SlideShare une entreprise Scribd logo
1  sur  12
1
IoT Security Taskforce
2
The Indus Entrepreneurs Network
15,000+
Members globally
61
Chapters spread across the
globe
18
Across Countries
2,000+
Charter Members
1999
Started the Bangalore Chapter
800+
Members in Bangalore
12,000+
Subscribers reading our updates
100+
events per year in Bangalore
1992
TiE Silicon Valley was started
120+
Mentors/CMs in Bangalore
3
TiE IoT Forum Activities : 12 Billion Indian IoT Market
 June 5 Open House (Attended by 125+ participants)

 June 26 Communication (Connectivity workshop
attended by over 25 participants)

 Aug 6 BlueTooth (Technical deep dive session
attended by over 35 participants)
 Aug 22 Survelliance Workshop with B.PAC for schools,
(attended by over 25 participants)
 Sep 11 MOU with IESA Press coverage in leading
online and print media
 Sep 11 Smart Water-Power & Internet Public utilities for
the city of Future (TiE IESA Bangalore attended by
280+ participants)
 Sep 18 IoT in Retail (attended by 65+ participants)
 Nov 13 Crowdfunding Your IoT Product ( attended by
75+ participants)
 Nov 19 MEMS Technical deep dive session ( Attended
by 30+ participants)
 Nov 20 Smart Devices : Leveraging Consumerization
and Open Innovation for the Future ( TiE IESA
Hyderabad 65+ particpants)
 Feb 20 IoT based Smart Grid Core of Sustainable
Living ( TiE IESA Delhi 50+ Participants)
 Feb 26 Contiki IoT workshop : Middleware for IoT (
RBCCPS Bangalore 40 participants)
 March 10 Workshop Demystifying IoT (TiE IESA
Pune 50 participants)
 March 10 Smart Vehicles The IoT Future ( TiE
IESA Pune 50 participants)
 May 9 IoT Innovation Showcase by 16 Startups
(150+ Participants)
 June 25 Smart Agriculture and Smart Healthcare (
TiE IESA with pan India Colleges and Universities)
175+ Participants
 Sep 25 IoT Security a IEEE partner event ( IEEE
partner 75 +)
 Dec 4 – 5 IEEE Bangalore: Leveraging Use cases
to Validate IoT Opportunities ( partner event 200+)
 Dec 9 -10 IoT Next 2015 ( 700+ particpants, 60
Speakers, 20 Starups)
2014 2015
18 + events, 1500 Attendees , 4 Cities
4
IoT Security Taskforce - Outline
Overview of Internet of Things & IoT Security
Using current security frameworks in IoT
Use of PKI in IoT
Non-traditional aspects
5
IoT Security Taskforce - Outline
Overview of Internet of Things & IoT Security
Using current security frameworks in IoT
Use of PKI in IoT
Non-traditional aspects
6
IoT Security Taskforce – Proposed Plan
Existing Approaches extend from Web to IoT
IoT has unique requirements & may need new approaches
Deepdive into two us-case
 Personal medical BLE
 Public smart transportation
Playback build model architecture, expand to other verticals
7
IoT Devices – Characteristics & Challenges
• Pervasive in Nature
– Variety of Deployments & Use Cases
– IP Camera, Process Control, Chatty Sensors
– Interoperability & Privacy Issues
– Physical Security
• Resource Constrained
– Available Memory: Typically 16KB RAM & 64KB Flash
– Computational Capability: Microcontroller, no CPU
– Power Management: Battery operated to last 2 years
 Security Requirements
– Lightweight Crypto Primitives
– Effective Key-Management Protocols
– Authentication & Authorization
IoT Security Holes
10
IoT Security Taskforce - Outline
Overview of Internet of Things & IoT Security
Using current security frameworks in IoT
Use of PKI in IoT
Non-traditional aspects
11
IoT Security Taskforce - Outline
Overview of Internet of Things & IoT Security
Using current security frameworks in IoT
Use of PKI in IoT
Non-traditional aspects
12
IoT Security Taskforce - Outline
Overview of Internet of Things & IoT Security
Using current security frameworks in IoT
Use of PKI in IoT
Non-traditional aspects

Contenu connexe

Tendances

Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
Monika Keerthi
 

Tendances (20)

IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
Internet of things –
Internet of things –Internet of things –
Internet of things –
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
 

Similaire à Keynote Session : Internet Of Things (IOT) Security Taskforce

Similaire à Keynote Session : Internet Of Things (IOT) Security Taskforce (20)

Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptx
 
IoT applications in rural and agriculture in pdf
IoT applications in rural and agriculture in pdfIoT applications in rural and agriculture in pdf
IoT applications in rural and agriculture in pdf
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
The Un Internet of things-
 The Un Internet of things- The Un Internet of things-
The Un Internet of things-
 
IOTCB cfp (1).pdf
IOTCB cfp (1).pdfIOTCB cfp (1).pdf
IOTCB cfp (1).pdf
 
International Conference on IOT, Cloud and Big Data (IOTCB 2022)
International Conference on IOT, Cloud and Big Data (IOTCB 2022)International Conference on IOT, Cloud and Big Data (IOTCB 2022)
International Conference on IOT, Cloud and Big Data (IOTCB 2022)
 
