SlideShare a Scribd company logo
Security Challenges in IoT
December 1, 2017
1 / 25
Outline
Introduction
Technologies used in IoT
RFID Technology
EPC Technology
Security Challenges in IoT
Solutions
Cryptographic Algorithms
Conclusion
References
2 / 25
Introduction
Definition
Intelligent interactivity between human and things to exchange
information and knowledge for new value creation
3 / 25
Introduction (Cont’d)
Smart systems and Internet of Things are driven by a
combination of
4 / 25
Introduction (Cont’d)
Sensors and Actuators
5 / 25
Introduction (Cont’d)
Connectivity
6 / 25
Introduction (Cont’d)
People and Processes
7 / 25
Introduction (Cont’d)
Applications
Smart Home
Wearables
Connected Cars
Industrial Internet
Smart Cities
IoT in agriculture
Smart Retail
Energy Engagement
IOT in Healthcare
IoT in Poultry and Farming
8 / 25
Outline
Introduction
Technologies used in IoT
RFID Technology
EPC Technology
Security Challenges in IoT
Solutions
Cryptographic Algorithms
Conclusion
References
9 / 25
Technologies used in IoT
RFID Technology
Radio Frequency Identification Technology
Use of radio waves to read and capture information stored on
a tag attached to an object
10 / 25
Technologies used in IoT (Cont’d)
Classifications for RFID tags
Class 0/class 1
basic radio frequency (RF) passive capability
tags are factory programmed
Class 2
Additional functionality - encryption and read-write RF
memory
tags are user-programmable
Class 3
Batteries are found on board that will power logic in the
computer circuit
longer range and broadband communications
11 / 25
Technologies used in IoT (Cont’d)
Classifications for RFID tags(Cont’d)
Class 4
Active tags
Peer-to-peer communications and additional sensing
Class 5
contain enough power to activate other tags
classified as a reader
12 / 25
Outline
Introduction
Technologies used in IoT
RFID Technology
EPC Technology
Security Challenges in IoT
Solutions
Cryptographic Algorithms
Conclusion
References
13 / 25
Technologies used in IoT (Cont’d)
EPC Technology
Electronics Product Code Technology
a universal identifier that provides a unique identity for every
physical object anywhere in the world, for all time
14 / 25
Technologies used in IoT (Cont’d)
Electronics Product Code - 96 bits which is divided into four
categories
15 / 25
Security Challenges in IoT
Key challenge areas are
Access control
Confidentiality
Integrity
Availability
Privacy
Standardization
Data deluge
16 / 25
Solutions
Timely updation of software
IoT devices are huge in number and it quite difficult to update
these devices one by one
High security codes
Data loss can happen if the attacker cracks the code
Devices must be connected to a central power station
But if central power station reaches its empty level
17 / 25
Outline
Introduction
Technologies used in IoT
RFID Technology
EPC Technology
Security Challenges in IoT
Solutions
Cryptographic Algorithms
Conclusion
References
18 / 25
Solutions(Cont’d)
Cryptographic Algorithms
ECC - Elliptic Curve Cryptography
public-key Cryptography
supports authenticated key exchange protocols
smaller keys, cipher text and signature
very fast key generation
fast encryption and decryption
uses less memory and CPU cycles
An elliptic curve is a plane curve defined by an equation of the
form
y2
= x3
+ ax + b
19 / 25
Solutions(Cont’d)
Cryptographic Algorithms
HMAC - Hash Based Message Authentication Code
hash function and a secret key
verify both the data integrity and the authentication of a
message
strength depends upon the cryptographic strength of the
underlying hash function, the size of its hash output, and on
the size and quality of the key.
less affected by collisions
HMAC(K, m) = H((K ⊕ opad)||H(K ⊕ ipad)||m)
20 / 25
Solutions(Cont’d)
Cryptographic Algorithms
21 / 25
Solutions(Cont’d)
Cryptographic Algorithms
22 / 25
Conclusion
Billions of devices are connected to the Internet
Companies behind these devices are not designing them with
security in mind
Leaving IoT devices unsecured, is like leaving the back door to
your house unlocked
Various solutions to security challenges were discussed
Cryptographic encrytpion techniques like ECC and HMAC can
be used to provide better protection
23 / 25
References
1. Aditya Parashar, Sachin Rishishwar Security Challanges In IoT
3rd International Conference on Advances in Electrical,
Electronics, Information, Communication and Bio-Informatics
(AEEICB17)
2. Ankush B. Pawar, Dr.Shashikant Ghumbre A survey on IoT
applications, security challenges, and counter measures 2016
International Conference on Computing, Analytics and
Security Trends (CAST)
3. Mohsen Hallaj Asghar RFID and EPC as key technology on
Internet of Things (IoT) IJCST Vol. 6, Iss ue 1, Jan - March
2015
4. Xiaolin Jia, Quanyuan Feng, Taihua Fan, Quanshui Lei1 RFID
Technology and Its Applications in Internet of Things (IOT)
978-1-4577-1415-3/12/2012 IEEE
24 / 25
25 / 25

