SlideShare a Scribd company logo
© Waher Data AB, 2019.
IoT Security
© Waher Data AB, 2019.
1. Introduction
Ex-Director of National Intelligence
James R. Clapper
http://www.popsci.com/clapper-americas-greatest-threat-is-internet-things
”America's greatest
threat is the
Internet of Things”
Feb 9, 2016
© Waher Data AB, 2019.
IoT systems particularly vulnerable
 Long-term operation
 Technologies become obsolete
 Lack of updates
 Invisible operation
 No visible clues something is wrong
 No human operator (for normal use case)
 Lack of supervision
 Larger scale
 More units and attack surfaces
 Consumers don’t pay for security
Check with https://www.shodan.io/
© Waher Data AB, 2019.
2. Problem Domain
© Waher Data AB, 2019.
Transport Security ≠ Security
Just one aspect
© Waher Data AB, 2019.
Security ≠ Privacy
Privacy
Subject
perspective
Security
Operator
perspective
MQTT
BlockChain
CoAP
LWM2M
XMPP
HTTPS
© Waher Data AB, 2019.
Security must encompass entire Life-Cycle
 Production
 Installation
 Configuration (zero-configuration)
 Discovery / Ownership
 Normal Operation / Interoperability
 Discovery / Usage
 Provisioning / Decision Support
 Smart Contracts / Usage
 Economic Feedback
 Transfer of Ownership
 Decommissioning
Life-Cycle
Just one aspect
© Waher Data AB, 2019.
Open & Transparent Networks
Sealed secure systems?
or
Open, Interoperable, but vulnerable
systems?
or is it possible to have:
Open, Interoperable & secure systems?
© Waher Data AB, 2019.
3. Design Choices
© Waher Data AB, 2019.
Protocol choices affect
 Flexibility
 Network topology
 Interoperability
 Scalability
To overcome limitations in protocols,
vulnerabilities are often built in.
© Waher Data AB, 2019.
Examples of Technology-induced problems
 Topology problem
 Client/Server
 Firewalls
 Centralized Middleware
 Scalability problem
 C10K
 Identity problem
 Reversed roles
© Waher Data AB, 2019.
Identity Problem
 Identity basis for security decisions
 Problematic with centralized technologies
 Good security/privacy require identity scheme
 Interoperability require federation
Server
Client
Client
Client
Client Client
Server
Server
Server
Server
© Waher Data AB, 2019.
Federation
 No single centralized authority
 Domains cooperate
 Improves
 Scalability
 Resilience
 Interoperability
 Reduces
 Risk
© Waher Data AB, 2019.
Centralized processing
 Less attack surfaces
 Value of central nodes is huge
 Value/Effort ratio large
 Difficult to protect
External use
Internal use
 Consequences huge
Massive leaks
© Waher Data AB, 2019.
Decentralization & security
Decentralization has security implications:
 More attack surfaces.
 But value of each node is small.
 Value/Effort ratio small.
 Easier to protect.
 Massive data breaches difficult.
 You don’t put all your eggs into the same basket.
 More resilient.
 End-to-end encryption.
© Waher Data AB, 2019.
4. Industrial IoT
© Waher Data AB, 2019.
Industry 4.0
CPS triggers 4th industrial revolution
© Waher Data AB, 2019.
Paradigm Shift
Industry 3.0 (Automation) Industry 4.0 (CPS)
Centralized (decisions) Decentralized (decisions)
Pre-Planned Ad hoc
Isolated Cross-domain
Local connectivity Inter-connectivity
Proprietary (closed) Interoperable (open)
Reactive Proactive
© Waher Data AB, 2019.
Motivations
 Adapting processes to current demand
 Interconnecting processes
 Better cooperation between companies
 Better overview
 Shorter downtimes
 Energy efficiency
 Distribution of limited resources
© Waher Data AB, 2019.
Examples
 Predictive maintenance reduces downtime
 Local cross-domain cooperation
 Advanced logistics include many parties
 Exchange of interoperable information
 Ad hoc networks
 Processes adapt to current demand
 Open markets for services/operations
 Mining
 Transport
 Agriculture
 Increasing energy efficiency
 Distributed information processing (analytics)
© Waher Data AB, 2019.
Challenges
 Security
 Reliability
 Resilience
 Protection of Intellectual Property
 Standards
 Interoperability
 Open Markets
 Decision Support
 Provisioning
© Waher Data AB, 2019.
5. Smart City/Society
© Waher Data AB, 2019.
Vision of a Smart City/Society
 Ubiquitous access to interoperable
sensors and things.
 Ubiquitous access to data and
information from society’s authorities.
 Access to smart services in all niches of
society.
 Definition of ownership of information.
 Protection of Privacy, by design and by
default.
 Market for access to things and data.
© Waher Data AB, 2019.
6. IEEE 1451.99
IoT Harmonization
Open, Interoperable & Secure
© Waher Data AB, 2019.
IoT Harmonization (IEEE 1451-99)
 Sensor Data
 Control Operations
 Localization (M2M, M2H)
 Tokens for distributed transactions
 Decision Support (for devices)
 Provisioning (for owners)
 Peer-to-Peer communication
 End-to-end encryption
 Concentrator/Bridge (“Thing of things”)
 Discovery
 Ownership
 Clock Synchronization
 Secure Account Creation
 Legal Identities
 Contracts
 Automated provisioning
 Economic feedback
https://gitlab.com/IEEE-SA/XMPPI/IoT
© Waher Data AB, 2019.
Smart City Lectures*
1. How to build a Smart City
2. Privacy in the Smart City
3. An Open and/or Secure Smart City
4. Harmonizing the Internet of Things
5. Introduction to Encryption
6. Earning by Sharing in the Smart City
https://www.youtube.com/watch?v=8G8ewFxE_V8&index=6&l
ist=PLVYZOLUlo74p7I348560JztHN9NaU51Xg
(*) Funded by Swedish Internet Fund.
© Waher Data AB, 2019.
 Raspberry Pi & Arduino
 Sensors, Actuators, Controllers,
Concentrators, Bridges
 Protocols:
MQTT, HTTP, CoAP, LWM2M, XMPP
 Interoperability
 Social Interaction
 Decision Support
 Product Lifecycle
 IoT Service Platforms
 IoT Harmonization
 Security
 Privacy
Amazon
Packt
Microsoft Store
Contact: https://waher.se/, https://littlesister.se/
Mastering Internet of Things

