SlideShare a Scribd company logo
1 of 21
Download to read offline
IoT Security & Privacy Considerations
2016 Taiwan IGF
Kenny Huang, Ph.D. 黃勝雄博⼠
Executive Council Member, APNIC
huangksh@gmail.com
2016.06.17
2
source : The Economist source : BBC
“Every step you take will be the threat to privacy”The Economist
3
“Personal data is the new oil of the
Internet and the new currency of
the digital world”
Meglena Kuneva, European Consumer Commissioner
User actions/
behavior
Software
Vulnerabilities
Hardward
Vunlerabilities
sourcesofrisk
“Target CEO out as Data Breach”
- USA Today May 2014
“Hackers' Next Target : Your Health
Insurance Company”
- FOXBusiness, May 2014
Privacy and Security
What Are The Risks
Policy and Process
4
Privacy by Design
Methodology
Fair Information
Practice Principles
Accountability
Standards
Open Technology
Standards
Privacy By Design
• Taking privacy into account throughout the whole engineering
process
• 7 principles
– Proactive not reactive
– Privacy as the default
• purpose specification; collection limitation; data minimization; use,
retention and disclosure limitation
– Privacy embeded into design
– Full functionality
– End-to-end security - full lifecycle protection
• ensure confidentiality; integrity and availabiliity
– Visibility and transparency - keep it open
• accountability; openness; compliance
– Respect for user privacy - user centric
• consent; accuracy; access; compliance
5
Fair Information Practice Principles
• Notice/awareness
– Consumers should be given notice of an entity's information practices
before any personal information is collected from them
• Choice/consent
– giving consumers options to control how their data is used
• Access/participation
– consumer's ability to view the data collected, and to verify and contest
its accuracy
• Integrity/Security
– ensure that the data they collect is accurate and secure
• Enforcement/Redress
– enforcement measures : by the information collectors; to sue violators;
criminal penalties
6
7
 Accountability standards serve as a framework for building
trusting, productive relationships among stakeholders
 Accountability standards create benchmarks and a common
ground for stakeholders
 For digital data operator collected, operator need to tell
people how they use it
Accountability Standards
 Need a large community that is interested in developing open
technology standards. People can identify weakness before it
become an issue
 Making sure we have public scrutiny on the things we going to
use and to keep our data private
Open Technology Standards
IoT Security is Critical
• Security is the top issue for IoT
– Deployments will not scale without trust
• With large deployments
– must limit attack surface of each device
• Applies to even simple sensors
– Even if there is no secure data issues
• Security must be architected from the beginning and
must not be made an option
8
Bring Security to Traditional Embeded Systems
9
Embeded
OS Software Stack and Application
 Traditional closed systems
Secure OS Application
 Very few developers have strong experience in creating secure systems
 Need a platform with built-in security and strong guidance on best practices
Security Design Challenges
• Too easy to declare developers of compromised products as incompetent
– as product security can't be reliably measured, security suffers first on tight
product schedules
– massively parallelized security researchers vs. limited product development
budgets and time frames
• The security of a system is dynamic over its lifttime
– the likehood of an attack often wrongly assessed or undervalued in the chain
• New Denial-of-Service power attacks a problem for battery/scavenging
devices
– structural sensors often inaccessible and battery replacement is expensive
• If your product is successful, it will be hacked.
– often the deployment costs of firmware udpates surpass the costs of a new device
– as a result even know-broken systems are kept in use
– this is not the PC world, no reset, no reinstall
• The assumption of being hacked at some point requires solid mitigation
strategy
– developers must ensure secure, reliable and affortable firmware updates
10
System Architecture - Security Perspective
11
Directory & Subscription Security Admin & Multi-tenancy
Data Flow Management - RESTful and Publish/Subscribe
Device Management - Lightweight M2M
Interface - Open Web Standards
Application Protocols - CoAP, HTTP
IoT Server
