Presentation is loading. Please wait.

Presentation is loading. Please wait.

Make “The Edge" the centre of your security/privacy

Similar presentations


Presentation on theme: "Make “The Edge" the centre of your security/privacy"— Presentation transcript:

1 Make “The Edge" the centre of your security/privacy
Stuart Mendelsohn, Peter Waher Lilsis AB

2 a contribution to a new smart city standard
An overview… © Lilsis AB 2018

3 Contents Why is a new standard needed? Proposed solution
The danger of encryption “backdoors”. Architecture A platform Proof of concept Smart City standard contribution Conclusion. © Lilsis AB 2018

4 Why? © Lilsis AB 2018

5 "I don't know that much about cyber, but I do think that's the number one problem with mankind.“ Warren Buffett Cyber Threats © Lilsis AB 2018

6 What about threats to your privacy?
Do you want bank details and personal health information public? Do you want your car tracked by unknowns? Do you want your smart electricity meter to tell thieves when you are away? And a lot more potential breaches… No? That’s where our technology can be used! © Lilsis AB 2018

7 How Far Can the Surveillance Economy Go?
Harvard Business Review Uninformed Consent – Leslie K. John © Lilsis AB 2018

8 Proposed solution © Lilsis AB 2018

9 So Let’s use a more secure internet protocol stack with extra encryption
Based on XMPP and add extra encryption. “Edge” architecture, all hardware can be “on premise”. Encrypted database, IoT Gateway and backup included. © Lilsis AB 2018

10 XMPP - the Extensible Messaging and Presence Protocol
Core specifications are developed at the Internet Engineering Task Force (IETF) - see RFC , RFC 6121, and RFC 7622 (along with a WebSocket binding defined in RFC 7395). See IEEE P Standard for Harmonization of Internet of Things (IoT) Devices and Systems. © Lilsis AB 2018

11 The danger of encryption “backdoors”
© Lilsis AB 2018

12 At this point I better mention Backdoors!
Maiden Castle, England is around 2000 years old © Lilsis AB 2018

13 Imposing Defences but…
Front Door Back Door © Lilsis AB 2018

14 The Romans Attacked via the back door
Mass graves show the results of the Roman attack. Back Door © Lilsis AB 2018

15 The moral is… Backdoors are dangerous! We haven't put backdoors in, not for us or anyone else. © Lilsis AB 2018

16 architecture © Lilsis AB 2018

17 PEER-TO-PEER SECURE Architecture
Privacy by Design. Recommended for the GDPR. Attach a drone A smart home could be a peer PEER-TO-PEER SECURE Architecture © Lilsis AB 2018

18 SIMPLIFIED Architecture - based on xmpp
XMPP Broker XMPP Communication Distributed Object Database Browser UI Distributed Object Database IoT Gateway IoT Gateway © Lilsis AB 2018

19 System detail - showing two peers and Broker
Application Smart Contract Application Application Applications /APIs DOD-E Distributed Object Database (Encrypted) IoT Gateway IoT Gateway Secure Communication Layer IoT Harmonization Layer (IEEE) XMPP XMPP Broker Federation System Components © Lilsis AB 2018

20 reduced attack surfaces, Scaleable, Resilient
Local to Global © Lilsis AB 2018

21 Federation – Global, Scalable, resilient
© Lilsis AB 2018

22 A platform © Lilsis AB 2018 This Photo by Unknown Author is licensed under CC BY

23 It’s A platform Smart contracts without blockchain, Yay!
Low cost of ownership Write scripts APIs Applications The unique architecture supports smart contracts Smart contracts without blockchain, Yay! © Lilsis AB 2018

24 Proof of concept © Lilsis AB 2018

25 Lilsis AB and Secure Private Social Network with end-to-end encryption. Trust based (whitelist) with strong control over who sees your data. You can instantly revoke access to your data. For Machines (IoT Gateway) and People. Machines can be members of a social network group. Multi-protocol support for flexibility. Modular software design, scriptable with APIs. Control your devices and provision services, using IEEE IoT Harmonization. Browser UI for ease of customization and localization. Create your own corporate look and feel. Social network groups define access rights and privileges. Works on low cost PC hardware (2GB compute stick tested). Full back up and restore, encrypted database included! Option to have all hardware on premise for maximum security. Low energy too! © Lilsis AB 2018

26 demo UI Prototype (You can configure your own)
Embed Video Functions as a Social Network for Machines and People © Lilsis AB 2018

27 Chatting with sensors?!... Yes we can!
This is the Little Sister® client (Testsister) asking for more information about the node it is chatting with (by typing /). The reply This client has two nodes: actuator Sensor. Device ID I get the readout of the light sensor (it was at night) it’s 0.92% It’s not moved Readout complete….that’s all it has to display. © Lilsis AB 2018

28 What was the name of that Client (Raspberry PI)?
Chatting with a raspberry pi client “smclab2 full XMPP address is: I select node 2 (the sensor connected to the Raspberry Pi) by typing “2” smclab2 replies and acknowledges I have selected “node sensor”. As we have seen the topology has two nodes, we select the sensor. © Lilsis AB 2018

29 Let’s read the sensor in the daytime
Now that I have selected node 2, I can ask for a readout. I just need to type “?” This is the device id The light sensor reading is now 29.16%….well it is morning in Stockholm in November! The sensor is not in motion.. © Lilsis AB 2018

30 Access Denied! – Actuator Access control example
Fine tuning sensor/actuator access allows you to assign access to different utility companies, for example. Now I select node 1 It’s the actuator node, node 1. I have already accessed node 2, (light sensor). I ask for a readout. I just type “?” Access denied – I don’t have access to node 1 even though I can see it. © Lilsis AB 2018

31 Smart city standard contribution
© Lilsis AB 2018

32 with support from Sweden’s Internet foundation (IIS) Peter Waher’s smart City standard Contribution Builds on what we have developed so far. © Lilsis AB 2018

33 New Smart City Standard contribution - Project scope Funded by IIS (Sweden’s Internet Foundation) Five main areas of Peter Waher’s project: 1) Protocol Harmonization (over technical and protocol boundaries) 2) Interoperability 3) Identification (Strong identities, trust based whitelist). 4) Provisioning. 5) Market for sensor data and operations. Smart contracts. (Example: buy access to live HD drone data) © Lilsis AB 2018

34 USE Cases ? Smart Factory Smart People Smart Home Smart Community
City Drones Smart Infrastructure Smart Transport ? USE Cases © Lilsis AB 2018

35 conclusion © Lilsis AB 2018

36 More information and IoT Labs!
The project will culminate with some presentations and IoT Labs at Goto 10, the IIS meeting place. Located at the IIS offices, Hammarby Kaj 10D, SE Stockholm. More information and IoT Labs! © Lilsis AB 2018

37 Thank You! Questions? Stuart Mendelsohn Peter Waher
Lilsis AB, Stockholm, Sweden. Little Sister® is a registered trademark of Lilsis AB. Press Release (Swedish)


Download ppt "Make “The Edge" the centre of your security/privacy"

Similar presentations


Ads by Google