SlideShare a Scribd company logo
1 of 37
Download to read offline
Securing the Internet of 
Things 
Mark Horowitz 
Stanford School of Engineering 
 
1
It's Worse Than You Think 
Secure Internet of Things 
3
Secure Internet of Things 
Our Goal 
• Embark on a 5-year research project to secure the 
Internet of Things 
▶ Collaboration between Stanford, Berkeley, and Michigan 
• Rethink building IoT systems from the ground up 
▶ Systems, cryptography, applications, analytics, networks, 
hardware, software, HCI 
• Data security: novel cryptography that enables 
analytics on confidential data 
• System security: a software framework for safe 
and secure IoT applications 
4
Secure Internet of Things 
Outline 
• What is the Internet of Things? 
• Why IoT security is so hard 
• What we plan to do about it 
5
The Internet of Things 
Secure Internet of Things 
6
Internet(s) of Things 
Secure Internet of Things 
7 
Networked 
Devices 
Tens/person 
Uncontrolled Environment 
Unlicensed spectrum 
Convenience 
Powered 
WiFi/802.11 
TCP/IP 
IEEE/IETF 
Personal Area 
Networks 
Tens/person 
Personal environment 
Unlicensed spectrum 
Instrumentation 
Fashion vs. function 
Bluetooth, BLE 
3G/LTE 
3GPP/IEEE 
Home Area 
Networks 
Hundreds/person 
Uncontrolled Environment 
Unlicensed spectrum 
Convenience 
Consumer requirements 
ZigBee, Z-Wave 
6lowpan, RPL 
IETF/ZigBee/private 
Industrial 
Automation 
Thousands/person 
Controlled Environment 
High reliability 
Control networks 
Industrial requirements 
WirelessHART, 802.15.4 
6tsch, RPL 
IEEE/IIC/IETF
Internet(s) of Things 
Secure Internet of Things 
8 
Networked 
Devices 
Tens/person 
Uncontrolled Environment 
Unlicensed spectrum 
Convenience 
Powered 
WiFi/802.11 
TCP/IP 
IEEE/IETF 
Personal Area 
Networks 
Tens/person 
Personal environment 
Unlicensed spectrum 
Instrumentation 
Fashion vs. function 
Bluetooth, BLE 
3G/LTE 
3GPP/IEEE 
Home Area 
Networks 
Hundreds/person 
Uncontrolled Environment 
Unlicensed spectrum 
Convenience 
Consumer requirements 
ZigBee, Z-Wave 
6lowpan, RPL 
IETF/ZigBee/private 
Industrial 
Automation 
Thousands/person 
Controlled Environment 
High reliability 
Control networks 
Industrial requirements 
WirelessHART, 802.15.4 
6tsch, RPL 
IEEE/IIC/IETF
IoT: MGC Architecture 
Secure Internet of Things 9
IoT: MGC Architecture 
eMbedded 
devices 
Secure Internet of Things 10
eMbedded 
devices 
Secure Internet of Things 
Gateways 
11 
IoT: MGC Architecture 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi
ZigBee, 
ZWave, 
Bluetooth, 
Secure Internet of Things 
WiFi 
3G/4G, 
TCP/IP 
Gateways 
Cloud 
12 
IoT: MGC Architecture 
eMbedded 
devices
IoT: MGC Architecture 
ZigBee, 
ZWave, 
Bluetooth, 
Secure Internet of Things 
WiFi 
3G/4G, 
TCP/IP 
eMbedded 
devices 
Gateways 
Cloud 
13 User device
IoT: MGC Architecture 
embedded C 
(ARM, avr, msp430) 
Secure Internet of Things 
14 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP
IoT: MGC Architecture 
embedded C 
(ARM, avr, msp430) 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Obj-C/C++, Java, 
Swift, Javascript/HTML 
Secure Internet of Things 15
IoT: MGC Architecture 
3G/4G, 
TCP/IP 
Ruby/Rails, 
Python/Django, 
J2EE, PHP, Node.js 
Obj-C/C++, Java, 
Swift, Javascript/HTML 
embedded C 
(ARM, avr, msp430) 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
