14
IOT CYBER SECURITY RESEARCH AT UTS [email protected] Prof. Eryk Dutkiewicz Head of School School of Computing and Communications

Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

Embed Size (px)

Citation preview

Page 1: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

IOT CYBER SECURITY RESEARCH AT UTS

[email protected]

Prof. Eryk DutkiewiczHead of School

School of Computing and Communications

Page 2: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

IoT enables objects to talk to other objects. Billions of devices envisaged with a wide range of applications. Greatly extends the current Internet. Security is essential for many applications.

An Example

Internet of Things and Cyber Security

Page 3: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

Secure Connectivity and Configuration

Secure Production and Data Collection Telemetry

Localisation, Sensing/Actuation

, Collection,

Aggregation and Filtering

Throughput and Per-message

QoS

NotificationsScheduling and

Targeting (Edge Devices, Device Groups

within large populations)

Command/Control and Query

Correlation, Sessions and Batching

Secure Brokerage, Storage & Integration

Interoperation and Integration,

APIs, 3rd Party Support, Legacy Systems

Secure Visualisation and Action

Predictive Analytics, Load Balancing.

Scenario Generation,Simulation and Training

• Secure production and visualization of image of image-based IoT applications

• Secure communications for hard-to-secure devices

Page 4: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

Secure Connectivity and

Configuration

Secure Production and Data Collection

TelemetryLocalisation,

Sensing/Actuation, Collection, Aggregation

and FilteringThroughput and Per-

message QoS

NotificationsScheduling and Targeting (Edge Devices, Device

Groups within large populations)

Command/Control and QueryCorrelation,

Sessions and Batching

Secure Brokerage, Storage & Integration

Interoperation and Integration, APIs, 3rd Party Support,

Legacy Systems

Secure Visualisation and Action Predictive Analytics,

Load Balancing. Scenario Generation,

Simulation and Training

1. Secure production and visualization in image-based IoT applications

2. Secure communications for hard-to-secure IoT devices

Page 5: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

Figure 4: General architecture of proposed model Figure 3: Relation between contrast and human sensitivity

Figure 1: This image contains 100 pages of text with various facts about Sydney

Figure 2: The concept

Securing Information in Digital Artifacts

Contact: Dr Zenon Chaczko

Encoding and Securing Data: Time Stamping, Invisible Copyrighting, …

Steganography

Page 6: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

Social Event Identification and TrackingTime Series Analysis

Causality Analysis

Dynamic sparse representation

Contact: Dr Min XuCross-domain event analysis

Page 7: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

Easier-to-secure devices: smart phone, laptops...

IoT Devices and Security Challenges

Hard-to-secure devices: limited in power and computational capability

Smart meters, wearable devices, sensors, implantable devices (e.g., pacemakers)

Smart metters

Fitbit actifity tracker

Pacemaker

Page 8: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

CoAP uses client/server interaction model similar to HTTPIn our scheme, the clients and server challenge each other for the authentication> Involves four handshake messages

> Payload of each message does not exceed 256 bits

Advanced Encryption Standard 128-bit is used for the payload encryption> Optimised for low energy consumption

A Lightweight Mutual Authentication SchemeUsing Payload-Based Encryption

Four Phases > Session/Connection initiation

> Server challenge

> Client response and challenge

> Server response

Pre-Requisite> Provisioning Phase

Contact: Dr Priyadarsi Nanda

Page 9: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

• Legal and security/privacy issues• Monitor everything causing privacy concerns

• Data is everywhere

• Distributed nature• Management of a large number of distributed devices

• Sensors in public areas unprotected

• Hard-to-secure devices• Limited power, computation capability, storage ...

• Wireless links vulnerable to simple attacks (e.g. eavesdropping, jamming)

• Passive RFID tags

Unprecedented Security Challenges in IoT

Smart meters/sensors fieldSource: WinLab Rutgers

Page 10: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

• TI MSP430 16-bit microcontroller, CC1150 Radio

Example:

• 14B packet at 250kbps requires 448 µsec for transmission and consumes 34.9 µJ

• If security overhead is about the same only about 448 x 10-6 x 12 x 106 = 5376 security operations can be performed

• But light TSL requires 16 millions operations*

Conventional encryption/TSL does not apply

Need novel approaches to secure little devices in IoTs

Conventional Encryption Does not Apply

*Source: WinLab Rutgers

Page 11: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

Unauthorized Access:

Read smart meters, wearable devices, implant devicess

Eavesdropping:

Leak confidential information (e.g., RFID and chip on credit cards)

Modification of Information

Typical Threats to Hard-to-Secure Devices

Page 12: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

• Blind eavesdroppers with Artificial Interference/Jamming

• Meter reader injects interference to conceal readings

• Cancels it own interference through self-

interference suppression

Solution 1: Rx-based Friendly Jamming

x+2

x+3

y+21

Address eavesdropping and information modification

Reader

Contact: Dr Diep Nguyen

Page 13: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

Solution 2: Data Forensics or Big Data for Little Devices

Address unauthorized access/authentication issues

Detect spoofing via anomaly detection:

• Physical channel statistics: RSSI readings, fading profile

• MAC layer statistics: packet sequence number, packet loss ratio

• Traffic statistics: inter-arrival packet time

B

AX

SpoofingReader

Contact: Dr Diep Nguyen

Page 14: Eryk Dutkiewicz - Everything IoT Data Security Forum 2016

Thank You!