Device Management - Lightweight M2M
Cryptography ?
IoT Device OS
WiFi Bluetooth 3G/4G
IPv6, 6LoWPAN IPv4
Lifecycle
Security
Communication
Security
IoT Device
Security
Open
Standards ?
Open
Source
IoT Interoperability
12
Participants : IETF, W3C, OMA, AllSeen Alliance, OCF, NIST, CableLabs, ZigBee, and ETSI, etc.
WiFi Stack
Traditional MCU Flat Security Model
13
Server
Application
Protocol
SSL Library
Secure
Storage
Crypto Key
Device
Managemen
Secure ID
Crypto API
Firmware
Update
Diagnose
BLE Stack
Random No
Generator
 IoT devices include significant software
complexity
 Secure and privacy enabled server
communication
 Unclonable device identity
 Cryptography and random number
generation
 Protection of keys/certificates and server
API tokens
 Secure firmware update over the air
 Flat security all code/data lives in a shared
address space
 Large attack surface makes hard to verify devide
security
 Bugs in any code can lead to a security flaw
 Code based is too large for exhaustive validation
 If malicious code updates Flash it may become
impossible to remotely recover a device
Device Security : Secure Partitioning for MCUs
14
BLE Stack
WiFi Stack
Application
Protocol
SSL Library
Device
Managemen
Diagnose
Server
Firmware
Update
Secure
Storage
Crypto Keys
Crypto API
Secure ID
Random No
Generator
Public Private
 Split memory into private critical and
public uncritical
 Small private footprint enables exhausive
verification
 Public code operates on cryptographic
secrets using defined API's but never allow
access to raw keys
 Vulnerabilities on public side can't affect
private side
 public code can't wirte code directly to
Flash
 Private side can reliably recover device to
clean state
 private side can verify integrity of the
public side image
Enable Fast Innovation
15
BLE Stack
WiFi Stack
Application
Protocol
SSL Library
Device
Managemen
Diagnose
Firmware
Update
Secure
Storage
Crypto Keys
Crypto API
Secure ID
Random No
Generator
Public Private
Fast Slow
 Private modules build with strong security
and rarely change
 software is never finished
 new features, bug fixes, patching
vulnerabilities and tracking standards
 Code in the public state is developed
rapidly
 fast time to market
 quick innovation cycles for public side
 still a secure product
 When bugs are discovered after
deployment a firmware update can be
reliably enforced
Driverless Car : Secure But is it Safe
16
360
View
Front
Camera
Interor
Camera
Long-range
Radar
Mid-range
Radar
Ultrasonic
Sensors
Automative Today, IoT Tomorrow
ASIL B or ASIL D support
IEC 61508
ISO 26262
Development process
Fault detection and control features
Failure node and effects analysis FMEA
Compiler qualification & Maintenance
Levels of Vehicle Automation
17
Level 1 - Function-specific
automation
one or more control
functions such as breaking
and lane keeping are
automated but driver has
control
Level 2 - Combined
function automation
Two or more control
functions automated. eg.
ACC with lane centering.
Hand off the steering
wheel and foot pedal but
still responsible to
monitoring and expected
to control the vehicle
Level 3 - Limited self-
driving automation
Vehicle takes control of all
safety critical functions
mostly. Driver is expected
to be available for
occasional control
without constant
monitoring
Level 4 - Full self-driving
automation
Vehicles takes control all
safety critical driving
function and monitor
roadway all the time.
Driver is not expected to
be available for control it
any time
Internet Protocol to The Edge
18
REST APIs
CoAP|HTTP
TCP
REST APIs
UDP
IoT
Application
Device
management
WiFi Bluetooth 3G/4G
 Non-standard approaches are a risk
 Don't repeat past mistakes
 Use Internet security
 widely deplyed and proven
 firewalls and local routers
 32-bit MCUs can handle IP stacks
 < $1 trust Moore's law
Lifecycle Security and LWM2M
19
Common Problems We Need to Solve
20
 IoT deployments will not scale without trust
 very few developers have strong security
experience
 Flat security model
 remote code execution allows full access
and key extraction
 Compromised communications protocols
 Man in the moddle attacks and
compromised devices
 Flawed proprietary algorithms
 Insecure firmware updates
 updates become the malware infection
issue
 compromised through ineffective or no
use of cryptograph
 Poor random number generation
 Negates strong cryptograph
Lifecycle
Security
Communication
Security
IoT Device
Security
21