Secure Internet of Things 16
IoT Security is Hard 
Secure Internet of Things 
3G/4G, 
TCP/IP 
Ruby/Rails, 
Python/Django, 
J2EE, PHP, Node.js 
Obj-C/C++, Java, 
Swift, Javascript/HTML 
embedded C 
(ARM, avr, msp430) 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
Secure Internet of Things 23 
• Complex, distributed systems 
▶ 103-106 differences in resources across tiers 
▶ Many languages, OSes, and networks 
▶ Specialized hardware 
• Just developing applications is hard 
• Securing them is even harder 
▶ Enormous attack surface 
▶ Reasoning across hardware, software, languages, devices, etc. 
▶ What are the threats and attack models? 
• Valuable data: personal, location, presence 
• Rush to development + hard ➔ avoid, deal later 
17
18 
What We're Going To 
Do About it
Secure Internet of Things 
Two Goals 
19 
1.Research and define new cryptographic 
computational models for secure data analytics 
and actuation on enormous streams of real-time 
data from embedded systems. 
2.Research and implement a secure, open source 
hardware/software framework that makes it easy 
to quickly build Internet of Things applications that 
use these new computational models.
Two Kinds of Security 
Secure Internet of Things 
20 
• Data security: data collected and processed by 
IoT applications remains safe 
▶ Home occupancy 
▶ Medical data 
▶ Presence/location 
• System security: elements of MGC architecture 
are hard to compromise 
▶ eMbedded devices 
▶ Gateways 
▶ Cloud systems 
▶ End applications
Secure Internet of Things 
Data Security 
• Security limits what you (or an attacker) can do 
• What do IoT applications need to do? 
▶ Generate data samples 
▶ Process/filter these samples 
▶ Analytics on streams of data, combined with historical data 
▶ Produce results for end applications to view 
• Goal: end-to-end security 
▶ Embedded devices generate encrypted data 
▶ Only end applications can fully decrypt and view data 
▶ Gateways and cloud operate on data without knowing what it is 
21
End-to-End Security 
Secure Internet of Things 
22 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 23
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 23
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 23
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 23
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 23
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 23
End-to-End Security 
ZigBee, 
ZWave, 
Bluetooth, 
WiFi 
3G/4G, 
TCP/IP 
Data 
Secure Internet of Things 24
End-to-End Security 
• Sensing device samples data, encrypts it 
• Each processing stage can decrypt or operate on 
encrypted data (increases storage requirements, 
limits potential operations) 
• Possible that only end user can fully view data 
data encrypted encrypted data 
Secure Internet of Things 
25
Homomorphic Encryption 
Secure Internet of Things 
(Gentry, 2009) 
• Take a sensor value S, encrypt it to be Se 
• It is possible to perform arbitrary computations on Se 
▶ But 1,000,000 slower than computations on S 
• So confidential analytics possible, but not yet practical 
▶ But can be fast for specific computations (e.g., addition) 
26
New Computational Models 
• Is it possible for devices to compute aggregate 
statistics without revealing their own data? 
