iot mashup - security for internet connected devices - lyle

20
Security for Internet- connected devices John Lyle, University of Oxford

Upload: webinos-project

Post on 23-Jan-2015

726 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: IoT Mashup - Security for internet connected devices - Lyle

Security for Internet-connected devicesJohn Lyle, University of Oxford

Page 2: IoT Mashup - Security for internet connected devices - Lyle

Welcome!

John Lyle

Research Assistant at the University of Oxford

Member of the webinos project

Email: [email protected]

Twitter: @jplyle

Page 3: IoT Mashup - Security for internet connected devices - Lyle

What I’m going to say

1. Internet of Things security is hard!

2. There are some good reasons for this.

3. There are new (ish) threats.

4. There are some new technologies to play with.

Page 4: IoT Mashup - Security for internet connected devices - Lyle

The Insecurity of Things

Page 5: IoT Mashup - Security for internet connected devices - Lyle

What I’m not going to say

1. Security is really important.

2. This is how to exploit [ insert popular technology product ]

3. I have the following silver bullets…

4. Anything about privacy

Page 6: IoT Mashup - Security for internet connected devices - Lyle

Why is IOT security difficult?And is there anything we can do about it?

Page 7: IoT Mashup - Security for internet connected devices - Lyle

Because…

1. Wireless communication

2. Physical insecurity

3. Constrained devices

4. Potentially sensitive data

5. Lack of standards

6. Heterogeneity: weakest link problem

7. A systems, not software problem

8. Classic web / internet threats

9. Identity management & dynamism

10. Inconvenience and cost

Page 8: IoT Mashup - Security for internet connected devices - Lyle

But really…It’s because we don’t know how to

do it.

Yet.

Page 9: IoT Mashup - Security for internet connected devices - Lyle

Threats to IOT systemsAdapted from "Security Considerations in the IP-based Internet of Things“ - Garcia-Morchon et al.

http://tools.ietf.org/html/draft-garcia-core-security-05

Page 10: IoT Mashup - Security for internet connected devices - Lyle

The physical devices

Can be stolen

Can be modified

Can be replaced

Can be cloned

Page 11: IoT Mashup - Security for internet connected devices - Lyle

The software

Can be modified (firmware / OS / middleware)

Can be decompiled to extract credentials

Can be exhausted (denial of service)

Page 12: IoT Mashup - Security for internet connected devices - Lyle

The network

Eavesdropping

Man-in-the-middle attacks

Rerouting traffic

Theft of bandwidth

Page 13: IoT Mashup - Security for internet connected devices - Lyle

Securing the wholelifecycle

Design

Production

Bootstrapping

Monitoring

Reconfiguration and recovery

Decommission

Page 14: IoT Mashup - Security for internet connected devices - Lyle

Who are the attackers?And what do they want?

Page 15: IoT Mashup - Security for internet connected devices - Lyle

We don’t know, but…

Make assumptions to make progress

Use Attacker Personas for consistency

Realistic attacker models

Organised crime?

Curious end users? Modders?

Service providers?

Page 16: IoT Mashup - Security for internet connected devices - Lyle

The state of the artSome of it, at least.

Page 17: IoT Mashup - Security for internet connected devices - Lyle

The webinos approach

TLS and a device PKI

Attribute-based access control

Web identity and authentication

“Personal zone” model

Page 18: IoT Mashup - Security for internet connected devices - Lyle

Protocols and identifiers for constrained devices

CoAP: The Constrained Application Protocol

DTLS: Datagram Transport Layer Security

IPsec

Sizzle – SSL with Elliptic Curve Cryptography[1]

HIPS: Host Identity Protocol

HIPS-DEX

ucode

[1] Gupta, V.; Millard, M.; Fung, S.; Zhu, Yu; Gura, N.; Eberle, H.; Shantz, S.C."Sizzle: a standards-based end-to-end security architecture for the embedded Internet,"  Third IEEE International Conference on Pervasive Computing and Communications. pp.247,256, 8-12 March 2005

Page 19: IoT Mashup - Security for internet connected devices - Lyle

Thoughts to leave you with.

Many new technologies and protocols are being developed

IOT requires systems security

Share your results!

Page 20: IoT Mashup - Security for internet connected devices - Lyle

Any questions?

John Lyle / [email protected]