iot security middleware: evaluating the threats and protecting against them

23
nquiringmi nds

Upload: nick-allott

Post on 11-Apr-2017

500 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: IoT Security Middleware: evaluating the threats and protecting against them

nquiringminds

Page 2: IoT Security Middleware: evaluating the threats and protecting against them

BIG DATA ANALYTICS

IOT SECURITY

SMART CITIES

MAR

KET

PLAT

RORM

CA

PABI

LITIE

S

A SECURE DATA PLATFORM FOR BIG DATA AND IOT

Page 3: IoT Security Middleware: evaluating the threats and protecting against them

IOT SECURITY CRISIS

Page 4: IoT Security Middleware: evaluating the threats and protecting against them

Analysts consensus is

enterprise data will grow

50x year on year 2014 through

to 2020

Page 5: IoT Security Middleware: evaluating the threats and protecting against them

IOT

BUSI

NESS

Page 6: IoT Security Middleware: evaluating the threats and protecting against them

Average Internet of

Things device has

25 security

flaws

Page 7: IoT Security Middleware: evaluating the threats and protecting against them
Page 8: IoT Security Middleware: evaluating the threats and protecting against them

“And if you can update the firmware on the main board, you can make the pump do whatever you like,” Rios says.

Page 9: IoT Security Middleware: evaluating the threats and protecting against them

apply the brakes, kill the engine and take control of steering over the internet

Page 10: IoT Security Middleware: evaluating the threats and protecting against them

IOT BUSINESS CONTEXT

Page 11: IoT Security Middleware: evaluating the threats and protecting against them

PROD

UCT

> SU

BSCR

IPTI

ON

SALE

Page 12: IoT Security Middleware: evaluating the threats and protecting against them

SECU

RITY

AS

BUSI

NESS

EN

ABLE

R

Page 13: IoT Security Middleware: evaluating the threats and protecting against them

TRUST UPTAKE

Page 14: IoT Security Middleware: evaluating the threats and protecting against them

WHAT IS NEEDED

Page 15: IoT Security Middleware: evaluating the threats and protecting against them

$2 2 years

20Mhz 64 Kb

Page 16: IoT Security Middleware: evaluating the threats and protecting against them

There is (often) no

I in IOT

CHALLENGES

Interoperability – common foundation The Network – No I in IOT Encryption – 64k 20MhZ challenge Provenance - where data comes

from Destination – where data goes to Permissioning – who has access Trusting device – flashing/rooting

Page 17: IoT Security Middleware: evaluating the threats and protecting against them
Page 18: IoT Security Middleware: evaluating the threats and protecting against them

END

TO E

ND S

ECUR

ITY

Server

Application

Sensor

IOT-HUB

Server

Page 19: IoT Security Middleware: evaluating the threats and protecting against them

IOT

SECU

RITY

SO

LUTI

ON

Trusted Data ExchangeSecure, scaleable database for peer to peer exchange of big data and IOT sensor stream

tdx

QBrikA modular highly secure physical IOT product with trusted hardware and IOT optimised crypto

PicosecJoint initiative with Oxford Uni and CopperHorses to produce secure optimised IOT stack

Trusted Data ExchangeA review of 22 IOT middleware technologies judged webinos to be the most secure

PROD

UCT

INIT

IATI

VES

Page 20: IoT Security Middleware: evaluating the threats and protecting against them

SOLUTION PACK AES-CTR MODE CCM ECDH (Elliptical Curve Diffie Hellman) Web based - Capability Tokens (in place of

XACML) Mutual Authenticated TLS PreShared PKI Certs OAuth 2.0 FuseBits – Locked Bootloaders TPM and Secure Storage

Page 21: IoT Security Middleware: evaluating the threats and protecting against them

PR

CISCO Top 15 IOT CompanyMultiple sensors deployed to domestic properties to improve energy and calculate refurb costs

Open Data ChampionMultiple sensors deployed to domestic properties to improve energy and calculate refurb costs

Future Cities ContractMultiple sensors deployed to domestic properties to improve energy and calculate refurb costs

BBC CoverageMultiple sensors deployed to domestic properties to improve energy and calculate refurb costs

Open Data Champion

Future Cities

Page 22: IoT Security Middleware: evaluating the threats and protecting against them

http://nquiringminds.com/resources/

Page 23: IoT Security Middleware: evaluating the threats and protecting against them

@NQMINDS

NQMINDS.COM

nquiringminds