▶ You’re in the 85th percentile for saving water today! 
▶ Your house consumed 120% of its average energy today 
• Is it possible to compute complex analytics? 
• Need new cryptographic computation models 
▶ Support computations that IoT applications need 
•)DFXOWZRUNLQJLQWKLVDUHD 
▶ Christopher Ré on analytics 
▶ Dan Boneh on cryptographic computational models 
Secure Internet of Things 
27
Secure Internet of Things 
Two Goals 
28 
1.Research and define new cryptographic 
computational models for secure data analytics 
and actuation on enormous streams of real-time 
data from embedded systems. 
2.Research and implement a secure, open source 
framework that makes it easy to quickly build 
Internet of Things applications that use these new 
computational models.
Building an Application 
• Write a data processing pipeline 
▶ Consists of a set of Models, describing data as it is stored 
▶ Transforms move data between Models 
▶ Instances of Models are bound to devices 
▶ Views can display Models 
▶ Controllers determine how data moves to Transforms 
10Hz ! 
Sampling! 
Secure Internet of Things 
29 
Motion! 
Sensor! Gateway! PC/Server! App/Web! 
Recent! 
History! 
Activity! 
Long! 
History! 
Behavior! 
Analytics,! 
Suggestions! 
Health! 
Views! 
Controllers! 
Models and! 
Transforms! 
Recent! 
History! 
Activity! 
Alarm! Schedule! 
security and privacy !
Secure Internet of Things 
Code Generation 
• Framework generates (working) skeleton code for 
entire pipeline 
▶ All Models, Transforms, and Controllers are written in a 
platform-independent language 
▶ Views are device specific (although many are HTML/JS) 
• Developer can modify this generated code 
▶ Framework detects if modifications violate pipeline description 
▶ E.g., data types, information leakage, encryption 
▶ Generated code compiles down to device OS/system 
•)DFXOWZRUNLQJLQWKLVDUHD 
▶ David Mazières: software abstractions for security 
▶3KLO/HYLV: 5DYHO software VVWHP 
30
The Internet of Things 
• Networking is one of the hardest development 
challenges in IoT applications 
▶ Ultra-low power protocols 
▶ Difficult link layers (4G, BLE) 
▶ Protocol stack mismatches 
▶ Data packing/unpacking 
• Framework handles this automatically 
▶ Novel network algorithms 
•)DFXOWZRUNLQJLQWKLVDUHD 
▶ Keith Winstein, reliability in challenged networks 
▶ Prabal Dutta, low power wireless 
Secure Internet of Things 
31
Software-defined Hardware 
• Hardware (boards, chips, power) is a daunting 
challenge to software developers 
▶ It easier to modify something than create it from scratch 
• The data processing pipeline is sufficient 
information to specify a basic embedded device 
▶ Sensors, networking, storage, processing needed 
•)DFXOWZRUNLQJLQWKLVDUHD 
▶ Mark Horowitz: DXWRPDWLQJFRQVWUDLQHGKDUGZDUHGHVLJQ 
▶ Prabal Dutta: embedded device design 
▶ Björn Hartmann: prototyping new applications 
Secure Internet of Things 
32
Secure Internet of Things 
Making It Easy 
• If it's hard to use, people will work around it 
▶ Set password to password 
▶ Just store data in the clear 
• Must understand development model 
▶ Embrace modification, incorporation, low barrier to entry 
▶ Do so such that prototypes can transition to production 
•)DFXOWZRUNLQJLQWKLVDUHD 
▶ Björn Hartmann: prototyping new applications 
33

