shailendra kumar sharma ddg smart networks, tec, dot mail ... · assign a communications address to...

132
IOT-Security India-EU-ICT - Program on 17-07-2019 Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail: [email protected] Government of India Ministry of Communications, Department of Telecommunications Telecommunication Engineering Centre

Upload: others

Post on 14-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

IOT-Security India-EU-ICT - Programon

17-07-2019

Shailendra Kumar Sharma

DDG Smart Networks, TEC, DoT

Mail: [email protected]

Government of India

Ministry of Communications, Department

of Telecommunications

Telecommunication Engineering Centre

Page 2: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Welcome to the Webnair onIOT Security

• Good Morning

• Bonjour

• Guten Morgen

• Ohayogozaimasu

• नमस्कार

Page 3: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT

• The Internet of Things may be a hot topic in the industry but it’s not a new concept. In the early 2000’s, Kevin Ashton was laying the groundwork for what would become the Internet of Things (IoT) at MIT’s AutoID lab. He Wrote

• “If we had computers that knew everything there was to know about things—using data they gathered without any help from us -- we would be able to track and count everything, and greatly reduce waste, loss and cost. “

Page 4: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT-contd

• “ We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. We need to empower computers with their own means of gathering information, so they can see, hear and smell the world for themselves, in all its random glory.

• RFID and sensor technology enable computers to observe, identify and understand the world—without the limitations of human-entered data.”

Page 5: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT-contd• At that time, this vision required major technology

improvements. • After all, how would we connect everything on the

planet? ( IPv4 >> IPv6 )• What type of wireless communications could be built

into devices? ( Low Power Tech ex, LoRa, Sigfox etc )• What changes would need to be made to the existing

Internet infrastructure to support billions of new devices communicating? ( advent of 5G, etc )

• What would power these devices? ( lasting 10 years or so )

• What must be developed to make the solutions cost effective? There were more questions than answers to the IoT concepts in 1999.

Page 6: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT-contd

• Today, many of these obstacles have been solved. The size and cost of wireless radios has dropped tremendously. IPv6 and other mechanisms allows us to assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless connectivity into a wide range of devices with 5G standard round the corner. Mobile data coverage has improved significantly. While not perfect, battery technology has improved and solar recharging has been built into numerous devices. There will be billions of objects connecting to the network with the next several years. As per estimation, 25-30 billion connected devices will be connected by 2020.

Page 7: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT-contd

• IoT describes a system where items in the physical world, and sensors within or attached to these items, are connected to the Internet via wireless and wired Internet connections. These sensors can use various types of local area connections such as RFID, NFC, Wi-Fi, Bluetooth, and Zigbee. Sensors can also have wide area connectivity such as GSM, GPRS, 3G, and LTE and other technologies like NB-IoT.

Page 8: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT-contd

• The IoT will: • 1. Connect both inanimate and living things.

Today, the vision of IoT has expanded to connect everything from industrial equipment to everyday objects. The types of items range from gas turbines to automobiles to utility meters. It can also include living organisms such as plants, farm animals and people. – For example, Cow Tracking Project in which data

collected from radio positioning tags to monitor cows for illness and track behavior in the herd.

Page 9: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT-contd

– Wearable computing and digital health devices, such as Nike+ Fuel band and Fitbit, are examples of how people are connecting in the Internet of Things landscape.

– Therefore, definition is now expanded to the Internet of Everything (IoE), which includes people, places, objects and things ( Physical and virtual, ( Apps) ).

– Basically anything you can attach a sensor and connectivity to can participate in the new connected ecosystems.

Page 10: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT-contd

• 2. Use sensors for data collection. The physical objects that are being connected will possess one or more sensors. Each sensor will monitor a specific condition such as location, vibration, motion and temperature. – In IoT, these sensors will connect to each other

and to systems that can understand or present information from the sensor’s data feeds. These sensors will provide new information to a company’s systems and to people.

Page 11: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT-contd

• 3. Change what types of item communicate over an IP Network. In the past, people communicated with people and with machines. – IoT-enabled objects will share information about their

condition and the surrounding environment with people, software systems and other machines.

– This information can be shared in realtime or collected and shared at defined intervals.

• Going forward, everything will have a digital identity and connectivity, which means you can identify, track and communicate with objects

Page 12: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT-contd

• IoT data differs from traditional computing. The data can be small in size and frequent in transmission. The no. of devices, or nodes, that are connecting to the network are also greater in IoT than in traditional PC computing. Machine-to-Machine communications and intelligence drawn from the devices and the network will allow businesses to automate certain basic tasks without depending on central or cloud based applications and services. These attributes present opportunities to collect a wide range of data but also provide challenges in terms of designing the appropriate data networking and security.

Page 13: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT-contd

• The Three Cs of IoT:

• A. Communication. IoT communicates information to people and systems, such as state and health of equipment (e.g. it’s on or off, charged, full or empty) and data from sensors that can monitor a person’s vital signs. In most cases, we didn’t have access to this information before or it was collected manually and infrequently.

• For example, an IOT-enabled HVAC system can report if its air filter is clean and functioning properly

Page 14: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT-contd

• GPS-enabled assets can communicate their current location and movement. Location is important for items that move, such as trucks, but it’s also applicable for locating items and people within an organization.

• In the healthcare industry, IoT can help a hospital track the location of everything from wheelchairs to cardiac defibrillators to surgeons.

• In the transportation industry, a business can deliver real-time tracking and condition of parcels and pallets.

Page 15: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT-contd

• B. Control and Automation. In a connected world, a person will have visibility into a device’s condition. In many cases, a business or consumer will also be able to remotely control a device.

• For example, a business can remotely turn on or shut down a specific piece of equipment or adjust the temperature in a climate-controlled environment.

• Meanwhile, a consumer can use IoT to unlock their car or start the washing machine.

• Once a performance baseline has been established, a process can send alerts for anomalies and possibly deliver an automated response. For example, if the brake pads on a truck are about to fail, it can prompt the company to take the vehicle out of service and automatically schedule maintenance

Page 16: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Beginning of IOT-contd

• Cost Savings. Many companies will adopt IoT to save money.

• Measurement provides actual performance data and equipment health, instead of just estimates. Businesses, particularly industrial companies, lose money when equipment fails.

• With new sensor information, IoT can help a company save money by minimizing equipment failure and allowing the business to perform planned maintenance.

• Sensors can also measuring items, such as driving behavior and speed, to reduce fuel expense and wear and tear on consumables.

• New smart meters in homes and businesses can also provide data that helps people understand energy consumption and opportunities for cost savings

Page 17: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

IOT-Def

• Internet of Things [b-ITU-T Y.2060]:

• A global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) thingsbased on existing and evolving interoperable information and communication technologies.

