SlideShare a Scribd company logo
Identity- defined Privacy & Security
for the Internet of Things
Paul Madsen
@paulmadsen
Ping Identity
2
The Internet of Things
connects people and physical
objects together through
applications
What’s driving IoT
• The sensor legacy. Sensors and remote monitoring tools have
existed for decades, in a field known as machine-to-machine (M2M)
communications, monitoring, and control.
• Broadening connectivity. Mainstreaming of home wifi, 4G mobile,
low-power wireless standards such as Bluetooth and ZigBee are
enabling just about everything to be connected together.
• The cloud and big data. Cloud computing and big data allow the
massive data created by things to be sifted, processed, and acted upon
• APIs.  Distributed, loosely coupled, transactional approaches in
software design are allowing things to exist and communicate
autonomously alongside internet-based services
Market
• Market size for IoT will be $290 billion by 2017, and
growing at 30 percent per year
(MarketsandMarkets)
• 31 billion internet-connected devices will exist by 2020
(Intel)
• A family of four will move from having 10 connected
devices in 2012 to 25 in 2017 to 50 in 2022 (Intel)
Privacy & Security Challenge
Most of the devices in the Internet of
Things will be used in two broad areas:
– Critical Infrastructure - power
production/generation/distribution,
manufacturing, transportation, etc.
– Personal "infrastructure" - personal medical
devices, automobiles, home entertainment
and device control, wearables, etc
Demands
security
Demands
privacy
Users surprised
& disappointed
Security
breach
Provider surprised
& disappointed
Privacy
breach
Security requirements
• Confidentiality. Protecting data from being inappropriately
accessed by unauthorized actors. Often manifests in authorization
policies & encryption
• Integrity protecting data or methods from modification or
deletion by unauthorized parties. Often manifests in digital
signatures
• Authentication. Verifying the identities of actors as they interact
with each other to ensure that malicious parties are not given
inappropriate permissions
Security challenges of the IoT
• Life and death implications
• Scale
• Heterogeneity
• Storage, processing, and connectivity constraints
• Usability implications of screenless devices
• Complex relationships between users & devices
• Implications of gateways for end-to-end security
Privacy requirements
• Transparency helps people understand who knows what about them —
give people information on how their data is to be used, with whom it is
shared with; how long is it held; etc
• Intervenability is the ability for users to view, change, correct, block,
revoke consent, and delete personal data stored by providers &
applications.
• Unlinkability is about the separation of informational contexts, such as
work, personal, family, citizen, and social. It’s about preventing undesired
linkages across different contexts.
Identity
Security
Privacy
Authentication Authorization
Authentication & Authorization Model
• IoT Actors authenticate by presenting security tokens
on their calls/messages to each other
• Tokens represent relationship between the relevant
user and the calling actor (and any
consents/permissions associated with that relationship
• Upon receiving a message, an actor validates the
token to verify the request is consistent with the
relationship/permissions
• If consent is removed, token is revoked, and access
disabled
OAuth 2.0 & OpenId Connect 1.0
• OAuth 2.0 is an IETF authentication & authorization framework for securing
application access to RESTful APIs
• OAuth allows a Client to send an API query to a Resource Server (RS), the
application hosting the desired information, such that the RS can authenticate
that the message was indeed sent by the Client.
• The Client authenticates to the RS through the inclusion of an access token on
its API call—a token previously provided to the Client by an Authorization
Server (AS).
• In those scenarios that the API in question protects access to a User’s identity
attributes, it may be the case that the access token will only be issued by the
AS after the User has explicitly given consent to the Client accessing those
