SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
Security IN 
the Internet of Things 
Victor Ake 
Victor.Ake@ForgeRock.com 
CTO Office/Co-Founder
2 
About me 
! 26 years experience in the IT Industry. 
! As a System Engineer, Networking, 
Security, Identity Relationship 
Management. Ericsson, IBM, 3Com, 
Sun Microsystems, ForgeRock 
! Co-Founder of FORGEROCK 
! CTO Office 
http://www.forgerock.com
3 
World Wide Web 
Mobile Internet 
Internet of things 
Image Source: Kelsey Austin. https://www.flickr.com/photos/kelseyrage/15362515989
4 
Despite the wave 
Information is the common key deliverable 
Telemetry (Health, Rockets, 
Energy, Aviation, etc) 
Device Identification 
Sensed Information 
Metered information 
Forget the HONEY! 
Source: Meadows R (2012) Understanding the Flight of the Bumblebee. PLoS Biol 10(9)
5 
Increasing Amount OF 
Security, 
Privacy & 
Safety 
Concerns
6 
Top barriers to iot and m2m adoption 
Source: Infonetics, January 2014.
7 
Security and privacy 
Data in Transit 
Data 
Access 
ACCESS 
Access 
Data 
Things MOBILE/ 
gateway 
CLOUD ENterprise 
Data 
Data 
ACCESS
8 
challenges 
Low friction human interaction 
Unique device identification 
Device Authenticity 
Device-user association 
Nature of the data 
Security vs Comfort / RISK vs REWARD 
Image Source: Sharkawi Che Din. https://www.flickr.com/photos/sharkawi3d/15374262331/
9 
More challenges 
Limited encryption capabilities 
Limited resources (RAM/ROM) 
Limited clock synchronization 
Firmware must be upgraded from time to time 
Image Soruce: Massimo Piccoli. https://www.flickr.com/photos/massimo_piccoli/12680390774/
10 
IoT security design rules 
" Build Security in, it can not be added later 
" Keep security mechanisms simple 
" Use existing standards 
" Obscurity does not provide security 
Image source: http://cdn.blickers.com/wp-content/uploads/2013/12/Leonardo-da-vinci2.jpg
11 
IoT security design rules 
" Encrypt sensitive data at rest and in transit 
" Use well-studied cryptographic building blocks 
" Identity and Access Management must be part 
of the design 
" Develop a realistic threat model 
Image source: http://cdn.blickers.com/wp-content/uploads/2013/12/Leonardo-da-vinci2.jpg
12 
Common Security Issues
13 
secure Web, Mobile and Cloud 
Interface 
" Do not allow default credentials 
" Assume device accessed Internally and Externally 
" Credentials should not be stored in plain text nor 
travel in unencrypted channels 
" Protect against account enumeration & implement 
account lockout 
" Protect against XSS, CSRF, SQLi 
" Implement an IAM/IRM system
14 
Implement an IAM/IRM System 
Identity creation, 
Authentication 
& 
Authorization
15 
Provisioning Device Identity 
IDM System 
I’m an Authentic device 
I’m unique (D) Verify authenticity 
Register me and registers device 
PKI (SE)
Register user, AuthN, claim ownership 
16 
Register me 
I own device D 
I allow device D to 
send data on my 
behalf to service S1 
for 1 day 
Verify identity of user, 
Register user, 
Authenticate user 
Proof possession of 
Device 
Create Relationship 
User-device 
Generates OAuth2 Token 
Provision Refresh and 
Access Token to device 
Authenticate 
Store R & A 
Tokens 
AM System 
PKI (SE)
17 
Device send data on behalf of user 
AM System 
Send Data (OAuth2 Token) 
Verify Device, OAuth2 
Access Token validity and 
Scope (authorization) 
PKI (SE) 
Refresh Token 
Associate data to Alice 
…. Token expired 
Negotiate new Access token 
Store A.Token New Access Token
18 
User shares data, revokes tokens 
AM with UMA 
System 
Authenticate 
I want to Share my data 
with My Insurance Company 
…. Lost my device 
Revoke token 
HTTP, MQTT, SASL 
PKI (SE)
19 
Network Services 
" Ensure only necessary ports are open 
" Ensure services are not vulnerable to buffer 
overflow and fuzzing attacks 
" Ensure services are not vulnerable to DoS attacks
20 
Transport encryption 
" Ensure data and credentials are encrypted while in 
transit 
" Use secure encrypted channels 
" Use good key lengths and good algorithms 
(Elliptic Curve provides efficient encrypting) 
" Protect against replay attacks
21 
Privacy as part of the design 
" Collect only the minimum necessary data for the 
functionality of the device 
" Ensure any sensitive data collected is properly 
protected with encryption 
" Ensure the device properly protects personal data 
Photo Source: Brian M (OCDBri): https://www.flickr.com/photos/ocdbri/14438661513
22 
Software/Firmware 
" Ensure your firmware does not contain hardcoded 
credentials or sensitive data 
" Use a secure channel to transmit the firmware during 
upgrades 
" Ensure the update is signed and verified before 
allowing the update 
" Do not send the public key with the firmware, use a 
hash 
" Ensure your SVN/GIT repositories do not contain the 
private keys
23 
Physical Security 
" Ensure physical access to your device is 
controlled 
" Accessible USB or SD ports can be a weakness 
" Can it be easily disassembled to access the 
internal storage (RAM/ROM) 
" If local data is sensitive, consider encrypting the 
data 
Image Source: http://conflictresearchgroupintl.com/wp-content/uploads/2014/03/How-to-Look-Like-a-Bouncer1.jpg
24 
Thank You! 
Security in the Internet of 
Things 
FORGEROCK.COM | LEGAL INFORMATION 
Victor Ake 
Victor.Ake@ForgeRock.com 
CTO Office