Page 18: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

The Internet of Things (IoT) is the phenomenonthat is connecting to the internet, an evergrowing ocean of intelligent sensing and remotemanageable things, data from which istransmitted, analyzed and actioned upon in nearreal time, delivering quantum gains in personalconvenience, security and quality of life on theone hand and business automation, efficiencyand growth on the other

What is Internet of Things?

Page 19: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Machine to Machine Communication (M2M)as the means of connection of the IoT Devicesto the Machines and Applications usuallydeployed in an internet based cloud, enablingthe transmission of the Device data in theuplink, and delivery of configuration, alerts andremote management information in thedownlink, without requiring humanintervention

What is Machine to Machine Communication?

Page 20: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

What is Machine to Machine Communication?

• ETSI has defined M2M Communications in ETSI TR 102 725 V1.1.1 (2013-06) as :

• Physical telecommunication based interconnection for data exchange between two ETSI M2M compliant entities, like: device, gateways and network infrastructure.

• M2M Ecosystem comprises of telecom service providers, M2M application service providers, Sensors, hardware OEMs, supply chain, middleware, deployment and asset management.

7/18/2019Final Report, M2M Security Work Group,

TEC20

Page 21: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Year Billions of Devices

1992 1 Million

2003 0.5 Billion

2012 8.7 Billion

2015 18.2 Billion

2016 22.9 Billion

2017 24.8 Billion

2018 34.8 Billion

2019 42.1 Billion

2020 50.1 Billion

The Internet of Things – An explosion of Connected

IoT Inception in 2009

Page 22: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

IoT is a key enabler to Smart Cities globally - Importance

7/18/2019Final Report, M2M Security Work Group,

TEC22

• Smart Water

River and Canals Water Balance & Usage

Drinking Water Usage and Supply

• Smart Lighting

Intelligent and weather adaptive lighting in streets and offices

• Waste Management

Detection of rubbish levels in containers to optimize the trash collection routes.

• Disaster Aversion, Management & Control

Monitoring soil moisture, vibrations and earth density to detect dangerous patterns

Coastal Area Warning

• Woman’s Safety and City Surveillance

Wearable panic buttons and automatic detection and alarm in abnormal human conditions

City Surveillance and Crime Control

• Pollution Control and Awareness

Control of CO2 emissions of factories, pollution emitted by cars and toxic gases generated in farms

• Intelligent Transport Systems

Connected Cars, V2V and V2I communications

Page 23: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

IOT – The Enabler of SSC

• Importance of IOT in SSC

• Development of Smart Cities under Smart City Mission of Govt of India.

Page 24: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Smart Cities

• In India, 100 Smart Cities spanning across country and are being built which will impact 100 Million population and cost will be around $3 Billion USD. In this direction, ITU has formed Study Group ITU-T 20 for Internet of Things and Smart Cities and Communities. This initiatives, is further helping in building standardized smart cities with global standards which will be sustainable and will impact the minimal with the usage of right technologies and which will help in making cities sustainable.

Page 25: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

5G - Enabler of IOT

• Industry groups and institutions have identified a set of eight requirements for 5G:9

• 1-10 Gbps connections to end points in the field • 1 millisecond end-to-end round trip delay (latency) • 1000X bandwidth per unit area • 10-100X number of connected devices • (Perception of) 99.999% availability • (Perception of) 100% coverage • 90% reduction in network energy usage • Up to ten-year battery life for low power, machine-

type devices.

Page 26: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Security is the critical enabler for IoT/M2M

Constitutes the biggest Impediment to proliferation

Page 27: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Encapsulation – OSI Model

Page 28: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Data

PresentationData Representation & Encryption

Data

ApplicationNetwork Process to Application

Segments TransportEnd-to-End Connections & Reliability

Packets NetworkPath Determination & IP

Frames Data LinkMAC & LLC (Physical Addressing)

Bits PhysicalMedia, Signal, & Binary Transmission

Data SessionInter-Host Communication

Ho

st L

aye

rsM

ed

ia L

ayer

s

OSI Model

Layers -FunctionData

Page 29: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

7 Layers of OSI Model-Protocols used

Page 30: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

“On the Internet, nobody knows you`re a dog”

© The New Yorker Collection 1993 Peter Steiner from

cartoonlink.com

Page 31: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless
Page 32: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Trust

• Before we talk about security in IOT ( Ecosystem , comprising various stakeholders like, device Manufacturers , TSP’s, M2M SP’s, End Users, etc) , Let us delve briefly on Trust . Trust in IOT Ecosystem.

Page 33: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Trust

• Definition of Trust

• Attributes of Trust

• Understanding of Trust

• Relationship between IOT security, Privacy and Trust.

• Trust in ICT Environment

Page 34: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

ITU-Def

• Trust: Trust is an accumulated value from history and the expecting value for future. Trust is quantitatively and/or qualitatively calculated and measured, which is used to evaluate values of physical components, value-chains among multiple stakeholders, and human behaviours including decision making.

• NOTE 1 - Trust is applied to social, cyber and physical domains.

• NOTE 2 – Trust [ITU-T X.509]: Generally, an entity can be said to "trust" a second entity when it (the first entity) assumes that the second entity will behave exactly as the first entity expects. The key role of trust is to describe the relationship between an authenticating entity and an authority; an entity shall be certain that it can trust the authority to create only valid and reliable certificates.

Page 35: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

ITU-Def

• NOTE 3 – Trust [ITU-T X.1163]: The relationship between two entities where each one is certain that the other will behave exactly as it expects.

• NOTE 4 – Trust [ITU-T X.1252]: The firm belief in the reliability and truth of information or in the ability and disposition of an entity to act appropriately, within a specified context.

• NOTE 5 – Trust [ITU-T Y.2701]: Entity X is said to trust entity Y for a set of activities if and only if entity X relies upon entity Y behaving in a particular way with respect to the activities.

• NOTE 6 – Trust [ITU-T Y.2720]: A measure of reliance on the character, ability, strength, or truth of someone or something.

Page 36: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Confidence

Belief

Expectation

Surety

Completeness

Accuracy

Reconfigurability

Dependability

Dependence

Ability

Faith

Reputation

Goodness

Honesty

Integrity

Assurance

Credibility

Confidentiality

Correctness

Relevance

Reliability

Availability

Stability

Scalability

Cyber Domain

Physical Domain

Social Domain

TRUST Attributes

Page 37: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Relationship among security,privacy and trust

• Security: systems need a variety of methods to prevent behaviours with malicious intents. Security mainly concerns technological aspects such as the confidentiality, availability and integrity. It also includes attack detection and recovery/resilience.

Page 38: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Relationship among security, privacy and trust

• Privacy: users need the protection of their personal information related to their behaviours and interactions with other people, services and devices. Privacy mainly concerns user aspects to support anonymity and restrictive handling of personal user data.