attributes.
• OpenID Connect 1.0 profiles and extends OAuth 2.0 to add an identity layer—
creating a single framework that promises to secure APIs, mobile native
applications and browser applications in a single, cohesive architecture.
Representative IoT architecture
• Fitbit makes the Aria smart scale
• Scale syncs through home Wifi to
Fitbit cloud for display & analysis
through web & native
applications
• 3rd
party services can access
weight data to provide additional
analysis
Architecture
FitBit
Proprietary
Architecture
FitBit
Proprietary
Architecture
FitBit 3rd
party
services
REST APIProprietary
Security & privacy requirements
• Confidentiality
• Integrity
• Authentication
• Transparency
• Intervenability
• Unlinkability
Security & privacy requirements
• Confidentiality
• Integrity
• Authentication
• Transparency
• Intervenability
• Unlinkability
Confidentiality & Integrity
• Weight data must be secured both on servers &
in-transit
– Encryption & access control ensures confidentiality on
Fitbit & 3rd
party servers
– TLS ensures confidentiality in-transit
– TLS protects against modifications in-transit
• Both OAuth & Connect mandate TLS for over-
the-network messages
Security & privacy requirements
• Confidentiality
• Integrity
• Authentication
• Transparency
• Intervenability
• Unlinkability
Native application authentication
FitBit 3rd
party
services
REST APIProprietary
Native Application authentication
• Users can view their weight data
& trends from Fitbit ioS &
Android native applications
• Native apps pull data from Fitbit
cloud REST endpoints
• Native applications can use
OAuth to authenticate their API
calls as being on behalf of
particular user
3rd
party application authentication
FitBit 3rd
party
services
REST APIProprietary
3rd
party application authentication
• TrendWeight offers additional
insight & analysis of weight data
• Pulls weight data from Fitbit
cloud REST endpoints
• TrendWeight uses OAuth to
authenticate to Fitbit as acting
on behalf of particular user
• The token represents the
relationship between
TrendWeight and that user
Cloud to Cloud
Copyright © 2014 Ping Identity
Login & consent
Weight data
Login & consent
Weight data
Access token delivery
Device authentication
FitBit 3rd
party
services
REST APIProprietary
Copyright © 2014 Ping Identity
• Devices communicate with each other and the gateway via
the local network— sharing data, sending control messages,
etc.
• These local interactions may not use HTTP, but instead a
application protocol more optimized to the constraints (CPU
size, battery, etc.) of devices.
• Such application protocols include XMPP, MQTT and CoAP.
• Work has begun in exploring how to bind OAuth & Connect
to such IoT optimized protocols, e.g. ACE effort in IETF
Device authentication
Security & privacy requirements
• Confidentiality
• Integrity
• Authentication
• Transparency
• Intervenability
• Unlinkability
Transparency
• Users actively mediate the
issuance of tokens to native
applications & 3rd
parties
• Provides opportunity for an
explicit consent step
• In theory can enable
granular consent, ie view
only weight data but not step
data
Security & privacy requirements
• Confidentiality
• Integrity
• Authentication
• Transparency
• Intervenability
• Unlinkability
Intervenability
User can revoke permissions
assigned to 3rd
parties
Security & privacy requirements
• Confidentiality
• Integrity
• Authentication
• Transparency
• Intervenability
• Unlinkability
Unlinkability
• Authenticating to Fitbit or sharing weight data to
3rd
party services should not directly enable
inappropriate correlation at some other party ,
eg Facebook
• Linkages must be explicit and consensual, as in
that established between FitBit & TrendWeight
It will be relationships
between users, devices,
and applications that will be
fundamental
Identity-Defined Privacay & Security for Internet of Things
THANKS
Conclusion
• Authentication & authorization of actors is
fundamental to enabling IoT security & privacy
• Mechanisms must be secure, scalable and privacy
respecting
• OAuth & Connect promise to provide important
pieces of authentication & authorization framework
for IoT

