Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Securing IoT devices

Securing an Intelligent Connected World.
Privacy & Security in a Connected World.

  • Login to see the comments

Securing IoT devices

  1. 1. Securing an Intelligent Connected World Hamdi Charef Computer Science Engineer Student 2015 Securing IoT Devices
  2. 2. Internet of Things to make Cities Smarter Cities around the world are becoming increasingly smarter and more connected to the Internet in an attempt to add convenience and ease to daily activities such as: -Smart street lights -Smart Public Transportation -Surveillance cameras -Traffic control System -Smart parking application -Smart Water and Energy Management
  3. 3. Smart Dustbins The bins recorded details of a very large devices (4,009,676 device) in the pockets of passers-by. If your Wi-Fi is on, your MAC address and movements can be tracked by the bins. The data is captured to see which shops you visit and how long you stay there, in order to serve up targeted adverts on screens on the sides of rubbish receptacles.
  4. 4. Secure Internet of Things is important -By 2020, there will be more than 45 Billion Internet-connected devices. -New risk and vulnerabilities will be associated with them. -Attacking easy like eavesdropping, DDos and tampering of network traffic -IoT complex and distributed systems -Contain valuable data: personal, location, presence  Security of Internet of Things (IoT) Can’t Be Ignored
  5. 5. Encryption for Internet of Things (IoT) MatrixSSL Tiny: Open source embedded SSL Make secure communications over the network. Simple integration Robust security PKI: Manage digital certificates for the IoT. Secure communications between IoT devices. Encryption, and data integrity Authentication, confidentiality
  6. 6. MILLLLLIONS of Devices Open to Attacks -There are at least 230 crypto keys are actively being used by more than 4 Million IoT devices. -580 unique private cryptographic keys for SSH and HTTPS are re-shared between multiple devices. -Insecure default configurations by vendors. -Automatic port forwarding via UPnP
  7. 7. Conclusion IoT infrastructure is still massively prone to cyber attacks An application or a firmware, must be verified through a chain of trust. Multi-layer security measures are needed for IoT devices