iot and crime prevention

14
SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP) LONDON’S GLOBAL UNIVERSITY The Internet of Things and Crime Prevention Jeremy Watson CBE FREng Professor of Engineering Systems, UCL Chief Scientist & Engineer, BRE (the Building Research Establishment)

Upload: iotuk

Post on 12-Apr-2017

410 views

Category:

Technology


0 download

TRANSCRIPT

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY

The Internet of Things and Crime Prevention

Jeremy Watson CBE FREng Professor of Engineering Systems, UCL Chief Scientist & Engineer, BRE (the Building Research Establishment)

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY

The Internet of Things (IoT)

• Very broad definition, links to Big Data and Data Analytics

• Smart technologies make previously unintelligent things (like home thermostats, white goods, or building management systems) able to compute and communicate wirelessly

• Almost all the data that IoT devices send will be to other machines – there will be no humans involved

• By 2020, industry experts predict the number of IoT devices to exceed 25 billion

• The possibility of hacking into IoT networks (by humans or machine agents) brings new cyber-threats

2

Reference - The Internet of Things: making the most of the second digital revolution The Government Office for Science 2014

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY

3

‘Big Data’ and IoT context • City- and building-scale object data; Live data plus geographical

information (GIS)

– Data from Building Information Modelling (BIM), static design and transactional data now, live data in BIM level 3

– Operational data associated with Building Management Systems – Infrastructure attributes and live,operational information (e.g. bus arrival times)

• Fusing disparate data types to create new insights

– Validation, continuity of information, prediction

• Private-sector mashing services

– Combining proprietary and open data sources for knowledge and value creation

• Social network feeds

– Can identify social trends (e.g. Norovirus before reporting by healthcare providers)

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY

Data integration in Cities

Mapping Energy Efficiency of Buildings

Mapping social data (e.g. Crimes)

Flood simulation

Exploration of multiple agendas in city development (transport, housing, employment etc)

Public Consultations

Acknowledgement: Professor T Fernando, University of Salford

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY

Applications of IoT • Households

– Smart thermostats – White goods – Televisions

• Building Management Systems (BMS) – sensors and controls – Heating, ventilation & air conditioning – Access controls

• Industrial and Utilities control systems – Sensors and actuators (pumps, heaters, valves, etc.)

• Medical and Hospital equipment – Patient monitors – Patient information recording

• Transport – Condition monitoring – Asset location

• Retail – Point-of-sale terminals

5

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY

Applications of IoT - Buildings

6

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY

Types of threat

• Information theft – Personal data, evesdropping – Building occupancy (space and time patterns)

• Perturbation of operation – Hacking into control networks to perturb asset operation (e.g. denial of a

physical service)

• Corruption of sensor information – Energy theft by hacking smart meters – Spoofing BMS

• Falsification of information – Supply chain issues – Product provenance issues (e.g. pharmaceuticals)

7

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY

20 Jan 2015 workshop: Deliverables

• Refined view of affected sectors and threats – Vulnerable sectors – Types of threat – Mitigation / prevention strategy

• Simple guidelines for IoT Cyber crime risk avoidance – Hygiene factors – Best practice guidelines; e.g. How can householders protect themselves?

• Knowledge gaps that suggest further research – e.g. – Behaviour change – Detecting IoT network attacks – The cyber-aware BMS

8

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY

Next steps…

• Home Office has produced an interactive PDF advice document in light of findings of the Roundtable

• Advice will be published by the end of February, in order to raise public awareness

• Representatives from industry and academia are asked to develop their thinking on how safeguards can be built into smart products

• Group agreed to re-convene later in the year to look at how the

crime prevention response might be further developed.

10

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY

SCIENCE, TECHNOLOGY, ENGINEERING AND PUBLIC POLICY (UCL STEaPP)

LONDON’S GLOBAL UNIVERSITY