SlideShare a Scribd company logo
IoT Security & Privacy Considerations
2016 Taiwan IGF
Kenny Huang, Ph.D. 黃勝雄博⼠
Executive Council Member, APNIC
huangksh@gmail.com
2016.06.17
2
source : The Economist source : BBC
“Every step you take will be the threat to privacy”The Economist
3
“Personal data is the new oil of the
Internet and the new currency of
the digital world”
Meglena Kuneva, European Consumer Commissioner
User actions/
behavior
Software
Vulnerabilities
Hardward
Vunlerabilities
sourcesofrisk
“Target CEO out as Data Breach”
- USA Today May 2014
“Hackers' Next Target : Your Health
Insurance Company”
- FOXBusiness, May 2014
Privacy and Security
What Are The Risks
Policy and Process
4
Privacy by Design
Methodology
Fair Information
Practice Principles
Accountability
Standards
Open Technology
Standards
Privacy By Design
• Taking privacy into account throughout the whole engineering
process
• 7 principles
– Proactive not reactive
– Privacy as the default
• purpose specification; collection limitation; data minimization; use,
retention and disclosure limitation
– Privacy embeded into design
– Full functionality
– End-to-end security - full lifecycle protection
• ensure confidentiality; integrity and availabiliity
– Visibility and transparency - keep it open
• accountability; openness; compliance
– Respect for user privacy - user centric
• consent; accuracy; access; compliance
5
Fair Information Practice Principles
• Notice/awareness
– Consumers should be given notice of an entity's information practices
before any personal information is collected from them
• Choice/consent
– giving consumers options to control how their data is used
• Access/participation
– consumer's ability to view the data collected, and to verify and contest
its accuracy
• Integrity/Security
– ensure that the data they collect is accurate and secure
• Enforcement/Redress
– enforcement measures : by the information collectors; to sue violators;
criminal penalties
6
7
 Accountability standards serve as a framework for building
trusting, productive relationships among stakeholders
 Accountability standards create benchmarks and a common
ground for stakeholders
 For digital data operator collected, operator need to tell
people how they use it
Accountability Standards
 Need a large community that is interested in developing open
technology standards. People can identify weakness before it
become an issue
 Making sure we have public scrutiny on the things we going to
use and to keep our data private
Open Technology Standards
IoT Security is Critical
• Security is the top issue for IoT
– Deployments will not scale without trust
• With large deployments
– must limit attack surface of each device
• Applies to even simple sensors
– Even if there is no secure data issues
• Security must be architected from the beginning and
must not be made an option
8
Bring Security to Traditional Embeded Systems
9
Embeded
OS Software Stack and Application
 Traditional closed systems
Secure OS Application
 Very few developers have strong experience in creating secure systems
 Need a platform with built-in security and strong guidance on best practices
Security Design Challenges
• Too easy to declare developers of compromised products as incompetent
– as product security can't be reliably measured, security suffers first on tight
product schedules
– massively parallelized security researchers vs. limited product development
budgets and time frames
• The security of a system is dynamic over its lifttime
– the likehood of an attack often wrongly assessed or undervalued in the chain
• New Denial-of-Service power attacks a problem for battery/scavenging
devices
– structural sensors often inaccessible and battery replacement is expensive
• If your product is successful, it will be hacked.
– often the deployment costs of firmware udpates surpass the costs of a new device
– as a result even know-broken systems are kept in use
– this is not the PC world, no reset, no reinstall
• The assumption of being hacked at some point requires solid mitigation
strategy
– developers must ensure secure, reliable and affortable firmware updates
10
System Architecture - Security Perspective
11
Directory & Subscription Security Admin & Multi-tenancy
Data Flow Management - RESTful and Publish/Subscribe
Device Management - Lightweight M2M
Interface - Open Web Standards
Application Protocols - CoAP, HTTP
IoT Server
