SlideShare a Scribd company logo
IoT Technologies for Context-Aware Security
Christian Damsgaard Jensen
Head of Cyber Security Section
DTU Compute
Technical University of Denmark
cdje@dtu.dk
http://compute.dtu.dk/~cdje
25/10/20182 DTU Compute Technical University of Denmark
Visions of IoT
25/10/20183 DTU Compute Technical University of Denmark
IoT Security
25/10/20184 DTU Compute Technical University of Denmark
Context is Important
Where is my car?
25/10/20185 DTU Compute Technical University of Denmark
Context is Important
Who Should Have Access to Patient Data?
25/10/20186 DTU Compute Technical University of Denmark
Context is Important
How do You Keep a Secret Here?
Source: http://workdesign.com/2016/06/open-offices-bug-industry-news/
25/10/20187 DTU Compute Technical University of Denmark
Enforcing Computer Security Policies
• Security enforced by logical and physical security mechanisms
• Granularity of security mechanisms
– Logical Security is fine-grained (individual records/files/…)
– Physical Security is coarse-grained (buildings/rooms/…)
• Computer Security Mechansms
– Restricted to consider the state of computer system entities
• Human users are not directly part of computer systems
• Data must be rendered physically to be consumed by users
– Displayed on monitor, printed, played on speakers
• Access to rendered data is constrained by physical security
– Confidentiality by restricting access to output devices
– Integrity by restricting access to input devices
25/10/20188 DTU Compute Technical University of Denmark
Access Control in Practise
Reference
Monitor
UID
PID
UID
PID
UID
PID
UID
PID
Enforcement of Logical
Access Control Policy
Trust
25/10/20189 DTU Compute Technical University of Denmark
The Granularity Gap in Acces Control
• Granularity of physical access control (room, floor, building, …)
– Defines the context for logical access control
– Granularity of physical security dominates
• min(physical, logical) = physical
• Trust in subject fills the granularity gap
25/10/201810 DTU Compute Technical University of Denmark
Sensor Enhanced Access Control
• Motivation
– To extend logical access control with context awareness
– Allows logical access control to be enforced in the physical env.
• Defines two models
– Logical access control
• In principle any access control mechanism
• Mandatory access control mechanisms are natural candidates
– Environmental access control
• Establish the context of subjects and objects
• Defines authorization zones for location based services
– Visibility zones for output devices (monitors, printers, …)
• Enforces logical access control policy in authorization zones
– Continuous enforcement based on context
25/10/201811 DTU Compute Technical University of Denmark
SEAC Motivation
25/10/201812 DTU Compute Technical University of Denmark
SEAC Prototype Architecture
Context
Manager
Visibility
Manager
Process
Person
User space
Kernel space
Sensors
Window
Reference
Monitor Files
View
Event
Notification
Draw
Graphics
Modify
Visibility
Read/Write
25/10/201813 DTU Compute Technical University of Denmark
Summary
• Security depends on context in which decisions are made
– Context is defined by context attributes
• Access control policies should encode contextual constraints
– User attributes
• Security clearance, treating physician, assigned case worker, …
– Object attributes
• Security classification, geriatric patient, unemployed, …
– Environmental attributes
• Alert state (DEFCON), hospital ward, home visit, …
• Access Control Mechanisms should enforce such policies
25/10/201814 DTU Compute Technical University of Denmark
Extra Slides
25/10/201815 DTU Compute Technical University of Denmark
Internet of Things
• Embedding sensors, actuators & computing capabilities in env.
– Sensors establishes current context
– Actuators adapts “environment” to the need of the users
• Environment may include computer equipment, monitors, etc.
– Computing capabilities implement smart behaviour
• Context aware applications, location based services, …
• Acting on IoT (Ambient Intelligence) may provide environmental
context to the logical access control mechanism
– Sensors allow the system to establish location of human users
– Computing capabilities may determine context of human users
– Actuators will not be used by security mechanism, but logical access
controls may be considered some form of “actuators”
25/10/201816 DTU Compute Technical University of Denmark
Role Based Access Control
• Permissions are based on the role(s) a user is assuming
• Several users have similar privileges
• Limitations:
– Role explosion
– Permissions refer explicitly to objects identifiers
– Not expressive enough for contextual information
25/10/201817 DTU Compute Technical University of Denmark
AERBAC
Attribute Enhances Role-Based Access Control
25/10/201818 DTU Compute Technical University of Denmark
SEAC Prototype Implementation
• Proof of concept prototype developed for standard Linux system
• Simple mandatory access control model (based on Bell & LaPadula)
– Simple security property (no read up)
– *-property (no write down) – not implemented in prototype
• Security Labelled file system (and open file monitor)
– Associates security labels with all files + processes that open files
– Implements logical access control
• Context Manager
– Derives context from sensors
• Issues events when users enter/leave visibility zone
• Visibility manager
– Subscribes to events from context manage
– Maps/unmaps X-windows based on subject clearances
• Considers all persons in the visibility zone (minimum rule)
25/10/201819 DTU Compute Technical University of Denmark
SEAC Summary
• Logical access controls are not enforced in the real world
– Who has access to physical representation of logical object?
• SEAC extends existing logical access control with context
– Environmental access control enforces logical AC in the real world
• Environmental access control policies
– Multiple subjects and continuity of enforcement
– Policy specification requires an aggregated subject (new challenge)
• Simple minimum rule, relative importance rule, …
– Policy specification requires context definition (new challenge)
• Confidentiality rule, integrity rule, …
– Allows community access control policies (new opportunity)
• Simple separation of duty
– Two (authorised) people present to pay a bill
• Declassification of sensitive information
– Two (authorised) people are needed to declassify information

