SlideShare une entreprise Scribd logo
1  sur  22
Authorization
for Internet of Things
using OAuth 2.0
Samuel Erdtman
samuel.erdtman@nexusgroup.com
Hannes Tschofenig
hannes.tschofenig@arm.com
© TechCon20152
Agenda
 Design Patterns
 Architecture
 Technology Big Picture
 Demo
 Summary
© TechCon20153
Design Patterns
 A design pattern is a general reusable solution to a commonly
occurring problem.
 A few design patterns have emerged in the IoT space, as
described in RFC 7452 and recent Internet Society IoT
whitepaper.
© TechCon20154
Backend Data Portability
 Devices upload data to the cloud operated by a specific vendor.
 Backend data sharing of protected data via OAuth-alike mechanisms and
RESTful APIs.
https://developer.carvoyant.com/page
http://www.mapmyfitness.com/
© TechCon20155
 Device talks directly to other device (often smart phone).
Security based on direct relationship between the device
(pairing).
Vendor A Vendor BE.g. Bluetooth Smart,
Thread
Device-to-Device Communication
© TechCon20156
Examples
Wahoo Heart-Rate
Monitor
Beacons
Cadence Sensor
Parrot
Hearing Aid
© TechCon20157
What if?
 IoT devices need to be accessed by multiple users
securely?
 Access rights dynamically change?
 Access rights are fine-grained?
 Number of IoT devices is large?
 Access policies need to be managed centrally?
 Access rights can be delegated?
 System has to be integrated in a larger context
(e.g., other, existing identity management
infrastructures)
Architecture
© TechCon20159
Client
Authorization
Server
Resource
Device
Management
Server
Response
Request
Token
Token
Client Info
© TechCon201510
HMAC-SHA256 (AS-RS Key)HMAC-SHA256 (PoP Key)
Request Example
Head
Body
{
“action” : “open”
}
Head
{
“alg” : “HMAC-SHA256”
“exp” : “1300819380”
“iv” : “<iv>”
}
Body
{
“scope” : “open”,
“audience” : “door lock foo-bar”,
“key” : “<encrypted key”>
}
{
“alg” : “HMAC-SHA256”,
“token” : “<access token>”,
“timestamp” : “1300919380”
}
Request Access Token
Technology Big Picture
© TechCon201512
ACE WG
 Authentication and Authorization for Constrained Environments
(ace) aims to standardize solutions for interoperable security for
IoT.
 Relevant documents:
 IoT Use Cases – draft-ietf-ace-usecases
 OAuth 2.0 Profile for IoT – draft-seitz-ace-oauth-authz
 Charter: http://datatracker.ietf.org/wg/ace/charter/
© TechCon201513
OAuth WG
 Authorization protocol widely used on the Web and on smart
phones.
 Core OAuth 2.0 functionality specified in RFC 6749
 Charter: https://tools.ietf.org/wg/oauth/
 Proof of Possession Security Extension
 Architecture – draft-ietf-oauth-pop-architecture
 Key Distribution – draft-ietf-oauth-pop-key-distribution
 JSON Web Token (JWT) – RFC 7519
 JWT Key Claim – draft-ietf-oauth-proof-of-possession
 Browser views allow for a secure browser context inside the native
app now available for Android and IOS
(described in draft-wdenniss-oauth-native-apps).
Example code available for Android and IOS.
© TechCon201514
COSE WG
 Concise Binary Object Representation (CBOR), RFC 7049,
defines an efficient binary encoding based on the JSON data
model.
 CBOR Object Signing and Encryption (COSE) offers security
services for CBOR-based structures.
 Functions:
 Signing, Encryption, Key Exchange, and Key Representation
 Charter: https://datatracker.ietf.org/wg/cose/charter/
© TechCon201515
OpenID Connect
 Builds on OAuth 2.0 and provides support for federated login
and the ability to convey authentication information.
 Organization offers self-certification program.
 Work done in working groups, such as the Heart working group.
 Main specifications can be found at
http://openid.net/developers/specs/
 Additional information about the organization can be found at
http://openid.net
© TechCon201516
UMA
 User Managed Access (UMA)
 OAuth-based protocol designed to give users a unified control
point for authorizing who and what can get access to their data
and devices.
 Separates resource owner from requesting party.
 More information available at:
http://kantarainitiative.org/confluence/display/uma/Home
© TechCon201517
OMA LWM2M
 Lightweight Machine-to-Machine Communication (LWM2M)
 http://openmobilealliance.org
 Specification available for download at
http://technical.openmobilealliance.org/Technical/technical-
information/release-program/current-releases/oma-
lightweightm2m-v1-0
 Functionality:
 Device management
 Key Provisioning
 Firmware Updates
© TechCon201518
FIDO
 The FIDO (Fast IDentity Online) Alliance was formed in July
2012 to address the lack of interoperability among strong
authentication technologies, and remedy the problems users
face with creating and remembering multiple usernames and
passwords.
 Specifications at https://fidoalliance.org/specifications
 Universal Second Factor (U2F) protocol
 Universal Authentication Framework (UAF) protocol
 More info about the alliance, certification programs and tutorials
at https://fidoalliance.org
Demo
© TechCon201520
Technologies used in Demo Setup
 OAuth 2.0 & Extensions
 OAuth 2.0 Proof of Possession
 OAuth 2.0 IoT profile
 JSON Web Token (JWT)
 Bluetooth Smart
 ARM mbed
 Android app
Nordic nRF51-DK
© TechCon201521
© TechCon201522
Summary
 There are ongoing standardization efforts. Help us make the
specifications better.
 Technologies and eco-systems can be re-used to solve IoT
security challenges.
 Code is available. We are planning to add more to make
development easier.

