Grant no. 609094 * REliable, Resilient and secUre IoT for sMart city applications 1.

Slides:



Advertisements
Similar presentations
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Advertisements

PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Low-Power Interoperability for the IPv6 Internet of Things Presenter - Bob Kinicki Low-Power Interoperability for the IPv6 Internet of Things Adam Dunkels,
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
LAB#2 JAVA SECURITY OVERVIEW Prepared by: I.Raniah Alghamdi.
Cryptography and Network Security Chapter 17
FIT3105 Smart card based authentication and identity management Lecture 4.
ACE – Design Considerations Corinna Schmitt IETF ACE WG meeting July 23,
Chapter 8 Web Security.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Chapter 21 Distributed System Security Copyright © 2008.
(c) Mitsubishi Electric Corp. 1 User Scenarios & Security Considerations in APPAGG part 2/ Nobuhiro Electric.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Security Token Service (STS) Design & Development Plans Henri Mikkonen / HIP 3 rd EMI All-Hands Meeting , Padova, Italy.
Web Services Security Patterns Alex Mackman CM Group Ltd
Internet of Things Fall 2015
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 draft-urien-eap-smartcard-06.txt “EAP-Support in Smartcard”
History and Implementation of the IEEE 802 Security Architecture
Grant no REliable, Resilient and secUre IoT for sMart city applications 1.
Co-funded by the Horizon 2020 Framework Programme of the European Union under grant agreement no Nora Koch fortiss GmbH An-Institut Technische Universität.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
The Secure Sockets Layer (SSL) Protocol
Secure and sMARrter ciTIes Data ManagEment
Trusted? 05/4/2016 Charles Sheehe, CCSDS Security Working Group GRC POC All information covered is from public sources.
History and Implementation of the IEEE 802 Security Architecture
Training for developers of X-Road interfaces
Hardware-rooted Trust for Secure Key Management & Transient Trust
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Security Outline Encryption Algorithms Authentication Protocols
Bluetooth Low Energy Overview.
Cryptography and Network Security
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Cryptography and Network Security
Katrin Hoeper Channel Bindings Katrin Hoeper
Secure Sockets Layer (SSL)
UNIT.4 IP Security.
Chapter 17 Risks, Security and Disaster Recovery
Module 8: Securing Network Traffic by Using IPSec and Certificates
S/MIME T ANANDHAN.
Seraphim : A Security Architecture for Active Networks
Smart Homes Automation using Z-Wave Protocol
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Cryptography and Network Security
NAAS 2.0 Features and Enhancements
IEEE MEDIA INDEPENDENT HANDOVER DCN:
PLUG-N-HARVEST ID: H2020-EU
draft-ipdvb-sec-01.txt ULE Security Requirements
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
The Secure Sockets Layer (SSL) Protocol
Module 8: Securing Network Traffic by Using IPSec and Certificates
CDK: Chapter 7 TvS: Chapter 9
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Chapter 8.5 AUTHENTICATION AND KEY DISTRIBUTION
Electronic Payment Security Technologies
A lighttwiht reconfigurable security mechanism for 3G/4G mobile devices 2019/7/1 A Lightweight reconfigurable security mechanism for 3G/4G mobile devices.
Cryptography and Network Security
National Trust Platform
Presentation transcript:

Grant no * REliable, Resilient and secUre IoT for sMart city applications 1

Grant no RERUM key tangible outcomes  RERUM Security/Privacy Architecture  DTLS  CS encryption  Integrity Protection (Digital Signatures)  Privacy-Enhanced Tokens for Authorization in ACE 2

Grant no RERUM Domain model 3 New cmp. IoT-A:  RD  VRD  GVO  Context (like in BUTLER)  Administrator  Policies  Data subject  Human User  Consent  Trust/reputation

Grant no Security/Privacy 4 Security Privacy Confidentiality Protection (DTLS & CS & RSSI-key) Integrity Protection (MAC & DTLS & ECDSA Sign) Authorization and Access Control Secure Credential Bootstrapping PRRS capabilities (incl.OAP) and SIEM integration Privacy Policies and its enforcement PET for Geo-Location Pseudonyms and related mechanisms (e.g. PAT-Token) Privacy Dashboard + Consent Manager Privacy Enhanced Integrity Protection (MSS) ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔

Grant no RERUM Architecture 5

Grant no RERUM Privacy architecture 6

Grant no Security/Privacy on the RDs - DTLS Datagram Transport Layer Security (DTLS) DTLS protects confidentiality and integrity of communication Asymmetric keys also allow identifying the origin DTLS implemented on RE-Mote on Contiki OS using TinyDTLS 7

Grant no Security/Privacy on the RDs - DTLS 8  Mutual Certificate based Handshake  Proposition to use Curve25519 (ECDH) and Ed25519 (Sign)  ECC is lightweight  Possibility of h/w acceleration for ECC on the RE-Mote

Grant no Security/Privacy on the RDs - DTLS 9

Grant no Security/Privacy on the RDs - CS  Simultaneous compression and encryption  Lightweight encryption on the device  Adaptive to changes in signal pattern  Lossy encryption – reconstruction error at the receiver 10

Grant no Security/Privacy on the RDs - CS  Client implementation on Contiki OS  Requires encryption key  Compression rate  Can be either stored or generated  Is implemented as a CoAP resource  Server implementation on Java  Should have/generate the same key  Estimates the original measurements  Minimize reconstruction error  Identifies signal changes and requests new compression rate 11