Page 39: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Relationship among security, privacy and trust

• Trust: trust is broader concept that can cover security and privacy (Figure in next but one slide). Trust revolves confidence that people, data, devices will function or behave in expected ways. Trust can be used to build new value-chain for future ICT infrastructure and services.

Page 40: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Relationship among security, privacy and trust

• For example, security controls have controlled a system and data securely in social-cyber-physical domains. However, traditional secure system concerns about how to authorize the entities as well as how to provide data to the authorized entities. Trust can give reliability to security and privacy as a parameter by measuring a discrepancy between observation and objective or subjective expectation of the reliable entities and data.

Page 41: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Relationship among security, privacy and trust

Page 42: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

IoT Needs Trust

7/18/2019Final Report, M2M Security Work Group,

TEC42

42

Page 43: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

IOT- Security –NUTSHELL-ImportanceA. Scale of IOT - 2015: 15Bn > 2020: 31Bn > 2025: 75Bn > 2030: 125 Bn ( Gartner )

B. Security in IOT comprises of 1.End Point Devices Security2. Network Communication Security3. Application Level Security4. Service Layer Security

Implementing above four security basically leads to Trusted Environment wherein the end user trusts the IOT Ecosystem.

1. Trust in ICT Environments 2. Physical Domain trust 3. Cyber trust4. Cross-domain service trust

C. IOT - Security >> data / Information SecurityMaintain

1. Confidentiality – of data / Information2. Integrity - “ “3. Availability - “ “ 4. Accountability - “ “5. Audit ability - “ “

Page 44: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

IOT- Security –NUTSHELL-Importance

D. Some IOT Standards 1. Industrial Internet Consortium (IIC) - : Industrial Internet of Things,

Volume G4: Security Framework2. IEEE Internet of Things – IEEE P-1363, P – 1619, P-2600, P-2413,

802.1AE, 802.1X3. International Electrotechnical Commission (IEC) - IEC/TR 62443-2-3.

“Security for industrial automation and control systems - Part 2-3: Patch management in the IACS environment.

4. International Organization for Standardization (ISO) - — Internet of Things Reference Architecture (IoT RA)

5. Cloud Security Alliance -6. Internet Engineering Task Force (IETF) –7. ITU-T SG208. 3rd Generation Partnership Project (3GPP):9. oneM2M etc

Page 45: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

IOT-Security

• The future of IoT/M2M cannot be realized without addressing security and privacy risks and policy issues.

• Securing and protecting the things that matter most—our systems, our Data, and our privacy—is a shared responsibility.

• Security and privacy must become part of every product’s feature set.

Page 46: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

IOT-Security: Affected Stakeholders

• The Following stakeholders are affected by the IoT/M2M Security threats

• M2M Application Service Provider;

• Manufacturer of M2M Devices and/or M2M Gateways;

• M2M Device/Gateway Management entities;

• M2M Service Provider;

• Network Operator

• User/Consumer

Page 47: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Define Security for IoT as:

“ IoT security deals with safeguarding connected devices, physical and virtual, in addition to the networks and IT security, for the Internet of things “

“Whether the support of security services is addressed at the M2M Service Layer level or at the M2M Application level, the ability to establish security associations between corresponding M2M nodes is required. Ideally, this ability could apply to nodes affiliated with different M2M Application Service Providers and M2M Service Providers..”

7/18/2019Final Report, M2M Security Work Group,

TEC47

Page 48: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Protecting IoT Data is critical

7/18/2019Final Report, M2M Security Work Group,

TEC48

Data is at the heart of connected devices and servicesData Analytics represents the enormous value from IoT

Page 49: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

IOT Challenges - Perspective

7/18/2019Final Report, M2M Security Work Group,

TEC49

Page 50: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Points Addressed

• IoT/M2M Security Threats

• Understanding the potential threats in IoT/M2M environment

• Frauds and attacks in IOT/M2M systems

• Challenges in IoT/M2M Security

• Challenges - Security of Embedded Systems

• Challenges – Security

• Challenges - Authentication and Authorization

Page 51: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Points Addressed

• Challenges - Heterogeneity and Resource Constraints

• Challenges - Privacy and its Preservation

• Challenges – Identity, Anonymity and Liability

• Mitigation of IoT/M2M Security Threats and Risks

• Address Security Early: Threat Modelling

• Build Security In

• Securing IOT/M2M-Security features and counter measures

Page 52: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Understanding the potential threats in IoT/M2M environment

• In a completely closed network, like in a verticalized captive use case, security risks are minimal. But, as M2M embedded systems become IP-enabled and interconnected the attack surface becomes open to threats. Services provided by the IOT/M2M System to IOT/M2M applications establish the need for trusted security credentials to secure connections between applicative entities, including the other involved functions.

Page 53: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Understanding the potential threats in IoT/M2M environment

• An understanding of the potential threats in the IoT environment has been broadly shown in the Figure on next slide, whereby various internal/external threat agents initiating threat by virtue of interruption, eavesdropping, buffer exhaustion, software/hardware compromise etc. which victimizes the various assets (like memory, crypto keys, buffer, power, energy etc.) and may cause malfunctioning of these assets.

Page 54: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Eavesdropping

User Compromise

Alteration

Hardware Compromise

Fabrication

Replay

Man-in-the middle

Interference

Interruption

Software Compromise

DoS

Power Drainage

Buffer Exhaustion

Sniffing

Crypto Keys

Password

Trust

Communication Link

Computation

Buffer

Protocol Stack

Operating System

System Software

Memory

Stored Data

Transmitted Data

Power

Energy

InitiatesVictimizes

External

Internal

Threat Agent ThreatsAssets compromised

Understanding the Potential Threats in IoT/M2M environment

Page 55: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Understanding the potential threats in IoT/M2M environment

• The devices and the control platform on which data may be consumed and shared could have different ownership, policy, managerial and connectivity domains. Consequently, devices will be required to have equal and open access to a number of data consumers and controllers concurrently, while still retaining privacy and exclusivity of data where that is required between those consumers.

Page 56: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Understanding the potential threats in IoT/M2M environment

• There are seemingly competing, complex security requirements to be deployed on a platform with potentially limited resources, which are enumerated below:

• Authenticate to multiple networks securely

• Ensure that data is available to multiple collectors

• Manage the contention between that data access

Page 57: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Understanding the potential threats in IoT/M2M environment

• The IoT can be affected by various categories of security threats including the following:

• Common worms jumping from ICT to IoT

• "Script kiddies" or others targeting residential IoT – Home control

• Organized crime: Access to intellectual property, sabotage, and espionage

• Cyber terrorism

Page 58: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges in IoT/M2M Security

Page 59: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Security of Embedded Systems

• In addition to the unique risks for M2M systems, embedded systems in general contain inherent security risks

• Many of the embedded systems in place today are unlikely to be connected to a network 100 percent of the time. Inconsistent or intermittent network connectivity increases the chances of a device connecting to an unsecured network. If an embedded system is online only occasionally, it is more likely to be dependent on a single node for network access, which creates a single point of failure or attack. Additionally, devices with only occasional connectivity are more difficult to monitor for issues and more difficult to troubleshoot and upgrade.

