1 / 12

Smart Object Security Workshop 23 rd March 2012, Paris

Smart Object Security Workshop 23 rd March 2012, Paris. Organizers. Hannes Tschofenig Nokia Siemens Networks, IAB member Jari Arkko Ericsson, IETF Internet Area Director, upcoming IAB member Carsten Bormann University of Bremen, IETF CoRE and 6LoWPAN WG co-chair Peter Friess

john
Download Presentation

Smart Object Security Workshop 23 rd March 2012, Paris

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Smart Object Security Workshop23rd March 2012, Paris

  2. Organizers • Hannes Tschofenig • Nokia Siemens Networks, IAB member • JariArkko • Ericsson, IETF Internet Area Director, upcoming IAB member • Carsten Bormann • University of Bremen, IETF CoRE and 6LoWPAN WG co-chair • Peter Friess • European Commission • Cullen Jennings • Cisco, IETF CoRE WG co-chair • Antonio Skarmeta • University of Murcia, IoT6 FP7 Project • Zach Shelby • Sensinode, Smart Object IETF Specification Author • Thomas Heide Clausen • EcolePolytechnique, our host

  3. Note  Well

  4. Info • Webpage: http://www.lix.polytechnique.fr/hipercom/SmartObjectSecurity/ • Papers and slides will be copied to this website after the meeting. • Currently, the 35 papers are here: http://www.tschofenig.priv.at/sos-papers/PositionPapers.htm

  5. A few words from Alex "Sandy" Pentland (MIT) • Data shows that great teams: • Communicate frequently. In a typical project team a dozen or so communication exchanges per working hour may turn out to be optimum; but more or less than that and team performance can decline. • Talk and listen in equal measure, equally among members. Lower performing teams have dominant members, teams within teams, and members who talk or listen but don't do both. • Engage in frequent informal communication. The best teams spend about half their time communicating outside of formal meetings or as "asides" during team meetings, and increasing opportunities for informal communication tends to increase team performance. • Explore for ideas and information outside the group. The best teams periodically connect with many different outside sources and bring what they learn back to the team.

  6. Mailing List • http://lists.i1b.org/listinfo.cgi/smart-object-security-i1b.org • Used for workshop preparation and discussion of the papers. • Will be deleted at the end of the workshop.

  7. Results of the workshop • Conclusions from discussions will be captured in a slide set at the end of the workshop. • Notes / Minutes from the day: • Etherpad: http://piratepad.net/bdP7oNNIJm • Twitter hashtag: #sosw

  8. Pictures & Audio Recording • I will take pictures • and try to upload them to the webpage • OK? • We will do an audio recording • Turned out to be useful if we missed some discussions. • Audio will not be shared with anyone. • OK?

  9. Agenda 08:30 - 09:00: Arrival of Participants and Coffee 09:00 - 09:30: Opening Remarks Thomas Clausen, EcolePolytechnique: Welcome and logistics (15 min) Hannes Tschofenig, NSN & JariArkko, Ericsson: Agenda (5 min) 09:30 - 10:30: Requirements and Use Cases Paul Chilton, NXP: Security challenges in the lighting use case (10 min) http://www.tschofenig.priv.at/sos-papers/slides/Paul.pptx Rudolf van der Berg, OECD: Open interfaces, identifier spaces, and economic challenges (10 min) http://www.tschofenig.priv.at/sos-papers/slides/Rudolf.pptx Discussion: What are the core security requirements? What has the industry already deployed, and what are they struggling with? How to design for choice considering economics, and competition for smart object security? 10:30 - 10:40: Break

  10. Agenda, cont. 10:40 - 12:30: Implementation experience Carsten Bormann, Universitaet Bremen: Light-weight COAP & DTLS implementations (10 min) Hannes Tschofenig, Nokia Siemens Networks: TLS and Raw Public Keys Implementation (5 min) http://www.tschofenig.priv.at/sos-papers/slides/Hannes.pptx MohitSethi, Ericsson/Aalto: Public Key Crypto Implementation Experience (5 min) http://www.tschofenig.priv.at/sos-papers/slides/Jari.pdf Discussion: What is our experience with implementing some of these protocols? What worked and what didn't? What advice can be given? Where is further research, standardization, and implementation work needed? 12:30 - 13:30: Lunch Break

  11. Agenda, cont. 13:30 - 15:30: Authorization and Role-based Access Control Richard Barnes, BBN: Beyond COMSEC (10 min) Jan Janak, Columbia University: On Access Control (10 min) Discussion: What is the interaction between business processes (such as installation, change of ownership; including non-business processes such as home admin), the roles we have to manage in the system as a result of that, and the crypto we can do to implement those roles? 15:30 - 16:00: Coffee Break

  12. Agenda, cont. 16:00 - 17:30: Provisioning Johannes Gilger, RTWH Aachen: Secure pairing (10 min) Cullen Jennings, Cisco: A deployment model (10 min) Discussion: What are practical deployment models, and corresponding protocols? 17:30 - 18:30: Summary Evening: Dinner for those who want (self-organized)

More Related