Contenu connexe

Tendances

Building the Internet of Things
Building the Internet of ThingsBuilding the Internet of Things
Building the Internet of Things
Angelo Corsaro
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
TransUnion
 

Tendances (20)

IoT Seminar (Oct. 2016) Juan Perez - Microsoft
IoT Seminar (Oct. 2016) Juan Perez - MicrosoftIoT Seminar (Oct. 2016) Juan Perez - Microsoft
IoT Seminar (Oct. 2016) Juan Perez - Microsoft
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
 
Creator IoT Framework
Creator IoT FrameworkCreator IoT Framework
Creator IoT Framework
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
 
Building the Internet of Things
Building the Internet of ThingsBuilding the Internet of Things
Building the Internet of Things
 
From IoT Central to IoT Hub
From IoT Central to IoT HubFrom IoT Central to IoT Hub
From IoT Central to IoT Hub
 
Device Management for OSGi IoT Gateways
Device Management for OSGi IoT GatewaysDevice Management for OSGi IoT Gateways
Device Management for OSGi IoT Gateways
 
What's the Right Messaging Standard for the IoT?
What's the Right Messaging  Standard for the IoT?What's the Right Messaging  Standard for the IoT?
What's the Right Messaging Standard for the IoT?
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
 
IoT, Demystified
IoT, DemystifiedIoT, Demystified
IoT, Demystified
 
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE Global Summit - Real-time Media Stream Processing Using KurentoFIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
 
Using open source for IoT
Using open source for IoTUsing open source for IoT
Using open source for IoT
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
 
How do you manage Internet of Things (IoT) devices at scale
How do you manage Internet of Things (IoT) devices at scaleHow do you manage Internet of Things (IoT) devices at scale
How do you manage Internet of Things (IoT) devices at scale
 
IoT Seminar (Oct. 2016) Jong Young Lee - MDS Technology
IoT Seminar (Oct. 2016) Jong Young Lee - MDS TechnologyIoT Seminar (Oct. 2016) Jong Young Lee - MDS Technology
IoT Seminar (Oct. 2016) Jong Young Lee - MDS Technology
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
Iot gateways march 2015
Iot gateways march 2015Iot gateways march 2015
Iot gateways march 2015
 
Elements of IoT connectivity technologies
Elements of IoT connectivity technologiesElements of IoT connectivity technologies
Elements of IoT connectivity technologies
 

Similaire à Authorization for Internet of Things using OAuth 2.0

Webinar WebRTC HTML5 (english)
Webinar WebRTC HTML5 (english)Webinar WebRTC HTML5 (english)
Webinar WebRTC HTML5 (english)
Quobis
 

Similaire à Authorization for Internet of Things using OAuth 2.0 (20)

What is WebRTC and How does it work?
What is WebRTC and How does it work?What is WebRTC and How does it work?
What is WebRTC and How does it work?
 
