SlideShare a Scribd company logo
1 of 27
Download to read offline
All Rights Reserved | FIDO Alliance | Copyright 20181
Using Fido Authenticator
for IoT devices
Stephen Oh
eWBM
All Rights Reserved | FIDO Alliance | Copyright 20182
AGENDA
1. eWBM’s Authenticator
2. Fido and IoT Application
3. Conclusion
All Rights Reserved | FIDO Alliance | Copyright 2018
eWBM’s
Biometric External FIDO
Authenticator
All Rights Reserved | FIDO Alliance | Copyright 20184
eWBM’s Fido Authenticators
All Rights Reserved | FIDO Alliance | Copyright 2018
FIDOUSBAuthenticatorModel1
5
All Rights Reserved | FIDO Alliance | Copyright 2018
USB for PC
Protection Sleeve
Snooping Resistance
Fingerprint sensor
Aluminum body for
Device integrity
(Metal preferable for
finger pushing application)
[Inside]
Secure chip for Maximum security
(both fingerprint recognition and
Fido protocol happen inside the chip)
All biometric data stored inside the chip encrypted
– no one can access the stored information
eWBM’s device
6
All Rights Reserved | FIDO Alliance | Copyright 2018
FIDOUSBAuthenticatorModel2
7
All Rights Reserved | FIDO Alliance | Copyright 2018
eWBM’s device
USB for PC
Snooping Resistance
Fingerprint sensor
[Inside] Secure chip for Maximum security
(both fingerprint recognition and
Fido protocol happen inside the chip)
All biometric data stored inside the chip encrypted
– no one can access the stored information
FCC, CE, KC
8
All Rights Reserved | FIDO Alliance | Copyright 2018999999
Inside eWBM’s Fido2 Authenticator
USB Chip MS500
SPI
SPI
USBTypeA
1. All Crypto functions
2. Fido Protocol
3. Fingerprint Recognition Algorithm
4. Fingerprint templates stored encrypted
5. All Crypto keys stored encrypted
6. Each device has its own unique key set
7. Secure Booting
Fingerprint sensor
All Rights Reserved | FIDO Alliance | Copyright 2018
Fido Authentication and IoT
Application
All Rights Reserved | FIDO Alliance | Copyright 2018111111111111
Fido Security Level (L2) & IoT
• Why L2 for typical consumer usage?
• Security Level 2 definition:
• “Authenticator Certification Level 2 (L2) evaluates FIDO
Authenticator protection against basic, scalable attacks.”
(fidoalliance.org)
→L2 Authenticator is the minimum requirement for
potential basic attacks (L1 is mostly SW implementation).
• IoT Security Concern
• IoT lifecycle (~10 years) is much longer than that of
development period
• Vulnerability chance is high for IoT device → protection
mechanism against attacks is mandatory
• Any Fido authenticator for IoT application is
recommended to achieve L2 security Level.
eWBM’s Fido Authenticator is backed by
one of the most secure MCUs in the industry,
MS500.
All Rights Reserved | FIDO Alliance | Copyright 2018
What is LoRa?
LoRa (Long Range) is a digital wireless data communication technology for Low power Wide Area
network (LPWA). LoRa uses license-free sub-gigahertz radio frequency bands like 169 MHz,
433 MHz, 868 MHz (Europe) and 915 MHz (North America). LoRa enables very-long-range
transmissions (more than 10 km in rural areas) with low power consumption. (Wikipedia)
- Data Rate < 10Kbps
- Battery life >10 years
- Security feature:
- AES-128
- three (3) keys: NwkSKey, AppSKey, AppKey
- NwkSkey for device authentication (PSK)
12
All Rights Reserved | FIDO Alliance | Copyright 2018
Lora Module EVB + Ext Ant.
Rural Mountain
7 km
Inside
Building
LoRa Field Test
13
All Rights Reserved | FIDO Alliance | Copyright 2018
What is LoRa?
We need stronger device authentication for LoRa application.
TLS is too complex for LoRa application (LoRa’s packet size is small and data rate slow)
14
All Rights Reserved | FIDO Alliance | Copyright 2018
LoRa device Authentication via Fido?
- Instead of using PSK (pre-shared key) NwkSKey for device authentication, use Fido Authentication.
Authenticator Cloud (RP)FidoAuthentication overLoRa
challenge
(signed) response
- No Shared Key
- No User Verification required
(“silent” authentication)
- No Cumbersome Key provisioning
- May need to slim down Fido protocol
- Attestation Key + Metadata insertion
shall be done at manufacturing site
Fido IoT Authentication needs:
- Reduce amount data exchange
- Remove Client (Platform) layer or
collapse into authenticator for IoT Application
- Stronger Device Security feature
15
All Rights Reserved | FIDO Alliance | Copyright 2018
Fido Authentication for IoT
Access Control
All Rights Reserved | FIDO Alliance | Copyright 2018
Fido over LoRa Network (example)
Cloud (RP)FidoAuthentication
UserVerification
Remote LoRabased
LockSystem
Unlock
Approval after
User
Authentication
Proof of Presence
Biometric
Fido Authenticator
- Need to develop smaller ASM or
Client for embedded system
LoRa Network
 User
Request unlock
User
Authentication
done
RP grants
user’s request
17
All Rights Reserved | FIDO Alliance | Copyright 2018
Fido for Drone Controller (example)
Cloud (RP)Fido AuthenticationUser Verification
After Successful Fido Authentication,
Device is ready to use
Usage Approval
Proof of Presence
Biometric
Fido Authenticator
- Need to develop smaller ASM or
Client for embedded system
18
All Rights Reserved | FIDO Alliance | Copyright 2018
Public Wifi Access Control (example)
Cloud (RP)
Fido Authentication
User Verification
After Successful Fido
Authentication,
Wifi AP will allow the
user data access
User Approval
Proof of Presence
Biometric
Fido Authenticator/
19
Proof of Presence
Biometric
Fido Authenticator
All Rights Reserved | FIDO Alliance | Copyright 2018
Personal BLE Fido device
for Voice Assistant
Platform
All Rights Reserved | FIDO Alliance | Copyright 201821
Smart Speaker Issues
All Rights Reserved | FIDO Alliance | Copyright 2018222222222222
Smart Speaker needs more than just voice command
https://www.americanbanker.com/news/is-
amazons-alexa-ready-for-p2p-payments
All Rights Reserved | FIDO Alliance | Copyright 2018
Public vs Personalized wake-up words
Public wake-up word
Wake-up word with User Authentication
23
From Star Trek “Voyager Home (1986)”
Star Trek, the Next Generation
All Rights Reserved | FIDO Alliance | Copyright 2018
Smart Speaker Platform over multiple devices
BLE Fido Authenticator
for personalized service
CTAP2
24
All Rights Reserved | FIDO Alliance | Copyright 2018
Why BLE Fido Authenticator for Smart Speaker System?
Use only one voice service
with multiple machines
(phone, speaker, laptop, etc)
A team uses one smart speaker
while each member receives tailor-
made service.
25
All Rights Reserved | FIDO Alliance | Copyright 201826
BLE Authenticator Demo
All Rights Reserved | FIDO Alliance | Copyright 201827
Conclusion
• Presented three (3) Fido Authentication based IoT Applications
• Silent Fido Authentication
• Fido Authentication for IoT Access Control
• BLE Fido Authenticator for Smart Speaker Application
• Need to work on slim-down ASM (or Client) implementation for
embedded environment
• For IoT Application, we strongly believe that Fido Authenticator shall
achieve Security Level 2 (L2) or higher certification to protect from attacks
over a long period of time.