More Related Content

What's hot

Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the EnterpriseDaniel Miessler
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamAmit Rohatgi
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay KumarOWASP Delhi
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsDesign World
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prustyamarprusty
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of ThingsRishabh Sharma
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTWSO2
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 

What's hot (20)

Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 

Viewers also liked

Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...
Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...
Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...AWS Germany
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...APNIC
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsJeff Katz
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
APrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of ThingsAPrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of ThingsAPNIC
 
Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Hannes Tschofenig
 
Connectivity for Smart Home IoT - Brad Kayton
Connectivity for Smart Home IoT - Brad KaytonConnectivity for Smart Home IoT - Brad Kayton
Connectivity for Smart Home IoT - Brad KaytonWithTheBest
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iotST_World
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSukumar Nayak
 
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)MicheleNati
 
Internet of things - zigbee network function
Internet of things - zigbee network functionInternet of things - zigbee network function
Internet of things - zigbee network functionNEEVEE Technologies
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 

Viewers also liked (17)

Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...
Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...
Internet der Ingenieure - reale und virtuelle Welten verschmelzen - AWS IoT W...
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
 
Challenges of the io t v1
Challenges of the io t v1Challenges of the io t v1
Challenges of the io t v1
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
APrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of ThingsAPrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of Things
 
Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0
 
Connectivity for Smart Home IoT - Brad Kayton
Connectivity for Smart Home IoT - Brad KaytonConnectivity for Smart Home IoT - Brad Kayton
Connectivity for Smart Home IoT - Brad Kayton
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
 
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
 
Internet of things - zigbee network function
Internet of things - zigbee network functionInternet of things - zigbee network function
Internet of things - zigbee network function
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 

Similar to Mark Horowitz - Stanford Engineering - Securing the Internet of Things

CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxssuserfb92ae
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot Aymeric Weinbach
 
The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...Adam Doyle
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)milemadinah
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014Brian Knopf
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computingsairamgoud16
 
Introduction to Internet of Things.pdf
Introduction to Internet of Things.pdfIntroduction to Internet of Things.pdf
Introduction to Internet of Things.pdfGVNSK Sravya
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network SecurityIRJET Journal
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesThe IOT Academy
 
The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017Jian-Hong Pan
 
Vibro box sitel midih-presentation oc2
Vibro box sitel midih-presentation oc2Vibro box sitel midih-presentation oc2
Vibro box sitel midih-presentation oc2MIDIH_EU
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...FBK CREATE-NET
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
Introduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basicsIntroduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basicsJaco Bester
 
Internet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatiInternet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatinabati
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture LayerMarcus Maneja
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 

Similar to Mark Horowitz - Stanford Engineering - Securing the Internet of Things (20)

CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot
 
The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Introduction to Internet of Things.pdf
Introduction to Internet of Things.pdfIntroduction to Internet of Things.pdf
Introduction to Internet of Things.pdf
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017
 
Vibro box sitel midih-presentation oc2
Vibro box sitel midih-presentation oc2Vibro box sitel midih-presentation oc2
Vibro box sitel midih-presentation oc2
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
Introduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basicsIntroduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basics
 
Internet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatiInternet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabati
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 

More from Stanford School of Engineering

Amin Arbabian - Stanford Engineering - Internet of Things as Connected Intell...
Amin Arbabian - Stanford Engineering - Internet of Things as Connected Intell...Amin Arbabian - Stanford Engineering - Internet of Things as Connected Intell...
Amin Arbabian - Stanford Engineering - Internet of Things as Connected Intell...Stanford School of Engineering
 
The Internet of Everything: Tom Lee, Stanford School of Engineering
The Internet of Everything:  Tom Lee, Stanford School of EngineeringThe Internet of Everything:  Tom Lee, Stanford School of Engineering
The Internet of Everything: Tom Lee, Stanford School of EngineeringStanford School of Engineering
 
Turbulence and Computing: Beauty and the Beast - Assistant Professor Gianluca...
Turbulence and Computing: Beauty and the Beast - Assistant Professor Gianluca...Turbulence and Computing: Beauty and the Beast - Assistant Professor Gianluca...
Turbulence and Computing: Beauty and the Beast - Assistant Professor Gianluca...Stanford School of Engineering
 
Lights, Nano, Action! - Assistant Professor Jennifer Dionne
Lights, Nano, Action! - Assistant Professor Jennifer DionneLights, Nano, Action! - Assistant Professor Jennifer Dionne
Lights, Nano, Action! - Assistant Professor Jennifer DionneStanford School of Engineering
 
Green Engineering 101: Building a Sustainable Planet, Michael Lepech, Stanfor...
Green Engineering 101: Building a Sustainable Planet, Michael Lepech, Stanfor...Green Engineering 101: Building a Sustainable Planet, Michael Lepech, Stanfor...
Green Engineering 101: Building a Sustainable Planet, Michael Lepech, Stanfor...Stanford School of Engineering
 