Page 60: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Security

• The IoT is where the Internet meets the physical world. A major disruption of the traditional model for the new brings its own set of challenges. The following lists some security challenges and considerations in designing and building IoT devices or systems:

• Typically small, inexpensive devices with little or no physical security.

• Though inexpensive, every device still has to compute something and also have some security feature. Also, it should not add to latency in processing

Page 61: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Security

• Computing platforms, constrained in memory and compute resources, may not support complex and evolving security algorithms due to the following factors:

• Limited security compute capabilities.• Encryption algorithms need higher processing

power • Low CPU cycles vs. effective encryption • Designed to operate autonomously in the field

with no backup connectivity if, primary connection is lost.

Page 62: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Security

• Mostly installed prior to network availability which increases the overall onboarding time.

• Requires secure remote management, up-dating during and after onboarding.

• Scalability and management of billions of entities in the IoT ecosystem.

• Identification of endpoints in a scalable manner, Sometimes the location may be more important than the individual identifier (ID).

• Management of Multi-Party Networks

Page 63: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Security

• The IoT entities will generally not be a single use, single ownership solution. Consequently, Identification and authorization of M2M devices in a dynamic and autonomous world pose serious research challenges. Authentication mechanisms should work side-by-side with distributed trust management and verification mechanisms. Any two M2M devices should be able to build and verify a trust relationship with each other, and this problem is certainly more challenging in environments without a security infrastructure in place. Trust will be an important requirement for designing new identification and authentication systems for M2M.

Page 64: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Security

• As authentication is related with identification, M2M systems will probably need to incorporate some type of secure identifier, tying information identifying the device or application with secret cryptographic material. Current proposals point to the usage of ITU-T specified X.509-based certified secure identifiers, for example using IEEE 802.1AR, or on the other end of self-generated uncertified secure identifiers, also called cryptographically generated identifiers, for example, the use of private keys in GSM Network authentication.

Page 65: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Security -Privacy

• As M2M systems require that privacy is balanced against disclosure of information, new authentication mechanisms relying on appropriate secure identifiers and incorporating privacy-preserving mechanisms are required. This aspect may also be incorporated in new trust computation mechanisms, as the evaluation of the risk in accepting communication with a partially unknown device may also consider the level of privacy accepted for an M2M application.

Page 66: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Security -Trust

• As distributed and autonomous trust mechanisms will be required for M2M environments, trust must be established on an M2M device from the start. Local state control via secure boot (local trust validation) may be enforced for M2M devices, similar to the mechanisms previously analyzed in the context of the ETSI M2M architecture. This secure boot may allow the establishment of a trusted environment providing a hardware security anchor and a root of trust, from which different models for trust computation may be adopted. In this context, the Trusted Computing Group (TCG) has proposed autonomous and remote validation models.

Page 67: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Authentication and Authorization

• Authentication

• At the heart of IOT secure framework is the authentication layer, used to provide and verify the identify information of an IoT entity. When connected IoT/M2M devices (e.g., embedded sensors and actuators or endpoints) need access to the IoTinfrastructure, the trust relationship is initiated based on the identity of the device. The way to store and present identity information may be substantially different for the IoT devices. Note that in typical enterprise networks, the endpoints may be identified by a human credential (e.g., username and password, token or biometrics).

Page 68: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Authentication and Authorization

• Authorization• The second layer of this framework is

authorization that controls a device's access throughout the network fabric. This layer builds upon the core authentication layer by leveraging the identity information of an entity. With authentication and authorization components, a trust relationship is established between IoTdevices to exchange appropriate information. For example, a car may establish a trust alliance with another car from the same vendor.

Page 69: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Heterogeneity and Resource Constraints

• Given the limitations on the computational capabilities of many sensing and actuating platforms, security technologies must be developed to cope with and supported by architectures with the characteristics similar to the ETSI M2M architecture. For example, applications using passive Radio-Frequency Identification (RFID) tags are unable to support security mechanisms requiring the exchange of many messages and communication with servers on a network domain.

Page 70: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

ITU-T-Privacy

• Defining privacy is no easy task, as the concept is an elusive one. It incorporates multiple perspectives (legal, technical, sociological) and is culturally, politically and historically "bounded".

• An increasingly pervasive internet also raises important socio-ethical concerns that are worth considering.

Page 71: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

ITU-T-Privacy• The concept of privacy often leads to discussions about

anonymity. Although they are related, privacy and anonymity have some important differences.

• In communications, privacy implies possession of and control over personal information and the terms and conditions under which it is used, stored, or disclosed to others.

• Anonymity, on the other hand, implies the absence of information about the identity of a person, and relates to the terms and conditions under which such information might be collected – e.g. a person can be

• “anonymous” on the internet by using programs that disable cookies or hide the geographic location of the user.

Page 72: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Privacy and its Preservation

• Enterprises try to protect their information, communication and application infrastructure, causing them to have private mail servers, data storages etc. Privacy can be divided into a few categories that have unique technical aspects:

• Communication privacy

• Position privacy (Location privacy)

• Path privacy

• Identity privacy (Personal privacy)

• Personal data, Local information privacy (use crypto for data protection)

Page 73: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Privacy and its Preservation

• Sticky policies are a way to cryptographically associate policies to encrypted (personal) data. These policies function as a gate keeper to the data. The data is only accessible when the stated policy is honoured. System keeps track of personal data relating to the user, as well as applied policies and service customizations.

Page 74: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Privacy and its Preservation

• For some M2M applications (in the context of the IoT) the user will require to be able to control the amount of personal information exposed to third parties, for instance in maintaining privacy while exposing personal records in healthcare applications. On the other end, other M2M applications may require that some of that information is available in case of necessity, for instance with M2M vehicular applications in case of traffic accidents.

Page 75: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Challenges - Privacy and its Preservation – India

• Privacy is one of key importance nowadays. People are concerned about their personal data that is on the internet. The right to privacy in India has developed through a series of decisions over the past 60 years. In an unanimous judgment by the Supreme Court of India (SCI) in Justice K.S. Puttaswamy (Retd) vs Union of India, in August 2017, has ruled that the right to privacy is protected as an intrinsic part of the right to life and personal liberty under Article 21 and as a part of the freedoms guaranteed by Part III of the Constitution.

