SlideShare a Scribd company logo
Syam Madanapalli | Chair IEEE P1931.1 - The Roof Computing | June 27, 2020
IoT Security Assessment Framework
A data driven approach for the businesses
1
Complex & uncomprehended
The businesses should know 

• What they are deploying

• A checklist for a calculated risk 

• Potential attack surface

• Risk vs bene
fi
ts
IoT Security
Constrained
Devices
Big Scale
Tech Illiterates
Lack of UI, challenging to
design & con
fi
gure,
update, and prone to
errors
Applications & devices
are personal, and
involves humans &
physical world
Variety of devices,
protocols, &
applications
Big Impact
Safety & economic
risks, loss of
privacy and
business
interruptions
2
Typical IoT Network Segments
Typical networking technologies and corresponding security protocols
3
Cloud
PAN WAN
LAN Internet
IPSec Tunnel IPSec Tunnel
WiFi/
Ethernet
BB/LTE/MPLS
BLE,
802.15.4,
WiFi
SSP
Edge Router Apps
OTAE
CoAP/UDP/DTLS/IPv6
IoT Security Assessment Framework
The proposal
The assessment framework standard will
provide

• A way for the industry to assess IoT
applications consisting of IoT devices and
Edge

• A checklist for devices and edge

• Necessary and su
ffi
cient conditions

• A scoring mechanisms

• Enable decision making

• Data driven analytics for security assessment
A set guidelines for the
device vendors and
application developers
A method for evaluating the
IoT applications for security
needs
Self assessment/IEEE
certi
fi
cation
4
Existing/Ongoing Standards/Work ...
@IEEE-SA
• Healthcare Device Security Assurance Working Group (EMB/Stds Com/
HDSecWG)

• Standard for Wireless Diabetes Device Security Assurance: Product
Security Evaluation Program

• This standard de
fi
nes a framework for a connected electronic product
security evaluation program
P2621.1
P2733
• Clinical IoT Data and Device Interoperability with TIPPSS (EMB/Stds Com/
Clinical IoT DDI with TIPPSS)

• Standard for Clinical Internet of Things (IoT) Data and Device
Interoperability with TIPPSS - Trust, Identity, Privacy, Protection, Safety,
Security

• This standard establishes the framework with TIPPSS principles (Trust,
Identity, Privacy, Protection, Safety, Security) for Clinical Internet of Things
(IoT) data and device validation and interoperability.
5
Existing/Ongoing Standards/Work
Outside IEEE
• GSMA IoT Security Guidelines and Assessment

• Provides recommendations for the secure design, development and
deployment of IoT services

• OneM2M, IoT Alliance Australia, Trusted Connectivity Alliance
GSMA
IoTSF
• IoT Security Foundation - A not-for-pro
fi
t organization

• Provides advice and framework for IoT Security

• Has over 100 members, including ARM, NXP, Microchip, Samsung,
Vodafone, Qualcomm
6
ETSI EN 303 645
• IoT Security requirements for Consumer Devices

• Under development

• A potential candidate to collaborate
Other Established Standards/Compliance Guidelines
These will in
fl
uence the development of any new security standards
Information technology — Security techniques — Evaluation
criteria for IT security
ISO/IEC 15408
GDPR
Regulation on the protection of natural persons with regard to
the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC (Data Protection
Directive)
HIPAA
The Health Insurance Portability and Accountability Act of
1996
PCI DSS Payment Card Industry Data Security Standard
7
IEEE Standard for an Architectural Framework for the Internet
of Things
IEEE 2413
IoT Security Requirements
The capabilities of the end devices should be considered for security assessment
Characteristic Class 0 Class 1 Class 2
RAM, ROM < 10KB, 100KB ~ 10KB, 100KB ~ 50KB, 250KB
Internet No IP CoAP IPv6, HIP
Cryptography Over the air
Symmetric
cryptography
PKI based
Protection One level up
Assisted at one level
up
Self and services at
one level up
Interface IoT Services
Security Provisioning
and Services
Security Services
Applications
Only for trusted
environments
Battery powered
under the Roof
Mains powered &
standalone devices
8
The Need for a New Standard
Data driven; Easy to understand and to be used by Business users
• Training, scaling, reducing costs and making
IoT deployments more secure 

• Device capabilities based approach

• De
fi
ning Necessary and Su
ffi
cient conditions

• Scoring/grading mechanism

• Easy to interpret checklist and summary for
for weighing risk vs. bene
fi
ts and decision
making

• Data driven approach (applying ML/AI for
assessment)

• Self assessment/IEEE certi
fi
cation
9
5C
Five Criteria
Broad Market Potential
A standards project authorized by IEEE 802 shall have a broad market potential. Speci
fi
cally, it
shall have the potential for:
11
• Broad sets of applicability

• IoT being adopted almost all business sectors, including residential and government
use. And security and privacy is the number one concern while considering an IoT
application. Hence the output of this project will have broad set of applicability.

