1 / 8

Secure connectivity in the Internet of Things Rodrigo Roman Universidad de Málaga

Secure connectivity in the Internet of Things Rodrigo Roman Universidad de Málaga. PROBLEM : IoT Security: Areas to Cover ?. What dangers await me?. INTERNET. IoT Security: Areas to Cover ( Results 1 ). Not enough resources…. Data. Who are you?. (I prefer something more usable).

manton
Download Presentation

Secure connectivity in the Internet of Things Rodrigo Roman Universidad de Málaga

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure connectivity in the Internet of Things Rodrigo Roman Universidad de Málaga

  2. PROBLEM: IoT Security: AreastoCover? What dangers await me?... INTERNET

  3. IoT Security: Areas to Cover (Results 1) Not enough resources… Data Who are you? (I prefer something more usable) I don’t think so… DESTROYYOURSELF!

  4. IoT Security: Areas to Cover (Results 2) • Other issues • Intrusion detection and survivability • Context-Aware Security (Physical World) • Self-* (learning, adaptative, repairing) • Secure Physical Location • Device Ownership • Usability of security and privacy technologies • Policy enforcement and rights management • Legal challenges and governance Issues Lots of other issues that must be considered!

  5. PROBLEM:IoT WSN Security: Key Management? DTLS & WS DTLS & WS

  6. IoT WSN Security: Key Management (1) Certificate Certificate ARES…2011 ARES…2011 PKCKeys are obtained using PKC primitives Pre-shared key Two elements shared a predefined key α β fα(β) = fβ(α) fβ(x) fα(x) Polynomial SchemeKey is derived from shared polynomial Blom Scheme Key is obtained from a certain matrix

  7. IoT WSN Security: Key Management (2) KSA KCASA KCASA KCBSA KCASB KCA KSB KSA KCA KSB KCASB KCBSA KGcGs KCB KGcGs KCBSB KCB KCBSB KSC KSC 1 – 1All elements share an unique key c – 1 All “clients” have their own key 1 – s All “servers” have their own key c – s Unique key per element

  8. IoT WSN Security: Key Management (Results) Usefulforsmall real-worldapplications Takecarewiththe server overhead! DTLS DTLS DTLS Need to consider resilience and maintenance… Scalabilityisbetter, plus otherniceproperties! As a client, I can accessfrom time to time As a server, I mustbeverypowerful! PRE-SHARED KEYS MATHEMATICALFRAMEWORK PUBLIC KEY CRYPTOGRAPHY

More Related