Page 76: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Privacy-Aadhaar-SC Verdict-Indian context

Page 77: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Privacy-Aadhaar-SC Verdict

Page 78: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Mitigation of IoT/M2M Security Threats and Risks

• Mitigating the Risks

• The four guidelines that embedded software teams should follow to help protect critical M2M systems against failure and malicious attack are:

1. Address security early and take defensive measures against security threats using threat modelling.

2. Reduce Security risk .

Page 79: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Mitigation of IoT/M2M Security Threats and Risks

3. Build security in at the development stage by finding and fixing code vulnerabilities with static analysis and code review.

4. Protect systems Through Secure Analytics: Visibility and control .

Page 80: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Mitigation of IoT/M2M Security Threats and Risks

1. Address Security Early: Threat Modelling

• Securing an M2M system starts with understanding the potential threats. Threat modelling involves thinking about the system or asset that needs protection and identifying how it can be compromised, either by remote attack or by a malicious insider. Threat modelling therefore begins in the software architecture stage and continues through the design phase.

Page 81: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Mitigation of IoT/M2M Security Threats and Risks

• Once the risks are understood, proactive measures to create a risk mitigation strategy can be made. When conducting this activity, it is important to remember that threats are not vulnerabilities. Vulnerabilities can be fixed; threats exist in perpetuity and are the attacker’s goal. Considering potential use and abuse cases will help you to determine threats and attack vectors on which to base a threat model. These include:

Page 82: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Mitigation of IoT/M2M Security Threats and Risks

• When designing the system, threat should be analysed from the perspective or point of view of an attacker. Threat modelling, also called Architectural Risk Analysis, is a security control to identify and reduce risk. An example of Threat Modelling is the STRIDE Threat Model (Figure given in next slide) as per Wikipedia, STRIDE is a threat classification model developed by Microsoft ), which helps place threats into categories such as Repudiation, Information disclosure, Tampering with data, Denial of service, Spoofing identity etc, and it includes a full breakdown of processes, data storage, data flows and trust boundaries.

Page 83: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Mitigation of IoT/M2M Security Threats and Risks

Page 84: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Mitigation of IoT/M2M Security Threats and Risks

2. Reducing Risk• There are a number of opportunities to minimize risks to

M2M embedded systems:• Attack Surface• The entire collection of entry points into a system or device

defines its attack surface. The larger the attack surface, the greater the potential security risk. Analyzing the attack surface allows engineers to gauge risk and uncover potential avenues of attack.

• Reducing the attack surface naturally limits the number of attack vectors or entry points into an embedded system. This does not negate the need to investigate all routes into a device (including user interfaces, network access, web services, etc.) and to analyze the attack surface of all third-party components in use as well.

Page 85: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Mitigation of IoT/M2M Security Threats and Risks

• Secure Design Security by Design.

• The secure design of M2M embedded systems relies heavily on a number of crucial elements being applied at the development stage:

• Enforce Boundaries: Isolate code to enforce strict boundaries between the operating system and the process.

• Protect Data: Encrypt data in transit. Protect data at rest using the underlying file system encryption features and employ separate keys.

• Enforce Least Privilege: Ensure that every program and every user of the system operates using the least set of privileges necessary to complete his/her/its job.

Page 86: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Mitigation of IoT/M2M Security Threats and Risks

• Perform Integrity Checks: Always perform integrity checks to validate authenticity—embedded devices usually rely on firmware updates.

• Non-Repudiation: Use a data hash, such as SHA2, to establish the authenticity of the data.

• Use Modular Cryptography: When employing cryptography, assume that algorithms will be replaced over time. Keep code modular and avoid custom algorithms.

• Protect Against Denial of Service: Use solid system management and software design to avoid resource exhaustion and vulnerability to Denial of Service attacks.

• Authenticate: Make authentication strong and manage it centrally to ensure inputs are from trusted sources.

Page 87: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Mitigation of IoT/M2M Security Threats and Risks

3. Build Security In

• Security vulnerabilities in embedded software have two sources:

• (i) Design flaws and fundamental approach problems

• (ii) Coding issues/bugs and bad programming practices

• Because the applications and devices at the end of every connection are presumed trustworthy in an M2M environment, the responsibility rests with the development team to ensure the security of embedded software.

Page 88: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Securing IOT/M2M-Security features and counter measures

• With data sharing across the IoT, security is a necessary part of every activity of every cooperative initiative, regardless of use case. There are already too many possible points of entry for security to be airtight, and with the IoT, these will be multiplied exponentially. Each company may require unique security solutions to address its own set of risks. The most immediate imperative is to verify software and ensure that security controls are able to address the latest risks and a plan is in place for responding to new risks in a timely fashion.

Page 89: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Securing IOT/M2M-Security features and counter measures

• Put in place encryption and/or strong session management security controls and Implement secure coding practices that enforce rigorous input data validation in system and services, database applications, and web services.

• Implementing security features and countermeasures to threats requires mechanisms that provide security related operations with an appropriate level of confidence. The generic mechanisms are described within this include:

Page 90: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Securing IOT/M2M-Security features and counter measures

• secure storage of sensitive data • sensitive functions executing operations on sensitive

data • secure connection allowing the secure transmission of

sensitive dataSensitive functions are typically performed in termination points within the M2M System. Examples of sensitive functions include:

1. cryptographic algorithms (session) key derivation functions

2. hash functions

Page 91: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Securing IOT/M2M-Security features and counter measures

• Thus the mechanism exploits the use of two fundamental cryptographic primitives: hash functions and public key systems. In general, cryptographic functions operate on inputs such as messages and keys, and produce outputs such as cipher texts and signatures. Public key encryption relies on a pair of related keys, one secret and one public, associated with each individual participating in a communication. While slower than secret key cryptography, public key systems are preferable when dealing with networks of devices that need to be reconfigured fairly often.

Page 92: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Securing IOT/M2M-Security features and counter measures

• Whether the support of security services is addressed at the M2M Service Layer level or at the M2M Application level, the ability to establish security associations between corresponding M2M nodes is required. A detailed risk assessment/evaluation of the level of impact of the threat depends on the assets and their value. The security affected in the various domains includes:

• Application domain security;

• Intra Common Services domain security;

• Inter Common Services domain security;

• Underlying Network security, if keys are shared with underlying network

Page 93: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

ETSI M2M Architecture

Page 94: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

GSMA Security Model

Page 95: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Global Platform Security Model

Page 96: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

oneM2M functional Architecture

AE AE

Mca Mca Mca

Mcc

Mcn Mcn

CSE CSE

NSE NSE

Field Domain Infrastructure Domain

To Infrastructure

Domain of other

Service Provider

Mcc’

Page 97: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

IOT Security-Issues , need to be addressed

• Incorporation of minimal security standards for M2M products and services with interoperability in view

• Define guidelines from security angle in relation to

– Data ownership and retention period

– Security of sensitive data ( privacy and security concerns )

– Location of application services

– Location of remote terminal unit/M2M devices

– Location of core network elements

• Enable interconnection of legacy/non-IP devices on existing network technologies

• Define precautions/security conditions for voice/SMS/MMS/video on M2M

• Security framework for various verticals and solutions

• KYC norms for M2M, Concept of Machine - KYC

• M2M Product Certification ( as per TEC MTCTE Scheme, Launched in July 2019 )

• The End User and Industrial User of the new M2M / IoT Applications, whose safety, ease-of-use and interests must be safe-guarded

• The Government Policy makers must act in the interest of the enablement of Industry to develop products and solutions that can capture the global marketplace

7/18/2019Final Report, M2M Security Work Group,

TEC97

Page 98: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

IoT Functional Architecture

• IoT Architecture can be understood in 5 blocks

– Sensors, Devices and Field Nodes

– Communication Networks

– Trust Frameworks

– Applications

– Common Services Layer

7/18/2019Final Report, M2M Security Work Group,

TEC98

Page 99: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

End Point Device security

• Do all End Point Devices need to confirm to same level of Security ?