More Related Content

PPTX
Smart City Lecture 6 - Earning by Sharing in the Smart City
PPTX
Smart City Lab 6 - Decision Support for your Devices
PPTX
Smart City Lecture 4 - Harmonizing the Internet of Things
PPTX
Smart City Lab 3 - Publishing Data from your Sensor
PPTX
Smart City Lab 4 - Publishing and Discovering Devices
PPTX
Smart City Lab 1 - Sensors and Actuators
PPTX
Smart City Lecture 5 - Introduction to Encryption
PPTX
Cross domain autonomous cooperation cross-domain autonomous cooperation
Smart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lab 6 - Decision Support for your Devices
Smart City Lecture 4 - Harmonizing the Internet of Things
Smart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 1 - Sensors and Actuators
Smart City Lecture 5 - Introduction to Encryption
Cross domain autonomous cooperation cross-domain autonomous cooperation

What's hot (20)

PDF
Monitor8 io t quick facts and solution procurement
PDF
IoT security reference architecture
PDF
Cloud Customer Architecture for IoT
PPTX
PDF
Vodafone Internet of Things
PDF
Internet of Things in 10 slides
PDF
Rapid Prototyping for IoT
PDF
Delivering the IoT ecosystem
PPTX
Nazmul haq abir
PDF
Iot Overview
PDF
The State of Edge Computing for IoT
PDF
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...
PPTX
Keynote Session : Internet Of Things (IOT) Security Taskforce
PPTX
IoT Broker
PDF
The Internet of Things is Here: Implementing IoT in Your Facility
PPTX
IoT World - creating a secure robust IoT reference architecture
PPTX
Introduction to Microsoft Azure IoT
PPTX
Blockchain in 10 slides
PDF
MILCOM 2013 Keynote Presentation: Larry Payne
PPTX
IoT Trends
Monitor8 io t quick facts and solution procurement
IoT security reference architecture
Cloud Customer Architecture for IoT
Vodafone Internet of Things
Internet of Things in 10 slides
Rapid Prototyping for IoT
Delivering the IoT ecosystem
Nazmul haq abir
Iot Overview
The State of Edge Computing for IoT
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...
Keynote Session : Internet Of Things (IOT) Security Taskforce
IoT Broker
The Internet of Things is Here: Implementing IoT in Your Facility
IoT World - creating a secure robust IoT reference architecture
Introduction to Microsoft Azure IoT
Blockchain in 10 slides
MILCOM 2013 Keynote Presentation: Larry Payne
IoT Trends
Ad

Similar to IoT Security (20)

PPTX
Smart City Lecture 3 - An Open And/Or Secure Smart City
PPTX
Module_I.pptxadsdDSSSSSSSSSSSSSSSSUGGGGGGGGGGGGG
PDF
Internet of things chapter2.pdf
PDF
Secure and Smart IoT using Blockchain and AI
PPTX
IoT_Structure
PPTX
ch2.pptx huuuuhy hhhh bjuuu huuujkjjjf hh
PPTX
ch2.pptxnnbhyyg uuggy jgugjb huuuhj hihij
PDF
Iot architectures slides important.pdf
PPTX
Modulmnbjkjnbnjnbnj,kkjebnmhnvfghjhgbcvxv
PDF
PPTX
Introduction to IoT Security
 
PDF
Drobics trustworthy io-t-for-industrial-applications
PPTX
Atal io t introduction
PDF
The Internet of Things – Good, Bad or Just Plain Ugly?
PPTX
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx
PPTX
Data Science for IoT
PDF
December 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
February 2024 - Top 10 Read Articles in Network Security & Its Applications
PDF
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
Smart City Lecture 3 - An Open And/Or Secure Smart City
Module_I.pptxadsdDSSSSSSSSSSSSSSSSUGGGGGGGGGGGGG
Internet of things chapter2.pdf
Secure and Smart IoT using Blockchain and AI
IoT_Structure
ch2.pptx huuuuhy hhhh bjuuu huuujkjjjf hh
ch2.pptxnnbhyyg uuggy jgugjb huuuhj hihij
Iot architectures slides important.pdf
Modulmnbjkjnbnjnbnj,kkjebnmhnvfghjhgbcvxv
Introduction to IoT Security
 
Drobics trustworthy io-t-for-industrial-applications
Atal io t introduction
The Internet of Things – Good, Bad or Just Plain Ugly?
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx
Data Science for IoT
December 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
February 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
Ad

More from Peter Waher (20)

PPTX
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
PPTX
Interoperabilidad e Internet
PPTX
Globally Scalable Mobile Digital ID using IEEE P1451.99
PPTX
New business opportunities in smart societies and industry 4.0
PPTX
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
PPTX
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
PPTX
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
PPTX
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
PPTX
Smart contracts for certification of smart devices
PPTX
Federated and legal identities in industrial and financial applications
PPTX
Secure interoperation across cyber physical systems in smart societies with i...
PPTX
Smart City Lab 5 - Controlling Actuators
PPTX
Smart City Lecture 2 - Privacy in the Smart City
PPTX
Smart City Lab 2 - Connect and Chat with your Device
PPTX
Smart City Lecture 1: How to build a Smart City
PPTX
IoT Security
PPTX
Privacy for IoT with XMPP
PPTX
XMPP and IoT - an overview
PPTX
XMPP IoT Sensor Data (XEP-0323)
PPTX
Web 3.0 & IoT (English)
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Interoperabilidad e Internet
Globally Scalable Mobile Digital ID using IEEE P1451.99
New business opportunities in smart societies and industry 4.0
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
Smart contracts for certification of smart devices
Federated and legal identities in industrial and financial applications
Secure interoperation across cyber physical systems in smart societies with i...
Smart City Lab 5 - Controlling Actuators
Smart City Lecture 2 - Privacy in the Smart City
Smart City Lab 2 - Connect and Chat with your Device
Smart City Lecture 1: How to build a Smart City
IoT Security
Privacy for IoT with XMPP
XMPP and IoT - an overview
XMPP IoT Sensor Data (XEP-0323)
Web 3.0 & IoT (English)

