Security in Internet of Things Begins with the Data

Slides:



Advertisements
Similar presentations
US View on the Technological Convergence Between the Internet of Things and Cloud Computing June 1, 2010 Brussels, Belgium Presented by: Dan Caprio.
Advertisements

IAPP Academy, Dallas, TX Elliot Maxwell, Fellow, Communications Program, Johns Hopkins University, and eMaxwell & Associates September 15, 2011 Internet.
. Smart Cities and the Ageing Population Sustainable smart cities: from vision to reality 13 October ITU, Geneva Knud Erik Skouby, CMI/ Aalborg University-Cph.
Intel Confidential — Do Not Forward Embedded Solutions Smart Sustainable Cities ITU-UNESCO Montevideo, March 11. Marcelo E. Volpi LAR Technology Team.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 The Open and Trustworthy ICT Platform Prof. Dr.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Internet of Things (Ref: Slideshare)
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Internet of Things in Industries
RFID, Privacy and the Public Policy Void Beth Givens Privacy Rights Clearinghouse – RFID Privacy Workshop.
IoT Meets Big Data Standardization Considerations
Emerging and Evolving Cyber Threats Require Sophisticated Response and Protection Capabilities  Advanced Algorithms  Cyber Attack Detection and Machine.
Internet of Things. Creating Our Future Together.
Security of the Internet of Things: perspectives and challenges
Internet of Things, Are You Ready?. Contents ●Introduction ●IoT Examples? ●IoT Benefits ○For Industries ○The Internet of Things In Organizations ○The.
Internet of Things – Getting Started
Andrew J Haire. Agenda  Let us define Terms…  What do we know so far  How did we get here  What are Implications to Policy Makers  What will this.
Emerging Technology 6.01 Understand the evolution of information technology. 6.01b Understand emerging technologies.
Resource Allocation in Mobile Cloud Computing. Motivation ›Apart from offloading, resource provisioning has emerged to be an important issue. › Resource.
1.4 wired and wireless networks lesson 1
ISO’s standardization approach to security, privacy and trust
INDUSTRY 4.0 Why it matters?.
Director, Energy and Sustainability Laboratory
Privacy and Public Policy Implications of IoT
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
IoT Security Part 2, The Malware
Internet of Things and Smart Cities
Implications of IoT for Emerging Economies – Strategic Significance, Pitfalls, Challenges and Opportunities Rajeev Tatkar.
Launching Potentially Big Ideas
“Internet of Things” – The new age drivers of Power Distribution Automation Speaker: Jayant Sinha Date of session: 2 Oct, 2015.
Attention CFOs How to tighten your belt and still survive May 18, 2017.
Challenges facing Enterprise Mobility
Information Technology Deanship
Deep Shift: 21 Ways Software Will Transform Global Society
Vonage use of Cloud-based Communication
Internet of Things and its applications
Prepared by: Celeste Ng Updated: May, 2017.
6lo Privacy Considerations
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
ASSET - Automotive Software cyber SEcuriTy
CNET334 - Network Security
Everything as a service
Data Quality: Practice, Technologies and Implications
Future Technologies FTC 2016 Future Technologies Conference December 2016 San Francisco, United States.
Algorithms for Big Data Delivery over the Internet of Things
INTERNET OF THINGS.
Get Real Value and Insights from Your Data: Biin Solutions Provides Predictive Analytics, IoT, and Business Intelligence with Microsoft Azure Power MICROSOFT.
Computer Science Principles
Ramy Ahmed Fathy ITU-T SG20 Vice Chairman
Internet of Things (IoT)
Internet of Things (IoT)
Customer Services Single view of the customer, enabling wide variety of customer requests to be dealt with at the point of contact Self-Service Portal.
Standards for the Internet of Things
Cloud & Developing Nations
ITP Maturity Model Survey 2018
Impact of new technologies on regulation
Smart Learning concepts to enhance SMART Universities in Africa
Make it easy to be secure E.g. derived credentials test lab
Network Security Ola Flygt Växjö University
Internet of Things (IoT) for Industrial Development and Automation
GRC, A holistic Road Map for Information Security Transformation
The MobileIron® Threat Detection difference:
Global megatrends (relevant for our business)
Internet of Things (IoT)
IoTs (Internet of Things)
Sachiko A. Kuwabara, PhD, MA
Utilizing the Network Edge
Children and Networks Suha Hajyahia Tareza Haddad.
IT Applications with Emerging Techniques: Security Solutions
IoT and Supply Chain Risk Management
Presentation transcript:

