SlideShare a Scribd company logo
1 of 44
Download to read offline
SRGE 2018 Internet of Things workshop – Cairo University, 12 July 2018
1
The Shift from Social Network Security to
the Social IOT Security
Presented By
Dr. Mohamed Torky
PHD in Computer Science (2018), Faculty of Science, Menoufyia University, Egypt.
Member in Scientific Research Group in Egypt (SRGE)
Agenda
2
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
Agenda
3
1
• Introduction.
2
• Privacy Protection in Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
7/13/2018
1- Introduction
Internet of People (IOP) Attacks
5
(IOP)
Agenda
6
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
7/13/2018
2- Privacy Protection of Internet of People (IOP)
Hacking Privacy of IOP
Fake Profiles Attacks Social Bot Attacks
2.1. IOP Privacy Protection against Fake Profile Attacks
(Fake Profile Recognizer (FPR) Model)
8
9
Users’ Identity Generator (UIG) Model
2.1. IOP Privacy Protection against Fake Profile Attacks
(Fake Profile Recognizer (FPR) Model)
10
Identity Verifier Machine (IVM) Model
2.1. IOP Privacy Protection against Fake Profile Attacks
(Fake Profile Recognizer (FPR) Model)
7/13/2018
2-4 Results
Intelligent system and it's application, FCI, Sat 3-12-2016
12
AccuracyF-MeasureRecallPrecisionDataset
03.9501.9594.5395.49Facebook
94.7794.4794.2795.22Google+
94.9394.928.9495.05Twitter
94.9194.8994.5395.25AVG
AUCFNRFall-OutSpecificityDataset
06.9547.547.453.95Facebook
94.785.734.7395.27Google+
94.955.24.9395.07Twitter
94.935.474.7195.29AVG
Results
13
Fig 1 Fig 2
Comparison Results
14
Fig 1 Fig 2
15
16
2.2. IOP Privacy Protection against Social Bot Attacks
(Necklace CAPTCHA Mechanism)
Classical Necklace Graph Modified Necklace Graph
Social Bot
CAPTCHA
17
2.2. IOP Privacy Protection against Social Bot Attacks
(Necklace CAPTCHA Mechanism)
7/13/2018
3-2 Usability Results
19
Effectiveness Results Solution Time Results
3-3 Security Results
20
Fig 1 Fig 2
3-4 Comparison Results
21
3-4 Comparison Results
22
23
24
From IOP to Internet of Things (IOT) !!
IOP IOT
Agenda
25
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
26
According to The Social Internet of Things (SIOT)–
when social networks meet the IOT: Concept,
architecture and network characterization, the term
SIOT (Social internet of Things) has a different
definition from what you might expect. In short, it
doesn’t refer to smart objects that are connected to
social networks,, but rather to intelligent devices that
are able to create social relationships among them,
fact that leads to social networks of their own.
3. Social Internet of Things (SIOT) is the Next Technology.
27
(1) Parental Object Relationship (POR):
is typically established among homogenous
objects - same generation devices made by
the same manufacturer.
3.1 Types of SIOT Relationships
28
(2) Co-location Object Relationship (C-LOR)
Established among heterogeneous or homogenous
objects that share the same environment or goal.
3.1 Types of SIOT Relationships
29
(3) Co-work Object Relationship (C-WOR):
Established between two or more devices whose
functionalities are combined to accomplish a
common goal. This type of relationship occurs
between objects that either need to touch each other
to achieve that goal, or need to be in close proximity
of one another
3.1 Types of SIOT Relationships
30
(4) Ownership Object Relationship (OOR):
Occur between the smart devices of the same user
(smartphones, portable media players, video game
consoles, etc.)