More Related Content

What's hot

Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoTJinia Bhowmik
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the EnterpriseDaniel Miessler
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsDesign World
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prustyamarprusty
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTWSO2
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingBryan Len
 

What's hot (20)

Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
IoT security
IoT securityIoT security
IoT security
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 

Viewers also liked

Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoTLAURA VIVET
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015HildebrandTech
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT securityJulien Vermillard
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
談已發展與發展中國家數位落差
談已發展與發展中國家數位落差談已發展與發展中國家數位落差
談已發展與發展中國家數位落差Kenny Huang Ph.D.
 
Smart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningSmart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningKenny Huang Ph.D.
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTautomatskicorporation
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 

Viewers also liked (20)

Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
網路中立性簡介
網路中立性簡介網路中立性簡介
網路中立性簡介
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
談已發展與發展中國家數位落差
談已發展與發展中國家數位落差談已發展與發展中國家數位落差
談已發展與發展中國家數位落差
 
Spectrum Policy
Spectrum PolicySpectrum Policy
Spectrum Policy
 
Smart Energy
Smart EnergySmart Energy
Smart Energy
 
Smart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningSmart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service Provisioning
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 

Similar to IoT Security and Privacy Considerations

Bringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android EndpointBringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android EndpointHamilton Turner
 
Boosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeBoosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeNational Retail Federation
 
UplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformUplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformSatya Harish
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
CNIT 128 8: Mobile development security
CNIT 128 8: Mobile development securityCNIT 128 8: Mobile development security
CNIT 128 8: Mobile development securitySam Bowne
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practiceteam-WIBU
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsBen Rothke
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareRogue Wave Software
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesDavid Shepherd
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4MLG College of Learning, Inc
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSource Code Control Limited
 
LPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT productsLPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT productsDigital Catapult
 

Similar to IoT Security and Privacy Considerations (20)

Bringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android EndpointBringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android Endpoint
 
Boosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeBoosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk Imperative
 
UplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformUplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platform
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
CNIT 128 8: Mobile development security
CNIT 128 8: Mobile development securityCNIT 128 8: Mobile development security
CNIT 128 8: Mobile development security
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle software
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile Devices
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
LPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT productsLPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT products
 

More from Kenny Huang Ph.D.

Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsKenny Huang Ph.D.
 
Internet Governance Model in Taiwan
Internet Governance Model in TaiwanInternet Governance Model in Taiwan
Internet Governance Model in TaiwanKenny Huang Ph.D.
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyKenny Huang Ph.D.
 
網路治理概念、組織及案例
網路治理概念、組織及案例網路治理概念、組織及案例
網路治理概念、組織及案例Kenny Huang Ph.D.
 
Ethical Considerations in AI
Ethical Considerations in AIEthical Considerations in AI
Ethical Considerations in AIKenny Huang Ph.D.
 
創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案Kenny Huang Ph.D.
 
共享經濟關鍵議題之探討
共享經濟關鍵議題之探討共享經濟關鍵議題之探討
共享經濟關鍵議題之探討Kenny Huang Ph.D.
 
物聯網與工業4.0情境分析
物聯網與工業4.0情境分析物聯網與工業4.0情境分析
物聯網與工業4.0情境分析Kenny Huang Ph.D.
 
Cloud Computing Business Models Review
Cloud Computing Business Models ReviewCloud Computing Business Models Review
Cloud Computing Business Models ReviewKenny Huang Ph.D.
 