Device Management - Lightweight M2M
Cryptography ?
IoT Device OS
WiFi Bluetooth 3G/4G
IPv6, 6LoWPAN IPv4
Lifecycle
Security
Communication
Security
IoT Device
Security
Open
Standards ?
Open
Source
IoT Interoperability
12
Participants : IETF, W3C, OMA, AllSeen Alliance, OCF, NIST, CableLabs, ZigBee, and ETSI, etc.
WiFi Stack
Traditional MCU Flat Security Model
13
Server
Application
Protocol
SSL Library
Secure
Storage
Crypto Key
Device
Managemen
Secure ID
Crypto API
Firmware
Update
Diagnose
BLE Stack
Random No
Generator
 IoT devices include significant software
complexity
 Secure and privacy enabled server
communication
 Unclonable device identity
 Cryptography and random number
generation
 Protection of keys/certificates and server
API tokens
 Secure firmware update over the air
 Flat security all code/data lives in a shared
address space
 Large attack surface makes hard to verify devide
security
 Bugs in any code can lead to a security flaw
 Code based is too large for exhaustive validation
 If malicious code updates Flash it may become
impossible to remotely recover a device
Device Security : Secure Partitioning for MCUs
14
BLE Stack
WiFi Stack
Application
Protocol
SSL Library
Device
Managemen
Diagnose
Server
Firmware
Update
Secure
Storage
Crypto Keys
Crypto API
Secure ID
Random No
Generator
Public Private
 Split memory into private critical and
public uncritical
 Small private footprint enables exhausive
verification
 Public code operates on cryptographic
secrets using defined API's but never allow
access to raw keys
 Vulnerabilities on public side can't affect
private side
 public code can't wirte code directly to
Flash
 Private side can reliably recover device to
clean state
 private side can verify integrity of the
public side image
Enable Fast Innovation
15
BLE Stack
WiFi Stack
Application
Protocol
SSL Library
Device
Managemen
Diagnose
Firmware
Update
Secure
Storage
Crypto Keys
Crypto API
Secure ID
Random No
Generator
Public Private
Fast Slow
 Private modules build with strong security
and rarely change
 software is never finished
 new features, bug fixes, patching
vulnerabilities and tracking standards
 Code in the public state is developed
rapidly
 fast time to market
 quick innovation cycles for public side
 still a secure product
 When bugs are discovered after
deployment a firmware update can be
reliably enforced
Driverless Car : Secure But is it Safe
16
360
View
Front
Camera
Interor
Camera
Long-range
Radar
Mid-range
Radar
Ultrasonic
Sensors
Automative Today, IoT Tomorrow
ASIL B or ASIL D support
IEC 61508
ISO 26262
Development process
Fault detection and control features
Failure node and effects analysis FMEA
Compiler qualification & Maintenance
Levels of Vehicle Automation
17
Level 1 - Function-specific
automation
one or more control
functions such as breaking
and lane keeping are
automated but driver has
control
Level 2 - Combined
function automation
Two or more control
functions automated. eg.
ACC with lane centering.
Hand off the steering
wheel and foot pedal but
still responsible to
monitoring and expected
to control the vehicle
Level 3 - Limited self-
driving automation
Vehicle takes control of all
safety critical functions
mostly. Driver is expected
to be available for
occasional control
without constant
monitoring
Level 4 - Full self-driving
automation
Vehicles takes control all
safety critical driving
function and monitor
roadway all the time.
Driver is not expected to
be available for control it
any time
Internet Protocol to The Edge
18
REST APIs
CoAP|HTTP
TCP
REST APIs
UDP
IoT
Application
Device
management
WiFi Bluetooth 3G/4G
 Non-standard approaches are a risk
 Don't repeat past mistakes
 Use Internet security
 widely deplyed and proven
 firewalls and local routers
 32-bit MCUs can handle IP stacks
 < $1 trust Moore's law
Lifecycle Security and LWM2M
19
Common Problems We Need to Solve
20
 IoT deployments will not scale without trust
 very few developers have strong security
experience
 Flat security model
 remote code execution allows full access
and key extraction
 Compromised communications protocols
 Man in the moddle attacks and
compromised devices
 Flawed proprietary algorithms
 Insecure firmware updates
 updates become the malware infection
issue
 compromised through ineffective or no
use of cryptograph
 Poor random number generation
 Negates strong cryptograph
Lifecycle
Security
Communication
Security
IoT Device
Security
21