A Wide Open World of Social Networking: Monica Lam, Stanford Engineering
A Wide Open World of Social Networking: Monica Lam, Stanford EngineeringA Wide Open World of Social Networking: Monica Lam, Stanford Engineering
A Wide Open World of Social Networking: Monica Lam, Stanford EngineeringStanford School of Engineering
 
Sowing Social Seeds: Voice Technology Connects India's Farmers - Scott Klemme...
Sowing Social Seeds: Voice Technology Connects India's Farmers - Scott Klemme...Sowing Social Seeds: Voice Technology Connects India's Farmers - Scott Klemme...
Sowing Social Seeds: Voice Technology Connects India's Farmers - Scott Klemme...Stanford School of Engineering
 
Biotic Games: Interactive Microbiology - Ingmar Riedel-Kruse, Stanford Engine...
Biotic Games: Interactive Microbiology - Ingmar Riedel-Kruse, Stanford Engine...Biotic Games: Interactive Microbiology - Ingmar Riedel-Kruse, Stanford Engine...
Biotic Games: Interactive Microbiology - Ingmar Riedel-Kruse, Stanford Engine...Stanford School of Engineering
 
Synthetic Biology: The next generation of biotechnology - Christina Smolke, S...
Synthetic Biology: The next generation of biotechnology - Christina Smolke, S...Synthetic Biology: The next generation of biotechnology - Christina Smolke, S...
Synthetic Biology: The next generation of biotechnology - Christina Smolke, S...Stanford School of Engineering
 
Changing the World through Innovation and Engineering - Judy Estrin, CEO JLab...
Changing the World through Innovation and Engineering - Judy Estrin, CEO JLab...Changing the World through Innovation and Engineering - Judy Estrin, CEO JLab...
Changing the World through Innovation and Engineering - Judy Estrin, CEO JLab...Stanford School of Engineering
 

More from Stanford School of Engineering (13)

Amin Arbabian - Stanford Engineering - Internet of Things as Connected Intell...
Amin Arbabian - Stanford Engineering - Internet of Things as Connected Intell...Amin Arbabian - Stanford Engineering - Internet of Things as Connected Intell...
Amin Arbabian - Stanford Engineering - Internet of Things as Connected Intell...
 
The Internet of Everything: Tom Lee, Stanford School of Engineering
The Internet of Everything:  Tom Lee, Stanford School of EngineeringThe Internet of Everything:  Tom Lee, Stanford School of Engineering
The Internet of Everything: Tom Lee, Stanford School of Engineering
 
Turbulence and Computing: Beauty and the Beast - Assistant Professor Gianluca...
Turbulence and Computing: Beauty and the Beast - Assistant Professor Gianluca...Turbulence and Computing: Beauty and the Beast - Assistant Professor Gianluca...
Turbulence and Computing: Beauty and the Beast - Assistant Professor Gianluca...
 
Lights, Nano, Action! - Assistant Professor Jennifer Dionne
Lights, Nano, Action! - Assistant Professor Jennifer DionneLights, Nano, Action! - Assistant Professor Jennifer Dionne
Lights, Nano, Action! - Assistant Professor Jennifer Dionne
 
Fiber Optics - Window on Human Biology: Olav Solgaard
Fiber Optics - Window on Human Biology:  Olav SolgaardFiber Optics - Window on Human Biology:  Olav Solgaard
Fiber Optics - Window on Human Biology: Olav Solgaard
 
The Wonders of Wireless: Phil Levis
The Wonders of Wireless: Phil LevisThe Wonders of Wireless: Phil Levis
The Wonders of Wireless: Phil Levis
 
Some Mathematics of Sailing: Margot Gerritsen
Some Mathematics of Sailing: Margot GerritsenSome Mathematics of Sailing: Margot Gerritsen
Some Mathematics of Sailing: Margot Gerritsen
 
Green Engineering 101: Building a Sustainable Planet, Michael Lepech, Stanfor...
Green Engineering 101: Building a Sustainable Planet, Michael Lepech, Stanfor...Green Engineering 101: Building a Sustainable Planet, Michael Lepech, Stanfor...
Green Engineering 101: Building a Sustainable Planet, Michael Lepech, Stanfor...
 
