Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT...

26
Challenges and opportunities for IoT security GEORGE SUCIU R&D AND INNOVATION MANAGER, BEIA CONSULT INTERNATIONAL www.beiaro.eu / @GeorgeSuciuG / @beiaconsult

Transcript of Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT...

Page 1: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

ChallengesandopportunitiesforIoTsecurityGEORGESUCIUR&DAND INNOVATIONMANAGER, BEIACONSULT INTERNATIONAL

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult

Page 2: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

Content§ Biography

§ AboutBEIAConsult

§ Introduction

§ IoT§ Security

§ Challenges

§ Opportunities

§ Projects

§ Conclusions

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult6/4/19 2

Page 3: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

Biography§ GeorgeSuciuJr.:§ graduatedfromtheFacultyofElectronics,TelecommunicationsandInformationTechnology(ETTI)attheUniversity“Politehnica”ofBucharest(UPB),Romania(www.upb.ro)

§ MBAinInformaticsProjectManagementandIPRfromtheFacultyofCybernetics,StatisticsandEconomicInformaticsoftheAcademyofEconomicStudiesBucharest(www.ase.ro)

§ Ph.D./ResearcheratAalborgUniversity§ R&DandInnovationManagerandCo-ownerofBEIAConsultInternational(Romania),aresearchperformingSME(www.beiaro.eu)

§ Experienceincoordinating,participatingandevaluatingR&Dprojects§ Foundersofseveralstart-ups

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult6/4/19 3

Page 4: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

BEIAConsult§ BEIAhasanexperiencesince1991inover5,000turnkeyprojectsforICTandIoTsolutions.

§ Over40R&Dprojects:Horizon2020istheEU'slargestresearchandinnovationprogramwithnearly€80billionavailableover7years(2014-2020)§ SWITCH:SoftwareWorkbenchforInteractive,TimeCriticalandHighlyself-adaptiveCloudapplications

(ICT-9)SoMeDi:SocialMediaandDigitalinteractionintelligence§ ESTABLISH:EnvironmentalSensingToActforaBetterqualityofLIfe:SmartHealth§ SeaForest:Intelligentforestprotectionmonitoringsystembasedonwirelesssensornetwork§ SoMeDi:Socialmediaanddigitalinteractionintelligence§ CitiSim:SmartCity3Dsimulationandmonitoringplatform§ VIRTUOSE:Virtualized VideoServices§ WINS@HI:Wereable IoT Network Solution forWork Safety inhazardous IndustrialEnvironments§ VLC/IR-RF:Hybrid VLC/IR-RFCommunication forSmart Space Based onMulti-Functional Thermal Image

Sensor Module§ A-WEAR:Anetwork fordynamic wearable applications with privacy constraints§ SCRATCh:SeCuRe and AgileConnected Things§ DEFRAUDify:Detecting Fraudulentactivities onthe internet§ I-DELTA:Interoperable Distributed Ledger Technology§ TIPS :Trust,Isolation &ProofS§ COSIBAS:CognitiveservicesforIoT-basedscenarios

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult6/4/19 4

Page 5: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

Partnerships§ Partners in Romanian R&D:

§ University “Politehnica” of Bucharest (www.upb.ro)§ Research Institute for Artificial Intelligence (www.racai.ro)§ Romanian Space Agency (www.rosa.ro)§ National Institute for Research and Development in Electrical Engineering

(www.icpe-ca.ro)§ National Institute of Aerospace Research “ELIE CARAFOLI” (www.incas.ro)§ National Institute for Research and Development in Informatics (www.ici.ro)§ Research and Development Institute for Industrializing and Marketing

Horticulture Products “HORTING” (www.horting.ro)§ National Institute for Research and Development in Microbiology and

Immunology for the Military (www.cantacuzino.ro)§ Member in the Directory Council of the German-Romanian Chamber of

Industry and Commerce (AHK-Deutsch-Rumaenische Industrie- undHandelskammer) and other Chambers of Commerce and Clusters:

§ Leader of NEM Romanian Mirror Group (www.nem-pt.ro) and ARTEMIS§ Member of Romanian Association for Electronic and Software Industry (ARIES),

Electronic Innovation Cluster (ELINCLUS)

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult6/4/19 5

Page 6: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

IoTarchitecture

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult6/4/19 6

Page 7: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

IoTdevicetrendsandanticipatedgrowth

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult6/4/19 7

Page 8: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

TheSecurityFeaturesofIoT§ Technologicalchallenges

§ resultoftheheterogeneousandubiquitouscharacterofIoTdevices§ associatedwithwirelesstechnologies,scalability, energy,anddistributednature

§ Securitychallenges§ associatedwiththesystemsandfunctionalitiesthatshouldbeimplementedtoproduceasecurenetwork§ concernedwiththelackoftheabilitytoensuresecuritybyauthentication,confidentiality,integrityandend-to-

endsecurity§ SecurityimplementedinIoTthroughouttheimprovementandoperationallifecycleofallIoTdevicesandhubs

§ IoTdevicessoftware§ paramounttobeauthorized

§ whenanIoTdeviceisturnedon,itshouldauthenticateitselfintothenetwork,andafterwardstostartcollectingortransmittinganykindofdata

§ Firewalling§ importantfactorfortheIoTnetworktofilterpacketsaddressedtothedevices

§ Automation§ autoconfigure,auto-repairandauto-coordinate§ riseinthevulnerabilityofthesystems(manualinteractionisextensivelyreduced)

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult6/4/19 8

Page 9: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

ChallengeswithSecurityPrinciples§ Balancingtheend-usersatisfaction,thecostsandtheimplementationeffortswithsecurity

§ Levelofsafetyó levelofcomfortprovidedbyanysolution

§ Levelsofconfidentiality,integrity,availabilityandauthentication§ consistently determined using a sliding scale, having in mind the application,use case or environment -> imperative to hit the precise balance betweenthe expected security levels, and cost or even the practicability ofimplementation. (e.g. a group of IoT devices like particular sensors, mightrequire more processing power for advanced cryptographic transactions)

§ Obtaininganarchitecturethatisregulatedbyvariousdevices,applicationsandnetworks=>§ higherproductquality§ fasterinnovationandintegration§ broadercommunity

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult6/4/19 9

betterresponsetoundesiredintrusionswhenoriftheyarise

Page 10: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

Opportunities§ Increasedmarketsize($$$)§ NewAItechnologies

§ Morenumberofinter-connecteddevices=>moredata

§ applyinganalyticsonallaspectsofthebusiness=>opportunitytoimprovestrategyandthecustomerexperience

§ SemanticIoT(naturallanguageinteractionwiththings)includingbiometry

§ Blockchain§ audittrails,accountability,smartcontracts,speed§ Buildtrust

§ betweenpartiesanddevices§ reducerisksofcollisionandtampering

§ Reducecosts§ removeoverheadassociatedwithintermediariesandmiddlemen

§ Acceleratetransactions§ reducesettlementtimefromdaystoalmostinstantneous

§ 5G§ Smartdoorbells&surveillancesystems=>helpidentify&recognizepeople=>boostofsecurity

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult6/4/19 10

Page 11: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

Projects§SA-TERRA:EnergyEfficientSystemforAutomationandTelemetryforResourceManagementinPrecisionFarming&SmartAgro: Telemetrysystemforintelligentagriculture

§WATER-M:UnifiedIntelligentWATERManagement

§TELEGREEN:Telemonitoringsystem,equipment,installationsandfacilitiesfortheproductionofcleanenergy

§TERRA-RO:Informaticssystemforrealtimeanalysisofriskfactorsforenvironmentandpublichealth