3.1 Types of SIOT Relationships
31
(4) Social Object Relationship (SOR):
Occur when the devices come in touch whenever
their owners meet. Smart objects belonging to
friends, classmates, coworkers and companions
could establish this type of relationship.
3.1 Types of SIOT Relationships
32
IOT is Dramatically Enlarging
the Attack Surface, So, How to
Secure SIOT Platforms, is an
Open Challenge !!
Agenda
33
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
34
4 .1. SIOT Attacks Surface
Insecure Mobile Interface
Insecure Web Interface
Lack of Encryption Protocol
Insecure Cloud Interface
Insecure Network services
Insecure Software/ Firmware
Poor Physical Security
35
4 .2. SIOT is a Popular Platforms for Attackers
Computational capabilities, Increasing capabilities
of microcomputers and Internet Connection make
IOT devices a popular attack tool to Hackers:
IOT Device can be used to:
• Send Same Messages
• Coordinate an attack against a critical
Infrastructure
• Serve a Malware
• Work as a entry point within a corporate network
36
4 .3. SIOT Attack Patterns
Botnets are already a major Threats…..
• IOT device can send a ThingBot within the
Social Internet of Things.
• Infected device can harm all connected
devices in SIOT network.
• Number of ThingBot software against smart
routers, TVs, network attached storage
devices, gaming devices are increasingly
growing.
Oops….. My refrigerator is sending Spam
Messages
37
4 .3. SIOT Attack Patterns
A Linux worm (Linux.Darlloz) and Spike Botnets is
designed to target IOT Devices through DDoS…..
• Generate random IP Addresses and attempt to
use commonly used credentials to log into the
target device in SIOT .
• It send HTTP posts requests specially crafted ,
once compromised the target device , it
downloads the worm from a remote server and
start searching other target devices in SIOT
network.
• Once the worm has compromised a device, it kills
off access to any telnet service running .
Symantec detected Linux.Darlloz attack as
the first IOT malware
38
4 .3. SIOT Attack Patterns
Hacking Smart watches…..
• Data sent between the Smart watches and an
android mobile phone can be intercepted.
• Easy to crack the authentication of smart watches
by brute force attacks as it use six digit PIN
Hacking Wearable Devices
39
4 .3. SIOT Attack Patterns
Hacking Smart Meters…..
• In Spain, millions of smart meters are susceptible to
cyber attacks due to lack of proper security controls.
• Attacker can exploit the lack of security controls to
perform fraudulent activities with smart meters in
SIOT network
• Smart meters is designed with poor protected
Credentials.
• Attackers can modify device ID to impersonate other
customer or use the smart meter to launch attacks
against power network or harm other devices in the
SIOT of the houses or firms.
Smart meters can be hacked to hit the
National power network
Agenda
40
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
41
 More Than 50 billion Devices by 2020.
 More Than 6 connected devices per
person.
 By 2020 IOT will be more than the size
of smart phones , PC, Tablets,
Connected Cars and wearable devices.
 We are rapidly evolving toward a world
where every thing will be connected
 Number of security attacks will increase.
 Privacy and security must be addressed
with untraditional mechanisms to secure
large SIOT networks.
 PKI-based solution can be used to
improve IOT and SIOT security.
5. Evolution of SIOT: Today, Tomorrow
42
43
Acknowledgment
44