A Wide Open World of Social Networking: Monica Lam, Stanford Engineering
A Wide Open World of Social Networking: Monica Lam, Stanford EngineeringA Wide Open World of Social Networking: Monica Lam, Stanford Engineering
A Wide Open World of Social Networking: Monica Lam, Stanford Engineering
 
Sowing Social Seeds: Voice Technology Connects India's Farmers - Scott Klemme...
Sowing Social Seeds: Voice Technology Connects India's Farmers - Scott Klemme...Sowing Social Seeds: Voice Technology Connects India's Farmers - Scott Klemme...
Sowing Social Seeds: Voice Technology Connects India's Farmers - Scott Klemme...
 
Biotic Games: Interactive Microbiology - Ingmar Riedel-Kruse, Stanford Engine...
Biotic Games: Interactive Microbiology - Ingmar Riedel-Kruse, Stanford Engine...Biotic Games: Interactive Microbiology - Ingmar Riedel-Kruse, Stanford Engine...
Biotic Games: Interactive Microbiology - Ingmar Riedel-Kruse, Stanford Engine...
 
Synthetic Biology: The next generation of biotechnology - Christina Smolke, S...
Synthetic Biology: The next generation of biotechnology - Christina Smolke, S...Synthetic Biology: The next generation of biotechnology - Christina Smolke, S...
Synthetic Biology: The next generation of biotechnology - Christina Smolke, S...
 
Changing the World through Innovation and Engineering - Judy Estrin, CEO JLab...
Changing the World through Innovation and Engineering - Judy Estrin, CEO JLab...Changing the World through Innovation and Engineering - Judy Estrin, CEO JLab...
Changing the World through Innovation and Engineering - Judy Estrin, CEO JLab...
 

Recently uploaded

System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 

Recently uploaded (20)