More Related Content

PDF
Ariu - Workshop on Artificial Intelligence and Security - 2011
PPTX
Wouter Joossen - IBBT Security departement
PPTX
9780840024220 ppt ch10
PPTX
9780840024220 ppt ch11
PPT
Security technologies
PPTX
Smart city project's Information Security challenges
PPTX
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
ODP
Jupiter physical security ppt 2016 1
Ariu - Workshop on Artificial Intelligence and Security - 2011
Wouter Joossen - IBBT Security departement
9780840024220 ppt ch10
9780840024220 ppt ch11
Security technologies
Smart city project's Information Security challenges
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Jupiter physical security ppt 2016 1

What's hot (14)

PPTX
Building Cybersecurity into a Greenfield ICS Project
PDF
Countering Computer Hacks-Sandy Suhling
PDF
Data Center Security Market — Explore latest facts on networking 2025
DOC
Ofer Cohen - areas of expertise
PPTX
Computing safety
PPTX
Data/File Security & Control
PPT
Lessson 2 - Application Layer
PDF
Research and Testbeds in Cyber-Physical Systems
PPT
Isys20261 lecture 01
PDF
Hannes astok digital_security_2012
DOC
IS311 questions
PPT
is_1_Introduction to Information Security
PPT
Lesson 1- Risk Managment
Building Cybersecurity into a Greenfield ICS Project
Countering Computer Hacks-Sandy Suhling
Data Center Security Market — Explore latest facts on networking 2025
Ofer Cohen - areas of expertise
Computing safety
Data/File Security & Control
Lessson 2 - Application Layer
Research and Testbeds in Cyber-Physical Systems
Isys20261 lecture 01
Hannes astok digital_security_2012
IS311 questions
is_1_Introduction to Information Security
Lesson 1- Risk Managment
Ad

Similar to IoT Technologies for Context-Aware Security (20)

PDF
Reference Architecture for Electric Energy OT.pdf
PPTX
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
PPTX
ZONeSEC in ERNCIP
PDF
Principles and risk assessment of managing distributed ontologies hosted by e...
PPTX
ZONeSEC: critical infrastructure protection in real practice
PDF
EMC Information Intelligence Group quick view
PDF
Cyber physical systems and robotics
PPTX
introduction.pptx
ODP
CISSP Week 22
PPTX
PPTX
DG_Architecture_Training.pptx
PDF
Design and implementation of a solution for remote data protection in safety-...
PDF
StreamSight: A Query-Driven Framework Extending Streaming IoT Analytics to th...
PPTX
Cyber security within Organisations: A sneaky peak of current status, trends,...
PPT
FG2.ppt
PDF
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
PDF
Unit2_Cyber Security updated.pdf
PDF
AFAC session 2 - September 8, 2014
PDF
DURAARK presentation at DEDICATE final seminar, October 21st 2013, Michelle L...
Reference Architecture for Electric Energy OT.pdf
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
ZONeSEC in ERNCIP
Principles and risk assessment of managing distributed ontologies hosted by e...
ZONeSEC: critical infrastructure protection in real practice
EMC Information Intelligence Group quick view
Cyber physical systems and robotics
introduction.pptx
CISSP Week 22
DG_Architecture_Training.pptx
Design and implementation of a solution for remote data protection in safety-...
StreamSight: A Query-Driven Framework Extending Streaming IoT Analytics to th...
Cyber security within Organisations: A sneaky peak of current status, trends,...
FG2.ppt
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
Unit2_Cyber Security updated.pdf
AFAC session 2 - September 8, 2014
DURAARK presentation at DEDICATE final seminar, October 21st 2013, Michelle L...
Ad