More Related Content

PPTX
Privacy and security in IoT
PPTX
Iot(security)
PPTX
IoT Security Imperative: Stop your Fridge from Sending you Spam
PDF
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
PPTX
IoT security patterns
PDF
IOT Security
PPTX
IoT Security Training, IoT Security Awareness 2019
PDF
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
Privacy and security in IoT
Iot(security)
IoT Security Imperative: Stop your Fridge from Sending you Spam
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
IoT security patterns
IOT Security
IoT Security Training, IoT Security Awareness 2019
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security

What's hot (20)

DOCX
Security and Privacy considerations in Internet of Things
PPTX
Security issues and solutions : IoT
PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
PPTX
Practical IoT Security in the Enterprise
PDF
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
PDF
Ryan Wilson - ryanwilson.com - IoT Security
PPTX
Iot Security, Internet of Things
PDF
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
PDF
IoT Security, Mirai Revisited
PDF
Security challenges for IoT
PPTX
IoT security
PDF
IoT security and privacy: main challenges and how ISOC-OTA address them
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PPTX
Iot security amar prusty
PPTX
Internet of Things Security
PPTX
Your Thing is Pwned - Security Challenges for the IoT
PPTX
IoT Security Briefing FBI 07 23-2017 final
PPTX
IoT Security: Cases and Methods
PPTX
IoT Security Awareness Training : Tonex Training
PPTX
security and privacy-Internet of things
Security and Privacy considerations in Internet of Things
Security issues and solutions : IoT
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Practical IoT Security in the Enterprise
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Ryan Wilson - ryanwilson.com - IoT Security
Iot Security, Internet of Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
IoT Security, Mirai Revisited
Security challenges for IoT
IoT security
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT Security, Threats and Challenges By V.P.Prabhakaran
Iot security amar prusty
Internet of Things Security
Your Thing is Pwned - Security Challenges for the IoT
IoT Security Briefing FBI 07 23-2017 final
IoT Security: Cases and Methods
IoT Security Awareness Training : Tonex Training
security and privacy-Internet of things
Ad

Viewers also liked (20)

PDF
Cybersecurity and Internet Governance
PDF
Privacy, Drones, and IoT
PDF
網路中立性簡介
PDF
IoT: Security & Privacy at IGNITE 2015
PDF
The 5 elements of IoT security
PPT
IoT security (Internet of Things)
PDF
Internet of Things - Privacy and Security issues
PDF
談已發展與發展中國家數位落差
PDF
Spectrum Policy
PDF
Smart Energy
PDF
Smart Vehicle and Data Service Provisioning
PPTX
Automatski - The Internet of Things - Privacy in IoT
PDF
Internet of Things: Challenges and Issues
PDF
The Internet of Things: Privacy and Security Issues
PDF
Overview of IoT and Security issues
PPTX
IoT Security Risks and Challenges
PPT
Internet of Things and its applications
PPTX
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
PPTX
IoT - IT 423 ppt
PDF
WP-Privacy-IoT-Era - PRODUCTION
Cybersecurity and Internet Governance
Privacy, Drones, and IoT
網路中立性簡介
IoT: Security & Privacy at IGNITE 2015
The 5 elements of IoT security
IoT security (Internet of Things)
Internet of Things - Privacy and Security issues
談已發展與發展中國家數位落差
Spectrum Policy
Smart Energy
Smart Vehicle and Data Service Provisioning
Automatski - The Internet of Things - Privacy in IoT
Internet of Things: Challenges and Issues
The Internet of Things: Privacy and Security Issues
Overview of IoT and Security issues
IoT Security Risks and Challenges
Internet of Things and its applications
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
IoT - IT 423 ppt
WP-Privacy-IoT-Era - PRODUCTION
Ad

Similar to IoT Security and Privacy Considerations (20)

PDF
Bringing Government and Enterprise Security Controls to the Android Endpoint
PPTX
Boosting IoT Protection: An Enterprise Risk Imperative
PDF
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
 
