Professional Documents
Culture Documents
A Security Disaster
HP conducted a security
analysis of IoT devices1
1http://fortifyprotect.com/HP_IoT_Research_Study.pdf
Philip Levis
Associate Professor, Stanford
Outline
securing it so hard?
What we plan to do about it
Overview of rest of workshop
Internet(s) of Things
Industrial
Automation
Home Area
Networks
Personal Area
Networks
Networked
Devices
Thousands/person
Controlled Environment
High reliability
Control networks
Industrial requirements
Hundreds/person
Uncontrolled Environment
Unlicensed spectrum
Convenience
Consumer requirements
Tens/person
Personal environment
Unlicensed spectrum
Instrumentation
Fashion vs. function
Tens/person
Uncontrolled Environment
Unlicensed spectrum
Convenience
Powered
WirelessHART, 802.15.4
6tsch, RPL
IEEE/IIC/IETF
ZigBee, Z-Wave
6lowpan, RPL
IETF/ZigBee/private
Bluetooth, BLE
3G/LTE
3GPP/IEEE
WiFi/802.11
TCP/IP
IEEE/IETF
Cloud
Gateways
3G/4G,
TCP/IP
End application
Ruby/Rails,
Python/Django,
J2EE, PHP, Node.js
6lowpan,
ZigBee,
ZWave,
Bluetooth,
WiFi,
WirelessHART
3G/4G,
TCP/IP
Obj-C/C++, Java,
Swift, Javascript/HTML
embedded C
(ARM, avr, msp430)
ZigBee,
ZWave,
Bluetooth,
WiFi
Ruby/Rails,
Python/Django,
J2EE, PHP, Node.js
3G/4G,
TCP/IP
Obj-C/C++, Java,
Swift, Javascript/HTML 23
10
11
Two Goals
1. Data security: research and define new
cryptographic computational models for secure
data analytics and actuation on enormous streams
of real-time data from embedded systems.
12
Data Security
Security limits what you (or an attacker) can do
What do IoT applications need to do?
13
End-to-End Security
Data
ZigBee,
ZWave,
Bluetooth,
WiFi
3G/4G,
TCP/IP
14
End-to-End Security
Data
ZigBee,
ZWave,
Bluetooth,
WiFi
3G/4G,
TCP/IP
15
End-to-End Security
ZigBee,
ZWave,
Bluetooth,
WiFi
3G/4G,
TCP/IP
Data
Secure Internet of Things
16
Homomorphic Encryption
(Gentry, 2009)
Server
10
encrypt
encrypt
17
Homomorphic Encryption
(Gentry, 2009)
Server
10
encrypt
encrypt
18
Homomorphic Encryption
(Gentry, 2009)
encrypt
encrypt
Server
x
y
x
y
xy
19
Homomorphic Encryption
(Gentry, 2009)
Server
10
encrypt
encrypt
70
decrypt
xy
xy
20
Homomorphic Encryption
(Gentry, 2009)
Server
10
encrypt
encrypt
70
decrypt
xy
xy
21
Talks today
Christopher R on analytics
Dan Boneh on cryptographic computational models
22
Two Goals
1. Research and define new cryptographic
computational models for secure data analytics
and actuation on enormous streams of real-time
data from embedded systems.
23
Building an Application
Write a data processing pipeline
Gateway!
PC/Server!
App/Web!
Views!
Controllers!
Models and!
Transforms!
10Hz !
Sampling!
Recent!
History!
Recent!
History!
Long!
History!
Analytics,!
Suggestions!
Motion!
Activity!
Activity!
Behavior!
Health!
Alarm!
Schedule!
24
Code Generation
Framework generates (working) skeleton code for
entire pipeline
Developer can modify this generated code
Talks today
25
Talks today
26
Software-defined Hardware
Hardware (boards, chips, power) is a daunting
challenge to software developers
Talks today
27
Making It Easy
Security must be easy
Talks today
28
29
Why Now?
Technology has just reached the tipping point
BLE, iBeacon
Cortex M series
Sensors
Harvesting circuits
30
Philip Levis
Stanford
Mark Horowitz
Stanford
Christopher R
Stanford
Dan Boneh
Stanford
Dawson Engler
Stanford
Keith Winstein
Stanford
Prabal Dutta
Michigan
David Mazires
Stanford
Bjrn Hartmann
Berkeley
Greg Kovacs
Stanford
Christos Kozyrakis
Stanford
31
32
Schedule
9:30
10:00
10:15
11:45
12:45
2:15
2:45
4:15
4:30
5:30
Breakfast
Welcome
Technology and
Applications
Security and
Networks
Hardware,
Software and Users
Lunch
Break
Closing
Social
33
Questions
34