More from DATA SECURITY SOLUTIONS (20)

PPTX
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
PPTX
MLM or how to look at company users with new eyes
PPTX
The artificial reality of cyber defense
PPTX
How to maintain business equality secured in network and cloud
ODP
Forensic tool development with rust
PPTX
IBM Q-radar security intelligence roadmap
PPTX
Transform your enterprise branch with secure sd-wan
PPTX
How to discover vulnerabilities in business and mission critical systems
PPT
Protecting web aplications with machine learning and security fabric
PPTX
Patching: answers to questions you probably were afraid to ask about oracle s...
PPTX
Practical approach to NIS Directive's incident management
PDF
When network security is not enough
PPTX
New security solutions for next generation of IT
PPT
Botprobe - Reducing network threat intelligence big data
PDF
Network is the Firewall
PDF
Let's hack your mobile device. Yes we can. And many other do.
PDF
Secure enterprise mobility
PDF
North European Cybersecurity Cluster - an example of the regional trust platf...
PDF
Cyber crime as a startup
PDF
Services evolution in cybercrime economics
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
MLM or how to look at company users with new eyes
The artificial reality of cyber defense
How to maintain business equality secured in network and cloud
Forensic tool development with rust
IBM Q-radar security intelligence roadmap
Transform your enterprise branch with secure sd-wan
How to discover vulnerabilities in business and mission critical systems
Protecting web aplications with machine learning and security fabric
Patching: answers to questions you probably were afraid to ask about oracle s...
Practical approach to NIS Directive's incident management
When network security is not enough
New security solutions for next generation of IT
Botprobe - Reducing network threat intelligence big data
Network is the Firewall
Let's hack your mobile device. Yes we can. And many other do.
Secure enterprise mobility
North European Cybersecurity Cluster - an example of the regional trust platf...
Cyber crime as a startup
Services evolution in cybercrime economics

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPT
Teaching material agriculture food technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Encapsulation theory and applications.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
KodekX | Application Modernization Development
PDF
Electronic commerce courselecture one. Pdf
NewMind AI Weekly Chronicles - August'25 Week I
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Empathic Computing: Creating Shared Understanding
Teaching material agriculture food technology
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”
Chapter 3 Spatial Domain Image Processing.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Encapsulation theory and applications.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KodekX | Application Modernization Development
Electronic commerce courselecture one. Pdf