• Multiple vendors and numerous users

• The number of devices that would be connected to the Internet is estimated to be in
tens of billions in the near future.

• Balanced costs (LAN versus attached stations)

• This project reduces the cost of IoT applications deployment by providing a repeatable
approach for security assessment and reduces the need for special skilled personnel.
Compatibility
IEEE 802 LMSC de
fi
nes a family of standards. All standards should be in conformance: IEEE Std
802, IEEE 802.1D, and IEEE 802.1Q. If any variances in conformance emerge, they shall be
thoroughly disclosed and reviewed with IEEE 802.1 Working Group. In order to demonstrate
compatibility with this criterion, the Five Criteria statement must answer the following questions.
12
A. Does the PAR mandate that the standard shall comply with IEEE Std 802,
IEEE Std 802.1D and IEEE Std 802.1Q? 

• No. However, the standard would use the IEEE 802 standards.

B. If not, how will the Working Group ensure that the resulting draft standard is
compliant, or if not, receives appropriate review from the IEEE 802.1 Working
Group? 

• Not applicable.
Distinct Identity
Each IEEE 802 standard shall have a distinct identity. To achieve this, each authorized project
shall be:
13
• Substantially di
ff
erent from other IEEE 802 standards

• This standard is not related to IEEE 802 standards.

• One unique solution per problem (not two solutions to a problem)

• There is no standard within IEEE that provides this capability.

• Easy for the document reader to select the relevant speci
fi
cation

• Yes, this project will de
fi
ne an assessment framework for deploying IoT
applications based on best practices for security and privacy.
Technical Feasibility
For a project to be authorized, it shall be able to show its technical feasibility. At a minimum, the
proposed project shall show:
14
• Demonstrated system feasibility

• Security assessment is typically prerequisite for any connected applications in the enterprise,
however the approach is proprietary.

• Proven technology, reasonable testing

• Not applicable.

• Con
fi
dence in reliability

• This standard will not reduce any existing system reliability.

• Coexistence of IEEE 802 LMSC wireless standards specifying devices for unlicensed operation.

• Not applicable.
Economic Feasibility
For a project to be authorized, it shall be able to show economic feasibility (so far as can
reasonably be estimated) for its intended applications. At a minimum, the proposed project shall
show:
15
• Known cost factors, reliable data

• This project will not introduce any new costs, rather will help in reducing
the cost of connected application deployment and maintenance.

• Reasonable cost for performance

• The benefit of security assessment will outweigh the cost of
assessment.

• Consideration of installation costs

• Not applicable.
Questions & Suggestions
16

More Related Content

PPTX
Edge Computing
PDF
EDGE COMPUTING: VISION AND CHALLENGES
PDF
The role of edge computing
PDF
Edge Computing M&A Analysis
PPTX
Edge Computing: An Extension to Cloud Computing
PPTX
presentation on Edge computing
PPTX
Edge computing
PDF
Introduction to Edge Computing using Google IoT
Edge Computing
EDGE COMPUTING: VISION AND CHALLENGES
The role of edge computing
Edge Computing M&A Analysis
Edge Computing: An Extension to Cloud Computing
presentation on Edge computing
Edge computing
Introduction to Edge Computing using Google IoT

What's hot (20)