• One must arrive at a logical and practical solution, as EPD security will entail costs and consume other scarce resources like memory, power etc.

• Hence the various Assuarance classification level proposed.

Page 100: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

End Point Device security

• End Point Devices: The End Point Devices form the most essential part of the machine to machine network, as it is here that the data creation / information generation / actuation happens. The most significant aspect of security for End Point Devices is to establish the assurance level of End Point devices, as they manifest themselves in different forms with unique requirements of the use cases they serve.

• The graphical representation in the section below defines the requirement and the alternate security levels which may be used as per customer requirement and the specific security needs of the use case.

• The security as well as the authentication infrastructure should be defined based on the required assurance level and the need for security in the use case.

Page 101: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Network Communication security- IOT

• It is imperative that the protocol stack of an M2M device has a robust and well protected Management and Control frames to prevent access to the information stored in the devices which can be used by an attacker to compromise not only the device but the entire M2M eco-system.

• Each entity in the M2M services chain should be responsible for the KYC of its customer, i.e. bulk KYC for the B2B relationships and the final customer facing entity, i.e. the B2C, should be responsible for fulfilling the customer’s KYC requirements.

• Just as an owner of the SIM is responsible for informing the TSPs for effecting any change in ownership of the SIM, similarly, the first / existing owner of the device (especially white goods, medical devices, cars, etc) should be responsible for transfer of ownership, in case the device changes hands. This would take care of the concerns of the security agencies about the traceability of the user of the end device.

• e-KYC should be mandatory for KYC by the MSPs

Page 102: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Application Level Security

• In the Machine to Machine domain, critical components of Application logic are implemented and distributed in a number of End Points, Gateways and Servers. Most current prevalent distributed computing software development models use the client side to initiate server requests and a remote server side to process these requests (the client-server model). This allows application developers to take advantage of centralized security, compute and storage and that has been a major driver of the emergence of cloud computing.

Page 103: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Application Level Security

• However, for M2M applications, developers need to identify features of their applications that require processing at the edge as distinct from features that require high compute power or that do not require near real-time response and can, therefore, be deployed at a central location. Each application service logic can be resident in a number of End Points and/or more than once on a single End Point (EP). The EP can be a traditional Smartphone or other wireless connected compute elements in a car, smart home or industrial location that can run dedicated client applications

Page 104: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Application Level Security

• Each execution instance of an application service logic may be termed an “End Point Application Instance (EPAI)" and is identified with a unique Identity. Examples of the EPAIs include an instance of a fleet tracking application, a remote blood sugar monitoring application, a power metering application, or a controlling application.

Page 105: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Application Level Security

• Though End Points are assumed to communicate without human involvement, individuals or organizations remain responsible for setting the access control policies used to authorize their EPAIs to access M2M Application services. In particular, individuals or organizations acquiring the End Points can subscribe to a contract with an M2M Service provider (M2M Service Subscription) under which they enrol their End Points (e.g. using identifiers pre-provisioned on the End Points, such as End Point-ID).

Page 106: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Application Level Security

• This in turn may require an M2M Service provisioning step (including Security provisioning) that takes place on the target End Points themselves, for which interoperable procedures are specified by Standards. Following the M2M service provisioning, the End Points can be identified and authenticated by an M2M Authentication Function for association with an M2M Service Subscription, whose properties reflect the contractual agreement established between their owner and the M2M Service Provider.

Page 107: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Application Level Security

• Similarly, it must be necessary for the M2M Service Provider to ensure that the EPAIs accessing M2M services be provisioned with security credentials that are used to authorize specific operations to instantiated applications. This step is required to manage the deployment and management of applications that are instantiated in great numbers, as it enables all instances of an application to be managed through common security policies that are set once for all.

Page 108: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Roles in an IoT Ecosystem

7/18/2019Final Report, M2M Security Work Group,

TEC108

Page 109: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Reducing Risks in IoT/M2M Solutions: End Point Devices

End Point Devices: The End Point Devices form the most essential part of the machine to machine network, as it is here that the data creation / information generation / actuation happens. Security by Design is criticalEstablishment of assurance level of End Point devices based on use case classification is keyEnd to End Security must start from provision of secure keys at the end point devicesUICC as a Secure Token for 3GPP / multi technology access Devices

7/18/2019Final Report, M2M Security Work Group,

TEC109

Page 110: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Work Group 1Assurance Level

7/18/2019Final Report, M2M Security Work Group,

TEC110

Page 111: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Work Group 1End Point: Connection Establishment

7/18/2019Final Report, M2M Security Work Group,

TEC111

Page 112: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Security Classification of IoT End Points / Devices

Security Classification• Registration of M2M

SP and M2M ASP• Classification of IoT /

M2M Applications / Use Cases

• Specifications, Certification and Compliance for IoT / M2M Devices by Use Case Categories

Security Classification Framework

• Registration of M2M SP by a Competent Authority recommended by DoT

• Registration of M2M ASP by Registrars within the Industry Vertical [ARAI, IMA, MEITY, ISGF etc] but preferably a single national registrar, the National Trust Centre

• Connected Device / Gateway Manufacturer Certification (e.g. TEC MTCTE Launched in July 2019 )

• A National Registrar for all M2M Machines, Embedded Tamper resistant Identity that can enable a Machine KYC

• Specifications, Certification and Compliance for IoT / M2M Devices by Use Case Categories

• Identity, Version and Configuration details registered along with the Machine KYC holder

7/18/2019Final Report, M2M Security Work Group,

TEC112

Page 113: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Concept of Machine - KYC

• The present licensing and regulatory regime is totally focused on provisioning of Voice and Data service for usage by humans. Accordingly, it covers issues such as customer acquisition, their KYC, customer data retention and sharing, security and LEA requirements, QoS compliances, tariff controls, roaming, etc. However, M2M services encompass a plethora of other services that have evolved from the IT domain. KYC of any customer is mandated for any individual utilizing human to human communication services. Similarly, it shall be prudent to ensure KYC of the OEMs of the machine(s) / device(s) and that of the ultimate owners of that machine / device