More Related Content

PPTX
Catalyst 2015: Patrick Harding
PPTX
Managing Identity without Boundaries
PPT
You Can't Spell Enterprise Security without MFA
PPTX
9.35am robert humphrey
PPTX
Connecting The Real World With The Virtual World
PDF
Clear and Present Danger
PDF
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
PPTX
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Catalyst 2015: Patrick Harding
Managing Identity without Boundaries
You Can't Spell Enterprise Security without MFA
9.35am robert humphrey
Connecting The Real World With The Virtual World
Clear and Present Danger
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...

What's hot (20)

PPTX
IDENTITY IN THE WORLD OF IOT
PDF
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
PDF
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
PPTX
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
PDF
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
PDF
The Case For Next Generation IAM
PPTX
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
PPTX
Onboarding in the IoT
PDF
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
PPTX
Identity's Role in a Zero Trust Strategy
PPTX
Con8896 securely enabling mobile access for business transformation - final
PDF
Okta Digital Enterprise Report
PPTX
The Zero Trust Model of Information Security
PPTX
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
PPTX
Security for iot and cloud aug 25b 2017
PPTX
CIS 2013 Ping Identity Chalktalk
PPTX
Multi-Factor Authentication - "Moving Towards the Enterprise"
PDF
Managing Mobile Business Insecurities
PDF
Security On The Edge - A New Way To Think About Securing the Internet of Things
PDF
SWM_WP_MaturityModel_July15
IDENTITY IN THE WORLD OF IOT
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
The Case For Next Generation IAM
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Onboarding in the IoT
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Identity's Role in a Zero Trust Strategy
Con8896 securely enabling mobile access for business transformation - final
Okta Digital Enterprise Report
The Zero Trust Model of Information Security
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Security for iot and cloud aug 25b 2017
CIS 2013 Ping Identity Chalktalk
Multi-Factor Authentication - "Moving Towards the Enterprise"
Managing Mobile Business Insecurities
Security On The Edge - A New Way To Think About Securing the Internet of Things
SWM_WP_MaturityModel_July15
Ad

Viewers also liked (20)

PDF
Internet of Things - Privacy and Security issues
PDF
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
PDF
Cloud Identity and Access Management
PDF
Digital Transformation and the Role of IAM
PPTX
Privacy, the Internet of Things and Smart Cities
PDF
​The Identity of Things
PDF
B4 the identity of things-securing the internet of everything
PDF
Paris Identity Tech Talk IoT
PDF
CIS 2015-Rationing Identity in the Internet of Things- Steve Wilson
PDF
The identity of things & the smart cities of tomorrow webinar may 2015
PDF
Center for Identity Webcast: The Internet of Things
PPT
Identity Relationship Management: The Community Revolution
DOCX
Security and Privacy considerations in Internet of Things
PDF
Five Things You Gotta Know About Modern Identity
PDF
The Future of Digital Identity in the Age of the Internet of Things
PPTX
What hope for privacy in an IoT world?
PPTX
Identity, the Internet of Things and the Blockchain
PDF
Security & Identity for the Internet of Things Webinar
PDF
Trends in IRM: Internet of Things
PDF
Information Rights Management (IRM)
Internet of Things - Privacy and Security issues
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Cloud Identity and Access Management
Digital Transformation and the Role of IAM
Privacy, the Internet of Things and Smart Cities
​The Identity of Things
B4 the identity of things-securing the internet of everything
Paris Identity Tech Talk IoT
CIS 2015-Rationing Identity in the Internet of Things- Steve Wilson
The identity of things & the smart cities of tomorrow webinar may 2015
Center for Identity Webcast: The Internet of Things
Identity Relationship Management: The Community Revolution
Security and Privacy considerations in Internet of Things
Five Things You Gotta Know About Modern Identity
The Future of Digital Identity in the Age of the Internet of Things
What hope for privacy in an IoT world?
Identity, the Internet of Things and the Blockchain
Security & Identity for the Internet of Things Webinar
Trends in IRM: Internet of Things
Information Rights Management (IRM)
Ad

Similar to Identity-Defined Privacay & Security for Internet of Things (20)

PDF
Identity for IoT: An Authentication Framework for the IoT
PDF
RISE OF THE MACHINES: IRM IN AN IOT WORLD
PPTX
Authorization for Internet of Things using OAuth 2.0
PDF
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
PDF
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
PDF
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
PDF
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
PPTX
IoT mobile app device cloud identity and security architecture
PDF
Simon Harrison RWE - Chain of Things 010616 final
PDF
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
PPTX
UNIT I-1.Introduction_7.08.24 - Copy.pptx
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PDF
Internet of Everything & WebRTC
PPTX
Anonymous Individual Integration for IoT
PPTX
IoT
PPTX
Presentation on Internet of Things
PPTX
Introduction to IOT security
PPTX
PPTX
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
PPTX
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
Identity for IoT: An Authentication Framework for the IoT
RISE OF THE MACHINES: IRM IN AN IOT WORLD
Authorization for Internet of Things using OAuth 2.0
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
IoT mobile app device cloud identity and security architecture
Simon Harrison RWE - Chain of Things 010616 final
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
UNIT I-1.Introduction_7.08.24 - Copy.pptx
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Internet of Everything & WebRTC
Anonymous Individual Integration for IoT
IoT
Presentation on Internet of Things
Introduction to IOT security
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene

More from Ping Identity (17)

