Arete Technology Confidential. 2 Security Threats on IoT Arete Technology Confidential When everything goes to the Internet, changing human life, it brings.

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Advertisements

Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Part of the BRE Trust Protecting People, Property and the Planet Smart Buildings and Security: Developing a unified approach Will Lloyd BRE Global Limited,
Depending on who you ask, IoT is either: Nothing new A unicorn Magic, and will soon change everything. We’ve been doing this for 40 years.
Ultra-low cost IoT system for smart house applications Characterization Presentation Students: Sagiv Katony Asaf Luster Advisors: Evgeny Kuksin 
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Cevgroup.org C utting E dge V isionaries. cevgroup.org TODAY’s TALK 1) Internet Of Things (IoT) 2) Wi-Fi Controlled Robots 3) Augmented Reality.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
IoT Cooperation Strategy
The Secure Sockets Layer (SSL) Protocol
Cloud Storage Service with Proven Military Grade Security
Palo Alto Networks Certified Network Security Engineer
Principles of Automotive cyber-security
Secure Connected Cars – SONG LI
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
Applying Cryptography to Physical Security
Hardware-rooted Trust for Secure Key Management & Transient Trust
Connected Living Connected Living What to look for Architecture
Document No: GSC-21_034 Source: ISO/TC 184/SC 4 Industrial data
Network Infrastructure
IOT Critical Impact on DC Design
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
A Wireless LAN Security Protocol
Security and Encryption
Industrial IoT Derive business value from the Internet of Things, People and Services Ronald Binkofski General Manager Microsoft MC CIS.
Smart Car through IoT 라이 아샤리 리날디
Connected Living Connected Living What to look for Architecture
Module 8: Securing Network Traffic by Using IPSec and Certificates
DevOps – Test Automation for IOTs
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
OLMEK Building a confidential and secure communication between a Bank and its customers March 2006.
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
National Mining University
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
January 2018 Meeting Irvine, CA, USA
Internet of Things
The security and vulnerabilities of IoT devices
PREPARED BY: RUMMY MIRANDA
Aniket Shah & Alexander Witt
SORACOM Icon Set v1.5 Please check the guidelines for use.
Internet of Things (IoT)
Identity Processor Secures IoT Systems
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Sukumara T, Janne S, Kishan SG, Harish G, Eashwar / Presented to CIGRE Colloquium, Mysore, Cyber Security - Secure communication design for.
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Public Key Infrastructure from the Most Trusted Name in e-Security
RKL Remote key loading.
The Secure Sockets Layer (SSL) Protocol
Good Morning/Afternoon/Evening
Platform Architecture
Document No: GSC-21_034 Source: ISO/TC 184/SC 4 Industrial data
Module 8: Securing Network Traffic by Using IPSec and Certificates
Nenad Stefanovic and Danijela Milosevic
Install AD Certificate Services
Securing Android Apps using Trusted Execution Environment (TEE) - 07/08/14 Presented by: Mike Hendrick VP Product Sequitur Labs.
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Erica Burch Jesse Forrest
Unit 8 Network Security.
Internet of Things (IoT)
IT Security for Meteorological Measuring Networks
Albeado - Enabling Smart Energy
SPIRAL: Security Protocols for Cerberus
Potential L2 security options for UL BCS
Introducing MagicInfo 6
IoT Security and Privacy
Presentation transcript:

Arete Technology Confidential

2 Security Threats on IoT Arete Technology Confidential When everything goes to the Internet, changing human life, it brings great convenience and smartness If you do “NOTHING”… it maybe a disaster Security

3 Security Risk on Manufacture IoT Arete Technology Confidential Chrysler, Jeep Cherokee Hacker approaches to manufacture (w/o Internet) USB storage Maintenance PC Sensor Camera Current IoT Remote Monitor , 1.4 million cars were recalled because hackers can take over the vehicle through Uconnect. In 2014, Hacking on manufacturing factories increases eight times than ever, from American ICS-CERT

4 Security Threats on IoT Arete Technology Confidential A Fake Server Sending incorrect commands which can be used to trigger unplanned events, or send some physical instruction (shutdown, restart, …etc) A Fake Device Injecting fake measurements which can disrupt the control processes and cause them to react (generate surroundings or tool overheating event,…etc) Data Corruption Modification of users’ data (Decrease meter numerical values to save money) An Eavesdropper Listening to commands or data which can reveal confidential information about the operation of the infrastructure

5 Importance of Device Authentication in IoT Material from ST-Micro Arete Technology Confidential

6 Solutions that Arete provide Arete Technology Confidential Communication interface Answer ® RTOS Secure CPU Core Secure Boot Crypto Vault Key Asset Bus Scramble Network Management Autonomous Mix Interface Mesh Authorization Security Components Authentication Crypto API BT WiFi ZigBee Ethernet PLC UART Integrity Checking, Anti-power analysis, Ani-invasive attack Security SOC Tamper Resistance Anti-clone, Confidentiality Sub-G

7 Peer-to-Peer Device Authentication Arete Technology Confidential Sensor, End device Device 1 ANSWER® Device 2 ANSWER® Device 3 ANSWER® Cloud Server Gateway Router Session key 1-2 Session key 2-3 Network1 key No central Certificate Authority is needed in the process of device authentication Existing network protocols are applied between gateways and Answer ® devices. CA Device 4 ANSWER® Device 5 ANSWER® Network2 key Session key 4-5 Session key 3-4

8 Arete Technology Confidential Use Case

9 Device Authentication using Triple-DH Arete Technology Confidential Device 1 Device 2 Device1 Key Pair: Y = y*G, Epoch key pair: B = b*G Device2 Key Pair: X = x*G, Epoch key pair: A = a*G Hello[r dev1 ] Certificate[Cert Dev2 ] KeyExchange[A] r = r dev1 +r dev2 Hello[r dev2 ] Verify(Cert Dev2 ) and get X k 2 = 2DHKDF((A+d A X)b, r) r = r dev1 +r dev2 k 3 = 3DH-KDF((A+d A X) (b+e B y), r) Certificate[Enc k2 [Cert Dev1 ]] KeyExchange[B] k 2 = 2DH-KDF((a+d A x)B, r) Decrypt and get Cert Dev1 Verify(Cert Dev1 ) and get Y k 3 = 3DH-KDF ((a+d A x) (B+e B Y), r) Key pairs generation Nonce Exchange Device 2 Cert. & Key A delivery Device 2 Cert. Verification Device 1 Cert. & Key B delivery Device 1 Cert. Verification Session key delivery encrypted by common derived key k3, Enc k3 [Sek]

10 ANSWER® System is the Solution Arete Technology Confidential A utonomous N euro S ecure W ise E fficiency R elay

11 Arete Technology Confidential Thanks for Listening

12 Comparison with chips in IoT Arete Technology Confidential General MCU Authentication Device DSP/Crypto Processor Secure CPU Core Built-in Crypto Vault Authentication Secure boot/FOTA ANSWER RTOS Arete SOC Security Performance