§3DSafeguard:GlobalSituationalAwarenessinRescue,CalamityandInspectionOperations,

§ASUA:AdvancedSensingforUrbanAutomation

§ALADIN :AirportsLandsideandAir-landSideAttacks’DetectionandPrevention

§CitiSim:SmartCity3Dsimulationandmonitoringplatform

§ODSI:OnDemandSecureIsolation

§PARFAIT:PersonaldAta pRotection FrAmework forIoT

§SealedGRID:Scalable,trustEd,andinteroperAble pLatform forsEcureD smartGRID

§SAFECARE:Integratedcyber-physicalsecurityforhealthservices- SAFEguard ofCriticalhealthinfrastructure

§ToR-SIM:IntegratedSoftwarePlatformforMobileMalwareAnalysis

6/4/19 11www.beiaro.eu/@GeorgeSuciuG /@beiaconsult

Page 12: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

Ødevelopmentofanintegratedtelemetrysolutionforautomatedresourcemanagementinprecisionagriculture

Ømoderncloudcomputingframeworks(IaaS,PaaS,SaaS)

Ømodelingandsimulationsoftware:MATLAB,LabVIEW

ØprogrammablelogiccontrollerandHMIdevices

Øcomplexmonitoringandcontrolsystem: hardware-softwareproject,SCADAapplicationsforresourcemanagement, increasedautonomybypowersupplyfromphotovoltaicpanelsonthefieldequipment.

Ølowenergyconsumption,lowadministrationcosts,scalability,forecastingfunctionality,diagnosis,potentialforextension

Øcooperationwithuniversities/researchinstitutesØ developmentoftheentrepreneurshipskillsofresearchers,masterandPhDstudents

Ø developmentandtestingactivitiesofenergyefficientindustrialsystems,Ø organizingofjointworkshopsforadaptingthego-to-markettoolsandmethodologiestotheuniversityprofile.

Ø Livedata:www.beia-telemetrie.roØ CropScienceDivisionofBayerRomaniaØAgroExpert:TelemetrystationsforNationalPhytosanitaryAuthority

SA-TERRA andSmartAgro

Page 13: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

Ø findingsolutionstotheinteroperability,real-time,bigdataandheterogeneousdatachallengestobeingabletoguaranteewatersupplyandqualityalongwiththestabilityandreliabilityofasmartwaternetwork

Page 14: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

TELEGREEN - Telemonitoring ofcleanenergysources:hydro,solar,wind

ØMonitoringofprimary energy sourcesØMonitoringofinstallations:output,efficiency,statusofbatteries&consumables,security

Page 15: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

RadiationsmonitoringsystemandearlywarningbasedonORBCOMLEOnetworktoprovideadequatelocalradioactivitymonitoringnetworksaroundthenuclearplantofCernavoda

TERRA-RO

Page 16: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

Øsolutionsformanagingconstraineddevicesinchallengingenvironments,whileenablingthemtogetconnectedbybecomingpartsofanadvancedsensingsystem.

Øadditionofnewsensorstoexistingsystemswillbefacilitatedbydesigningflexibleinterfacesforenhancedinteroperability

Page 17: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

https://3dsafeguard.beia-consult.ro/

3DSafeguard proposesasolutionenablingthesituationalawarenessbyintroducinganintegratedoperationworkflow,whichdeploysthefollowingtechnologicalinnovations:• multi-modalheat,depth,toxicity,acousticandvideosensorsmountedonactingofficersor

UAVs,• sensordatafusion,resultinginreconstructed3Dmapofunknownpremisesasactors

propagatethoughandintrackingoftheactorpositions;• situationalanalysisanddecisionsupportprovidingautomatedguidanceandalertstothe

officers,• multi-layeredvisualizationofthesensors,analysis- and3D-mapdataontocoordinator

displaysandontoHMDdisplaysofactingofficers.

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult6/4/19 17

Page 18: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

AirportsLandsideandAir-landSideAttacks’DetectionandPrevention

The project will offer an optimally scalable solution that will integrate several security fields, tools, and servicesso that we will take into account all the requirements and limitations and adaptation of the ALADIN solution todifferent specific companies, air traffic administrations or other end users.