Internet of Things, An Introduction
Internet of Things, An IntroductionInternet of Things, An Introduction
Internet of Things, An Introduction
 
Internet of Things Cebu meetup : 1st meetup
Internet of Things Cebu meetup : 1st meetup Internet of Things Cebu meetup : 1st meetup
Internet of Things Cebu meetup : 1st meetup
 
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)
 
IOTCB cfp.pdf
IOTCB cfp.pdfIOTCB cfp.pdf
IOTCB cfp.pdf
 
International Conference on IOT, Cloud and Big Data (IOTCB 2022)
International Conference on IOT, Cloud and Big Data (IOTCB 2022)International Conference on IOT, Cloud and Big Data (IOTCB 2022)
International Conference on IOT, Cloud and Big Data (IOTCB 2022)
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation Track
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Cisco Internet of Things
Cisco Internet of ThingsCisco Internet of Things
Cisco Internet of Things
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
International Conference on Computer Science and Information Technology (COMS...
International Conference on Computer Science and Information Technology (COMS...International Conference on Computer Science and Information Technology (COMS...
International Conference on Computer Science and Information Technology (COMS...
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 

Plus de Priyanka Aash

Plus de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Keynote Session : Internet Of Things (IOT) Security Taskforce

  • 2. 2 The Indus Entrepreneurs Network 15,000+ Members globally 61 Chapters spread across the globe 18 Across Countries 2,000+ Charter Members 1999 Started the Bangalore Chapter 800+ Members in Bangalore 12,000+ Subscribers reading our updates 100+ events per year in Bangalore 1992 TiE Silicon Valley was started 120+ Mentors/CMs in Bangalore
  • 3. 3 TiE IoT Forum Activities : 12 Billion Indian IoT Market  June 5 Open House (Attended by 125+ participants)   June 26 Communication (Connectivity workshop attended by over 25 participants)   Aug 6 BlueTooth (Technical deep dive session attended by over 35 participants)  Aug 22 Survelliance Workshop with B.PAC for schools, (attended by over 25 participants)  Sep 11 MOU with IESA Press coverage in leading online and print media  Sep 11 Smart Water-Power & Internet Public utilities for the city of Future (TiE IESA Bangalore attended by 280+ participants)  Sep 18 IoT in Retail (attended by 65+ participants)  Nov 13 Crowdfunding Your IoT Product ( attended by 75+ participants)  Nov 19 MEMS Technical deep dive session ( Attended by 30+ participants)  Nov 20 Smart Devices : Leveraging Consumerization and Open Innovation for the Future ( TiE IESA Hyderabad 65+ particpants)  Feb 20 IoT based Smart Grid Core of Sustainable Living ( TiE IESA Delhi 50+ Participants)  Feb 26 Contiki IoT workshop : Middleware for IoT ( RBCCPS Bangalore 40 participants)  March 10 Workshop Demystifying IoT (TiE IESA Pune 50 participants)  March 10 Smart Vehicles The IoT Future ( TiE IESA Pune 50 participants)  May 9 IoT Innovation Showcase by 16 Startups (150+ Participants)  June 25 Smart Agriculture and Smart Healthcare ( TiE IESA with pan India Colleges and Universities) 175+ Participants  Sep 25 IoT Security a IEEE partner event ( IEEE partner 75 +)  Dec 4 – 5 IEEE Bangalore: Leveraging Use cases to Validate IoT Opportunities ( partner event 200+)  Dec 9 -10 IoT Next 2015 ( 700+ particpants, 60 Speakers, 20 Starups) 2014 2015 18 + events, 1500 Attendees , 4 Cities
  • 4. 4 IoT Security Taskforce - Outline Overview of Internet of Things & IoT Security Using current security frameworks in IoT Use of PKI in IoT Non-traditional aspects
  • 5. 5 IoT Security Taskforce - Outline Overview of Internet of Things & IoT Security Using current security frameworks in IoT Use of PKI in IoT Non-traditional aspects
  • 6. 6 IoT Security Taskforce – Proposed Plan Existing Approaches extend from Web to IoT IoT has unique requirements & may need new approaches Deepdive into two us-case  Personal medical BLE  Public smart transportation Playback build model architecture, expand to other verticals
  • 7. 7
  • 8. IoT Devices – Characteristics & Challenges • Pervasive in Nature – Variety of Deployments & Use Cases – IP Camera, Process Control, Chatty Sensors – Interoperability & Privacy Issues – Physical Security • Resource Constrained – Available Memory: Typically 16KB RAM & 64KB Flash – Computational Capability: Microcontroller, no CPU – Power Management: Battery operated to last 2 years  Security Requirements – Lightweight Crypto Primitives – Effective Key-Management Protocols – Authentication & Authorization
  • 10. 10 IoT Security Taskforce - Outline Overview of Internet of Things & IoT Security Using current security frameworks in IoT Use of PKI in IoT Non-traditional aspects
  • 11. 11 IoT Security Taskforce - Outline Overview of Internet of Things & IoT Security Using current security frameworks in IoT Use of PKI in IoT Non-traditional aspects
  • 12. 12 IoT Security Taskforce - Outline Overview of Internet of Things & IoT Security Using current security frameworks in IoT Use of PKI in IoT Non-traditional aspects