Recently uploaded (20)

PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
innovation process that make everything different.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
Testing WebRTC applications at scale.pdf
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
Introduction to Information and Communication Technology
SASE Traffic Flow - ZTNA Connector-1.pdf
The Internet -By the Numbers, Sri Lanka Edition
Cloud-Scale Log Monitoring _ Datadog.pdf
An introduction to the IFRS (ISSB) Stndards.pdf
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Introuction about ICD -10 and ICD-11 PPT.pptx
Paper PDF World Game (s) Great Redesign.pdf
Triggering QUIC, presented by Geoff Huston at IETF 123
introduction about ICD -10 & ICD-11 ppt.pptx
presentation_pfe-universite-molay-seltan.pptx
WebRTC in SignalWire - troubleshooting media negotiation
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
innovation process that make everything different.pptx
SAP Ariba Sourcing PPT for learning material
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Testing WebRTC applications at scale.pdf
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
RPKI Status Update, presented by Makito Lay at IDNOG 10
Introduction to Information and Communication Technology

IoT Security

  • 1. © Waher Data AB, 2019. IoT Security
  • 2. © Waher Data AB, 2019. 1. Introduction
  • 3. Ex-Director of National Intelligence James R. Clapper http://www.popsci.com/clapper-americas-greatest-threat-is-internet-things ”America's greatest threat is the Internet of Things” Feb 9, 2016
  • 4. © Waher Data AB, 2019. IoT systems particularly vulnerable  Long-term operation  Technologies become obsolete  Lack of updates  Invisible operation  No visible clues something is wrong  No human operator (for normal use case)  Lack of supervision  Larger scale  More units and attack surfaces  Consumers don’t pay for security Check with https://www.shodan.io/
  • 5. © Waher Data AB, 2019. 2. Problem Domain
  • 6. © Waher Data AB, 2019. Transport Security ≠ Security Just one aspect
  • 7. © Waher Data AB, 2019. Security ≠ Privacy Privacy Subject perspective Security Operator perspective MQTT BlockChain CoAP LWM2M XMPP HTTPS
  • 8. © Waher Data AB, 2019. Security must encompass entire Life-Cycle  Production  Installation  Configuration (zero-configuration)  Discovery / Ownership  Normal Operation / Interoperability  Discovery / Usage  Provisioning / Decision Support  Smart Contracts / Usage  Economic Feedback  Transfer of Ownership  Decommissioning Life-Cycle Just one aspect
  • 9. © Waher Data AB, 2019. Open & Transparent Networks Sealed secure systems? or Open, Interoperable, but vulnerable systems? or is it possible to have: Open, Interoperable & secure systems?
  • 10. © Waher Data AB, 2019. 3. Design Choices
  • 11. © Waher Data AB, 2019. Protocol choices affect  Flexibility  Network topology  Interoperability  Scalability To overcome limitations in protocols, vulnerabilities are often built in.
  • 12. © Waher Data AB, 2019. Examples of Technology-induced problems  Topology problem  Client/Server  Firewalls  Centralized Middleware  Scalability problem  C10K  Identity problem  Reversed roles
  • 13. © Waher Data AB, 2019. Identity Problem  Identity basis for security decisions  Problematic with centralized technologies  Good security/privacy require identity scheme  Interoperability require federation Server Client Client Client Client Client Server Server Server Server
  • 14. © Waher Data AB, 2019. Federation  No single centralized authority  Domains cooperate  Improves  Scalability  Resilience  Interoperability  Reduces  Risk