The ALADIN Platform will improve the Safety management functions of providing air navigation services thatmake sure that all safety risks will be identified, assessed and reduced to an acceptable level since, within therecent applications, there are not integrated Cyber Security tools for Airports Communications.

The motivation behind ALADIN project derives from the current political and economic situation: the attackoccurred in USA 9/11, caused a significant number of changes to national and international aviation securityregulations. Confidence in the sector dramatically affected the proclivity to travel, and the public is onlyrecently returning to pre-9/11 numbers and the industry returning to profitability.

https://aladin.beia-consult.ro/

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult6/4/19 18

Page 19: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

Ødesign and implementation of a new generation platform for the Smart City ecosystemØprovide a powerful 3D simulation, monitoring and control infrastructure to enable planners to make criticalmanagement decisions on tactical and strategic levels based on the knowledge provided by the specific platformdeveloped.Ø for a natural interaction and better understanding of the events that happen in the city, 3D visualizationtechniques as augmented virtuality and augmented reality will be explored.

19

SmartCity3Dsimulationandmonitoringplatform

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult6/4/19 19

Page 20: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

OnDemandSecureIsolation

§ Deliversnewsecuritymodelswiththepropertiesandthebenefitsofbothhardwareandsoftwareapproaches§ minimalpropertiesforisolation,withthegoalofbeingusedinmassproduction(low-costandconstrainedCPU)inallapproachesthat

requirecontextisolation:M2M,IoT,networkinfrastructuresharing,etc.

§ TCB(TrustedComputingBase)1 level:Provenhypervisor("reducingcomplexitytobuildprovenTCB")§ buildandformallyprovethattheODSIHypervisorsupportsthesecurityrequirementswithlowermanpower,thankstoaninnovative

softwaredevelopmentmethodologyandtoolchainenablingtherapidandcost-effectivedevelopmentofflexibleandmaintainabletrustedsystems

§ showthattheMesoVisor canimplementtheisolationmodelwithsmallTCB§ demonstratethatbothsolutions(MesoVisor andODSIHypervisor)haveperformanceclosetosystemswithoutit

§ SoftwareLevel:Applicabilityoftheisolationmodelfortheapplication§ proposesseveralusescasestovalidatetheAPIofferedbytheisolationkernel,includingaBYODapplication§ showthatrouting-dedicatedhardwarewithisolationpropertiesoffersgoodperformanceandarecompatiblewiththeisolationkernel§ proposesoftwarearchitecturesandimplementationsforpartitionmanagementandsecurecommunicationbetweencomponents

implementingODSIapproach

§ AssuranceLevel:TheLegoMethodology§ compositionofcertification:enablecertificationasaLegoconstruction§ easierthecertificationbyreducingdependenciesbetweenapplicationsrunning§ adapttheexistingriskanalysisandcertificationmethodologytothespecificneedsofODSI§ identifythesecurityrequirementsforeachcomponentoftheproject§ promotetheworkinstandardizationorganizations

6/4/19 WWW.BEIARO.EU/@GEORGESUCIUG/@BEIACONSULT 20

Page 21: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

PersonaldAtapRotectionFrAmeworkforIoTinteroperability

§ Security & privacy of personal data => limitations for the growth of the Internet ofThings (IoT) market. Interoperability increases the complexity of service productionprocesses and the cost of production. Lack of security and trust for the protection ofprivacy put a barrier between service providers and consumers

§ Objectives§ develop a platform for protecting personal data in IoT applications => reduce thecomplexity of integrating and deploying services in today’s IoT technology by providinginteroperable software libraries, tools, and SDK elements

§ generate huge business potential§ integrated, scalable and extendable privacy and security framework -> will be demonstrated by 2 use cases

(Personal Information Management & Smart Home Services) leaded by industrial partners of the project consortium

§ define interoperability and security/privacy methodologies, rules and guidelines to makerecommendations for the policy makers

§ Consortium§ 11 partners from 3 countries (France, Turkey and Romania)

