Internet of Things: Security Challenges Csilla Farkas Department of Computer Science and Engineering University of South Carolina farkas@cec.sc.edu
Source: http://www. ipofferings
What are the security challenges?
https://www.youtube.com/watch?v=y7Gs1dB_bFw
What are the security challenges?
What are the security challenges?
Secure Software Development Requirement and Use cases Architecture and Design Test Plans Code Tests and Test Results Feedback from the Field 5. Abuse cases 6. Security Requirements 2. Risk Analysis External Review 4. Risk-Based Security Tests 1. Code Review (Tools) 3. Penetration Testing 7. Security Operations
Communication Security Passive attacks: Eavesdropping Monitoring Active attacks: Masquerade Replay Modification of messages Denial of service Cryptographic protocols
Device Security Source:smallbusiness.chron.com Source mobihealthnews.com Source: www.edn.com Source:smallbusiness.chron.com Source: kulichet.com Surce: www.pardaz.net Source: www.health.mil
New Types of Threats
Secure Data Management Data intensive applications Data driven research -- data warehouses Data Integration Sensitive data New types of misuse
DATA Volume Velocity Variety
Semantics Domain Knowledge Device information Context-specification Security policy Data Management Data quality Data integration Data query and storage Source: https://www.w3.org/Submission/2015/SUBM-iot-lite-20151126/
Security Policies . Users Roles Permissions Sessions User assignment Constraints Role Hierarchy Property Roles as Classes Roles as Values Defining Roles <RoleName> rdfs:subclassOf rbac:Role. <Ac- tiveRoleName> rdfs:subClassOf rbac:ActiveRole. <ActiveRoleName> rdfs:subclassOf <Role- Name>. <RoleName> rbac:activeForm <ActiveRoleName> <RoleName> a rbac:Role. Role Hierarchy <RoleName> rdfs:subclassOf <SuperRole- Name> <RoleName> rbac:subRole <SuperRoleName> Permission Association OWL class expression <RoleName> rbac:permitted <Action> Static Separation of Duty Constraint <Role1> owl:disjointFrom <Role2> <Role1> rbac:ssod <Role2> Dynamic Separation of <ActiveRole1> owl:disjointFrom <ActiveRole2> <Role1> rbac:dsod <Role2> Queries role activation permitted, separation of duty, ac- cess monitoring Enforcing RBAC Mostly using DL reasoning Mostly using rules
What are the new security needs? IoT in the Future Interconnection of cyber-physical systems Interoperation and adaptive policy composition Full automation … What are the new security needs?