PPTX
What is Edge Computing and Why does it matter in IoT?
PPTX
Edge Computing & AI
PDF
fog&Edge computing
PDF
Edge computing
PDF
EDGE COMPUTING
PPTX
Edge Computing and Cloud Computing
PPTX
Edge and Fog computing, a use-case prespective
PPTX
Edge computing
ODP
Augmented Reality: On a new powerful mobile computing platforms
PDF
Edge Computing and 5G - SDN/NFV London meetup
PDF
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
PDF
Five Trends in IoT and Edge Computing to Track in 2019
PDF
The State of Edge Computing for IoT
PDF
Edge Computing : future of IoT ?
PPTX
Altitude NY 2018: What's next in edge computing?
PPTX
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
PPTX
Edge computing -by ChandraShekhar
PDF
Demystify Edge Computing Vs. Cloud Computing
PPTX
How to start your IOT journey
PDF
What's next in edge computing?
What is Edge Computing and Why does it matter in IoT?
Edge Computing & AI
fog&Edge computing
Edge computing
EDGE COMPUTING
Edge Computing and Cloud Computing
Edge and Fog computing, a use-case prespective
Edge computing
Augmented Reality: On a new powerful mobile computing platforms
Edge Computing and 5G - SDN/NFV London meetup
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
Five Trends in IoT and Edge Computing to Track in 2019
The State of Edge Computing for IoT
Edge Computing : future of IoT ?
Altitude NY 2018: What's next in edge computing?
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
Edge computing -by ChandraShekhar
Demystify Edge Computing Vs. Cloud Computing
How to start your IOT journey
What's next in edge computing?
Ad

Similar to IoT Security Assessment - IEEE PAR Proposal (20)

PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
PPTX
Industrial IoT Security Standards & Frameworks
PDF
Iio t security std
PDF
Iot 3 architectures architecture of iot.
PDF
IOT Product Development for Startups: A Beginner’s Guide
PDF
Securing the IoT Value Chain with AWS
PPTX
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
PDF
Internet of things chapter2.pdf
PDF
Segregation of IT and OT Networks across organization
PPTX
IIoT Endpoint Security
PDF
Iot architectures slides important.pdf
PPTX
Power System Cybersecurity: Barriers and Challenges
PPTX
ch2.pptxnnbhyyg uuggy jgugjb huuuhj hihij
PPTX
ch2.pptx huuuuhy hhhh bjuuu huuujkjjjf hh
PDF
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
PDF
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
PPTX
Evolution of IoT with the sir of gujarat university
PPT
IOT ARCHITECTURAL OVERVIEW1 (ARCH&DESIGN).ppt
PPTX
Interop 2006: Evolution of the Networking Industry
PDF
From IT to IoT: Bridging the Growing Cybersecurity Divide
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Industrial IoT Security Standards & Frameworks
Iio t security std
Iot 3 architectures architecture of iot.
IOT Product Development for Startups: A Beginner’s Guide
Securing the IoT Value Chain with AWS
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
Internet of things chapter2.pdf
Segregation of IT and OT Networks across organization
IIoT Endpoint Security
Iot architectures slides important.pdf
Power System Cybersecurity: Barriers and Challenges
ch2.pptxnnbhyyg uuggy jgugjb huuuhj hihij
ch2.pptx huuuuhy hhhh bjuuu huuujkjjjf hh
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
Evolution of IoT with the sir of gujarat university
IOT ARCHITECTURAL OVERVIEW1 (ARCH&DESIGN).ppt
Interop 2006: Evolution of the Networking Industry
From IT to IoT: Bridging the Growing Cybersecurity Divide
Ad

More from Syam Madanapalli (20)

PDF
IoT, Careers, and Skills
PDF
IEEE P1931.1, The Roof Computing
PDF
Embracing the VUCA
PDF
Water Distribution Management - A Design by High School Kids
PDF
Child Safety - A Design by Kids using IoT
PDF
Securing the Internet of Things
PDF
Realizing the Potential of Connected World
PDF
The Impact of IoT on Cloud Computing, Big Data & Analytics
PDF
Building Smart Cities with Everything as a Service
PDF
Innovating the Smart Cities
PDF
IoT Primer for High School Students
PPTX
IoT for a Better World by Syam Madanapalli
PDF
Internet of Things, Innovation and India by Syam Madanapalli
PDF
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
PDF
IoT - Make in India: Challenges and Opportunities
PDF
iRam Innovation - Automate Your Home With Just a Switch
PDF
India, Internet of things and the role of government
PDF
The internet of things
PDF
Next Generation Emergency Warning System
PDF
Smart Grid With I Pv6 For India
IoT, Careers, and Skills
IEEE P1931.1, The Roof Computing
Embracing the VUCA
Water Distribution Management - A Design by High School Kids
Child Safety - A Design by Kids using IoT
Securing the Internet of Things
Realizing the Potential of Connected World
The Impact of IoT on Cloud Computing, Big Data & Analytics
Building Smart Cities with Everything as a Service
Innovating the Smart Cities
IoT Primer for High School Students
IoT for a Better World by Syam Madanapalli
Internet of Things, Innovation and India by Syam Madanapalli
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
IoT - Make in India: Challenges and Opportunities
iRam Innovation - Automate Your Home With Just a Switch
India, Internet of things and the role of government
The internet of things
Next Generation Emergency Warning System
Smart Grid With I Pv6 For India