PDF
UplinQ - qualcomm® smart gateway the home network as a development platform
PPTX
IIoT Endpoint Security
PPT
Palo Alto Networks Soc Ent Okt2009
PDF
CNIT 128 8: Mobile development security
PPT
How PCI And PA DSS will change enterprise applications
PDF
Top 5 best practice for delivering secure in-vehicle software
PDF
Endpoint Security for Mobile Devices
PDF
[Webinar] Why Security Certification is Crucial for IoT Success
PPT
Information Assurance And Security - Chapter 2 - Lesson 4
PPTX
Application security meetup k8_s security with zero trust_29072021
PPTX
PDF
IOT Product Development for Startups: A Beginner’s Guide
DOCX
IoT Design Principles
PDF
MultiValue Security
PPTX
Embracing secure, scalable BYOD with Sencha and Centrify
PDF
Supply Chain Security and Compliance for Embedded Devices & IoT
Bringing Government and Enterprise Security Controls to the Android Endpoint
Boosting IoT Protection: An Enterprise Risk Imperative
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
 
UplinQ - qualcomm® smart gateway the home network as a development platform
IIoT Endpoint Security
Palo Alto Networks Soc Ent Okt2009
CNIT 128 8: Mobile development security
How PCI And PA DSS will change enterprise applications
Top 5 best practice for delivering secure in-vehicle software
Endpoint Security for Mobile Devices
[Webinar] Why Security Certification is Crucial for IoT Success
Information Assurance And Security - Chapter 2 - Lesson 4
Application security meetup k8_s security with zero trust_29072021
IOT Product Development for Startups: A Beginner’s Guide
IoT Design Principles
MultiValue Security
Embracing secure, scalable BYOD with Sencha and Centrify
Supply Chain Security and Compliance for Embedded Devices & IoT

More from Kenny Huang Ph.D. (20)

PDF
Taiwan Internet Intermediaries and Cyber Norms
PDF
Internet Governance Model in Taiwan
PDF
Cyberspace and Digital Diplomacy
PDF
Internet Routing Security
PDF
網路治理概念、組織及案例
PDF
Ethical Considerations in AI
PDF
創新網路服務產業發展條例建議草案
PDF
APNIC44 Briefing
PDF
共享經濟關鍵議題之探討
PDF
物聯網與工業4.0情境分析
PDF
Cloud Computing Business Models Review
PDF
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
PDF
Big Data : Risks and Opportunities
PDF
Taiwan Network Environment Analysis
PDF
Taiwan gTLD Policy and Regulation
PDF
New gTLD - National Cyberspace Strategy
PDF
國際固定寬頻發展策略分析
PDF
Cyber Attack Analysis : Part I DDoS
PDF
Ruling the root : CJK Rules for The Root Zone
PDF
CJK Generation Panels Coordination Review
Taiwan Internet Intermediaries and Cyber Norms
Internet Governance Model in Taiwan
Cyberspace and Digital Diplomacy
Internet Routing Security
網路治理概念、組織及案例
Ethical Considerations in AI
創新網路服務產業發展條例建議草案
APNIC44 Briefing
共享經濟關鍵議題之探討
物聯網與工業4.0情境分析
Cloud Computing Business Models Review
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Big Data : Risks and Opportunities
Taiwan Network Environment Analysis
Taiwan gTLD Policy and Regulation
New gTLD - National Cyberspace Strategy
國際固定寬頻發展策略分析
Cyber Attack Analysis : Part I DDoS
Ruling the root : CJK Rules for The Root Zone
CJK Generation Panels Coordination Review

Recently uploaded (20)

PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Testing WebRTC applications at scale.pdf
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
RPKI Status Update, presented by Makito Lay at IDNOG 10
Job_Card_System_Styled_lorem_ipsum_.pptx
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Slides PPTX World Game (s) Eco Economic Epochs.pptx
QR Codes Qr codecodecodecodecocodedecodecode
Sims 4 Historia para lo sims 4 para jugar
Cloud-Scale Log Monitoring _ Datadog.pdf
Testing WebRTC applications at scale.pdf
Paper PDF World Game (s) Great Redesign.pdf
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
presentation_pfe-universite-molay-seltan.pptx
The Internet -By the Numbers, Sri Lanka Edition
522797556-Unit-2-Temperature-measurement-1-1.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Decoding a Decade: 10 Years of Applied CTI Discipline
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PptxGenJS_Demo_Chart_20250317130215833.pptx

