Download presentation
Presentation is loading. Please wait.
Published byRebecca Morton Modified over 6 years ago
2
Security in Internet of Things Begins with the Data
Daniel W. Engels, PhD Associate Professor, CSE, Southern Methodist University Director, SMU Master of Science in Data Science Program
3
The Internet today Source: Opte Project
4
What is IoT? First mentioned in 1999 by the MIT Auto-ID Center.
IoT meant to “create a universal environment in which computers understand the world without human intervention.” IoT was simply the tool that would be used to merge the worlds of bits and atoms. Over 15 years after its inception, IoT is now seen as a modern, fresh concept in our connected world…with many different definitions.
5
Internet of Things (Dragon Files)
Merging of the physical world with the virtual world in order to give virtual lives to inanimate objects, ideas and concepts and through those lives to impact both the physical and the virtual lives of man, machine and things. Disembodied Intelligence Augmented Reality Automation 6th Sense of World Monitoring Distributed Control Augmented Virtuality Improved Visibility Ant-like Intelligence
6
Billions of Things are Already Connected to the IoT!
Internet of powered devices Internet of powered things Connected by Internet of everyday things Connected by Slide courtesy of Evanhoe and Associates
7
IoT Last Mile Technology Standards
WirelessHART (IEC 62591) NFC 6LowPAN (IETF RFC 4944) ISO/IEC IEEE ISO/IEC ISO/IEC (ITU-T G.9959) Contiki (ISO/IEC )
8
Two Paradigms for IoT are Emerging
Brain-Body Merge – intelligence is added to everyday things in your world, so that your life can be more awesome. Head in the Clouds – identification and wireless connectivity is added to everyday things in your world and intelligence is supported in the cloud, so that your life can be more awesome.
9
Brain-Body Merge HRP-4C Robot
10
Head in the Clouds
11
Internet of Things
12
Potentially Trillions of Tag Reads per Day
with basically zero security on the tags (This is the definition of BIG DATA!)
13
Big Data can violate your privacy without any one piece of data violating your privacy. Connecting bits and atoms using IoT promises to create Huge Data.
14
Do you Trust your IoT Data & Collector?
do you trust the data you are collecting and/or using? do you trust who is collecting the data from you?
16
What Went Wrong? The BARCODE was designed to SHARE information
The RFID TAG was designed to SHARE information The IoT System was designed to SHARE information NETWORKS were designed to SHARE information Security was an AFTERTHOUGHT (what are the security threats?) (and it continues to be an afterthought today)
17
The edge of the network continues to expand and become mobile
The edge of the network continues to expand and become mobile. Devices are introduced to fill some benefit. Once the number of edge devices are sufficiently large or a significant security breach occurs, security is added. Security is always an afterthought, especially as devices become smaller, cheaper, and less powerful. The new edge, epitomized by the Internet of Things, is here today and is following the same deploy, realize benefit and then secure paradigm. The problem is that these new edge devices cannot use the security developed for the old edge devices. Therefore, new security mechanisms are required.
18
It’s all about the data!™
The IoT technologies have been around for a long time Advances in communication and connectivity are allowing the “interconnectedness” needed for IoT The value is in the data not the connections The data allows you to make autonomous decision based on business rules closer to the edge Slide courtesy of Evanhoe and Associates
19
(Some) Big Data Security Challenges
Data Confidentiality Privacy Preserving Data Correlation Personal and population privacy Privacy enhancing techniques Data service monetization Data publication Privacy implication of data quality Data ownership Data lifecycle management
20
Final Thoughts IoT has been widely deployed with limited to no security. As massive amounts of data are being collected, stored, manipulated, merged, analyzed, and expunged, security and privacy concerns will have begun to explode. Need scalable and practical solutions to Big Data Security and Privacy as well as applying Big Data Management and Analytics for Cyber Security. Need to develop technologies guided by policies to address security and privacy issues throughout the lifecycle of the data. Need to understand not only the societal impact of IoT and its ubiquitous data collection, use and analysis, also need to formulate appropriate laws and policies for such activities.
21
Do You Feel Lucky?
22
Thank You
23
Questions ???
24
No Device is an Island Every networked device is an entry point into your network (DATA ATTACKS!) No device is to be fully trusted by any other Every device is a city state to be protected
25
Policy Standards Procedures, Guidelines & Best Practices
Mechanisms and Monitoring Actual Operations & Environment
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.