6/4/19 WWW.BEIARO.EU/@GEORGESUCIUG/@BEIACONSULT 21

Page 22: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

Scalable,trustEd,andinteroperAblepLatformforsEcureDsmartGRID

§Aims at bringing together experts from industry and academia from cross-sectorial research areas having complementarybackground with the long-term goal to design, analyze, and implement a scalable, highly trusted and interoperable SmartGrid security platform• builds on a realistic architectural image of industrial installations considering the special characteristics of energy infrastructures, their cyber

and physical requirements§ Objectives

§ efficient operation of critical infrastructure, while preserving quality of service, for the ultimate benefit of customers§ providing an integrated solution that will be applicable to existing systems§ providing advanced security features in legacy equipment upgrading their capabilities for operation in modern computing environments§ limiting the security risks for the expansion of remote energy distribution network management, towards the evolution of Smart Grid

6/4/19 WWW.BEIARO.EU/@GEORGESUCIUG/@BEIACONSULT 22

Page 23: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

§ Aimstoprovidesolutionsthatwillimprovephysicalandcybersecurityinaseamlessandcost-effectiveway§ promotesnewtechnologiesandnovelapproachestoenhancethreatprevention,threatdetection,

incidentresponseandmitigationofimpacts

6/4/19 WWW.BEIARO.EU/@GEORGESUCIUG/@BEIACONSULT 23

1: Sharing best practices between security and health actors, industrialistsand university scientists.2: Analysis and learning: by focusing on health services infrastructure,Safecare works towards creating a protection system, which covers threatprevention, response and mitigation of impacts across infrastructures.3: Decision Support: Since threats cannot be analyzed solely as physical orcyber => develop an integrated approach to fight such combination ofthreats. Safecare will deliver high quality & innovative solutions in systemsecurity to support healthcare stakeholders take decisions.4: Collect information on the heterogeneous sources of new threats.5: Raising awareness => create a protection system which covers threatdetection and mitigation of impacts across infrastructures and populations.6: Disseminate the results and best practices throughout the health usercommunities to enhance awareness on how to handle multi-faced threats.

Page 24: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

Ødevelopasoftwareplatformthatintegrates,inaunitarymanner,themalwareanalysisproceduresformostoftheexistingmobileterminals,withthepurposeofstrengtheningthesecurityofmobileterminalsandnetworks.

Øidentifyingtheoperationalrequirementsandcapabilitiesnecessaryfordevelopingandsecuringsolutionsformobileapplicationsandterminals

Øincreaseofcyberprotection solutionsefficiencybyapartnershipbetweengovernment,academiaandindustry.

WWW.BEIARO.EU Skype: george_suciu6/4/19

ToR – SIM

Page 25: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

Conclusions§ Increase in the number of IoT devices => more and more automation will be needed forboth individual users and industrial environments§ Automation levels rise within IoT systems => hardware and software vulnerabilities will increase

§ In the close future, information from IoT devices is going to be handled by proxy networkservers, because end devices used nowadays practically have few, if no security features=> more work should be spent on designing IoT devices

§ Before better standards concerning privacy protection of individual data and bettersecurity rules on transmission procedures and cloud/ information storage, security ofsensors and wearables will stay poor

§ The variety of the software and hardware in the IoT area gives solid market competition,but it also provides a security issue since there is no general “system”.§ dynamically characterized by the request of the customer and the response from the vendors.

§The capacity to design secure IoT devices relies on the meaning of security standards andagreements between vendors.§ Providers will handle the access to devices in the cloud, but they cannot grant 100% securityagainst unapproved access => is fundamental to exist cooperation between vendors in order todevelop a secured IoT world.

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult6/4/19 25

Page 26: Challenges and opportunities for IoT security - CyberSecurity … · The Security Features of IoT §Technological challenges §result of the heterogeneous and ubiquitous character

[email protected]

www.beiaro.eu/@GeorgeSuciuG /@beiaconsult