Recently uploaded (20)

PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Testing WebRTC applications at scale.pdf
PPTX
cyber security Workshop awareness ppt.pptx
PPT
tcp ip networks nd ip layering assotred slides
PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
innovation process that make everything different.pptx
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
durere- in cancer tu ttresjjnklj gfrrjnrs mhugyfrd
PPTX
Internet___Basics___Styled_ presentation
PPTX
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
WebRTC in SignalWire - troubleshooting media negotiation
Module 1 - Cyber Law and Ethics 101.pptx
Testing WebRTC applications at scale.pdf
cyber security Workshop awareness ppt.pptx
tcp ip networks nd ip layering assotred slides
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
Slides PPTX World Game (s) Eco Economic Epochs.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
innovation process that make everything different.pptx
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
The Internet -By the Numbers, Sri Lanka Edition
Job_Card_System_Styled_lorem_ipsum_.pptx
SAP Ariba Sourcing PPT for learning material
durere- in cancer tu ttresjjnklj gfrrjnrs mhugyfrd
Internet___Basics___Styled_ presentation
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION

IoT Security Assessment - IEEE PAR Proposal

  • 1. Syam Madanapalli | Chair IEEE P1931.1 - The Roof Computing | June 27, 2020 IoT Security Assessment Framework A data driven approach for the businesses 1
  • 2. Complex & uncomprehended The businesses should know • What they are deploying • A checklist for a calculated risk • Potential attack surface • Risk vs bene fi ts IoT Security Constrained Devices Big Scale Tech Illiterates Lack of UI, challenging to design & con fi gure, update, and prone to errors Applications & devices are personal, and involves humans & physical world Variety of devices, protocols, & applications Big Impact Safety & economic risks, loss of privacy and business interruptions 2
  • 3. Typical IoT Network Segments Typical networking technologies and corresponding security protocols 3 Cloud PAN WAN LAN Internet IPSec Tunnel IPSec Tunnel WiFi/ Ethernet BB/LTE/MPLS BLE, 802.15.4, WiFi SSP Edge Router Apps OTAE CoAP/UDP/DTLS/IPv6
  • 4. IoT Security Assessment Framework The proposal The assessment framework standard will provide • A way for the industry to assess IoT applications consisting of IoT devices and Edge • A checklist for devices and edge • Necessary and su ffi cient conditions • A scoring mechanisms • Enable decision making • Data driven analytics for security assessment A set guidelines for the device vendors and application developers A method for evaluating the IoT applications for security needs Self assessment/IEEE certi fi cation 4
  • 5. Existing/Ongoing Standards/Work ... @IEEE-SA • Healthcare Device Security Assurance Working Group (EMB/Stds Com/ HDSecWG) • Standard for Wireless Diabetes Device Security Assurance: Product Security Evaluation Program • This standard de fi nes a framework for a connected electronic product security evaluation program P2621.1 P2733 • Clinical IoT Data and Device Interoperability with TIPPSS (EMB/Stds Com/ Clinical IoT DDI with TIPPSS) • Standard for Clinical Internet of Things (IoT) Data and Device Interoperability with TIPPSS - Trust, Identity, Privacy, Protection, Safety, Security • This standard establishes the framework with TIPPSS principles (Trust, Identity, Privacy, Protection, Safety, Security) for Clinical Internet of Things (IoT) data and device validation and interoperability. 5
  • 6. Existing/Ongoing Standards/Work Outside IEEE • GSMA IoT Security Guidelines and Assessment • Provides recommendations for the secure design, development and deployment of IoT services • OneM2M, IoT Alliance Australia, Trusted Connectivity Alliance GSMA IoTSF • IoT Security Foundation - A not-for-pro fi t organization • Provides advice and framework for IoT Security • Has over 100 members, including ARM, NXP, Microchip, Samsung, Vodafone, Qualcomm 6 ETSI EN 303 645 • IoT Security requirements for Consumer Devices • Under development • A potential candidate to collaborate
  • 7. Other Established Standards/Compliance Guidelines These will in fl uence the development of any new security standards Information technology — Security techniques — Evaluation criteria for IT security ISO/IEC 15408 GDPR Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (Data Protection Directive) HIPAA The Health Insurance Portability and Accountability Act of 1996 PCI DSS Payment Card Industry Data Security Standard 7 IEEE Standard for an Architectural Framework for the Internet of Things IEEE 2413