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...Kenny Huang Ph.D.
 
Big Data : Risks and Opportunities
Big Data : Risks and OpportunitiesBig Data : Risks and Opportunities
Big Data : Risks and OpportunitiesKenny Huang Ph.D.
 
Taiwan Network Environment Analysis
Taiwan Network Environment AnalysisTaiwan Network Environment Analysis
Taiwan Network Environment AnalysisKenny Huang Ph.D.
 
Taiwan gTLD Policy and Regulation
Taiwan gTLD Policy and RegulationTaiwan gTLD Policy and Regulation
Taiwan gTLD Policy and RegulationKenny Huang Ph.D.
 
New gTLD - National Cyberspace Strategy
New gTLD - National Cyberspace StrategyNew gTLD - National Cyberspace Strategy
New gTLD - National Cyberspace StrategyKenny Huang Ph.D.
 
國際固定寬頻發展策略分析
國際固定寬頻發展策略分析國際固定寬頻發展策略分析
國際固定寬頻發展策略分析Kenny Huang Ph.D.
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSKenny Huang Ph.D.
 
Ruling the root : CJK Rules for The Root Zone
Ruling the root : CJK Rules for The Root ZoneRuling the root : CJK Rules for The Root Zone
Ruling the root : CJK Rules for The Root ZoneKenny Huang Ph.D.
 
CJK Generation Panels Coordination Review
CJK Generation Panels Coordination ReviewCJK Generation Panels Coordination Review
CJK Generation Panels Coordination ReviewKenny Huang Ph.D.
 

More from Kenny Huang Ph.D. (20)

Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber Norms
 
Internet Governance Model in Taiwan
Internet Governance Model in TaiwanInternet Governance Model in Taiwan
Internet Governance Model in Taiwan
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital Diplomacy
 
Internet Routing Security
Internet Routing SecurityInternet Routing Security
Internet Routing Security
 
網路治理概念、組織及案例
網路治理概念、組織及案例網路治理概念、組織及案例
網路治理概念、組織及案例
 
Ethical Considerations in AI
Ethical Considerations in AIEthical Considerations in AI
Ethical Considerations in AI
 
創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案
 
APNIC44 Briefing
APNIC44 BriefingAPNIC44 Briefing
APNIC44 Briefing
 
共享經濟關鍵議題之探討
共享經濟關鍵議題之探討共享經濟關鍵議題之探討
共享經濟關鍵議題之探討
 
物聯網與工業4.0情境分析
物聯網與工業4.0情境分析物聯網與工業4.0情境分析
物聯網與工業4.0情境分析
 
Cloud Computing Business Models Review
Cloud Computing Business Models ReviewCloud Computing Business Models Review
Cloud Computing Business Models Review
 
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
 
Big Data : Risks and Opportunities
Big Data : Risks and OpportunitiesBig Data : Risks and Opportunities
Big Data : Risks and Opportunities
 
Taiwan Network Environment Analysis
Taiwan Network Environment AnalysisTaiwan Network Environment Analysis
Taiwan Network Environment Analysis
 
Taiwan gTLD Policy and Regulation
Taiwan gTLD Policy and RegulationTaiwan gTLD Policy and Regulation
Taiwan gTLD Policy and Regulation
 
New gTLD - National Cyberspace Strategy
New gTLD - National Cyberspace StrategyNew gTLD - National Cyberspace Strategy
New gTLD - National Cyberspace Strategy
 
國際固定寬頻發展策略分析
國際固定寬頻發展策略分析國際固定寬頻發展策略分析
國際固定寬頻發展策略分析
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
 
Ruling the root : CJK Rules for The Root Zone
Ruling the root : CJK Rules for The Root ZoneRuling the root : CJK Rules for The Root Zone
Ruling the root : CJK Rules for The Root Zone
 
CJK Generation Panels Coordination Review
CJK Generation Panels Coordination ReviewCJK Generation Panels Coordination Review
CJK Generation Panels Coordination Review
 