PDF
Healthcare Patient Experiences Matter
PDF
Optimize Your Zero Trust Infrastructure
PDF
Ping’s Technology Partner Program
PDF
Remote Work Fuels Zero Trust Growth
PDF
Identity Verification: Who’s Really There?
PDF
Extraordinary Financial Customer Experiences
PDF
Extraordinary Retail Customer Experiences
PDF
Security Practices: The Generational Gap | Infographic
PDF
Security Concerns Around the World | Infographic
PDF
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
PDF
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
PDF
Consumer Attitudes in a Post-breach Era: The Geographical Gap
PDF
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
PDF
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
PDF
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
PDF
API Security Needs AI Now More Than Ever
PDF
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Healthcare Patient Experiences Matter
Optimize Your Zero Trust Infrastructure
Ping’s Technology Partner Program
Remote Work Fuels Zero Trust Growth
Identity Verification: Who’s Really There?
Extraordinary Financial Customer Experiences
Extraordinary Retail Customer Experiences
Security Practices: The Generational Gap | Infographic
Security Concerns Around the World | Infographic
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
Consumer Attitudes in a Post-breach Era: The Geographical Gap
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
API Security Needs AI Now More Than Ever
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Electronic commerce courselecture one. Pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
MYSQL Presentation for SQL database connectivity
The AUB Centre for AI in Media Proposal.docx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Network Security Unit 5.pdf for BCA BBA.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Dropbox Q2 2025 Financial Results & Investor Presentation
Electronic commerce courselecture one. Pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
20250228 LYD VKU AI Blended-Learning.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectral efficient network and resource selection model in 5G networks