More Related Content

PDF
Security in IoT
PDF
IoT Security: Problems, Challenges and Solutions
PPTX
Iot Security
PPTX
security and privacy-Internet of things
PPTX
IOT privacy and Security
PPTX
IoT Development - Opportunities and Challenges
PDF
Top Technology Trends in IoT for 2022
Security in IoT
IoT Security: Problems, Challenges and Solutions
Iot Security
security and privacy-Internet of things
IOT privacy and Security
IoT Development - Opportunities and Challenges
Top Technology Trends in IoT for 2022

What's hot (20)

PPT
IoT security (Internet of Things)
PDF
IoT Security Challenges and Solutions
PPTX
Introduction to IoT Security
 
PPTX
What is SCADA system? SCADA Solutions for IoT
PDF
Introduction to IoT Architectures and Protocols
PPTX
Iot architecture
PPTX
Internet of Things (IoT) - Seminar ppt
PDF
IoT Networking
PPTX
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
PPTX
Iot(security)
PPTX
Iot and cloud computing
PDF
IoT and m2m
PDF
Internet of things (IOT) connects physical to digital
PPTX
Sensors in IOT
PDF
IoT internet of things
PPTX
Introduction to IOT
PDF
Fundamentals of IoT Security
PPTX
connecting smart object in IoT.pptx
PPTX
Sensor Network
IoT security (Internet of Things)
IoT Security Challenges and Solutions
Introduction to IoT Security
 
What is SCADA system? SCADA Solutions for IoT
Introduction to IoT Architectures and Protocols
Iot architecture
Internet of Things (IoT) - Seminar ppt
IoT Networking
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
Iot(security)
Iot and cloud computing
IoT and m2m
Internet of things (IOT) connects physical to digital
Sensors in IOT
IoT internet of things
Introduction to IOT
Fundamentals of IoT Security
connecting smart object in IoT.pptx
Sensor Network
Ad

Similar to Security challenges in IoT (20)

PDF
1 importance of light weight authentication in iot
PDF
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
PDF
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
PPTX
Lecture 14
PPTX
IoTPresentation2 (1)
PPTX
Future of IoT: Key Challenges to Face
PPTX
Key challenges facing the future of IoT
PDF
final.pdf
PDF
2 cyber security challenges in io t
PDF
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
PDF
assignment help experts
PDF
sample assignment
PDF
509286-Aki_Koivu-Review
PDF
Strengthening IoT Security Against Cyber Threats.pdf
PDF
Security Aspects in IoT - A Review
PPTX
Internet of things security challenges
PDF
UCT IoT Deployment and Challenges
PDF
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
PPTX
Challenges posed by iot
PDF
Review on Vulnerabilities of IoT Security
1 importance of light weight authentication in iot
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
Lecture 14
IoTPresentation2 (1)
Future of IoT: Key Challenges to Face
Key challenges facing the future of IoT
final.pdf
2 cyber security challenges in io t
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
assignment help experts
sample assignment
509286-Aki_Koivu-Review
Strengthening IoT Security Against Cyber Threats.pdf
Security Aspects in IoT - A Review
Internet of things security challenges
UCT IoT Deployment and Challenges
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
Challenges posed by iot
Review on Vulnerabilities of IoT Security
Ad

More from Vishnupriya T H (7)

PDF
Computer graphics - colour crt and flat-panel displays
PDF
Apache HBase
PPTX
Security auditing architecture
PPTX
A comparative review of various approaches for feature extraction in Face rec...
PPTX
Sampling design, sampling errors, sample size determination
PDF
Halstead's software science - ananalytical technique
PPTX
Introduction to Triz (TIPS)
Computer graphics - colour crt and flat-panel displays
Apache HBase
Security auditing architecture
A comparative review of various approaches for feature extraction in Face rec...
Sampling design, sampling errors, sample size determination
Halstead's software science - ananalytical technique
Introduction to Triz (TIPS)

Recently uploaded (20)

PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Business Ethics Teaching Materials for college
PDF
Classroom Observation Tools for Teachers
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Pre independence Education in Inndia.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Cell Types and Its function , kingdom of life
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Abdominal Access Techniques with Prof. Dr. R K Mishra
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Business Ethics Teaching Materials for college
Classroom Observation Tools for Teachers
VCE English Exam - Section C Student Revision Booklet
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
O7-L3 Supply Chain Operations - ICLT Program
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Pre independence Education in Inndia.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Week 4 Term 3 Study Techniques revisited.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Anesthesia in Laparoscopic Surgery in India
Cell Types and Its function , kingdom of life
Chapter 2 Heredity, Prenatal Development, and Birth.pdf

