for Better Healthcare
5G World: Better Networks for Better Healthcare
 
Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...
Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...
Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...
 
Digital Health a call for Government Leadership and cooperation between ICT a...
Digital Health a call for Government Leadership and cooperation between ICT a...Digital Health a call for Government Leadership and cooperation between ICT a...
Digital Health a call for Government Leadership and cooperation between ICT a...
 
The importance of post-marketing registries for payers and regulators to mana...
The importance of post-marketing registries for payers and regulators to mana...The importance of post-marketing registries for payers and regulators to mana...
The importance of post-marketing registries for payers and regulators to mana...
 
Deriving more value from real world evidence to ensure timely access of medic...
Deriving more value from real world evidence to ensure timely access of medic...Deriving more value from real world evidence to ensure timely access of medic...
Deriving more value from real world evidence to ensure timely access of medic...
 

Wireless security and the internet of things nick hunn

  • 1. Wireless Security and the Internet of Things Nick Hunn WiFore Consulting Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 2. The Legal Requirement In the EU proposal for the revision of the R&TTE directive, it states that: Article 3 Radio equipment shall be so constructed that it complies with the following essential requirements: (c) radio equipment incorporates safeguards to ensure that the personal data and privacy of the user and of the subscriber are protected; https://www.gov.uk/government/consultations/radio-equipment-directive-proposal#download http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0584:FIN:EN:PDF Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 3. Some examples of what has been hacked • Pacemakers • Insulin Pumps • Weir Gates • Set Top Boxes • Fitness Monitors • Smart Meters Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 4. The Consequences of Hacking • People know where you are. • People  know  where  you  aren’t. • People  know  who  you’re  with. • People  know  what  you’re  doing. • People  think  you’re  someone  else. • Your lights go out. • Your bills go up. • Things stop working. • Things start working differently. • Your business fails. Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 5. What is the Internet of Things? Some are born with Sensors, Some acquire sensors, and Some have sensors thrust upon them. Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 6. Machine to Machine (M2M) Many current M2M deployments are cellular Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 7. Appcessories and The Quantified Self Consumer growth is most likely to come from the world of Appcessories. Find out more about Appcessories at http://www.nickhunn.com/2ubiquity Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 8. The Smart Home It will take time coming, but homes will get monitored. Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 9. To 40 billion and Beyond Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 10. The  missing  25  billion  may  be  “Desirable” Annual Sales of Appcessories 14,000 12,000 10,000 8,000 Millions 6,000 4,000 2,000 - 2014 2015 2016 2017 2018 2019 2020 Source: WiFore Consulting Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 11. Which gives 40 billion opportunities to steal  or  corrupt  someone’s  data. Every second of every day Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 12. Addressing Security Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 13. The Topology of the Internet of Things dB & App Sensors Where cellular is Integrated with sensors it will remove some steps in the chain. Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 14. The Simple Case of the Smart Thermostat Senso Gateway Router r Boiler PC PCT Switch Installer Supplied Customer Supplied Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 15. The Backend Environment Phone External Web Interface Service Provider Router I/O Application Manager dB & Analysis 3rd Party Data MDMS, etc. Device Security PC Manager Manager Service Provision Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 16. And  don’t  forget  the  Weak  Link… Phone PC Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 17. “Elements  of  Security” • Most IoT architectures consist of a collection of separate, connected elements, each of which may have their own security. • Systems  composed  of  “Off  the  Shelf”  components   generally have different levels of security, which need to be stitched into a whole. This can be trickier than designing from scratch. • The order of installation can be critical. But guaranteeing the correct order may be impossible. • Existing security of wireless may be a false security. Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 18. The AES128 Datasheet Misconception “But  I’m  using  Wi-Fi / Bluetooth / ZigBee. That’s  got  security  built  in.     Why  do  I  need  to  do  anything  else?” Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 19. Practical Considerations Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 20. Build a Security Model • You MUST develop a complete end-to-end security model. Just implementing Wireless security is not enough. • Write  an  RMADS  as  soon  as  you’ve  done  your  first  draft  of  system   architecture, and then reiterate both until they work and are consistent. • Consider device management, end to end authentication and link key management. dB & App BTS / WPA2 TLS TLS / PW Encryption / Authentication Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 21. Design for Autonomous Operation X X X X dB & App Think about what happens when: • Internal or external comms links or the web service fail • The mobile phone goes out of the house • The gateway / router fails or is replaced • The consumer moves home The consumer expects their HVAC and lights to continue working Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 22. Security & Usability • No security makes getting to 40 billion devices easy. • High security makes it very difficult. But… • Major security failures scare customers and may kill the market altogether. If the reaction to new security threats is simplistically to add even stronger protection, then the costs of that additional security will result in M2M solutions that are not economically viable. Beecham Research 2013 www.beechamresearch.com Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 23. And… • Pairing remains the biggest problem for most wireless products, both in terms of usability and security. • Many of these IoT & M2M products will have much longer lives than current consumer products. That means that new components will be added to the system and existing ones replaced. That is a security challenge. • More security = more processing = shorter battery life. • Make  sure  that  firmware  updates  don’t  compromise  the   security.    Or  that  the  security  model  doesn’t  prevent  them   being deployed. • Remember that many of these devices may have NO user interface. Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 24. But… Annual Sales of Appcessories 14,000 12,000 10,000 8,000 Millions 6,000 4,000 2,000 - 2014 2015 2016 2017 2018 2019 2020 If we get it right, the market is five times bigger than the mobile phone market.    It’s  worth  getting  it  right. Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013
  • 25. Questions? Nick Hunn CTO mob: +44 7768 890 148 email: nick@wifore.com web: www.wifore.com www.wireless-book.com Creative Connectivity Blog: www.nickhunn.com Wireless Security and the Internet of Things – Cambridge Wireless 18th April 2013