Identity-Defined Privacay & Security for Internet of Things

  • 1. Identity- defined Privacy & Security for the Internet of Things Paul Madsen @paulmadsen Ping Identity
  • 2. 2
  • 3. The Internet of Things connects people and physical objects together through applications
  • 4. What’s driving IoT • The sensor legacy. Sensors and remote monitoring tools have existed for decades, in a field known as machine-to-machine (M2M) communications, monitoring, and control. • Broadening connectivity. Mainstreaming of home wifi, 4G mobile, low-power wireless standards such as Bluetooth and ZigBee are enabling just about everything to be connected together. • The cloud and big data. Cloud computing and big data allow the massive data created by things to be sifted, processed, and acted upon • APIs.  Distributed, loosely coupled, transactional approaches in software design are allowing things to exist and communicate autonomously alongside internet-based services
  • 5. Market • Market size for IoT will be $290 billion by 2017, and growing at 30 percent per year (MarketsandMarkets) • 31 billion internet-connected devices will exist by 2020 (Intel) • A family of four will move from having 10 connected devices in 2012 to 25 in 2017 to 50 in 2022 (Intel)
  • 6. Privacy & Security Challenge Most of the devices in the Internet of Things will be used in two broad areas: – Critical Infrastructure - power production/generation/distribution, manufacturing, transportation, etc. – Personal "infrastructure" - personal medical devices, automobiles, home entertainment and device control, wearables, etc Demands security Demands privacy
  • 7. Users surprised & disappointed Security breach Provider surprised & disappointed Privacy breach
  • 8. Security requirements • Confidentiality. Protecting data from being inappropriately accessed by unauthorized actors. Often manifests in authorization policies & encryption • Integrity protecting data or methods from modification or deletion by unauthorized parties. Often manifests in digital signatures • Authentication. Verifying the identities of actors as they interact with each other to ensure that malicious parties are not given inappropriate permissions
  • 9. Security challenges of the IoT • Life and death implications • Scale • Heterogeneity • Storage, processing, and connectivity constraints • Usability implications of screenless devices • Complex relationships between users & devices • Implications of gateways for end-to-end security
  • 10. Privacy requirements • Transparency helps people understand who knows what about them — give people information on how their data is to be used, with whom it is shared with; how long is it held; etc • Intervenability is the ability for users to view, change, correct, block, revoke consent, and delete personal data stored by providers & applications. • Unlinkability is about the separation of informational contexts, such as work, personal, family, citizen, and social. It’s about preventing undesired linkages across different contexts.
  • 12. Authentication & Authorization Model • IoT Actors authenticate by presenting security tokens on their calls/messages to each other • Tokens represent relationship between the relevant user and the calling actor (and any consents/permissions associated with that relationship • Upon receiving a message, an actor validates the token to verify the request is consistent with the relationship/permissions • If consent is removed, token is revoked, and access disabled
  • 13. OAuth 2.0 & OpenId Connect 1.0 • OAuth 2.0 is an IETF authentication & authorization framework for securing application access to RESTful APIs • OAuth allows a Client to send an API query to a Resource Server (RS), the application hosting the desired information, such that the RS can authenticate that the message was indeed sent by the Client. • The Client authenticates to the RS through the inclusion of an access token on its API call—a token previously provided to the Client by an Authorization Server (AS). • In those scenarios that the API in question protects access to a User’s identity attributes, it may be the case that the access token will only be issued by the AS after the User has explicitly given consent to the Client accessing those attributes. • OpenID Connect 1.0 profiles and extends OAuth 2.0 to add an identity layer— creating a single framework that promises to secure APIs, mobile native applications and browser applications in a single, cohesive architecture.
  • 14. Representative IoT architecture • Fitbit makes the Aria smart scale • Scale syncs through home Wifi to Fitbit cloud for display & analysis through web & native applications • 3rd party services can access weight data to provide additional analysis
  • 18. Security & privacy requirements • Confidentiality • Integrity • Authentication • Transparency • Intervenability • Unlinkability
  • 19. Security & privacy requirements • Confidentiality • Integrity • Authentication • Transparency • Intervenability • Unlinkability
  • 20. Confidentiality & Integrity • Weight data must be secured both on servers & in-transit – Encryption & access control ensures confidentiality on Fitbit & 3rd party servers – TLS ensures confidentiality in-transit – TLS protects against modifications in-transit • Both OAuth & Connect mandate TLS for over- the-network messages
  • 21. Security & privacy requirements • Confidentiality • Integrity • Authentication • Transparency • Intervenability • Unlinkability
  • 22. Native application authentication FitBit 3rd party services REST APIProprietary
  • 23. Native Application authentication • Users can view their weight data & trends from Fitbit ioS & Android native applications • Native apps pull data from Fitbit cloud REST endpoints • Native applications can use OAuth to authenticate their API calls as being on behalf of particular user
  • 24. 3rd party application authentication FitBit 3rd party services REST APIProprietary
  • 25. 3rd party application authentication • TrendWeight offers additional insight & analysis of weight data • Pulls weight data from Fitbit cloud REST endpoints • TrendWeight uses OAuth to authenticate to Fitbit as acting on behalf of particular user • The token represents the relationship between TrendWeight and that user
  • 26. Cloud to Cloud Copyright © 2014 Ping Identity Login & consent Weight data Login & consent Weight data Access token delivery
  • 28. Copyright © 2014 Ping Identity • Devices communicate with each other and the gateway via the local network— sharing data, sending control messages, etc. • These local interactions may not use HTTP, but instead a application protocol more optimized to the constraints (CPU size, battery, etc.) of devices. • Such application protocols include XMPP, MQTT and CoAP. • Work has begun in exploring how to bind OAuth & Connect to such IoT optimized protocols, e.g. ACE effort in IETF Device authentication
  • 29. Security & privacy requirements • Confidentiality • Integrity • Authentication • Transparency • Intervenability • Unlinkability
  • 30. Transparency • Users actively mediate the issuance of tokens to native applications & 3rd parties • Provides opportunity for an explicit consent step • In theory can enable granular consent, ie view only weight data but not step data
  • 31. Security & privacy requirements • Confidentiality • Integrity • Authentication • Transparency • Intervenability • Unlinkability
  • 32. Intervenability User can revoke permissions assigned to 3rd parties
  • 33. Security & privacy requirements • Confidentiality • Integrity • Authentication • Transparency • Intervenability • Unlinkability
  • 34. Unlinkability • Authenticating to Fitbit or sharing weight data to 3rd party services should not directly enable inappropriate correlation at some other party , eg Facebook • Linkages must be explicit and consensual, as in that established between FitBit & TrendWeight
  • 35. It will be relationships between users, devices, and applications that will be fundamental
  • 38. Conclusion • Authentication & authorization of actors is fundamental to enabling IoT security & privacy • Mechanisms must be secure, scalable and privacy respecting • OAuth & Connect promise to provide important pieces of authentication & authorization framework for IoT