80 likes | 237 Views
Secure connectivity in the Internet of Things Rodrigo Roman Universidad de Málaga. PROBLEM : IoT Security: Areas to Cover ?. What dangers await me?. INTERNET. IoT Security: Areas to Cover ( Results 1 ). Not enough resources…. Data. Who are you?. (I prefer something more usable).
E N D
Secure connectivity in the Internet of Things Rodrigo Roman Universidad de Málaga
PROBLEM: IoT Security: AreastoCover? What dangers await me?... INTERNET
IoT Security: Areas to Cover (Results 1) Not enough resources… Data Who are you? (I prefer something more usable) I don’t think so… DESTROYYOURSELF!
IoT Security: Areas to Cover (Results 2) • Other issues • Intrusion detection and survivability • Context-Aware Security (Physical World) • Self-* (learning, adaptative, repairing) • Secure Physical Location • Device Ownership • Usability of security and privacy technologies • Policy enforcement and rights management • Legal challenges and governance Issues Lots of other issues that must be considered!
PROBLEM:IoT WSN Security: Key Management? DTLS & WS DTLS & WS
IoT WSN Security: Key Management (1) Certificate Certificate ARES…2011 ARES…2011 PKCKeys are obtained using PKC primitives Pre-shared key Two elements shared a predefined key α β fα(β) = fβ(α) fβ(x) fα(x) Polynomial SchemeKey is derived from shared polynomial Blom Scheme Key is obtained from a certain matrix
IoT WSN Security: Key Management (2) KSA KCASA KCASA KCBSA KCASB KCA KSB KSA KCA KSB KCASB KCBSA KGcGs KCB KGcGs KCBSB KCB KCBSB KSC KSC 1 – 1All elements share an unique key c – 1 All “clients” have their own key 1 – s All “servers” have their own key c – s Unique key per element
IoT WSN Security: Key Management (Results) Usefulforsmall real-worldapplications Takecarewiththe server overhead! DTLS DTLS DTLS Need to consider resilience and maintenance… Scalabilityisbetter, plus otherniceproperties! As a client, I can accessfrom time to time As a server, I mustbeverypowerful! PRE-SHARED KEYS MATHEMATICALFRAMEWORK PUBLIC KEY CRYPTOGRAPHY