Security in Internet of Things Begins with the Data Daniel W. Engels, PhD Associate Professor, CSE, Southern Methodist University Director, SMU Master of Science in Data Science Program

The Internet today Source: Opte Project

What is IoT? First mentioned in 1999 by the MIT Auto-ID Center. IoT meant to “create a universal environment in which computers understand the world without human intervention.” IoT was simply the tool that would be used to merge the worlds of bits and atoms. Over 15 years after its inception, IoT is now seen as a modern, fresh concept in our connected world…with many different definitions.

Internet of Things (Dragon Files) Merging of the physical world with the virtual world in order to give virtual lives to inanimate objects, ideas and concepts and through those lives to impact both the physical and the virtual lives of man, machine and things. Disembodied Intelligence Augmented Reality Automation 6th Sense of World Monitoring Distributed Control Augmented Virtuality Improved Visibility Ant-like Intelligence

Billions of Things are Already Connected to the IoT! Internet of powered devices Internet of powered things Connected by Internet of everyday things Connected by Slide courtesy of Evanhoe and Associates

IoT Last Mile Technology Standards WirelessHART (IEC 62591) NFC 6LowPAN (IETF RFC 4944) ISO/IEC 18000-3 IEEE 802.15.4 ISO/IEC 18000-6 ISO/IEC 18000-7 (ITU-T G.9959) Contiki (ISO/IEC 14543-3-10)

Two Paradigms for IoT are Emerging Brain-Body Merge – intelligence is added to everyday things in your world, so that your life can be more awesome. Head in the Clouds – identification and wireless connectivity is added to everyday things in your world and intelligence is supported in the cloud, so that your life can be more awesome.

Brain-Body Merge HRP-4C Robot

Head in the Clouds

Internet of Things

Potentially Trillions of Tag Reads per Day with basically zero security on the tags (This is the definition of BIG DATA!)

Big Data can violate your privacy without any one piece of data violating your privacy. Connecting bits and atoms using IoT promises to create Huge Data.

Do you Trust your IoT Data & Collector? do you trust the data you are collecting and/or using? do you trust who is collecting the data from you?

What Went Wrong? The BARCODE was designed to SHARE information The RFID TAG was designed to SHARE information The IoT System was designed to SHARE information NETWORKS were designed to SHARE information Security was an AFTERTHOUGHT (what are the security threats?) (and it continues to be an afterthought today)

The edge of the network continues to expand and become mobile The edge of the network continues to expand and become mobile. Devices are introduced to fill some benefit. Once the number of edge devices are sufficiently large or a significant security breach occurs, security is added. Security is always an afterthought, especially as devices become smaller, cheaper, and less powerful. The new edge, epitomized by the Internet of Things, is here today and is following the same deploy, realize benefit and then secure paradigm. The problem is that these new edge devices cannot use the security developed for the old edge devices. Therefore, new security mechanisms are required.

It’s all about the data!™ The IoT technologies have been around for a long time Advances in communication and connectivity are allowing the “interconnectedness” needed for IoT The value is in the data not the connections The data allows you to make autonomous decision based on business rules closer to the edge Slide courtesy of Evanhoe and Associates

(Some) Big Data Security Challenges Data Confidentiality Privacy Preserving Data Correlation Personal and population privacy Privacy enhancing techniques Data service monetization Data publication Privacy implication of data quality Data ownership Data lifecycle management

Final Thoughts IoT has been widely deployed with limited to no security. As massive amounts of data are being collected, stored, manipulated, merged, analyzed, and expunged, security and privacy concerns will have begun to explode. Need scalable and practical solutions to Big Data Security and Privacy as well as applying Big Data Management and Analytics for Cyber Security. Need to develop technologies guided by policies to address security and privacy issues throughout the lifecycle of the data. Need to understand not only the societal impact of IoT and its ubiquitous data collection, use and analysis, also need to formulate appropriate laws and policies for such activities.

Do You Feel Lucky?

Thank You

Questions ???

No Device is an Island Every networked device is an entry point into your network (DATA ATTACKS!) No device is to be fully trusted by any other Every device is a city state to be protected

Policy Standards Procedures, Guidelines & Best Practices Mechanisms and Monitoring Actual Operations & Environment