Recently uploaded

定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 

Recently uploaded (20)

Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 

IoT Security and Privacy Considerations

  • 1. IoT Security & Privacy Considerations 2016 Taiwan IGF Kenny Huang, Ph.D. 黃勝雄博⼠ Executive Council Member, APNIC huangksh@gmail.com 2016.06.17
  • 2. 2 source : The Economist source : BBC “Every step you take will be the threat to privacy”The Economist
  • 3. 3 “Personal data is the new oil of the Internet and the new currency of the digital world” Meglena Kuneva, European Consumer Commissioner User actions/ behavior Software Vulnerabilities Hardward Vunlerabilities sourcesofrisk “Target CEO out as Data Breach” - USA Today May 2014 “Hackers' Next Target : Your Health Insurance Company” - FOXBusiness, May 2014 Privacy and Security What Are The Risks
  • 4. Policy and Process 4 Privacy by Design Methodology Fair Information Practice Principles Accountability Standards Open Technology Standards
  • 5. Privacy By Design • Taking privacy into account throughout the whole engineering process • 7 principles – Proactive not reactive – Privacy as the default • purpose specification; collection limitation; data minimization; use, retention and disclosure limitation – Privacy embeded into design – Full functionality – End-to-end security - full lifecycle protection • ensure confidentiality; integrity and availabiliity – Visibility and transparency - keep it open • accountability; openness; compliance – Respect for user privacy - user centric • consent; accuracy; access; compliance 5
  • 6. Fair Information Practice Principles • Notice/awareness – Consumers should be given notice of an entity's information practices before any personal information is collected from them • Choice/consent – giving consumers options to control how their data is used • Access/participation – consumer's ability to view the data collected, and to verify and contest its accuracy • Integrity/Security – ensure that the data they collect is accurate and secure • Enforcement/Redress – enforcement measures : by the information collectors; to sue violators; criminal penalties 6
  • 7. 7  Accountability standards serve as a framework for building trusting, productive relationships among stakeholders  Accountability standards create benchmarks and a common ground for stakeholders  For digital data operator collected, operator need to tell people how they use it Accountability Standards  Need a large community that is interested in developing open technology standards. People can identify weakness before it become an issue  Making sure we have public scrutiny on the things we going to use and to keep our data private Open Technology Standards
  • 8. IoT Security is Critical • Security is the top issue for IoT – Deployments will not scale without trust • With large deployments – must limit attack surface of each device • Applies to even simple sensors – Even if there is no secure data issues • Security must be architected from the beginning and must not be made an option 8
  • 9. Bring Security to Traditional Embeded Systems 9 Embeded OS Software Stack and Application  Traditional closed systems Secure OS Application  Very few developers have strong experience in creating secure systems  Need a platform with built-in security and strong guidance on best practices
  • 10. Security Design Challenges • Too easy to declare developers of compromised products as incompetent – as product security can't be reliably measured, security suffers first on tight product schedules – massively parallelized security researchers vs. limited product development budgets and time frames • The security of a system is dynamic over its lifttime – the likehood of an attack often wrongly assessed or undervalued in the chain • New Denial-of-Service power attacks a problem for battery/scavenging devices – structural sensors often inaccessible and battery replacement is expensive • If your product is successful, it will be hacked. – often the deployment costs of firmware udpates surpass the costs of a new device – as a result even know-broken systems are kept in use – this is not the PC world, no reset, no reinstall • The assumption of being hacked at some point requires solid mitigation strategy – developers must ensure secure, reliable and affortable firmware updates 10