Contenu connexe

Tendances

Virtual private network
Virtual private networkVirtual private network
Virtual private network
Sowmia Sathyan
 

Tendances (20)

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
IoT Systems: Technology, Architecture & Performance
IoT Systems: Technology, Architecture & PerformanceIoT Systems: Technology, Architecture & Performance
IoT Systems: Technology, Architecture & Performance
 
Iot Security
Iot SecurityIot Security
Iot Security
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Network Security
Network Security Network Security
Network Security
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 

En vedette

The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
Julien Vermillard
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
MachinePulse
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
Thesis Scientist Private Limited
 

En vedette (20)

Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Internet of Things and Security challenges
Internet of Things and Security challengesInternet of Things and Security challenges
Internet of Things and Security challenges
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
When IoT Meets Artificial Intelligence
 When IoT Meets Artificial Intelligence When IoT Meets Artificial Intelligence
When IoT Meets Artificial Intelligence
 
Artificial intelligence and IoT
Artificial intelligence and IoTArtificial intelligence and IoT
Artificial intelligence and IoT
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoT
 
How AI connect dots for IoT
How AI connect dots for IoTHow AI connect dots for IoT
How AI connect dots for IoT
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
IoT + Big Data + Cloud + AI Integration Strategy Insights from Patents
IoT + Big Data + Cloud + AI Integration Strategy Insights from PatentsIoT + Big Data + Cloud + AI Integration Strategy Insights from Patents
IoT + Big Data + Cloud + AI Integration Strategy Insights from Patents
 
Innovation with AWS: IoT, Robotics and AI
Innovation with AWS: IoT, Robotics and AIInnovation with AWS: IoT, Robotics and AI
Innovation with AWS: IoT, Robotics and AI
 
Why the Internet of Things needs AI & interoperability to succeed
Why the Internet of Things needs AI & interoperability to succeedWhy the Internet of Things needs AI & interoperability to succeed
Why the Internet of Things needs AI & interoperability to succeed
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
 
Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 

Similaire à Security in the Internet of Things

IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
AuliaArifWardana
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
Ulf Mattsson
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
Sejahtera Affif
 

Similaire à Security in the Internet of Things (20)

IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platformSFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is Yours
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Health Information Privacy and Security (October 30, 2019)
Health Information Privacy and Security (October 30, 2019)Health Information Privacy and Security (October 30, 2019)
Health Information Privacy and Security (October 30, 2019)
 
INT 1010 05-1.pdf
INT 1010 05-1.pdfINT 1010 05-1.pdf
INT 1010 05-1.pdf
 
itmsday2.pptx
itmsday2.pptxitmsday2.pptx
itmsday2.pptx
 
Mobile security
Mobile securityMobile security
Mobile security
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced Threats
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Tokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and ComplianceTokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and Compliance
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Enterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security CasesEnterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security Cases
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 

Plus de ForgeRock

Plus de ForgeRock (20)

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Security in the Internet of Things

