Security in Internet of Things Begins with the Data

Security in Internet of Things Begins with the Data - Description

Daniel . W. . . Engels, PhD. Associate Professor, CSE, Southern . Methodist University. Director, SMU . Master of Science in Data Science Program. Source: Opte Project. F. irst . mentioned in 1999 . by . ID: 524943 Download Presentation

42K - views

Security in Internet of Things Begins with the Data

Daniel . W. . . Engels, PhD. Associate Professor, CSE, Southern . Methodist University. Director, SMU . Master of Science in Data Science Program. Source: Opte Project. F. irst . mentioned in 1999 . by .

Similar presentations


Download Presentation

Security in Internet of Things Begins with the Data




Download Presentation - The PPT/PDF document "Security in Internet of Things Begins wi..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.



Presentation on theme: "Security in Internet of Things Begins with the Data"— Presentation transcript:

Slide1

Slide2

Security in Internet of Things Begins with the Data

Daniel W. Engels, PhD

Associate Professor, CSE, Southern

Methodist University

Director, SMU

Master of Science in Data Science Program

Slide3

Source: Opte Project

Slide4

First mentioned in 1999 by the MIT Auto-ID Center.IoT meant to “create a universal environment in which computers understand the world without human intervention.”IoT was simply the tool that would be used to merge the worlds of bits and atoms.Over 15 years after its inception, IoT is now seen as a modern, fresh concept in our connected world…with many different definitions.

What is IoT?

Slide5

Automation

Merging

of the physical world with the virtual world in order to

give virtual lives to inanimate objects, ideas and concepts and through those lives to impact both the physical and the virtual lives of man, machine and things.

6

th

Sense of World

Monitoring

Improved Visibility

Distributed Control

Augmented Reality

Ant-like Intelligence

Disembodied Intelligence

Augmented

Virtuality

Internet of Things (Dragon Files)

Slide6

Internet of everyday things

Connected by

Connected by

Internet of powered

devices

Billions of Things are Already Connected to the

IoT

!

Slide courtesy of

Evanhoe

and Associates

Internet of

powered things

Slide7

(ISO/IEC 14543-3-10)

(ITU-T G.9959)

IoT

Last Mile Technology Standards

6LowPAN

(IETF RFC 4944)

IEEE 802.15.4

WirelessHART

(IEC 62591)

Contiki

ISO/IEC 18000-6

ISO/IEC 18000-3

ISO/IEC 18000-7

NFC

7

Slide8

Two Paradigms for IoT are Emerging

Brain-Body Merge – intelligence is added to everyday things in your world, so that your life can be more awesome.Head in the Clouds – identification and wireless connectivity is added to everyday things in your world and intelligence is supported in the cloud, so that your life can be more awesome.

8

Slide9

HRP-4C Robot

9

Brain-Body Merge

Slide10

Head in the Clouds

10

Slide11

Internet of Things

Slide12

(This is the definition of BIG DATA!)

Potentially Trillions of Tag Reads per Day

with basically zero security on the tags

12

Slide13

Big Data can violate your privacy without any one piece of data violating your privacy. Connecting bits and atoms using IoT promises to create Huge Data.

13

Slide14

Do you Trust your IoT Data & Collector?

do you trust the data you are collecting and/or using?do you trust who is collecting the data from you?

14

Slide15

Slide16

What Went

Wrong?

The BARCODE was designed to SHARE informationThe RFID TAG was designed to SHARE informationThe IoT System was designed to SHARE informationNETWORKS were designed to SHARE informationSecurity was an AFTERTHOUGHT (what are the security threats?) (and it continues to be an afterthought today)

Slide17

17

Slide18

The IoT technologies have been around for a long timeAdvances in communication and connectivity are allowing the “interconnectedness” needed for IoTThe value is in the data not the connectionsThe data allows you to make autonomous decision based on business rules closer to the edge

It’s all about the data!™

Slide courtesy of

Evanhoe

and Associates

Slide19

Data ConfidentialityPrivacy Preserving Data CorrelationPersonal and population privacyPrivacy enhancing techniquesData service monetizationData publicationPrivacy implication of data qualityData ownershipData lifecycle management

(Some) Big Data Security Challenges

Slide20

IoT

has been widely deployed with limited to no security.As massive amounts of data are being collected, stored, manipulated, merged, analyzed, and expunged, security and privacy concerns will have begun to explode. Need scalable and practical solutions to Big Data Security and Privacy as well as applying Big Data Management and Analytics for Cyber Security. Need to develop technologies guided by policies to address security and privacy issues throughout the lifecycle of the data. Need to understand not only the societal impact of IoT and its ubiquitous data collection, use and analysis, also need to formulate appropriate laws and policies for such activities.

Final Thoughts

Slide21

Do You Feel Lucky?

Slide22

Thank You

Slide23

Questions ???

Slide24

No Device is an Island

Every networked device is an entry point into your network (DATA ATTACKS!)

No device is to be fully trusted by any other

Every device is a city state to be protected

Slide25

Policy