More Related Content

What's hot

What's hot (20)

FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations
 
Beyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationBeyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User Authentication
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
 
FIDO Alliance Vision and Status
FIDO Alliance Vision and StatusFIDO Alliance Vision and Status
FIDO Alliance Vision and Status
 
FIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and RecommendationsFIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and Recommendations
 
FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive Authentication
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social Applications
 
Shopping Service Based on FIDO Voice Authentication
Shopping Service Based on FIDO Voice AuthenticationShopping Service Based on FIDO Voice Authentication
Shopping Service Based on FIDO Voice Authentication
 
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
 
FIDO And the Future of User Authentication
FIDO And the Future of User AuthenticationFIDO And the Future of User Authentication
FIDO And the Future of User Authentication
 
FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA Session
 
The Value of FIDO Certification
The Value of FIDO CertificationThe Value of FIDO Certification
The Value of FIDO Certification
 
Introduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationIntroduction to FIDO Biometric Authentication
Introduction to FIDO Biometric Authentication
 
FIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory LandscapeFIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory Landscape
 
FIDO2 & Microsoft
FIDO2 & MicrosoftFIDO2 & Microsoft
FIDO2 & Microsoft
 
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
 
Lifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key DeploymentsLifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key Deployments
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 

Similar to Using FIDO Authenticator for IoT Devices

Similar to Using FIDO Authenticator for IoT Devices (20)

Implementation Case Study by eWBM
Implementation Case Study by eWBMImplementation Case Study by eWBM
Implementation Case Study by eWBM
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoT
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 
FTNT_Icon-Library-External-February-2023.pptx
FTNT_Icon-Library-External-February-2023.pptxFTNT_Icon-Library-External-February-2023.pptx
FTNT_Icon-Library-External-February-2023.pptx
 
Introduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & StatusIntroduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & Status
 
FTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptxFTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptx
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer Authentication
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellIntroduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for Authentication
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
FIDO Authentication & Blockchain
FIDO Authentication & BlockchainFIDO Authentication & Blockchain
FIDO Authentication & Blockchain
 
Tokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and StatusTokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and Status
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 