  • 1. Security IN the Internet of Things Victor Ake Victor.Ake@ForgeRock.com CTO Office/Co-Founder
  • 2. 2 About me ! 26 years experience in the IT Industry. ! As a System Engineer, Networking, Security, Identity Relationship Management. Ericsson, IBM, 3Com, Sun Microsystems, ForgeRock ! Co-Founder of FORGEROCK ! CTO Office http://www.forgerock.com
  • 3. 3 World Wide Web Mobile Internet Internet of things Image Source: Kelsey Austin. https://www.flickr.com/photos/kelseyrage/15362515989
  • 4. 4 Despite the wave Information is the common key deliverable Telemetry (Health, Rockets, Energy, Aviation, etc) Device Identification Sensed Information Metered information Forget the HONEY! Source: Meadows R (2012) Understanding the Flight of the Bumblebee. PLoS Biol 10(9)
  • 5. 5 Increasing Amount OF Security, Privacy & Safety Concerns
  • 6. 6 Top barriers to iot and m2m adoption Source: Infonetics, January 2014.
  • 7. 7 Security and privacy Data in Transit Data Access ACCESS Access Data Things MOBILE/ gateway CLOUD ENterprise Data Data ACCESS
  • 8. 8 challenges Low friction human interaction Unique device identification Device Authenticity Device-user association Nature of the data Security vs Comfort / RISK vs REWARD Image Source: Sharkawi Che Din. https://www.flickr.com/photos/sharkawi3d/15374262331/
  • 9. 9 More challenges Limited encryption capabilities Limited resources (RAM/ROM) Limited clock synchronization Firmware must be upgraded from time to time Image Soruce: Massimo Piccoli. https://www.flickr.com/photos/massimo_piccoli/12680390774/
  • 10. 10 IoT security design rules " Build Security in, it can not be added later " Keep security mechanisms simple " Use existing standards " Obscurity does not provide security Image source: http://cdn.blickers.com/wp-content/uploads/2013/12/Leonardo-da-vinci2.jpg
  • 11. 11 IoT security design rules " Encrypt sensitive data at rest and in transit " Use well-studied cryptographic building blocks " Identity and Access Management must be part of the design " Develop a realistic threat model Image source: http://cdn.blickers.com/wp-content/uploads/2013/12/Leonardo-da-vinci2.jpg
  • 13. 13 secure Web, Mobile and Cloud Interface " Do not allow default credentials " Assume device accessed Internally and Externally " Credentials should not be stored in plain text nor travel in unencrypted channels " Protect against account enumeration & implement account lockout " Protect against XSS, CSRF, SQLi " Implement an IAM/IRM system
  • 14. 14 Implement an IAM/IRM System Identity creation, Authentication & Authorization
  • 15. 15 Provisioning Device Identity IDM System I’m an Authentic device I’m unique (D) Verify authenticity Register me and registers device PKI (SE)
  • 16. Register user, AuthN, claim ownership 16 Register me I own device D I allow device D to send data on my behalf to service S1 for 1 day Verify identity of user, Register user, Authenticate user Proof possession of Device Create Relationship User-device Generates OAuth2 Token Provision Refresh and Access Token to device Authenticate Store R & A Tokens AM System PKI (SE)
  • 17. 17 Device send data on behalf of user AM System Send Data (OAuth2 Token) Verify Device, OAuth2 Access Token validity and Scope (authorization) PKI (SE) Refresh Token Associate data to Alice …. Token expired Negotiate new Access token Store A.Token New Access Token
  • 18. 18 User shares data, revokes tokens AM with UMA System Authenticate I want to Share my data with My Insurance Company …. Lost my device Revoke token HTTP, MQTT, SASL PKI (SE)
  • 19. 19 Network Services " Ensure only necessary ports are open " Ensure services are not vulnerable to buffer overflow and fuzzing attacks " Ensure services are not vulnerable to DoS attacks
  • 20. 20 Transport encryption " Ensure data and credentials are encrypted while in transit " Use secure encrypted channels " Use good key lengths and good algorithms (Elliptic Curve provides efficient encrypting) " Protect against replay attacks
  • 21. 21 Privacy as part of the design " Collect only the minimum necessary data for the functionality of the device " Ensure any sensitive data collected is properly protected with encryption " Ensure the device properly protects personal data Photo Source: Brian M (OCDBri): https://www.flickr.com/photos/ocdbri/14438661513
  • 22. 22 Software/Firmware " Ensure your firmware does not contain hardcoded credentials or sensitive data " Use a secure channel to transmit the firmware during upgrades " Ensure the update is signed and verified before allowing the update " Do not send the public key with the firmware, use a hash " Ensure your SVN/GIT repositories do not contain the private keys
  • 23. 23 Physical Security " Ensure physical access to your device is controlled " Accessible USB or SD ports can be a weakness " Can it be easily disassembled to access the internal storage (RAM/ROM) " If local data is sensitive, consider encrypting the data Image Source: http://conflictresearchgroupintl.com/wp-content/uploads/2014/03/How-to-Look-Like-a-Bouncer1.jpg
  • 24. 24 Thank You! Security in the Internet of Things FORGEROCK.COM | LEGAL INFORMATION Victor Ake Victor.Ake@ForgeRock.com CTO Office