More Related Content

What's hot

Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
 
Review on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT SecurityReview on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT Securityijtsrd
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoTJinia Bhowmik
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Dr. Michael Agbaje
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoTExosite
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTBarcoding, Inc.
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of ThingsTushar Sharma
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmIJSRED
 

What's hot (19)

Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 
Review on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT SecurityReview on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT Security
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoT
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of Things
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
Iot Market Readiness
Iot Market ReadinessIot Market Readiness
Iot Market Readiness
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 

Similar to The shift from social network security to the social iot security

A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfImXaib
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...AIRCC Publishing Corporation
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...AIRCC Publishing Corporation
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsDodi Saputra
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon Bob Snyder
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksIJECEIAES
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
 

Similar to The shift from social network security to the social iot security (20)

mypresentation.pdf
mypresentation.pdfmypresentation.pdf
mypresentation.pdf
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Internet of Things.
Internet of Things.Internet of Things.
Internet of Things.
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
 

More from Aboul Ella Hassanien

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdfAboul Ella Hassanien
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...Aboul Ella Hassanien
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...Aboul Ella Hassanien
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...Aboul Ella Hassanien
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxAboul Ella Hassanien
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdfAboul Ella Hassanien
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات Aboul Ella Hassanien
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي Aboul Ella Hassanien
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى Aboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنيةAboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنيةAboul Ella Hassanien
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفالAboul Ella Hassanien
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالAboul Ella Hassanien
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىAboul Ella Hassanien
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية Aboul Ella Hassanien
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...Aboul Ella Hassanien
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةAboul Ella Hassanien
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى Aboul Ella Hassanien
 

More from Aboul Ella Hassanien (20)

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptx
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdf
 
SRGE photo.pdf
SRGE photo.pdfSRGE photo.pdf
SRGE photo.pdf
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفال
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفال
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
 