Security challenges in IoT

  • 1. Security Challenges in IoT December 1, 2017 1 / 25
  • 2. Outline Introduction Technologies used in IoT RFID Technology EPC Technology Security Challenges in IoT Solutions Cryptographic Algorithms Conclusion References 2 / 25
  • 3. Introduction Definition Intelligent interactivity between human and things to exchange information and knowledge for new value creation 3 / 25
  • 4. Introduction (Cont’d) Smart systems and Internet of Things are driven by a combination of 4 / 25
  • 8. Introduction (Cont’d) Applications Smart Home Wearables Connected Cars Industrial Internet Smart Cities IoT in agriculture Smart Retail Energy Engagement IOT in Healthcare IoT in Poultry and Farming 8 / 25
  • 9. Outline Introduction Technologies used in IoT RFID Technology EPC Technology Security Challenges in IoT Solutions Cryptographic Algorithms Conclusion References 9 / 25
  • 10. Technologies used in IoT RFID Technology Radio Frequency Identification Technology Use of radio waves to read and capture information stored on a tag attached to an object 10 / 25
  • 11. Technologies used in IoT (Cont’d) Classifications for RFID tags Class 0/class 1 basic radio frequency (RF) passive capability tags are factory programmed Class 2 Additional functionality - encryption and read-write RF memory tags are user-programmable Class 3 Batteries are found on board that will power logic in the computer circuit longer range and broadband communications 11 / 25
  • 12. Technologies used in IoT (Cont’d) Classifications for RFID tags(Cont’d) Class 4 Active tags Peer-to-peer communications and additional sensing Class 5 contain enough power to activate other tags classified as a reader 12 / 25
  • 13. Outline Introduction Technologies used in IoT RFID Technology EPC Technology Security Challenges in IoT Solutions Cryptographic Algorithms Conclusion References 13 / 25
  • 14. Technologies used in IoT (Cont’d) EPC Technology Electronics Product Code Technology a universal identifier that provides a unique identity for every physical object anywhere in the world, for all time 14 / 25
  • 15. Technologies used in IoT (Cont’d) Electronics Product Code - 96 bits which is divided into four categories 15 / 25
  • 16. Security Challenges in IoT Key challenge areas are Access control Confidentiality Integrity Availability Privacy Standardization Data deluge 16 / 25
  • 17. Solutions Timely updation of software IoT devices are huge in number and it quite difficult to update these devices one by one High security codes Data loss can happen if the attacker cracks the code Devices must be connected to a central power station But if central power station reaches its empty level 17 / 25
  • 18. Outline Introduction Technologies used in IoT RFID Technology EPC Technology Security Challenges in IoT Solutions Cryptographic Algorithms Conclusion References 18 / 25
  • 19. Solutions(Cont’d) Cryptographic Algorithms ECC - Elliptic Curve Cryptography public-key Cryptography supports authenticated key exchange protocols smaller keys, cipher text and signature very fast key generation fast encryption and decryption uses less memory and CPU cycles An elliptic curve is a plane curve defined by an equation of the form y2 = x3 + ax + b 19 / 25
  • 20. Solutions(Cont’d) Cryptographic Algorithms HMAC - Hash Based Message Authentication Code hash function and a secret key verify both the data integrity and the authentication of a message strength depends upon the cryptographic strength of the underlying hash function, the size of its hash output, and on the size and quality of the key. less affected by collisions HMAC(K, m) = H((K ⊕ opad)||H(K ⊕ ipad)||m) 20 / 25
  • 23. Conclusion Billions of devices are connected to the Internet Companies behind these devices are not designing them with security in mind Leaving IoT devices unsecured, is like leaving the back door to your house unlocked Various solutions to security challenges were discussed Cryptographic encrytpion techniques like ECC and HMAC can be used to provide better protection 23 / 25
  • 24. References 1. Aditya Parashar, Sachin Rishishwar Security Challanges In IoT 3rd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB17) 2. Ankush B. Pawar, Dr.Shashikant Ghumbre A survey on IoT applications, security challenges, and counter measures 2016 International Conference on Computing, Analytics and Security Trends (CAST) 3. Mohsen Hallaj Asghar RFID and EPC as key technology on Internet of Things (IoT) IJCST Vol. 6, Iss ue 1, Jan - March 2015 4. Xiaolin Jia, Quanyuan Feng, Taihua Fan, Quanshui Lei1 RFID Technology and Its Applications in Internet of Things (IOT) 978-1-4577-1415-3/12/2012 IEEE 24 / 25