Page 114: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Concept of Machine - KYC

• The concept of “Machine KYC” is fast becoming relevant, especially in the backdrop of remote connected dispersed and mobile assets such as Vehicles, Meters etc. It is not sufficient to know the identity of the owner (person) of the connectivity element, but equally important to know the Machine in which the connectivity element is fitted in. The National Trust Centre will identify “Machines” based on tamper resistant connectivity elements, which will add to the security, safety and traceability of the IoT use cases

Page 115: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Concept of Machine - KYC

• The current guidelines listed for adherence to KYC norms, for the telecom services, are onerous and impractical to implement while provisioning M2M services as the devices / automobiles are movable assets and often change hands. Purchase and sale of movable assets decisions are individual centric and it shall be extremely difficult and economically unviable for the MSP/TSP to keep track of the chain of events post sale and resale of devices/automobiles. Therefore, a simpler solution shall have to be evolved for implementing KYC norms for the M2M devices. Following suggestions are made towards this end

Page 116: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Concept of Machine - KYC

– Suggestion

–The KYC norms for each of the individual M2M service verticals should be part of the TEC standards finalization agenda.

–For the automobiles, the MDN can be captured as part of the registration process, similar to the engine and chassis numbers. The activation / deactivation of the SIM should be permitted only once the copy of RC is submitted to the TSP by the original / subsequent purchaser. ( suggestion )

Page 117: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Concept of Machine - KYC• suggestion

• For devices which are owned by an individual, e.g. white goods / health products, the ownership of MDN can be with the customer (purchaser) itself. The original / second / subsequent purchaser shall approach his local TSP for the MDN, of the M2M device, and hence his KYC details can be captured as per the existing norms. This would also provide the customer the flexibility of (a) subscribing / not for the M2M services, (b) choosing the network provider of his choice depending on the coverage in his area as well as (c) ensuring that he retains the number of his choice while subscribing to M2M services

Page 118: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Concept of Machine - KYC

• M2M KYC has to be implemented as a security by design. Machine KYC implies that the device is an authenticated device [e.g. a Certified Device and / or a registered Vehicle/Machine from an OEM/OE registered in India] installed with a tamper resistant identity [e.g. a secure element] in a manner that any removal / replacement of the Secure Element / Device from the Vehicle / Machine in which the Secure Element / Device is installed should immediately raise an alarm through the secure element and the device application, rendering the device unusable with the other Vehicle / Machine, unless explicitly authorised by the registered M2M Service Provider providing the Service. The concept may be implemented through the following steps:

Page 119: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Classification of Use Cases• The most important aspect of M2M / IoT Security is in how it is able to

protect the data generated by the end points and the applications that use the end point data to create services. The classifications of IoT / M2M Use Cases, and the proposed mandatory recommendations, are in the context of the said primary objective of M2M / IoT data protection

– Use Case categories• Mission Critical, High QoS, Sensitive Information [CQS]

• Mission Critical, High QoS, Non Sensitive Information [CQN]

• Non Critical, Best Effort, Sensitive Information [NBS]

• Non Critical, Best Effort, Non Sensitive Information [NBN]

• Mission Critical, Best Effort, Sensitive Information [CBS]

• Mission Critical, Best Effort, Non Sensitive Information [CBN]

• Non Critical, High QoS, Sensitive Information [NQS]

• Non Critical, High QoS, Non Sensitive Information [NQN]

7/18/2019Final Report, M2M Security Work Group,

TEC119

Page 120: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Trust ModelRegistration for IoT / M2M domain• Recommendations : all IoT / M2M Service

Providers and IoT / M2M Application Service Providers shall be registered with the Department of Telecommunications as per the draft M2M Service Providers (M2MSP) Registration Guidelines

• M2MSP / M2MASP be given a unique identity with a Company Name, Registration_ID, Application_Name, Application_ID, Application_Classification, Start_Date , ( PPS of Company )

• Hosting of the M2M Service Provider Applications shall be from Cloud or Privately Hosted Servers physically located in India

• IP address(es) used by the M2M Service Provider shall belong to a range of valid IP addresses from Indian Registry for Internet Names and Numbers, issued by a licensed ISP / Domain Name provider in India

• Exactly one Server Node per Infrastructure Domain per M2M Service Provider

• Common Service Functions

– Security Common Services Function hosted by the M2M Service Provider shall ensure implementation of the security functions described below

• Record the Embedded Machine Identity or “Machine KYC”

• Identify the Machine’s Capability, Configuration and Purpose or Use Case

• Record the Identity [APP ID] of the Application / Server that the Machine is parented to

• Record the Identity [M2M SP ID] of the M2M Service Provider who is responsible for the Machine with the possibility of admitting changes of the M2M SP

• Identify the Owner of the Machine with the possibility of admitting changes of the owner

• Command the Machine to reveal its Identity, configuration

• Ensure Location Discovery

• Locking of the Connectivity element to the Remote / Dispersed / Mobile Object

• Ensure Lawful Intercept and Block / Shut Down

– Remote Provision able Connectivity

– High Quality of Service in Connectivity meant for mission critical use cases

7/18/2019Final Report, M2M Security Work Group,

TEC120

Page 121: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

National Trust Centre

• National Trust Centre

A National Trust Centre be formed under the Umbrella of DoT to implement .

• Framework for National Trust Centre– Registration of M2M Service Providers– Registration of M2M Applications using a Class 2 / Class 3

Certificate taken from the Commercial CA in India– M2M ASP interactions coupled through standards based

m2m architectures– Registration of Devices, which may include following

• Record the Embedded Machine Identity or “Machine KYC”• Identify the Machine’s Capability, Configuration and Purpose

or Use Case• Record the Identity [APP ID] of the Application / Server that

the Machine is parented to• Record the Identity [M2M SP ID] of the M2M Service

Provider who is responsible for the Machine with the possibility of admitting changes of the M2M SP

• Identify the Owner of the Machine with the possibility of admitting changes of the owner

• Command the Machine to reveal its Identity, configuration• Ensure Location Discovery• Locking of the Connectivity element to the Remote /

Dispersed / Mobile Object• Ensure Lawful Intercept and Block / Shut Down

– Remote Provision able Connectivity– High Quality of Service in Connectivity meant for mission

critical use cases

7/18/2019Final Report, M2M Security Work Group,

TEC121

Page 122: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Common Mandatory Security Requirements

Node Mandatory Parameter Specification / Requirement / Standard

Device

Identity As per ANSI 41 / ITU

Certification TEC Certified

SIM Locking to IMEI Required for Pluggable Form Factor

Application Authorization Required

Device Data End to End Encryption

Remote ManagementReal time Request / Response for Identity &

Configuration

Application

IoT / M2M Service Provider ID DoT Provided

IoT / M2M Application ID National Trust Centre Provided

IoT / M2M Server IDAs per IoT / M2M Service Provider

Registration

Practice Statement Required, Published, Updated

Page 123: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Use Case Class Specific Mandatory Security Requirements