  • 15. © Waher Data AB, 2019. Centralized processing  Less attack surfaces  Value of central nodes is huge  Value/Effort ratio large  Difficult to protect External use Internal use  Consequences huge Massive leaks
  • 16. © Waher Data AB, 2019. Decentralization & security Decentralization has security implications:  More attack surfaces.  But value of each node is small.  Value/Effort ratio small.  Easier to protect.  Massive data breaches difficult.  You don’t put all your eggs into the same basket.  More resilient.  End-to-end encryption.
  • 17. © Waher Data AB, 2019. 4. Industrial IoT
  • 18. © Waher Data AB, 2019. Industry 4.0 CPS triggers 4th industrial revolution
  • 19. © Waher Data AB, 2019. Paradigm Shift Industry 3.0 (Automation) Industry 4.0 (CPS) Centralized (decisions) Decentralized (decisions) Pre-Planned Ad hoc Isolated Cross-domain Local connectivity Inter-connectivity Proprietary (closed) Interoperable (open) Reactive Proactive
  • 20. © Waher Data AB, 2019. Motivations  Adapting processes to current demand  Interconnecting processes  Better cooperation between companies  Better overview  Shorter downtimes  Energy efficiency  Distribution of limited resources
  • 21. © Waher Data AB, 2019. Examples  Predictive maintenance reduces downtime  Local cross-domain cooperation  Advanced logistics include many parties  Exchange of interoperable information  Ad hoc networks  Processes adapt to current demand  Open markets for services/operations  Mining  Transport  Agriculture  Increasing energy efficiency  Distributed information processing (analytics)
  • 22. © Waher Data AB, 2019. Challenges  Security  Reliability  Resilience  Protection of Intellectual Property  Standards  Interoperability  Open Markets  Decision Support  Provisioning
  • 23. © Waher Data AB, 2019. 5. Smart City/Society
  • 24. © Waher Data AB, 2019. Vision of a Smart City/Society  Ubiquitous access to interoperable sensors and things.  Ubiquitous access to data and information from society’s authorities.  Access to smart services in all niches of society.  Definition of ownership of information.  Protection of Privacy, by design and by default.  Market for access to things and data.
  • 25. © Waher Data AB, 2019. 6. IEEE 1451.99 IoT Harmonization Open, Interoperable & Secure
  • 26. © Waher Data AB, 2019. IoT Harmonization (IEEE 1451-99)  Sensor Data  Control Operations  Localization (M2M, M2H)  Tokens for distributed transactions  Decision Support (for devices)  Provisioning (for owners)  Peer-to-Peer communication  End-to-end encryption  Concentrator/Bridge (“Thing of things”)  Discovery  Ownership  Clock Synchronization  Secure Account Creation  Legal Identities  Contracts  Automated provisioning  Economic feedback https://gitlab.com/IEEE-SA/XMPPI/IoT
  • 27. © Waher Data AB, 2019. Smart City Lectures* 1. How to build a Smart City 2. Privacy in the Smart City 3. An Open and/or Secure Smart City 4. Harmonizing the Internet of Things 5. Introduction to Encryption 6. Earning by Sharing in the Smart City https://www.youtube.com/watch?v=8G8ewFxE_V8&index=6&l ist=PLVYZOLUlo74p7I348560JztHN9NaU51Xg (*) Funded by Swedish Internet Fund.
  • 28. © Waher Data AB, 2019.  Raspberry Pi & Arduino  Sensors, Actuators, Controllers, Concentrators, Bridges  Protocols: MQTT, HTTP, CoAP, LWM2M, XMPP  Interoperability  Social Interaction  Decision Support  Product Lifecycle  IoT Service Platforms  IoT Harmonization  Security  Privacy Amazon Packt Microsoft Store Contact: https://waher.se/, https://littlesister.se/ Mastering Internet of Things