System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 

Mark Horowitz - Stanford Engineering - Securing the Internet of Things

  • 1. Securing the Internet of Things Mark Horowitz Stanford School of Engineering 1
  • 2. It's Worse Than You Think Secure Internet of Things 3
  • 3. Secure Internet of Things Our Goal • Embark on a 5-year research project to secure the Internet of Things ▶ Collaboration between Stanford, Berkeley, and Michigan • Rethink building IoT systems from the ground up ▶ Systems, cryptography, applications, analytics, networks, hardware, software, HCI • Data security: novel cryptography that enables analytics on confidential data • System security: a software framework for safe and secure IoT applications 4
  • 4. Secure Internet of Things Outline • What is the Internet of Things? • Why IoT security is so hard • What we plan to do about it 5
  • 5. The Internet of Things Secure Internet of Things 6
  • 6. Internet(s) of Things Secure Internet of Things 7 Networked Devices Tens/person Uncontrolled Environment Unlicensed spectrum Convenience Powered WiFi/802.11 TCP/IP IEEE/IETF Personal Area Networks Tens/person Personal environment Unlicensed spectrum Instrumentation Fashion vs. function Bluetooth, BLE 3G/LTE 3GPP/IEEE Home Area Networks Hundreds/person Uncontrolled Environment Unlicensed spectrum Convenience Consumer requirements ZigBee, Z-Wave 6lowpan, RPL IETF/ZigBee/private Industrial Automation Thousands/person Controlled Environment High reliability Control networks Industrial requirements WirelessHART, 802.15.4 6tsch, RPL IEEE/IIC/IETF
  • 7. Internet(s) of Things Secure Internet of Things 8 Networked Devices Tens/person Uncontrolled Environment Unlicensed spectrum Convenience Powered WiFi/802.11 TCP/IP IEEE/IETF Personal Area Networks Tens/person Personal environment Unlicensed spectrum Instrumentation Fashion vs. function Bluetooth, BLE 3G/LTE 3GPP/IEEE Home Area Networks Hundreds/person Uncontrolled Environment Unlicensed spectrum Convenience Consumer requirements ZigBee, Z-Wave 6lowpan, RPL IETF/ZigBee/private Industrial Automation Thousands/person Controlled Environment High reliability Control networks Industrial requirements WirelessHART, 802.15.4 6tsch, RPL IEEE/IIC/IETF
  • 8. IoT: MGC Architecture Secure Internet of Things 9
  • 9. IoT: MGC Architecture eMbedded devices Secure Internet of Things 10
  • 10. eMbedded devices Secure Internet of Things Gateways 11 IoT: MGC Architecture ZigBee, ZWave, Bluetooth, WiFi
  • 11. ZigBee, ZWave, Bluetooth, Secure Internet of Things WiFi 3G/4G, TCP/IP Gateways Cloud 12 IoT: MGC Architecture eMbedded devices
  • 12. IoT: MGC Architecture ZigBee, ZWave, Bluetooth, Secure Internet of Things WiFi 3G/4G, TCP/IP eMbedded devices Gateways Cloud 13 User device
  • 13. IoT: MGC Architecture embedded C (ARM, avr, msp430) Secure Internet of Things 14 ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP
  • 14. IoT: MGC Architecture embedded C (ARM, avr, msp430) ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Obj-C/C++, Java, Swift, Javascript/HTML Secure Internet of Things 15
  • 15. IoT: MGC Architecture 3G/4G, TCP/IP Ruby/Rails, Python/Django, J2EE, PHP, Node.js Obj-C/C++, Java, Swift, Javascript/HTML embedded C (ARM, avr, msp430) ZigBee, ZWave, Bluetooth, WiFi Secure Internet of Things 16
  • 16. IoT Security is Hard Secure Internet of Things 3G/4G, TCP/IP Ruby/Rails, Python/Django, J2EE, PHP, Node.js Obj-C/C++, Java, Swift, Javascript/HTML embedded C (ARM, avr, msp430) ZigBee, ZWave, Bluetooth, WiFi Secure Internet of Things 23 • Complex, distributed systems ▶ 103-106 differences in resources across tiers ▶ Many languages, OSes, and networks ▶ Specialized hardware • Just developing applications is hard • Securing them is even harder ▶ Enormous attack surface ▶ Reasoning across hardware, software, languages, devices, etc. ▶ What are the threats and attack models? • Valuable data: personal, location, presence • Rush to development + hard ➔ avoid, deal later 17
  • 17. 18 What We're Going To Do About it
  • 18. Secure Internet of Things Two Goals 19 1.Research and define new cryptographic computational models for secure data analytics and actuation on enormous streams of real-time data from embedded systems. 2.Research and implement a secure, open source hardware/software framework that makes it easy to quickly build Internet of Things applications that use these new computational models.
  • 19. Two Kinds of Security Secure Internet of Things 20 • Data security: data collected and processed by IoT applications remains safe ▶ Home occupancy ▶ Medical data ▶ Presence/location • System security: elements of MGC architecture are hard to compromise ▶ eMbedded devices ▶ Gateways ▶ Cloud systems ▶ End applications