More from FIDO Alliance

Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
FIDO Alliance
 

More from FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
 

Recently uploaded

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 

Using FIDO Authenticator for IoT Devices

  • 1. All Rights Reserved | FIDO Alliance | Copyright 20181 Using Fido Authenticator for IoT devices Stephen Oh eWBM
  • 2. All Rights Reserved | FIDO Alliance | Copyright 20182 AGENDA 1. eWBM’s Authenticator 2. Fido and IoT Application 3. Conclusion
  • 3. All Rights Reserved | FIDO Alliance | Copyright 2018 eWBM’s Biometric External FIDO Authenticator
  • 4. All Rights Reserved | FIDO Alliance | Copyright 20184 eWBM’s Fido Authenticators
  • 5. All Rights Reserved | FIDO Alliance | Copyright 2018 FIDOUSBAuthenticatorModel1 5
  • 6. All Rights Reserved | FIDO Alliance | Copyright 2018 USB for PC Protection Sleeve Snooping Resistance Fingerprint sensor Aluminum body for Device integrity (Metal preferable for finger pushing application) [Inside] Secure chip for Maximum security (both fingerprint recognition and Fido protocol happen inside the chip) All biometric data stored inside the chip encrypted – no one can access the stored information eWBM’s device 6
  • 7. All Rights Reserved | FIDO Alliance | Copyright 2018 FIDOUSBAuthenticatorModel2 7
  • 8. All Rights Reserved | FIDO Alliance | Copyright 2018 eWBM’s device USB for PC Snooping Resistance Fingerprint sensor [Inside] Secure chip for Maximum security (both fingerprint recognition and Fido protocol happen inside the chip) All biometric data stored inside the chip encrypted – no one can access the stored information FCC, CE, KC 8
  • 9. All Rights Reserved | FIDO Alliance | Copyright 2018999999 Inside eWBM’s Fido2 Authenticator USB Chip MS500 SPI SPI USBTypeA 1. All Crypto functions 2. Fido Protocol 3. Fingerprint Recognition Algorithm 4. Fingerprint templates stored encrypted 5. All Crypto keys stored encrypted 6. Each device has its own unique key set 7. Secure Booting Fingerprint sensor
  • 10. All Rights Reserved | FIDO Alliance | Copyright 2018 Fido Authentication and IoT Application
  • 11. All Rights Reserved | FIDO Alliance | Copyright 2018111111111111 Fido Security Level (L2) & IoT • Why L2 for typical consumer usage? • Security Level 2 definition: • “Authenticator Certification Level 2 (L2) evaluates FIDO Authenticator protection against basic, scalable attacks.” (fidoalliance.org) →L2 Authenticator is the minimum requirement for potential basic attacks (L1 is mostly SW implementation). • IoT Security Concern • IoT lifecycle (~10 years) is much longer than that of development period • Vulnerability chance is high for IoT device → protection mechanism against attacks is mandatory • Any Fido authenticator for IoT application is recommended to achieve L2 security Level. eWBM’s Fido Authenticator is backed by one of the most secure MCUs in the industry, MS500.
  • 12. All Rights Reserved | FIDO Alliance | Copyright 2018 What is LoRa? LoRa (Long Range) is a digital wireless data communication technology for Low power Wide Area network (LPWA). LoRa uses license-free sub-gigahertz radio frequency bands like 169 MHz, 433 MHz, 868 MHz (Europe) and 915 MHz (North America). LoRa enables very-long-range transmissions (more than 10 km in rural areas) with low power consumption. (Wikipedia) - Data Rate < 10Kbps - Battery life >10 years - Security feature: - AES-128 - three (3) keys: NwkSKey, AppSKey, AppKey - NwkSkey for device authentication (PSK) 12
  • 13. All Rights Reserved | FIDO Alliance | Copyright 2018 Lora Module EVB + Ext Ant. Rural Mountain 7 km Inside Building LoRa Field Test 13