Open Source Edge Computing Platforms - Overview
Open Source Edge Computing Platforms - OverviewOpen Source Edge Computing Platforms - Overview
Open Source Edge Computing Platforms - Overview
 
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
 
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
 
Developers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivity
Developers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivityDevelopers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivity
Developers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivity
 
Webinar WebRTC HTML5 (english)
Webinar WebRTC HTML5 (english)Webinar WebRTC HTML5 (english)
Webinar WebRTC HTML5 (english)
 
Pkewebrtc
PkewebrtcPkewebrtc
Pkewebrtc
 
Open Source Predictive Analytics Pipeline with Apache NiFi and MiniFi Princeton
Open Source Predictive Analytics Pipeline with Apache NiFi and MiniFi PrincetonOpen Source Predictive Analytics Pipeline with Apache NiFi and MiniFi Princeton
Open Source Predictive Analytics Pipeline with Apache NiFi and MiniFi Princeton
 
Open platform communication
Open platform communicationOpen platform communication
Open platform communication
 
S01 gae and_hybrid_app_v1.0
S01 gae and_hybrid_app_v1.0S01 gae and_hybrid_app_v1.0
S01 gae and_hybrid_app_v1.0
 
Html5 RTC - 1
Html5 RTC  - 1Html5 RTC  - 1
Html5 RTC - 1
 
The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...
The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...
The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...
 
IoT Gateway Introduction
IoT Gateway IntroductionIoT Gateway Introduction
IoT Gateway Introduction
 
IoT digest. March 2018
IoT digest. March 2018IoT digest. March 2018
IoT digest. March 2018
 
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They KeyOAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
 
Dart on Arm - Flutter Bangalore June 2021
Dart on Arm - Flutter Bangalore June 2021Dart on Arm - Flutter Bangalore June 2021
Dart on Arm - Flutter Bangalore June 2021
 
FIWARE Generic Enablers introduction
FIWARE Generic Enablers introductionFIWARE Generic Enablers introduction
FIWARE Generic Enablers introduction
 
FIWARE Overview of Generic Enablers
FIWARE Overview of Generic EnablersFIWARE Overview of Generic Enablers
FIWARE Overview of Generic Enablers
 
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
 
InduSoft IoTView
InduSoft IoTViewInduSoft IoTView
InduSoft IoTView
 

Plus de Hannes Tschofenig

A guide to make your research less successful
A guide to make your research less successfulA guide to make your research less successful
A guide to make your research less successful
Hannes Tschofenig
 

Plus de Hannes Tschofenig (6)

Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
 
Device Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2MDevice Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2M
 
Smart Object Architecture
Smart Object ArchitectureSmart Object Architecture
Smart Object Architecture
 
UMA for ACE
UMA for ACEUMA for ACE
UMA for ACE
 
How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?
 
A guide to make your research less successful
A guide to make your research less successfulA guide to make your research less successful
A guide to make your research less successful
 

Dernier

+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Dernier (20)

Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 

Authorization for Internet of Things using OAuth 2.0

  • 1. Authorization for Internet of Things using OAuth 2.0 Samuel Erdtman samuel.erdtman@nexusgroup.com Hannes Tschofenig hannes.tschofenig@arm.com
  • 2. © TechCon20152 Agenda  Design Patterns  Architecture  Technology Big Picture  Demo  Summary
  • 3. © TechCon20153 Design Patterns  A design pattern is a general reusable solution to a commonly occurring problem.  A few design patterns have emerged in the IoT space, as described in RFC 7452 and recent Internet Society IoT whitepaper.
  • 4. © TechCon20154 Backend Data Portability  Devices upload data to the cloud operated by a specific vendor.  Backend data sharing of protected data via OAuth-alike mechanisms and RESTful APIs. https://developer.carvoyant.com/page http://www.mapmyfitness.com/
  • 5. © TechCon20155  Device talks directly to other device (often smart phone). Security based on direct relationship between the device (pairing). Vendor A Vendor BE.g. Bluetooth Smart, Thread Device-to-Device Communication
  • 7. © TechCon20157 What if?  IoT devices need to be accessed by multiple users securely?  Access rights dynamically change?  Access rights are fine-grained?  Number of IoT devices is large?  Access policies need to be managed centrally?  Access rights can be delegated?  System has to be integrated in a larger context (e.g., other, existing identity management infrastructures)
  • 10. © TechCon201510 HMAC-SHA256 (AS-RS Key)HMAC-SHA256 (PoP Key) Request Example Head Body { “action” : “open” } Head { “alg” : “HMAC-SHA256” “exp” : “1300819380” “iv” : “<iv>” } Body { “scope” : “open”, “audience” : “door lock foo-bar”, “key” : “<encrypted key”> } { “alg” : “HMAC-SHA256”, “token” : “<access token>”, “timestamp” : “1300919380” } Request Access Token
  • 12. © TechCon201512 ACE WG  Authentication and Authorization for Constrained Environments (ace) aims to standardize solutions for interoperable security for IoT.  Relevant documents:  IoT Use Cases – draft-ietf-ace-usecases  OAuth 2.0 Profile for IoT – draft-seitz-ace-oauth-authz  Charter: http://datatracker.ietf.org/wg/ace/charter/
  • 13. © TechCon201513 OAuth WG  Authorization protocol widely used on the Web and on smart phones.  Core OAuth 2.0 functionality specified in RFC 6749  Charter: https://tools.ietf.org/wg/oauth/  Proof of Possession Security Extension  Architecture – draft-ietf-oauth-pop-architecture  Key Distribution – draft-ietf-oauth-pop-key-distribution  JSON Web Token (JWT) – RFC 7519  JWT Key Claim – draft-ietf-oauth-proof-of-possession  Browser views allow for a secure browser context inside the native app now available for Android and IOS (described in draft-wdenniss-oauth-native-apps). Example code available for Android and IOS.
  • 14. © TechCon201514 COSE WG  Concise Binary Object Representation (CBOR), RFC 7049, defines an efficient binary encoding based on the JSON data model.  CBOR Object Signing and Encryption (COSE) offers security services for CBOR-based structures.  Functions:  Signing, Encryption, Key Exchange, and Key Representation  Charter: https://datatracker.ietf.org/wg/cose/charter/
  • 15. © TechCon201515 OpenID Connect  Builds on OAuth 2.0 and provides support for federated login and the ability to convey authentication information.  Organization offers self-certification program.  Work done in working groups, such as the Heart working group.  Main specifications can be found at http://openid.net/developers/specs/  Additional information about the organization can be found at http://openid.net
  • 16. © TechCon201516 UMA  User Managed Access (UMA)  OAuth-based protocol designed to give users a unified control point for authorizing who and what can get access to their data and devices.  Separates resource owner from requesting party.  More information available at: http://kantarainitiative.org/confluence/display/uma/Home
  • 17. © TechCon201517 OMA LWM2M  Lightweight Machine-to-Machine Communication (LWM2M)  http://openmobilealliance.org  Specification available for download at http://technical.openmobilealliance.org/Technical/technical- information/release-program/current-releases/oma- lightweightm2m-v1-0  Functionality:  Device management  Key Provisioning  Firmware Updates
  • 18. © TechCon201518 FIDO  The FIDO (Fast IDentity Online) Alliance was formed in July 2012 to address the lack of interoperability among strong authentication technologies, and remedy the problems users face with creating and remembering multiple usernames and passwords.  Specifications at https://fidoalliance.org/specifications  Universal Second Factor (U2F) protocol  Universal Authentication Framework (UAF) protocol  More info about the alliance, certification programs and tutorials at https://fidoalliance.org
  • 19. Demo
  • 20. © TechCon201520 Technologies used in Demo Setup  OAuth 2.0 & Extensions  OAuth 2.0 Proof of Possession  OAuth 2.0 IoT profile  JSON Web Token (JWT)  Bluetooth Smart  ARM mbed  Android app Nordic nRF51-DK
  • 22. © TechCon201522 Summary  There are ongoing standardization efforts. Help us make the specifications better.  Technologies and eco-systems can be re-used to solve IoT security challenges.  Code is available. We are planning to add more to make development easier.