IoT Security and Privacy Considerations

  • 1. IoT Security & Privacy Considerations 2016 Taiwan IGF Kenny Huang, Ph.D. 黃勝雄博⼠ Executive Council Member, APNIC huangksh@gmail.com 2016.06.17
  • 2. 2 source : The Economist source : BBC “Every step you take will be the threat to privacy”The Economist
  • 3. 3 “Personal data is the new oil of the Internet and the new currency of the digital world” Meglena Kuneva, European Consumer Commissioner User actions/ behavior Software Vulnerabilities Hardward Vunlerabilities sourcesofrisk “Target CEO out as Data Breach” - USA Today May 2014 “Hackers' Next Target : Your Health Insurance Company” - FOXBusiness, May 2014 Privacy and Security What Are The Risks
  • 4. Policy and Process 4 Privacy by Design Methodology Fair Information Practice Principles Accountability Standards Open Technology Standards
  • 5. Privacy By Design • Taking privacy into account throughout the whole engineering process • 7 principles – Proactive not reactive – Privacy as the default • purpose specification; collection limitation; data minimization; use, retention and disclosure limitation – Privacy embeded into design – Full functionality – End-to-end security - full lifecycle protection • ensure confidentiality; integrity and availabiliity – Visibility and transparency - keep it open • accountability; openness; compliance – Respect for user privacy - user centric • consent; accuracy; access; compliance 5
  • 6. Fair Information Practice Principles • Notice/awareness – Consumers should be given notice of an entity's information practices before any personal information is collected from them • Choice/consent – giving consumers options to control how their data is used • Access/participation – consumer's ability to view the data collected, and to verify and contest its accuracy • Integrity/Security – ensure that the data they collect is accurate and secure • Enforcement/Redress – enforcement measures : by the information collectors; to sue violators; criminal penalties 6
  • 7. 7  Accountability standards serve as a framework for building trusting, productive relationships among stakeholders  Accountability standards create benchmarks and a common ground for stakeholders  For digital data operator collected, operator need to tell people how they use it Accountability Standards  Need a large community that is interested in developing open technology standards. People can identify weakness before it become an issue  Making sure we have public scrutiny on the things we going to use and to keep our data private Open Technology Standards
  • 8. IoT Security is Critical • Security is the top issue for IoT – Deployments will not scale without trust • With large deployments – must limit attack surface of each device • Applies to even simple sensors – Even if there is no secure data issues • Security must be architected from the beginning and must not be made an option 8
  • 9. Bring Security to Traditional Embeded Systems 9 Embeded OS Software Stack and Application  Traditional closed systems Secure OS Application  Very few developers have strong experience in creating secure systems  Need a platform with built-in security and strong guidance on best practices
  • 10. Security Design Challenges • Too easy to declare developers of compromised products as incompetent – as product security can't be reliably measured, security suffers first on tight product schedules – massively parallelized security researchers vs. limited product development budgets and time frames • The security of a system is dynamic over its lifttime – the likehood of an attack often wrongly assessed or undervalued in the chain • New Denial-of-Service power attacks a problem for battery/scavenging devices – structural sensors often inaccessible and battery replacement is expensive • If your product is successful, it will be hacked. – often the deployment costs of firmware udpates surpass the costs of a new device – as a result even know-broken systems are kept in use – this is not the PC world, no reset, no reinstall • The assumption of being hacked at some point requires solid mitigation strategy – developers must ensure secure, reliable and affortable firmware updates 10
  • 11. System Architecture - Security Perspective 11 Directory & Subscription Security Admin & Multi-tenancy Data Flow Management - RESTful and Publish/Subscribe Device Management - Lightweight M2M Interface - Open Web Standards Application Protocols - CoAP, HTTP IoT Server Device Management - Lightweight M2M Cryptography ? IoT Device OS WiFi Bluetooth 3G/4G IPv6, 6LoWPAN IPv4 Lifecycle Security Communication Security IoT Device Security Open Standards ? Open Source