  • 14. All Rights Reserved | FIDO Alliance | Copyright 2018 What is LoRa? We need stronger device authentication for LoRa application. TLS is too complex for LoRa application (LoRa’s packet size is small and data rate slow) 14
  • 15. All Rights Reserved | FIDO Alliance | Copyright 2018 LoRa device Authentication via Fido? - Instead of using PSK (pre-shared key) NwkSKey for device authentication, use Fido Authentication. Authenticator Cloud (RP)FidoAuthentication overLoRa challenge (signed) response - No Shared Key - No User Verification required (“silent” authentication) - No Cumbersome Key provisioning - May need to slim down Fido protocol - Attestation Key + Metadata insertion shall be done at manufacturing site Fido IoT Authentication needs: - Reduce amount data exchange - Remove Client (Platform) layer or collapse into authenticator for IoT Application - Stronger Device Security feature 15
  • 16. All Rights Reserved | FIDO Alliance | Copyright 2018 Fido Authentication for IoT Access Control
  • 17. All Rights Reserved | FIDO Alliance | Copyright 2018 Fido over LoRa Network (example) Cloud (RP)FidoAuthentication UserVerification Remote LoRabased LockSystem Unlock Approval after User Authentication Proof of Presence Biometric Fido Authenticator - Need to develop smaller ASM or Client for embedded system LoRa Network  User Request unlock User Authentication done RP grants user’s request 17
  • 18. All Rights Reserved | FIDO Alliance | Copyright 2018 Fido for Drone Controller (example) Cloud (RP)Fido AuthenticationUser Verification After Successful Fido Authentication, Device is ready to use Usage Approval Proof of Presence Biometric Fido Authenticator - Need to develop smaller ASM or Client for embedded system 18
  • 19. All Rights Reserved | FIDO Alliance | Copyright 2018 Public Wifi Access Control (example) Cloud (RP) Fido Authentication User Verification After Successful Fido Authentication, Wifi AP will allow the user data access User Approval Proof of Presence Biometric Fido Authenticator/ 19 Proof of Presence Biometric Fido Authenticator
  • 20. All Rights Reserved | FIDO Alliance | Copyright 2018 Personal BLE Fido device for Voice Assistant Platform
  • 21. All Rights Reserved | FIDO Alliance | Copyright 201821 Smart Speaker Issues
  • 22. All Rights Reserved | FIDO Alliance | Copyright 2018222222222222 Smart Speaker needs more than just voice command https://www.americanbanker.com/news/is- amazons-alexa-ready-for-p2p-payments
  • 23. All Rights Reserved | FIDO Alliance | Copyright 2018 Public vs Personalized wake-up words Public wake-up word Wake-up word with User Authentication 23 From Star Trek “Voyager Home (1986)” Star Trek, the Next Generation
  • 24. All Rights Reserved | FIDO Alliance | Copyright 2018 Smart Speaker Platform over multiple devices BLE Fido Authenticator for personalized service CTAP2 24
  • 25. All Rights Reserved | FIDO Alliance | Copyright 2018 Why BLE Fido Authenticator for Smart Speaker System? Use only one voice service with multiple machines (phone, speaker, laptop, etc) A team uses one smart speaker while each member receives tailor- made service. 25
  • 26. All Rights Reserved | FIDO Alliance | Copyright 201826 BLE Authenticator Demo
  • 27. All Rights Reserved | FIDO Alliance | Copyright 201827 Conclusion • Presented three (3) Fido Authentication based IoT Applications • Silent Fido Authentication • Fido Authentication for IoT Access Control • BLE Fido Authenticator for Smart Speaker Application • Need to work on slim-down ASM (or Client) implementation for embedded environment • For IoT Application, we strongly believe that Fido Authenticator shall achieve Security Level 2 (L2) or higher certification to protect from attacks over a long period of time.