اقتصاد ميتافيرس
اقتصاد ميتافيرساقتصاد ميتافيرس
اقتصاد ميتافيرس
 

Recently uploaded

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

The shift from social network security to the social iot security

  • 1. SRGE 2018 Internet of Things workshop – Cairo University, 12 July 2018 1 The Shift from Social Network Security to the Social IOT Security Presented By Dr. Mohamed Torky PHD in Computer Science (2018), Faculty of Science, Menoufyia University, Egypt. Member in Scientific Research Group in Egypt (SRGE)
  • 2. Agenda 2 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 3. Agenda 3 1 • Introduction. 2 • Privacy Protection in Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 5. Internet of People (IOP) Attacks 5 (IOP)
  • 6. Agenda 6 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 7. 7/13/2018 2- Privacy Protection of Internet of People (IOP) Hacking Privacy of IOP Fake Profiles Attacks Social Bot Attacks
  • 8. 2.1. IOP Privacy Protection against Fake Profile Attacks (Fake Profile Recognizer (FPR) Model) 8
  • 9. 9 Users’ Identity Generator (UIG) Model 2.1. IOP Privacy Protection against Fake Profile Attacks (Fake Profile Recognizer (FPR) Model)
  • 10. 10 Identity Verifier Machine (IVM) Model 2.1. IOP Privacy Protection against Fake Profile Attacks (Fake Profile Recognizer (FPR) Model)
  • 12. 2-4 Results Intelligent system and it's application, FCI, Sat 3-12-2016 12 AccuracyF-MeasureRecallPrecisionDataset 03.9501.9594.5395.49Facebook 94.7794.4794.2795.22Google+ 94.9394.928.9495.05Twitter 94.9194.8994.5395.25AVG AUCFNRFall-OutSpecificityDataset 06.9547.547.453.95Facebook 94.785.734.7395.27Google+ 94.955.24.9395.07Twitter 94.935.474.7195.29AVG
  • 15. 15
  • 16. 16 2.2. IOP Privacy Protection against Social Bot Attacks (Necklace CAPTCHA Mechanism) Classical Necklace Graph Modified Necklace Graph Social Bot CAPTCHA
  • 17. 17 2.2. IOP Privacy Protection against Social Bot Attacks (Necklace CAPTCHA Mechanism)
  • 19. 3-2 Usability Results 19 Effectiveness Results Solution Time Results
  • 23. 23
  • 24. 24 From IOP to Internet of Things (IOT) !! IOP IOT
  • 25. Agenda 25 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 26. 26 According to The Social Internet of Things (SIOT)– when social networks meet the IOT: Concept, architecture and network characterization, the term SIOT (Social internet of Things) has a different definition from what you might expect. In short, it doesn’t refer to smart objects that are connected to social networks,, but rather to intelligent devices that are able to create social relationships among them, fact that leads to social networks of their own. 3. Social Internet of Things (SIOT) is the Next Technology.
  • 27. 27 (1) Parental Object Relationship (POR): is typically established among homogenous objects - same generation devices made by the same manufacturer. 3.1 Types of SIOT Relationships
  • 28. 28 (2) Co-location Object Relationship (C-LOR) Established among heterogeneous or homogenous objects that share the same environment or goal. 3.1 Types of SIOT Relationships
  • 29. 29 (3) Co-work Object Relationship (C-WOR): Established between two or more devices whose functionalities are combined to accomplish a common goal. This type of relationship occurs between objects that either need to touch each other to achieve that goal, or need to be in close proximity of one another 3.1 Types of SIOT Relationships
  • 30. 30 (4) Ownership Object Relationship (OOR): Occur between the smart devices of the same user (smartphones, portable media players, video game consoles, etc.) 3.1 Types of SIOT Relationships
  • 31. 31 (4) Social Object Relationship (SOR): Occur when the devices come in touch whenever their owners meet. Smart objects belonging to friends, classmates, coworkers and companions could establish this type of relationship. 3.1 Types of SIOT Relationships
  • 32. 32 IOT is Dramatically Enlarging the Attack Surface, So, How to Secure SIOT Platforms, is an Open Challenge !!
  • 33. Agenda 33 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 34. 34 4 .1. SIOT Attacks Surface Insecure Mobile Interface Insecure Web Interface Lack of Encryption Protocol Insecure Cloud Interface Insecure Network services Insecure Software/ Firmware Poor Physical Security
  • 35. 35 4 .2. SIOT is a Popular Platforms for Attackers Computational capabilities, Increasing capabilities of microcomputers and Internet Connection make IOT devices a popular attack tool to Hackers: IOT Device can be used to: • Send Same Messages • Coordinate an attack against a critical Infrastructure • Serve a Malware • Work as a entry point within a corporate network
  • 36. 36 4 .3. SIOT Attack Patterns Botnets are already a major Threats….. • IOT device can send a ThingBot within the Social Internet of Things. • Infected device can harm all connected devices in SIOT network. • Number of ThingBot software against smart routers, TVs, network attached storage devices, gaming devices are increasingly growing. Oops….. My refrigerator is sending Spam Messages
  • 37. 37 4 .3. SIOT Attack Patterns A Linux worm (Linux.Darlloz) and Spike Botnets is designed to target IOT Devices through DDoS….. • Generate random IP Addresses and attempt to use commonly used credentials to log into the target device in SIOT . • It send HTTP posts requests specially crafted , once compromised the target device , it downloads the worm from a remote server and start searching other target devices in SIOT network. • Once the worm has compromised a device, it kills off access to any telnet service running . Symantec detected Linux.Darlloz attack as the first IOT malware
  • 38. 38 4 .3. SIOT Attack Patterns Hacking Smart watches….. • Data sent between the Smart watches and an android mobile phone can be intercepted. • Easy to crack the authentication of smart watches by brute force attacks as it use six digit PIN Hacking Wearable Devices
  • 39. 39 4 .3. SIOT Attack Patterns Hacking Smart Meters….. • In Spain, millions of smart meters are susceptible to cyber attacks due to lack of proper security controls. • Attacker can exploit the lack of security controls to perform fraudulent activities with smart meters in SIOT network • Smart meters is designed with poor protected Credentials. • Attackers can modify device ID to impersonate other customer or use the smart meter to launch attacks against power network or harm other devices in the SIOT of the houses or firms. Smart meters can be hacked to hit the National power network
  • 40. Agenda 40 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 41. 41  More Than 50 billion Devices by 2020.  More Than 6 connected devices per person.  By 2020 IOT will be more than the size of smart phones , PC, Tablets, Connected Cars and wearable devices.  We are rapidly evolving toward a world where every thing will be connected  Number of security attacks will increase.  Privacy and security must be addressed with untraditional mechanisms to secure large SIOT networks.  PKI-based solution can be used to improve IOT and SIOT security. 5. Evolution of SIOT: Today, Tomorrow
  • 42. 42
  • 44. 44