IoT Technologies for Context-Aware Security

  • 1. IoT Technologies for Context-Aware Security Christian Damsgaard Jensen Head of Cyber Security Section DTU Compute Technical University of Denmark cdje@dtu.dk http://compute.dtu.dk/~cdje
  • 2. 25/10/20182 DTU Compute Technical University of Denmark Visions of IoT
  • 3. 25/10/20183 DTU Compute Technical University of Denmark IoT Security
  • 4. 25/10/20184 DTU Compute Technical University of Denmark Context is Important Where is my car?
  • 5. 25/10/20185 DTU Compute Technical University of Denmark Context is Important Who Should Have Access to Patient Data?
  • 6. 25/10/20186 DTU Compute Technical University of Denmark Context is Important How do You Keep a Secret Here? Source: http://workdesign.com/2016/06/open-offices-bug-industry-news/
  • 7. 25/10/20187 DTU Compute Technical University of Denmark Enforcing Computer Security Policies • Security enforced by logical and physical security mechanisms • Granularity of security mechanisms – Logical Security is fine-grained (individual records/files/…) – Physical Security is coarse-grained (buildings/rooms/…) • Computer Security Mechansms – Restricted to consider the state of computer system entities • Human users are not directly part of computer systems • Data must be rendered physically to be consumed by users – Displayed on monitor, printed, played on speakers • Access to rendered data is constrained by physical security – Confidentiality by restricting access to output devices – Integrity by restricting access to input devices
  • 8. 25/10/20188 DTU Compute Technical University of Denmark Access Control in Practise Reference Monitor UID PID UID PID UID PID UID PID Enforcement of Logical Access Control Policy Trust
  • 9. 25/10/20189 DTU Compute Technical University of Denmark The Granularity Gap in Acces Control • Granularity of physical access control (room, floor, building, …) – Defines the context for logical access control – Granularity of physical security dominates • min(physical, logical) = physical • Trust in subject fills the granularity gap
  • 10. 25/10/201810 DTU Compute Technical University of Denmark Sensor Enhanced Access Control • Motivation – To extend logical access control with context awareness – Allows logical access control to be enforced in the physical env. • Defines two models – Logical access control • In principle any access control mechanism • Mandatory access control mechanisms are natural candidates – Environmental access control • Establish the context of subjects and objects • Defines authorization zones for location based services – Visibility zones for output devices (monitors, printers, …) • Enforces logical access control policy in authorization zones – Continuous enforcement based on context
  • 11. 25/10/201811 DTU Compute Technical University of Denmark SEAC Motivation
  • 12. 25/10/201812 DTU Compute Technical University of Denmark SEAC Prototype Architecture Context Manager Visibility Manager Process Person User space Kernel space Sensors Window Reference Monitor Files View Event Notification Draw Graphics Modify Visibility Read/Write
  • 13. 25/10/201813 DTU Compute Technical University of Denmark Summary • Security depends on context in which decisions are made – Context is defined by context attributes • Access control policies should encode contextual constraints – User attributes • Security clearance, treating physician, assigned case worker, … – Object attributes • Security classification, geriatric patient, unemployed, … – Environmental attributes • Alert state (DEFCON), hospital ward, home visit, … • Access Control Mechanisms should enforce such policies
  • 14. 25/10/201814 DTU Compute Technical University of Denmark Extra Slides
  • 15. 25/10/201815 DTU Compute Technical University of Denmark Internet of Things • Embedding sensors, actuators & computing capabilities in env. – Sensors establishes current context – Actuators adapts “environment” to the need of the users • Environment may include computer equipment, monitors, etc. – Computing capabilities implement smart behaviour • Context aware applications, location based services, … • Acting on IoT (Ambient Intelligence) may provide environmental context to the logical access control mechanism – Sensors allow the system to establish location of human users – Computing capabilities may determine context of human users – Actuators will not be used by security mechanism, but logical access controls may be considered some form of “actuators”
  • 16. 25/10/201816 DTU Compute Technical University of Denmark Role Based Access Control • Permissions are based on the role(s) a user is assuming • Several users have similar privileges • Limitations: – Role explosion – Permissions refer explicitly to objects identifiers – Not expressive enough for contextual information
  • 17. 25/10/201817 DTU Compute Technical University of Denmark AERBAC Attribute Enhances Role-Based Access Control
  • 18. 25/10/201818 DTU Compute Technical University of Denmark SEAC Prototype Implementation • Proof of concept prototype developed for standard Linux system • Simple mandatory access control model (based on Bell & LaPadula) – Simple security property (no read up) – *-property (no write down) – not implemented in prototype • Security Labelled file system (and open file monitor) – Associates security labels with all files + processes that open files – Implements logical access control • Context Manager – Derives context from sensors • Issues events when users enter/leave visibility zone • Visibility manager – Subscribes to events from context manage – Maps/unmaps X-windows based on subject clearances • Considers all persons in the visibility zone (minimum rule)
  • 19. 25/10/201819 DTU Compute Technical University of Denmark SEAC Summary • Logical access controls are not enforced in the real world – Who has access to physical representation of logical object? • SEAC extends existing logical access control with context – Environmental access control enforces logical AC in the real world • Environmental access control policies – Multiple subjects and continuity of enforcement – Policy specification requires an aggregated subject (new challenge) • Simple minimum rule, relative importance rule, … – Policy specification requires context definition (new challenge) • Confidentiality rule, integrity rule, … – Allows community access control policies (new opportunity) • Simple separation of duty – Two (authorised) people present to pay a bill • Declassification of sensitive information – Two (authorised) people are needed to declassify information