we believe that we are on the verge of the internet of
play

We believe that we are on the verge of the Internet of Things - PowerPoint PPT Presentation

We believe that we are on the verge of the Internet of Things explosion. Now is the time to make sure that IoT incorporates everything weve learned about digital security and infrastructure resiliency over the last 20 years of the Internet.


  1. We believe that we are on the verge of the Internet of Things explosion. Now is the time to make sure that IoT incorporates everything we’ve learned about digital security and infrastructure resiliency over the last 20 years of the Internet. 1

  2. SECURITY BEGINS WITH IDENTITY

  3. IDENTITY User name and password

  4. IDENTITY Smartcard

  5. IDENTITY Biometrics

  6. IDENTITY Certificate

  7. IDENTITY AE5021 B3209A API KEY FEA409

  8. IDENTITY TRUST

  9. IDENTITY TRUST

  10. IDENTITY APPLYING THESE MECHANISMS TO IOT AND M2M

  11. IDENTITY PROGRAMMATIC PHYSICAL AE5021 B3209A FEA409

  12. IDENTITY PROGRAMMATIC PHYSICAL AE5021 B3209A FEA409

  13. CERTIFICATES PUBLIC KEY INFRASTRUCTURE (PKI) l Trusted and well established technology l Allows for mutual authentication l Can be used for message signing

  14. CERTIFICATES

  15. CERTIFICATES

  16. CERTIFICATES

  17. CERTIFICATES $$$$$ $$$$$ COST $$$$$

  18. CERTIFICATES $$$$$ $$$$$ COST $$$$$

  19. CERTIFICATES SECURITY

  20. CERTIFICATES CERTIFICATE AUTHORITY SECURITY - Revocation Certificate Online Revocation Certificate List Status Protocol

  21. CERTIFICATES CERTIFICATE AUTHORITY SECURITY - Revocation Certificate Online Revocation Certificate List Status Protocol

  22. CERTIFICATES CERTIFICATE AUTHORITY SECURITY - Revocation Certificate Online Revocation Certificate List Status Protocol

  23. CERTIFICATES CERTIFICATE AUTHORITY SECURITY - TRUST

  24. CERTIFICATES CERTIFICATE AUTHORITIES SECURITY - TRUST

  25. CERTIFICATES CERTIFICATE AUTHORITIES SECURITY - TRUST Certificate Authority A device123.example.com Certificate Authority B device123.example.com

  26. CERTIFICATES MANAGEMENT

  27. CERTIFICATES INTEROPERABILITY FOO.COM BAR.COM CERTIFICATE CERTIFICATE AUTHORITY AUTHORITY

  28. CERTIFICATES INTEROPERABILITY FOO.COM BAR.COM CERTIFICATE CERTIFICATE AUTHORITY AUTHORITY

  29. CHALLENGES How do we deploy PKI at Internet of Things scale. l Keep cost low l Be interoperable l Deploy at scale l Improve security

  30. DANE

  31. DNS-BASED AUTHENTICATION OF NAMED ENTITIES

  32. DNSSEC Provides a secure global registry l Highly scalable

  33. DNSSEC Provides a secure global registry l Highly scalable l Globally distributed

  34. DNSSEC Provides a secure global registry l Highly scalable l Globally distributed l Resilient

  35. DNSSEC Provides a secure global registry l Highly scalable l Globally distributed l Resilient l Standards based

  36. DNSSEC Provides a secure global registry l Highly scalable l Globally distributed l Resilient l Standards based l Ubiquitous

  37. DNSSEC Provides a secure global registry l Highly scalable l Globally distributed l Resilient l Standards based l Ubiquitous l Secure

  38. DNSSEC . root key Provides a secure global registry .com key l Secure .example.com key l Cryptographically signed l Supports delegation zone.example.com … .... … .... … ....

  39. DANE RFC 6698 - establishes new record types for DNS Allows publishing of certificate data in DNS Data integrity validated by cryptographic signature zone.example.com … .... … .... … ....

  40. DANE RFC 6698 - establishes new record types for DNS l Effectively replaces local CA store as means of validating certificates l Allows records to be queried in real time l Allows records to be cached for specific amount of time l Removes the need for CRLs and OCSP l Can work with CA issued certificates or self signed certificates

  41. DNS Registry Device provisioning device1.example.com device2.example.com Device creates public/private keypair device3.example.com device4.example.com Public key is published in DNS device5.example.com … .... deviceX.example.com Sensor Keys

  42. DNS Registry device1.example.com device2.example.com device3.example.com device4.example.com device5.example.com … .... deviceX.example.com Sensor DNS “TLSA” record maps device name to public key Device only needs name does not need published IP address Keys

  43. DNS Registry device1.example.com device2.example.com device3.example.com device4.example.com device5.example.com … .... deviceX.example.com Sensor IoT Platform Sensor initiates TLS connection to IoT Platform Keys

  44. DNS Registry device1.example.com device2.example.com device3.example.com device4.example.com device5.example.com … .... deviceX.example.com Sensor IoT Platform TLS handshake includes device name and public key Keys

  45. DNS Registry device1.example.com device2.example.com device3.example.com device4.example.com device5.example.com … .... Recursive DNS Server deviceX.example.com IoT Platform queries secure DNS for public key for device Sensor IoT Platform Keys

  46. DNS Registry device1.example.com device2.example.com device3.example.com device4.example.com device5.example.com … .... Recursive DNS Server deviceX.example.com IoT Platform retrieves public key from secure DNS Server Sensor IoT Platform Keys

  47. DNS Registry IoT Platform compares device's published key with the key used during negotiation device1.example.com device2.example.com device3.example.com device4.example.com = ? device5.example.com … .... deviceX.example.com Sensor Keys

  48. DNS Registry The keys match so the client certificate is validated device1.example.com device2.example.com device3.example.com device4.example.com device5.example.com … .... deviceX.example.com Sensor Keys

  49. DANE Advantages of DANE l Highly scalable l Economically viable l Highly secure l Limited scope of trust l Instant revocation l Transparency

  50. WHAT NOW ? COMMUNITY ENGAGEMENT Working with the community on DANE enablement across the stack including crypto libraries and common runtime frameworks. FEEDBACK We'd love to talk! email us at iot@verisign.com 50

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend