48
Secure and Smart IoT Prof. Ahmed Banafa IoT Expert | Faculty | Author | Keynote Speaker College of Engineering San Jose State University San Jose, CA USA

Secure and Smart IoT

Embed Size (px)

Citation preview

Page 1: Secure and Smart IoT

Secure and Smart IoTProf. Ahmed Banafa

IoT Expert | Faculty | Author | Keynote Speaker

College of Engineering

San Jose State University

San Jose, CA USA

Page 2: Secure and Smart IoT

Secure IoT

Page 3: Secure and Smart IoT

• The Internet of Things (IoT) as a concept is fascinating and exciting, but one of the major challenging aspects of IoT is having a secure ecosystem encompassing all building blocks of IoT-architecture.

Page 4: Secure and Smart IoT
Page 5: Secure and Smart IoT

• Things: These are defined as uniquely identifiable nodes, primarily sensors that communicate without human interaction using different connectivity methods.

Page 6: Secure and Smart IoT

• Gateways: These act as intermediaries between things and the cloud to provide the needed connectivity, security, and manageability.

Page 7: Secure and Smart IoT

• Network infrastructure: This is comprised of routers, aggregators, gateways, repeaters and other devices that control and secure data flow.

Page 8: Secure and Smart IoT

• Cloud infrastructure: Cloud infrastructure contains large pools of virtualized servers and storage that are networked together with computing and analytical capabilities

Page 9: Secure and Smart IoT

Challenges to secure IoT deployments

Page 10: Secure and Smart IoT

• Many IoT Systems are poorly designed and implemented, using diverse protocols and technologies that create complex and sometimes conflicting configurations.

• Limited guidance for life cycle maintenance and management of IoT devices

• IoT privacy concerns are complex and not always readily evident.

Page 11: Secure and Smart IoT

• There is a lack of standards for authentication and authorization of IoT edge devices.

• Security standards, for platform configurations, involving virtualized IoT platforms supporting multi-tenancy is immature.

• The uses for Internet of Things technology are expanding and changing—often in uncharted waters.

Page 12: Secure and Smart IoT

• IoT security will be complicated by the fact that many "things" use simple processors and operating systems that may not support sophisticated security approaches.

Page 13: Secure and Smart IoT

• A prime example of the urgent need for such new security technologies is the recent massive distributed denial of service attack (DDoS) that crippled the servers of popular services like Twitter, Netflix, NYTimes, and PayPal across the U.S. on October 21st, 2016. It was the result of an immense assault that involved millions of internet addresses and malicious software.

• One source of the traffic for the attacks was devices infected by the Mirai malware.

Page 14: Secure and Smart IoT

The Blockchain Approach

Page 15: Secure and Smart IoT

• Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond.

Page 16: Secure and Smart IoT

What are some advantages of Blockchain?

Page 17: Secure and Smart IoT
Page 18: Secure and Smart IoT

• The big advantage of blockchain is that it's public. Everyone participating can see the blocks and the transactions stored in them. This doesn't mean everyone can see the actual content of your transaction, however; that's protected by your private key.

Page 19: Secure and Smart IoT

• A blockchain is decentralized, so there is no single authority that can approve the transactions or set specific rules to have transactions accepted.

• That means there's a huge amount of trust involved since all the participants in the network have to reach a consensus to accept transactions.

Page 20: Secure and Smart IoT

• Most importantly, it's secure. The database can only be extended and previous records cannot be changed (at least, there's a very high cost if someone wants to alter previous records).

Page 21: Secure and Smart IoT

The blockchain and IoT

Page 22: Secure and Smart IoT
Page 23: Secure and Smart IoT

• This decentralized approach would eliminate Single Points of Failure, creating a more resilient ecosystem for devices to run on. The cryptographic algorithms used by blockchains would make consumer data more private.

Page 24: Secure and Smart IoT

• In an IoT network, the blockchain can keep an undisputable record of the history of smart devices.

• This feature enables the autonomous functioning of smart devices without the need for centralized authority.

• As a result, the blockchain opens the door to a series of IoT scenarios that were remarkably difficult, or even impossible to implement without it.

Page 25: Secure and Smart IoT

• In this model, the blockchain will treat message exchanges between devices similar to financial transactions in a bitcoin network.

• To enable message exchanges, devices will leverage smart contracts which then model the agreement between the two parties

Page 26: Secure and Smart IoT

What are the challenges?

Page 27: Secure and Smart IoT

Challenges Facing

Blockchain in IoT

Scalability

Processing Power and

Time

StorageLack of Skills

Legal and Compliance

Issues

Page 28: Secure and Smart IoT

• Scalability issues pertaining to the blockchain that might lead to centralization, which is casting a shadow over the future of the cryptocurrency.

Page 29: Secure and Smart IoT

• Processing power and time required to perform encryption for all the objects involved in a blockchain-based ecosystem.

Page 30: Secure and Smart IoT

• Storage too will be a hurdle. Blockchain eliminates the need for a central server to store transactions and device IDs, but the ledger has to be stored on the nodes themselves. And the ledger will increase in size as time passes.

Page 31: Secure and Smart IoT

• Lack of skills: few people understand how blockchain technology really works and when you add IoT to the mix that number will shrink drastically.

Page 32: Secure and Smart IoT

• Legal and compliance issues: It's a new territory in all aspects without any legal or compliance code to follow, which is a serious problem for manufacturers and service providers.

Page 33: Secure and Smart IoT

Smart IoT

Page 34: Secure and Smart IoT

AI and IoT Data Analytics

Page 35: Secure and Smart IoT

There are six types of IoT Data Analysis where AI can help :

• Data Preparation: Defining pools of data and clean them which will take us to concepts like Dark Data, Data Lakes.

Page 36: Secure and Smart IoT

• Data Discovery: Finding useful data in the defined pools of data

Page 37: Secure and Smart IoT

• Visualization of Streaming Data: On the fly dealing with streaming data by defining, discovering data, and visualizing it in smart ways to make it easy for the decision-making process to take place without delay.

Page 38: Secure and Smart IoT

• Time Series Accuracy of Data: Keeping the level of confidence in data collected high with high accuracy and integrity of data

Page 39: Secure and Smart IoT

• Predictive and Advance Analytics: a Very important step where decisions can be made based on data collected, discovered and analyzed

Page 40: Secure and Smart IoT

• Real-Time Geospatial and Location (logistical Data): Maintaining the flow of data smooth and under control.

Page 41: Secure and Smart IoT

Challenges facing AI in IoT

Page 42: Secure and Smart IoT

Challenges facing AI in IoT

Page 43: Secure and Smart IoT

• Compatibility: IoT is a collection of many parts and systems they are fundamentally different in time and space.

Page 44: Secure and Smart IoT

• Complexity: IoT is a complicated system with many moving parts and non –stop stream of data making it a very complicated ecosystem

Page 45: Secure and Smart IoT

• Privacy/Security/Safety (PSS): PSS is always an issue with every new technology or concept, how far IA can help without compromising PSS? One of the new solutions for such problem is using Blockchain technology.

Page 46: Secure and Smart IoT

• Ethical and legal Issues: It’s a new world for many companies with no precedents, untested territory with new laws and cases emerging rapidly.

Page 47: Secure and Smart IoT

• Artificial Stupidity: Back to the very simple concept of GIGO, AI still needs “training” to understand human reactions/emotions so the decisions will make sense.

Page 48: Secure and Smart IoT

Thank you!

https://www.linkedin.com/in/[email protected]@BanafaAhmed