Download presentation
Presentation is loading. Please wait.
Published byLoraine Angel Atkins Modified over 6 years ago
1
Make “The Edge" the centre of your security/privacy
Stuart Mendelsohn, Peter Waher Lilsis AB
2
a contribution to a new smart city standard
An overview… © Lilsis AB 2018
3
Contents Why is a new standard needed? Proposed solution
The danger of encryption “backdoors”. Architecture A platform Proof of concept Smart City standard contribution Conclusion. © Lilsis AB 2018
4
Why? © Lilsis AB 2018
5
"I don't know that much about cyber, but I do think that's the number one problem with mankind.“ Warren Buffett Cyber Threats © Lilsis AB 2018
6
What about threats to your privacy?
Do you want bank details and personal health information public? Do you want your car tracked by unknowns? Do you want your smart electricity meter to tell thieves when you are away? And a lot more potential breaches… No? That’s where our technology can be used! © Lilsis AB 2018
7
How Far Can the Surveillance Economy Go?
Harvard Business Review Uninformed Consent – Leslie K. John © Lilsis AB 2018
8
Proposed solution © Lilsis AB 2018
9
So Let’s use a more secure internet protocol stack with extra encryption
Based on XMPP and add extra encryption. “Edge” architecture, all hardware can be “on premise”. Encrypted database, IoT Gateway and backup included. © Lilsis AB 2018
10
XMPP - the Extensible Messaging and Presence Protocol
Core specifications are developed at the Internet Engineering Task Force (IETF) - see RFC , RFC 6121, and RFC 7622 (along with a WebSocket binding defined in RFC 7395). See IEEE P Standard for Harmonization of Internet of Things (IoT) Devices and Systems. © Lilsis AB 2018
11
The danger of encryption “backdoors”
© Lilsis AB 2018
12
At this point I better mention Backdoors!
Maiden Castle, England is around 2000 years old © Lilsis AB 2018
13
Imposing Defences but…
Front Door Back Door © Lilsis AB 2018
14
The Romans Attacked via the back door
Mass graves show the results of the Roman attack. Back Door © Lilsis AB 2018
15
The moral is… Backdoors are dangerous! We haven't put backdoors in, not for us or anyone else. © Lilsis AB 2018
16
architecture © Lilsis AB 2018
17
PEER-TO-PEER SECURE Architecture
Privacy by Design. Recommended for the GDPR. Attach a drone A smart home could be a peer PEER-TO-PEER SECURE Architecture © Lilsis AB 2018
18
SIMPLIFIED Architecture - based on xmpp
XMPP Broker XMPP Communication Distributed Object Database Browser UI Distributed Object Database IoT Gateway IoT Gateway © Lilsis AB 2018
19
System detail - showing two peers and Broker
Application Smart Contract Application Application Applications /APIs DOD-E Distributed Object Database (Encrypted) IoT Gateway IoT Gateway Secure Communication Layer IoT Harmonization Layer (IEEE) XMPP XMPP Broker Federation System Components © Lilsis AB 2018
20
reduced attack surfaces, Scaleable, Resilient
Local to Global © Lilsis AB 2018
21
Federation – Global, Scalable, resilient
© Lilsis AB 2018
22
A platform © Lilsis AB 2018 This Photo by Unknown Author is licensed under CC BY
23
It’s A platform Smart contracts without blockchain, Yay!
Low cost of ownership Write scripts APIs Applications The unique architecture supports smart contracts Smart contracts without blockchain, Yay! © Lilsis AB 2018
24
Proof of concept © Lilsis AB 2018
25
Lilsis AB and Secure Private Social Network with end-to-end encryption. Trust based (whitelist) with strong control over who sees your data. You can instantly revoke access to your data. For Machines (IoT Gateway) and People. Machines can be members of a social network group. Multi-protocol support for flexibility. Modular software design, scriptable with APIs. Control your devices and provision services, using IEEE IoT Harmonization. Browser UI for ease of customization and localization. Create your own corporate look and feel. Social network groups define access rights and privileges. Works on low cost PC hardware (2GB compute stick tested). Full back up and restore, encrypted database included! Option to have all hardware on premise for maximum security. Low energy too! © Lilsis AB 2018
26
demo UI Prototype (You can configure your own)
Embed Video Functions as a Social Network for Machines and People © Lilsis AB 2018
27
Chatting with sensors?!... Yes we can!
This is the Little Sister® client (Testsister) asking for more information about the node it is chatting with (by typing /). The reply This client has two nodes: actuator Sensor. Device ID I get the readout of the light sensor (it was at night) it’s 0.92% It’s not moved Readout complete….that’s all it has to display. © Lilsis AB 2018
28
What was the name of that Client (Raspberry PI)?
Chatting with a raspberry pi client “smclab2 full XMPP address is: I select node 2 (the sensor connected to the Raspberry Pi) by typing “2” smclab2 replies and acknowledges I have selected “node sensor”. As we have seen the topology has two nodes, we select the sensor. © Lilsis AB 2018
29
Let’s read the sensor in the daytime
Now that I have selected node 2, I can ask for a readout. I just need to type “?” This is the device id The light sensor reading is now 29.16%….well it is morning in Stockholm in November! The sensor is not in motion.. © Lilsis AB 2018
30
Access Denied! – Actuator Access control example
Fine tuning sensor/actuator access allows you to assign access to different utility companies, for example. Now I select node 1 It’s the actuator node, node 1. I have already accessed node 2, (light sensor). I ask for a readout. I just type “?” Access denied – I don’t have access to node 1 even though I can see it. © Lilsis AB 2018
31
Smart city standard contribution
© Lilsis AB 2018
32
with support from Sweden’s Internet foundation (IIS) Peter Waher’s smart City standard Contribution Builds on what we have developed so far. © Lilsis AB 2018
33
New Smart City Standard contribution - Project scope Funded by IIS (Sweden’s Internet Foundation) Five main areas of Peter Waher’s project: 1) Protocol Harmonization (over technical and protocol boundaries) 2) Interoperability 3) Identification (Strong identities, trust based whitelist). 4) Provisioning. 5) Market for sensor data and operations. Smart contracts. (Example: buy access to live HD drone data) © Lilsis AB 2018
34
USE Cases ? Smart Factory Smart People Smart Home Smart Community
City Drones Smart Infrastructure Smart Transport ? USE Cases © Lilsis AB 2018
35
conclusion © Lilsis AB 2018
36
More information and IoT Labs!
The project will culminate with some presentations and IoT Labs at Goto 10, the IIS meeting place. Located at the IIS offices, Hammarby Kaj 10D, SE Stockholm. More information and IoT Labs! © Lilsis AB 2018
37
Thank You! Questions? Stuart Mendelsohn Peter Waher
Lilsis AB, Stockholm, Sweden. Little Sister® is a registered trademark of Lilsis AB. Press Release (Swedish)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.