  • 12. IoT Interoperability 12 Participants : IETF, W3C, OMA, AllSeen Alliance, OCF, NIST, CableLabs, ZigBee, and ETSI, etc.
  • 13. WiFi Stack Traditional MCU Flat Security Model 13 Server Application Protocol SSL Library Secure Storage Crypto Key Device Managemen Secure ID Crypto API Firmware Update Diagnose BLE Stack Random No Generator  IoT devices include significant software complexity  Secure and privacy enabled server communication  Unclonable device identity  Cryptography and random number generation  Protection of keys/certificates and server API tokens  Secure firmware update over the air  Flat security all code/data lives in a shared address space  Large attack surface makes hard to verify devide security  Bugs in any code can lead to a security flaw  Code based is too large for exhaustive validation  If malicious code updates Flash it may become impossible to remotely recover a device
  • 14. Device Security : Secure Partitioning for MCUs 14 BLE Stack WiFi Stack Application Protocol SSL Library Device Managemen Diagnose Server Firmware Update Secure Storage Crypto Keys Crypto API Secure ID Random No Generator Public Private  Split memory into private critical and public uncritical  Small private footprint enables exhausive verification  Public code operates on cryptographic secrets using defined API's but never allow access to raw keys  Vulnerabilities on public side can't affect private side  public code can't wirte code directly to Flash  Private side can reliably recover device to clean state  private side can verify integrity of the public side image
  • 15. Enable Fast Innovation 15 BLE Stack WiFi Stack Application Protocol SSL Library Device Managemen Diagnose Firmware Update Secure Storage Crypto Keys Crypto API Secure ID Random No Generator Public Private Fast Slow  Private modules build with strong security and rarely change  software is never finished  new features, bug fixes, patching vulnerabilities and tracking standards  Code in the public state is developed rapidly  fast time to market  quick innovation cycles for public side  still a secure product  When bugs are discovered after deployment a firmware update can be reliably enforced
  • 16. Driverless Car : Secure But is it Safe 16 360 View Front Camera Interor Camera Long-range Radar Mid-range Radar Ultrasonic Sensors Automative Today, IoT Tomorrow ASIL B or ASIL D support IEC 61508 ISO 26262 Development process Fault detection and control features Failure node and effects analysis FMEA Compiler qualification & Maintenance
  • 17. Levels of Vehicle Automation 17 Level 1 - Function-specific automation one or more control functions such as breaking and lane keeping are automated but driver has control Level 2 - Combined function automation Two or more control functions automated. eg. ACC with lane centering. Hand off the steering wheel and foot pedal but still responsible to monitoring and expected to control the vehicle Level 3 - Limited self- driving automation Vehicle takes control of all safety critical functions mostly. Driver is expected to be available for occasional control without constant monitoring Level 4 - Full self-driving automation Vehicles takes control all safety critical driving function and monitor roadway all the time. Driver is not expected to be available for control it any time
  • 18. Internet Protocol to The Edge 18 REST APIs CoAP|HTTP TCP REST APIs UDP IoT Application Device management WiFi Bluetooth 3G/4G  Non-standard approaches are a risk  Don't repeat past mistakes  Use Internet security  widely deplyed and proven  firewalls and local routers  32-bit MCUs can handle IP stacks  < $1 trust Moore's law
  • 20. Common Problems We Need to Solve 20  IoT deployments will not scale without trust  very few developers have strong security experience  Flat security model  remote code execution allows full access and key extraction  Compromised communications protocols  Man in the moddle attacks and compromised devices  Flawed proprietary algorithms  Insecure firmware updates  updates become the malware infection issue  compromised through ineffective or no use of cryptograph  Poor random number generation  Negates strong cryptograph Lifecycle Security Communication Security IoT Device Security
  • 21. 21