  • 8. IoT Security Requirements The capabilities of the end devices should be considered for security assessment Characteristic Class 0 Class 1 Class 2 RAM, ROM < 10KB, 100KB ~ 10KB, 100KB ~ 50KB, 250KB Internet No IP CoAP IPv6, HIP Cryptography Over the air Symmetric cryptography PKI based Protection One level up Assisted at one level up Self and services at one level up Interface IoT Services Security Provisioning and Services Security Services Applications Only for trusted environments Battery powered under the Roof Mains powered & standalone devices 8
  • 9. The Need for a New Standard Data driven; Easy to understand and to be used by Business users • Training, scaling, reducing costs and making IoT deployments more secure • Device capabilities based approach • De fi ning Necessary and Su ffi cient conditions • Scoring/grading mechanism • Easy to interpret checklist and summary for for weighing risk vs. bene fi ts and decision making • Data driven approach (applying ML/AI for assessment) • Self assessment/IEEE certi fi cation 9
  • 11. Broad Market Potential A standards project authorized by IEEE 802 shall have a broad market potential. Speci fi cally, it shall have the potential for: 11 • Broad sets of applicability • IoT being adopted almost all business sectors, including residential and government use. And security and privacy is the number one concern while considering an IoT application. Hence the output of this project will have broad set of applicability. • Multiple vendors and numerous users • The number of devices that would be connected to the Internet is estimated to be in tens of billions in the near future. • Balanced costs (LAN versus attached stations) • This project reduces the cost of IoT applications deployment by providing a repeatable approach for security assessment and reduces the need for special skilled personnel.
  • 12. Compatibility IEEE 802 LMSC de fi nes a family of standards. All standards should be in conformance: IEEE Std 802, IEEE 802.1D, and IEEE 802.1Q. If any variances in conformance emerge, they shall be thoroughly disclosed and reviewed with IEEE 802.1 Working Group. In order to demonstrate compatibility with this criterion, the Five Criteria statement must answer the following questions. 12 A. Does the PAR mandate that the standard shall comply with IEEE Std 802, IEEE Std 802.1D and IEEE Std 802.1Q? • No. However, the standard would use the IEEE 802 standards. B. If not, how will the Working Group ensure that the resulting draft standard is compliant, or if not, receives appropriate review from the IEEE 802.1 Working Group? • Not applicable.
  • 13. Distinct Identity Each IEEE 802 standard shall have a distinct identity. To achieve this, each authorized project shall be: 13 • Substantially di ff erent from other IEEE 802 standards • This standard is not related to IEEE 802 standards. • One unique solution per problem (not two solutions to a problem) • There is no standard within IEEE that provides this capability. • Easy for the document reader to select the relevant speci fi cation • Yes, this project will de fi ne an assessment framework for deploying IoT applications based on best practices for security and privacy.
  • 14. Technical Feasibility For a project to be authorized, it shall be able to show its technical feasibility. At a minimum, the proposed project shall show: 14 • Demonstrated system feasibility • Security assessment is typically prerequisite for any connected applications in the enterprise, however the approach is proprietary. • Proven technology, reasonable testing • Not applicable. • Con fi dence in reliability • This standard will not reduce any existing system reliability. • Coexistence of IEEE 802 LMSC wireless standards specifying devices for unlicensed operation. • Not applicable.
  • 15. Economic Feasibility For a project to be authorized, it shall be able to show economic feasibility (so far as can reasonably be estimated) for its intended applications. At a minimum, the proposed project shall show: 15 • Known cost factors, reliable data • This project will not introduce any new costs, rather will help in reducing the cost of connected application deployment and maintenance. • Reasonable cost for performance • The benefit of security assessment will outweigh the cost of assessment. • Consideration of installation costs • Not applicable.