This power point presentation is about AWS-ECC508 a chip which is used to protect the IoT cloud of Amazon and design to provide end-to-end security between the IoT and cloud infrastructure.
3. IoT Mean
• IoT or “Internet of thing”
• September 1985
• PETER T. LEWIS : in speech delivered at U.S.
“Federal communications Commission(FCC)”
•Inter – Networking
• IoT – GSI : In 2K13 Define “ The infrastructure
of the information society”
• Thing : Legal scholar suggest to look as an
“Inextricable Mixture of hardware , software
,data and service ”
4. One of the platform for :
• Smart city
• Smart Energy Management System
•Intelligent transportation
• Connected car
• Connected Health
• Smart Farming
• Health care
8. Home Automation
App on cloud All information is here
o Able to open it
o Can fed incorrect information
o Can plant hostile malware
o Then can deeply attack it
So what are way to secure IoT ??
10. AWS – ECC508
• Relies on “ Elliptic Curve Cryptography” algorithm
rather than the better known RSA algorithm
• Microchip Technology and Amazon.com have
collaborate to create a“ Add – On Chip “
• AWS : Amazon Web Service Cloud
• AWS – ECC508 developer kits are available and the
chip costs around 68 U.S. cents in bulks.
11.
12. AWS – ECC508
Make easier to
• Compact certain types of attack
• Encourage developer to use Amazon cloud based
` infrastructure for the IoT
Make more secure the Amazon’s IoT cloud
Designed to provide end - to - end security between
` the IoT device and cloud infrastructure
Also designed to protect against hard – ware attacks
13. ECC Algorithm
Neal Koblitz
December 24 , 1948
United state
Mathematician
University of Washington
University of waterloo
Victor S. Miller
March 3 ,1947
Brooklyn , New York
Mathematician
Columbia University
Harvard University
14. RSA Algorithm
Ronald L. Rivest
May 6,1947
United states
Massachusetts
institute of Tech.
Adi Shamir
July 6,1952
Israel
Weizmann Institute
Leonard Adleman
December 31,1945
American
University of
California,Berkeley
16. RSA vs ECC
RSA Advantages :
Has been around longer ;math well – understood
Potent expired ; royalty free
Faster encryption
ECC Advantages :
Shorter key size
Fast key generation
Faster decryption
Low power consumption
Low Memory usage
Low CPU utilization
17. How Amazon Provides Security
mutual authentication
Verify identity of cloud service
Generates Cryptographic Keys
( Contract manufacturer generates keys --- > securely pass this along manufacturing chain )
AWS – ECC508 has a amazing advantage that it can generate its own keys
-----------------------