  • 20. Secure Internet of Things Data Security • Security limits what you (or an attacker) can do • What do IoT applications need to do? ▶ Generate data samples ▶ Process/filter these samples ▶ Analytics on streams of data, combined with historical data ▶ Produce results for end applications to view • Goal: end-to-end security ▶ Embedded devices generate encrypted data ▶ Only end applications can fully decrypt and view data ▶ Gateways and cloud operate on data without knowing what it is 21
  • 21. End-to-End Security Secure Internet of Things 22 ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data
  • 22. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 23
  • 23. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 23
  • 24. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 23
  • 25. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 23
  • 26. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 23
  • 27. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 23
  • 28. End-to-End Security ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Data Secure Internet of Things 24
  • 29. End-to-End Security • Sensing device samples data, encrypts it • Each processing stage can decrypt or operate on encrypted data (increases storage requirements, limits potential operations) • Possible that only end user can fully view data data encrypted encrypted data Secure Internet of Things 25
  • 30. Homomorphic Encryption Secure Internet of Things (Gentry, 2009) • Take a sensor value S, encrypt it to be Se • It is possible to perform arbitrary computations on Se ▶ But 1,000,000 slower than computations on S • So confidential analytics possible, but not yet practical ▶ But can be fast for specific computations (e.g., addition) 26
  • 31. New Computational Models • Is it possible for devices to compute aggregate statistics without revealing their own data? ▶ You’re in the 85th percentile for saving water today! ▶ Your house consumed 120% of its average energy today • Is it possible to compute complex analytics? • Need new cryptographic computation models ▶ Support computations that IoT applications need •)DFXOWZRUNLQJLQWKLVDUHD ▶ Christopher Ré on analytics ▶ Dan Boneh on cryptographic computational models Secure Internet of Things 27
  • 32. Secure Internet of Things Two Goals 28 1.Research and define new cryptographic computational models for secure data analytics and actuation on enormous streams of real-time data from embedded systems. 2.Research and implement a secure, open source framework that makes it easy to quickly build Internet of Things applications that use these new computational models.
  • 33. Building an Application • Write a data processing pipeline ▶ Consists of a set of Models, describing data as it is stored ▶ Transforms move data between Models ▶ Instances of Models are bound to devices ▶ Views can display Models ▶ Controllers determine how data moves to Transforms 10Hz ! Sampling! Secure Internet of Things 29 Motion! Sensor! Gateway! PC/Server! App/Web! Recent! History! Activity! Long! History! Behavior! Analytics,! Suggestions! Health! Views! Controllers! Models and! Transforms! Recent! History! Activity! Alarm! Schedule! security and privacy !
  • 34. Secure Internet of Things Code Generation • Framework generates (working) skeleton code for entire pipeline ▶ All Models, Transforms, and Controllers are written in a platform-independent language ▶ Views are device specific (although many are HTML/JS) • Developer can modify this generated code ▶ Framework detects if modifications violate pipeline description ▶ E.g., data types, information leakage, encryption ▶ Generated code compiles down to device OS/system •)DFXOWZRUNLQJLQWKLVDUHD ▶ David Mazières: software abstractions for security ▶3KLO/HYLV: 5DYHO software VVWHP 30
  • 35. The Internet of Things • Networking is one of the hardest development challenges in IoT applications ▶ Ultra-low power protocols ▶ Difficult link layers (4G, BLE) ▶ Protocol stack mismatches ▶ Data packing/unpacking • Framework handles this automatically ▶ Novel network algorithms •)DFXOWZRUNLQJLQWKLVDUHD ▶ Keith Winstein, reliability in challenged networks ▶ Prabal Dutta, low power wireless Secure Internet of Things 31
  • 36. Software-defined Hardware • Hardware (boards, chips, power) is a daunting challenge to software developers ▶ It easier to modify something than create it from scratch • The data processing pipeline is sufficient information to specify a basic embedded device ▶ Sensors, networking, storage, processing needed •)DFXOWZRUNLQJLQWKLVDUHD ▶ Mark Horowitz: DXWRPDWLQJFRQVWUDLQHGKDUGZDUHGHVLJQ ▶ Prabal Dutta: embedded device design ▶ Björn Hartmann: prototyping new applications Secure Internet of Things 32
  • 37. Secure Internet of Things Making It Easy • If it's hard to use, people will work around it ▶ Set password to password ▶ Just store data in the clear • Must understand development model ▶ Embrace modification, incorporation, low barrier to entry ▶ Do so such that prototypes can transition to production •)DFXOWZRUNLQJLQWKLVDUHD ▶ Björn Hartmann: prototyping new applications 33