Use Case Class Availability / QoS Authentication Level

Encryption KYC

Transport Layer Machine User

CQS High 5 Mandatory Mandatory Mandatory

CQN High 3 Mandatory

CBS Medium 5 Mandatory Mandatory Mandatory

CBN Medium 2 Mandatory

NQS High 4 Mandatory Mandatory Mandatory

NQN High 1 *

NBS Low 4 Mandatory Mandatory Mandatory

NBN Low 0 *

Page 124: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Reducing Risks in IoT/M2M Solutions | Network Layer

Network Layer• Network Layer is critical to implementing end

to end security, it natively offers a tamper resistant security infrastructure

• Each entity in the M2M services chain should be responsible for the KYC of its customer, e-KYC should be mandatory for KYC by the M2M Service Provider (M2M SP)

• SIMs should be issued with Indian IMSIs India, where they are embedded in devices sourced abroad, they must be converted to Indian IMSIs by Over-The-Air (OTA) Provisioning within an year / six months.

• M2M SIMs, being industrial grade and embedded, are costlier than the normal SIMs and require a completely different business model and lifecycle management. The M2M SIMs should be permitted to be procured by the MSPs, SIM Ownership with MSPs

• MCC and MNC should not be directly allocated to the MSPs

• India needs to negotiate maximum number of MLAT agreements

• M2M SIMs should be issued with restrictive guidelines, M2M SIM management infrastructure should be based in India

• Generic Bootstrapping for Access Control7/18/2019

Final Report, M2M Security Work Group, TEC

124

Application Layer Security

• Network Identity based Authentication

• Message Payload authenticity cerification

Network Security

• APN

• Network Layer Encryption

• Secure SMS

Network Identity

• IMSI

• Embedded Secure Element

• Secure Keys & Crypto capability

Page 125: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Reducing Risks in IoT/M2M Solutions | Application Layer

Application Layer• In the M2M domain, critical

components of Application logic are implemented and distributed in a number of End Points (EPs), Gateways and Servers

• Registration and Identification of the M2M Service Provider (M2M SP) and M2M Application Service Provider (M2MASP) and Application Layer Instances by a Registration Authority

• The Registration Authority may be a National Trust Centre that can Identify Certified M2M Applications and Devices

• The Platform Layer must implement an authentication function for identifying and authorising EPs, validate the credentials provided to the EPs during the M2M application enrolment procedures

7/18/2019Final Report, M2M Security Work Group,

TEC125

Strong Authentication & Security

• A minimum use of Private or Public Keys, 3DES / AES / AKA algorithms

• Identification and Encryption of Sensitive and PII data, Secure storage of Sensitive Application Data

• Mechanisms for generating Application Layer alerts when QoS, Safety, Security and Reliability conditions are compromised

• Health Packets, Heartbeat mechanisms between End Points and Apps

• Fraud detection, FMEA and Analytics in order to minimise breakdowns

Page 126: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Reducing Risks in IoT/M2M Solutions | Application Layer• Establishment of a Secure

Association by generating a security credential (M2M Connection key), which must be shared between communicating End Points / App Layer

• Resistant to Man-in-the-Middle Attacks, Replays, DDOS

• Remote and Secure updates of security parameters in EP Firmware

• Locking of the tamper resistant Secure Element with Device / Asset Identity

• Blocking of Services until E-KYC and registration is completed, or if compromised

• Compliance to DoT / MIETY Guidelines for storage of Data in India, Identification of the IPs / Location of Application Servers, Platforms and Network Elements, Lawful Interception

• Minimum Data Retention and Archival as per Standards and Guidelines

• Management of Sensitive functions executing operations on sensitive data

• Secure Device Management to ensure protection of EP configuration, such as destination IPs, Frequency of Data

Page 127: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Reducing Risks in IoT/M2M Solutions | Common Service layerCommon Service Layer• Most M2M solutions in different industries use

proprietary systems that often comprise all layers, from physical to application, to provide their specialized M2M services to customers

• There is a need for a standardized common service layer that can enforce common security principles, data sharing, inter-operability, transferability and device management

• The Common Service Layer sits between the Applications and the underlying Communication Layer

• It exposes common set of functions to applications via developer friendly APIs

• It is integrated into devices/gateways/servers and allows distributed intelligence

• It hides complexity of NW usage from apps, stores and shares data, supports access control, notifies applications about events

• By deploying the Standards compliant Common Service Layer, M2M Service Providers can offer wide range of services developed by the industry

7/18/2019Final Report, M2M Security Work Group,

TEC127

Page 128: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Reducing Risks in IoT/M2M Solutions | Trust Framework

Trust Framework• National Trust Centre for M2M Devices and Applications

should be mandated• Trust means that an entity behaves in a particular defined

way. A trusted resource is one that is forced by its constitution to function in a trusted manner.

• The failure of this resource would compromise the function, integrity or security of a system which does not give output / result in expected ways

• The trusted ICT infrastructure comprise objects from the physical domain (physical objects), the cyber domain (virtual objects) and the social domain (humans with attached devices), which are capable of being identified and integrated into information and communication networks

• Employ Identity management with digital identification/authentication of social-cyber-physical objects.

• SIMs should be issued with Indian IMSIs India, where they are embedded in devices sourced abroad, they must be converted to Indian IMSIs by Over-The-Air (OTA) Provisioning within an year / six months.

• Maintenance and periodic analytics of Trust Data including operations of objects and the history of interactions

• Trust model must enable cross-domain and cross-certification trust model

7/18/2019Final Report, M2M Security Work Group,

TEC128

Page 129: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

THANK YOU ALL FOR

YOUR PATIENTHEARINGDURING

THE PRESENTATIONShailendra K Sharma

DDG Smart Networks), TEC, DoT.9013135311, [email protected]

Page 130: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

Question and Discussion Session

Page 131: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

For further Information

• For further and detailed information on the subject one can visit TEC website www.tec.gov.in and read about:

• Recommendations on IOT security

• and SSC under m2M Reports

• For MTCTE clarification one can visit TEC website https://www.mtcte.tec.gov.in/

• For Mandatory testing Requirements.

Page 132: Shailendra Kumar Sharma DDG Smart Networks, TEC, DoT Mail ... · assign a communications address to billions of devices. Electronics companies are building Wi-Fi, cellular wireless

THANK YOU ALL FOR

YOUR PATIENCEAND

INTERACTIONFOR ENRICHING

THE PRESENTATIONShailendra K Sharma

DDG Smart Networks), TEC, DoT.9013135311, [email protected]