13
1 Leveraging on core MNOs’ assets to provide IoT Security Services IoT Security Foundation Conference 2018 Vicente Segura Gualde (vicente.seguragualde@telefónica.com)

Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)

1

Leveraging on core MNOs’ assets to provide IoT Security Services IoT Security Foundation Conference 2018 Vicente Segura Gualde (vicente.seguragualde@telefónica.com)

Page 2: Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)

2

IoT Security is an end to end challenge, although devices are what is new and brings new challenges

SmartM2

Communication networks IoT Service Ecosystem

Endpoint Ecosystem

User interface

Apps

Partner APIs

* Based on GSMA IoT model

Traditional IT security Known field although requires doing properly

IoT specific security challenges Must address the IoT scale and limitations

Page 3: Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)

3

Key security challenges that IoT devices bring

Heterogeneity

No one size fits all solutions

Resources

Constrained devices

Dispersion

Devices can be distant and exposed to physical attacks

Long-life cycles

Devices can be working up to 15-20

years

Unclear liability

Who is liable for incidents affecting

third parties?

Page 4: Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)

4

Physically

Endpoint ecosystems threats Devices threat surfaces classification

Local bus communications

Chip access

IoT Service Ecosystem

Apps

Partner APIs

Network communications

Accessible network services

Remotely

Console Access

Console Access

Page 5: Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)

5

Key security requirements (and IoT security services to meet them)

Secure Credentials

Device identification

Can the device be uniquely identified and his identity verified?

IoT Threats Detection

Proper device behaviour

Is the device doing what it is supposed to do?

¿ ?

Page 6: Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)

6

Comm. Module

IoT Application Endpoint

IoT Device

Secure Communications

IoT Application

IoT Service Platform

The IoT Device Authentication Challenge (over cellular connectivity)

Cellular Network

Application Layer Authentication (e.g. using Transport Layer Security (D/TLS))

Comm. Layer Authentication Comm. Layer Authentication

• Mutual authentication between device and network

• Strong OTA encryption (128 bits key AES-like in LTE) and integrity assurance

• Temporary identity to avoid device tracking • Trusted hardware (SIM)

• IPSec or MPLS VPNs • Strong encryption • Isolated from the Internet

MAIN CHALLENGE: HOW TO PROVISION, PROTECT AND MANAGE THE APPLICATION LAYER

SECURITY

UICC

Secure Credentials

Page 7: Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)

7

Comm. Layer Authentication

Credentials Broker

MQTT, HTTP over TLS

Authentication Authentication

Certificates are loaded on the SIM card during device on-boarding process

Certificate signing request

Cellular Network

Comm. Module

IoT Application Endpoint

IoT Device

UICC

Secure Communications

IoT Application

IoT Service Platform

Secure Credentials: “Simplifying the management of IoT device credentials leveraging on MNO core assets”

Comm. Layer Authentication

Secure Credentials

Page 8: Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)

8

Comm. Module

IoT Application Endpoint

IoT Device

Secure Communications

IoT Application

IoT Service Platform

IoT Devices are exposed to physical and remote attacks that make them act in an unexpected way

Cellular Network

UICC

IoT Threats Detection

Internet and other networks

Page 9: Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)

9

IoT Honeypots IoT Honeypots

IoT Threats Detection: “Leveraging on the network to detect anomalies and protect devices from threats”

Comm. Module

IoT Application Endpoint

IoT Device

Secure Communications

IoT Application

IoT Service Platform

Cellular Network

UICC

Internet and other networks

IoT Threats Detection

IoT Honeypots

Network traffic

Cyberintelligence Device profiling

Anomaly detection

Threat Detection

IoT Threats Detection

Page 10: Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)

10

Key takeaways

IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten) and devices are boxes of surprises

Risk analysis is a key preliminary tool for identifying the security requirements in a sector in which of use cases and the lack of IoT device platforms consolidation prevails

Cellular networks play a central role in IoT connectivity that can be extended to overcome device limitations and to complete what is missing in the service platforms

Page 11: Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)

11

Q&A

Q A

Page 12: Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)
Page 13: Leveraging on core MNOs’ assets to provide IoT Security ... · IoT Security requires an E2E approach in which service platforms are the conventional component (but must not be forgotten)

13

Icons from www.flaticon.com: Wifi free icon, Car free icon, Pressure free icon made by Vectors Market Smoke detector made by mynamepong Id card, Like free icon, Time free, Hacker free icon made by Smashicons Wifi free icon made by Alfredo Hernandez Maps and Flags, Mallet made by Freepik Anonymous by free icon

Image Credits