Grant no Security/Privacy on the RDs - Signatures  Implemented  based on micro-ECC library for RE-Mote  currently ECC curve from NIST (future: ed25519)  also worked on Z1  JSS: Signature Container for JSON data  signature over JSON retained from RD-to-OTHER  Integrity of sensed data verifiable in GW or MW  End-to-End Integrity protection, Origin authentication 12

Grant no Security/Privacy on the RDs - Signatures 13

Grant no IETF draft  Privacy-Enhanced Tokens for Authorization in ACE 14

Grant no PRIVACY-ENHANCED TOKENS FOR AUTHORIZATION IN CONSTRAINED ENVIRONMENTS D. Calvo, J.Gato - Atos Research & Innovation J.Cuellar, P. Kasinathan, Santiago Reinhard - Siemens AG IoT Week Belgrade 15 Reliable, Resilient and Secure IoT for Smart City Applications Grant no Restricted

Grant no Objectives  Definition of a protocol to create secure communication channels in constrained environments  Authorization  Integrity  Privacy & Confidentiality  DoS Resilience  Efficiency is the key!!  Low energy consumption: extended battery life  Minimum impact in resources usage 16

Grant no Constrained Environments  Personal Health Monitoring 17

Grant no Authorization Problems  Personal Health Monitoring  Special access rights are defined for emergencies  Restricted access to medical data for different persons  Constant operation: opportunity for DoS attacks  Integrity and confidentiality of the data are ensured 18

Grant no Constrained Devices  Zolertia RERUM Re-Mote 19 ARM Cortex-M3 32 MHz 512 KB flash 32 KB RAM Consumption down to 150 nA using the shutdown mode Built-in battery charger (500 mA) ISM 2.4-GHz IEEE & ZigBee compliant radio ISM MHz ISM/SRD band IEEE compliant radio

Grant no Architecture: Collocated CAM-C 20 Authorization Server (AS) CLIENT (C) SERVER (S) Safe Channel (DTLS) No-confidential channel

Grant no Protocol overview: Tokens 21

Grant no Unauthorized Resource Request [C->S] 22  Client knows Resource Server and Server  Client doesn’t know who is the SAM  Client performs a request without Ticket CLIENT (C) SERVER (S) COAP: GET ECG

Grant no SAM Information Message [S->C] 23  Client does not have access ticket  Response Code: Unauthorized  SAM Information: URI, timestamp CLIENT (C) SERVER (S) COAP: 4.01 SAM URI Timestamp

Grant no Authorization SERVER (S) Access Request Message [C->AS] 24  Client already knows SAM  Resource URI & Actions to perform CLIENT (C) DTLS : POST coaps://server/AUTHORIZE RESOURCE URI GET&PUT S Timestamp

Grant no Construction of Token in AS 25  Face Data: Resource URI & Operations Allowed Time Stamp Lifetime Random value  Verifier: HMAC(K, Face Data) [Poly1305] K: long term secret shared between SAM & S

Grant no Authorization Server (S) Ticket Transfer Message [AS->C] 26  Token:  Face Data  HMAC (K, Verifier) [Poly1305]  Verifier CLIENT (C) DTLS: 2.01 Token Verifier

Grant no Authorized Resource Request [C->S]  Client has a valid Access Token  Safe channel (DTLS) is not required  Payloads are encrypted  ChaCha20_Poly1305_AEAD with Verifier as Key  Client attaches Face to each request CLIENT (C) SERVER (S) COAP: GET ECG Token

Grant no Validation of Access Tickets in Server  Access ticket: Face Data & HMAC (K, Verifier)  Verifier was built by AS: HMAC(K, Data) [Poly1305]  S generates its own version of Verifier and checks the Hash contained in the Access Ticket  C demonstrates Verifier PoP => Resilience against DoS attacks  S checks Face Data validity  Resource & Operations  Time Stamp & Life Time

Grant no Valid Response [S->C]  Payloads are encrypted  ChaCha20_Poly1305_AEAD authenticated encryption mechanism CLIENT (C) SERVER (S) 2.05 Payload: {Enc(V,resp)}

Grant no Conclusions  Efficient communication C S  AEAD_CHACHA20_POLY1305 OTK Privacy & Confidentiality Integrity  Length(cipherText)= Length(plainText)  Authorization delegated to unconstrained AS  Authenticated Encryption and PoP  Resilience to DoS attacks

Grant no Roadmap OCTOBER 2015 Draft standard v2 raft-cuellar-ace-pat-priv- enhanced-authz-tokens-02 MARCH 2016 Java prototype gitlab.atosresearch.eu JUNE 2015 Draft standard v1 raft-cuellar-ace-pat-priv- enhanced-authz-tokens-01 JULY 2016 IETF Berlin Meeting ortant-dates html#ietf96 APRIL 2016 Draft standard v3 raft-cuellar-ace-pat-priv- enhanced-authz-tokens-02

Grant no Main people involved  Jorge Cuellar - Siemens  Prabhakaran Kasinathan - Siemens  Santiago Reinhard Suppan - Siemens  Daniel Calvo - ATOS 32

Grant no Acknowledgements The RERUM project has received funding from the European Union’s Seventh Programme for research, technological development and demonstration under grant agreement No ) 33

Grant no Questions? THANK YOU!! Daniel Calvo Atos Research & Innovation IoE Lab booklet.atosresearch.eu