  • 11. System Architecture - Security Perspective 11 Directory & Subscription Security Admin & Multi-tenancy Data Flow Management - RESTful and Publish/Subscribe Device Management - Lightweight M2M Interface - Open Web Standards Application Protocols - CoAP, HTTP IoT Server Device Management - Lightweight M2M Cryptography ? IoT Device OS WiFi Bluetooth 3G/4G IPv6, 6LoWPAN IPv4 Lifecycle Security Communication Security IoT Device Security Open Standards ? Open Source
  • 12. IoT Interoperability 12 Participants : IETF, W3C, OMA, AllSeen Alliance, OCF, NIST, CableLabs, ZigBee, and ETSI, etc.
  • 13. WiFi Stack Traditional MCU Flat Security Model 13 Server Application Protocol SSL Library Secure Storage Crypto Key Device Managemen Secure ID Crypto API Firmware Update Diagnose BLE Stack Random No Generator  IoT devices include significant software complexity  Secure and privacy enabled server communication  Unclonable device identity  Cryptography and random number generation  Protection of keys/certificates and server API tokens  Secure firmware update over the air  Flat security all code/data lives in a shared address space  Large attack surface makes hard to verify devide security  Bugs in any code can lead to a security flaw  Code based is too large for exhaustive validation  If malicious code updates Flash it may become impossible to remotely recover a device
  • 14. Device Security : Secure Partitioning for MCUs 14 BLE Stack WiFi Stack Application Protocol SSL Library Device Managemen Diagnose Server Firmware Update Secure Storage Crypto Keys Crypto API Secure ID Random No Generator Public Private  Split memory into private critical and public uncritical  Small private footprint enables exhausive verification  Public code operates on cryptographic secrets using defined API's but never allow access to raw keys  Vulnerabilities on public side can't affect private side  public code can't wirte code directly to Flash  Private side can reliably recover device to clean state  private side can verify integrity of the public side image
  • 15. Enable Fast Innovation 15 BLE Stack WiFi Stack Application Protocol SSL Library Device Managemen Diagnose Firmware Update Secure Storage Crypto Keys Crypto API Secure ID Random No Generator Public Private Fast Slow  Private modules build with strong security and rarely change  software is never finished  new features, bug fixes, patching vulnerabilities and tracking standards  Code in the public state is developed rapidly  fast time to market  quick innovation cycles for public side  still a secure product  When bugs are discovered after deployment a firmware update can be reliably enforced
  • 16. Driverless Car : Secure But is it Safe 16 360 View Front Camera Interor Camera Long-range Radar Mid-range Radar Ultrasonic Sensors Automative Today, IoT Tomorrow ASIL B or ASIL D support IEC 61508 ISO 26262 Development process Fault detection and control features Failure node and effects analysis FMEA Compiler qualification & Maintenance
  • 17. Levels of Vehicle Automation 17 Level 1 - Function-specific automation one or more control functions such as breaking and lane keeping are automated but driver has control Level 2 - Combined function automation Two or more control functions automated. eg. ACC with lane centering. Hand off the steering wheel and foot pedal but still responsible to monitoring and expected to control the vehicle Level 3 - Limited self- driving automation Vehicle takes control of all safety critical functions mostly. Driver is expected to be available for occasional control without constant monitoring Level 4 - Full self-driving automation Vehicles takes control all safety critical driving function and monitor roadway all the time. Driver is not expected to be available for control it any time
  • 18. Internet Protocol to The Edge 18 REST APIs CoAP|HTTP TCP REST APIs UDP IoT Application Device management WiFi Bluetooth 3G/4G  Non-standard approaches are a risk  Don't repeat past mistakes  Use Internet security  widely deplyed and proven  firewalls and local routers  32-bit MCUs can handle IP stacks  < $1 trust Moore's law
  • 20. Common Problems We Need to Solve 20  IoT deployments will not scale without trust  very few developers have strong security experience  Flat security model  remote code execution allows full access and key extraction  Compromised communications protocols  Man in the moddle attacks and compromised devices  Flawed proprietary algorithms  Insecure firmware updates  updates become the malware infection issue  compromised through ineffective or no use of cryptograph  Poor random number generation  Negates strong cryptograph Lifecycle Security Communication Security IoT Device Security
  • 21. 21