Security & Reliability threaths to mobile...
Transcript of Security & Reliability threaths to mobile...
![Page 1: Security & Reliability threaths to mobile systemszandercom.com/web/wp-content/uploads/2010/12/IVA20161122... · 2017-01-11 · Security & Reliability threaths to mobile systems -](https://reader036.fdocuments.us/reader036/viewer/2022081405/5f0b85587e708231d430ece3/html5/thumbnails/1.jpg)
Security & Reliability threaths to mobile systems - the non-military scenario
Jens Zander, KTH
![Page 2: Security & Reliability threaths to mobile systemszandercom.com/web/wp-content/uploads/2010/12/IVA20161122... · 2017-01-11 · Security & Reliability threaths to mobile systems -](https://reader036.fdocuments.us/reader036/viewer/2022081405/5f0b85587e708231d430ece3/html5/thumbnails/2.jpg)
KTH ROYAL INSTITUTE OF TECHNOLOGY
The internet: ”More than ’fun and games’ ”
![Page 3: Security & Reliability threaths to mobile systemszandercom.com/web/wp-content/uploads/2010/12/IVA20161122... · 2017-01-11 · Security & Reliability threaths to mobile systems -](https://reader036.fdocuments.us/reader036/viewer/2022081405/5f0b85587e708231d430ece3/html5/thumbnails/3.jpg)
”The Internet of Information”
Information available anywhere, anytime ”Being Digital” = copies ”for free”
Threat: Desinformation, Privacy breach, Delays, Info service disruption
![Page 4: Security & Reliability threaths to mobile systemszandercom.com/web/wp-content/uploads/2010/12/IVA20161122... · 2017-01-11 · Security & Reliability threaths to mobile systems -](https://reader036.fdocuments.us/reader036/viewer/2022081405/5f0b85587e708231d430ece3/html5/thumbnails/4.jpg)
2. ”The Internet of Sensors”
Information collected everywhere Enormaous data volumes – ”Big Data”
Data Mining, ”Analytics” for decision support
Threat: Desinformation, Privacy breach
![Page 5: Security & Reliability threaths to mobile systemszandercom.com/web/wp-content/uploads/2010/12/IVA20161122... · 2017-01-11 · Security & Reliability threaths to mobile systems -](https://reader036.fdocuments.us/reader036/viewer/2022081405/5f0b85587e708231d430ece3/html5/thumbnails/5.jpg)
3. ”The Internet of Action”
The physical world is under Remote control by people and machines
www.davincisurgery.com
Källa: The Economist
Threat: Physical damage, Disruption of vital infrastrucure
![Page 6: Security & Reliability threaths to mobile systemszandercom.com/web/wp-content/uploads/2010/12/IVA20161122... · 2017-01-11 · Security & Reliability threaths to mobile systems -](https://reader036.fdocuments.us/reader036/viewer/2022081405/5f0b85587e708231d430ece3/html5/thumbnails/6.jpg)
KTH ROYAL INSTITUTE OF TECHNOLOGY
The Threats - Accidents, Natural disasters - Organized crime - Terrorist attacks
![Page 7: Security & Reliability threaths to mobile systemszandercom.com/web/wp-content/uploads/2010/12/IVA20161122... · 2017-01-11 · Security & Reliability threaths to mobile systems -](https://reader036.fdocuments.us/reader036/viewer/2022081405/5f0b85587e708231d430ece3/html5/thumbnails/7.jpg)
Today’s information infrastructure
• From special purpose infrastructures (”one-trick ponies) to general IP-based access infrastructures
• Internet access = dominant design for ALL services (fixed & mobile)
• ”Cloud” computing • Standardized platforms • Marginalizes other technical solutions
– e.g. Wireless P2P, Mesh, ...
”IP is the answer - now, what was the question ?” G Q Maguire
![Page 8: Security & Reliability threaths to mobile systemszandercom.com/web/wp-content/uploads/2010/12/IVA20161122... · 2017-01-11 · Security & Reliability threaths to mobile systems -](https://reader036.fdocuments.us/reader036/viewer/2022081405/5f0b85587e708231d430ece3/html5/thumbnails/8.jpg)
Cellular /Data Security/Privacy Threats Then, now and tomorrow
Threats: From physical interception to • Link interception/disruption • Network interception • Spoofing (insertion of desinformation) • ”Cloud” /Server attacks
”CLOUD”
![Page 9: Security & Reliability threaths to mobile systemszandercom.com/web/wp-content/uploads/2010/12/IVA20161122... · 2017-01-11 · Security & Reliability threaths to mobile systems -](https://reader036.fdocuments.us/reader036/viewer/2022081405/5f0b85587e708231d430ece3/html5/thumbnails/9.jpg)
Wireless Network vulnerabilities
• Poor coverage • Poor capacity • Power outage • Physical damage • Active interference
Internet
![Page 10: Security & Reliability threaths to mobile systemszandercom.com/web/wp-content/uploads/2010/12/IVA20161122... · 2017-01-11 · Security & Reliability threaths to mobile systems -](https://reader036.fdocuments.us/reader036/viewer/2022081405/5f0b85587e708231d430ece3/html5/thumbnails/10.jpg)
Redundant resources:
• Poor coverage – Multiple Networks, lower frequencies • Poor capacity – Multiple Networks, higher frequencies • Power outage Power backup – Multiple Networks • Physicial damage: Physical protection – Multiple Networks • Active interference: Multiple frequencies
Internet
![Page 11: Security & Reliability threaths to mobile systemszandercom.com/web/wp-content/uploads/2010/12/IVA20161122... · 2017-01-11 · Security & Reliability threaths to mobile systems -](https://reader036.fdocuments.us/reader036/viewer/2022081405/5f0b85587e708231d430ece3/html5/thumbnails/11.jpg)
Some observations:
• Open networks do not provide security • this has to be provided ”end-to-end”
• Main threat: Disruption of vital services • The internet is a fantastic tool to scale-up systems and
solutitons and make the effective on an global scale - but it also empower the attackers to do likewise
• Our computers are protected – but what about the ”low-end” cyber-physical devices ? • Smartphones are replaced every 1-2 years • A car lasts for 10 years • The thermostat in my house … will it ever be replaced?