Prashant Krishnamurthy Department of Informatics and Networked Systems School of Computing and Information University of Pittsburgh
Security and the Internet of Things
1
Security and the Internet of Things Prashant Krishnamurthy - - PowerPoint PPT Presentation
Security and the Internet of Things Prashant Krishnamurthy Department of Informatics and Networked Systems School of Computing and Information University of Pittsburgh 1 About Faculty member in the School of Computing and Information
Prashant Krishnamurthy Department of Informatics and Networked Systems School of Computing and Information University of Pittsburgh
1
Research in Security Assured Information Systems
now IoT
2
“best” encryption algorithm depends on the length of the packet
3
coordinated
professionals as to how the parts fit and how one may impact the other
and the moving parts
4
scientific/research community as well
5
6
All critical infrastructure sectors
7
Source: pcworld.com
8
address
9
10
11
12
Cloud Internet
Storage, computation
Edge Router Device Networks Gateway
Crowdsourced data
Third party services (including bots)
Client devices get analytics, visualization, recommendations - result of computing
cloud
Things that sense and do “stuff”
13
14
platforms
complex and (human) users do not comprehend the intricacies
Security Challenges/Work Edge (things, device network) IoT “system” 15
devices
❖
Use device function to generate high-entropy keys
❖
Inter-heart beat times
Device networks 16
device and Homekit accessory (thing)
device
efficient than AES) with authentication/integrity
Device Networks App 802.11 Router
Internet
17
Provider, Me?
18
DDoS attacks”
technology
IoT related attacks
http://www.arm.com/products/security-on-arm/trustzone 19
“things” for enhancing security?
improve the tradeoffs between security and performance?
20
Zadorozhny
data sources
granularity/gaps in space/time, semantics, scope, etc.
data
Data Credence Stratum sources Consolidation
v a r i
s Human Things Apps & Bots Meta- sources
SOURCES
21
moisture, crop growth
round or foreclose on land?
Controllable devices with high credence external source
“things” Bob
Owen Oscar
Fiona’s land
22
graphs (like page rank)
that iteratively improve
Network
Storage, credence computation
Mix of sources with varying credence Public (or private) AP Untrusted Path to Data Credence Stratum Data Credence Stratum
Crowdsourced data (lower credence)
23
http://www.iot-a.eu
with Internet of Things: A Tutorial Introduction,” IEEE Design and Test, March/April 2016
(IoT): A Vision, Architectural Elements, and Future Directions,” Elsevier Future Generation Computer Systems, Vol. 29, pp. 1645-1660, 2013
24
– Title of article by Martin Bryant, The Next Web, April 7, 2016
“Your next car will need a firewall.”
25
– Title of article by Ben Woods, The Next Web, April 21, 2016
“The bank at the middle of an attempted $950m cyber heist didn’t even have a firewall”
26
If you have time and interest, please see: goo.gl/Crifhd
27