Presentation is loading. Please wait.

Presentation is loading. Please wait.

Smart Object Security Workshop 23 rd March 2012, Paris.

Similar presentations


Presentation on theme: "Smart Object Security Workshop 23 rd March 2012, Paris."— Presentation transcript:

1 Smart Object Security Workshop 23 rd March 2012, Paris

2 Organizers Hannes Tschofenig – Nokia Siemens Networks, IAB member Jari Arkko – Ericsson, IETF Internet Area Director, upcoming IAB member Carsten Bormann – University of Bremen, IETF CoRE and 6LoWPAN WG co-chair Peter Friess – European Commission Cullen Jennings – Cisco, IETF CoRE WG co-chair Antonio Skarmeta – University of Murcia, IoT6 FP7 Project Zach Shelby – Sensinode, Smart Object IETF Specification Author Thomas Heide Clausen – Ecole Polytechnique, our host

3 Note Well

4 Info Webpage: http://www.lix.polytechnique.fr/hipercom/Sm artObjectSecurity/ http://www.lix.polytechnique.fr/hipercom/Sm artObjectSecurity/ Papers and slides will be copied to this website after the meeting. Currently, the 35 papers are here: http://www.tschofenig.priv.at/sos- papers/PositionPapers.htm http://www.tschofenig.priv.at/sos- papers/PositionPapers.htm

5 A few words from Alex "Sandy" Pentland (MIT)Alex "Sandy" Pentland Data shows that great teams: – Communicate frequently. In a typical project team a dozen or so communication exchanges per working hour may turn out to be optimum; but more or less than that and team performance can decline. – Talk and listen in equal measure, equally among members. Lower performing teams have dominant members, teams within teams, and members who talk or listen but don't do both. – Engage in frequent informal communication. The best teams spend about half their time communicating outside of formal meetings or as "asides" during team meetings, and increasing opportunities for informal communication tends to increase team performance. – Explore for ideas and information outside the group. The best teams periodically connect with many different outside sources and bring what they learn back to the team.

6 Mailing List http://lists.i1b.org/listinfo.cgi/smart-object- security-i1b.org http://lists.i1b.org/listinfo.cgi/smart-object- security-i1b.org – Used for workshop preparation and discussion of the papers. – Will be deleted at the end of the workshop.

7 Results of the workshop Conclusions from discussions will be captured in a slide set at the end of the workshop. Notes / Minutes from the day: – Etherpad: http://piratepad.net/bdP7oNNIJmhttp://piratepad.net/bdP7oNNIJm Twitter hashtag: #sosw

8 Pictures & Audio Recording I will take pictures – and try to upload them to the webpage – OK? We will do an audio recording – Turned out to be useful if we missed some discussions. – Audio will not be shared with anyone. – OK?

9 Agenda 08:30 - 09:00: Arrival of Participants and Coffee 09:00 - 09:30: Opening Remarks Thomas Clausen, Ecole Polytechnique: Welcome and logistics (15 min) Hannes Tschofenig, NSN & Jari Arkko, Ericsson: Agenda (5 min) 09:30 - 10:30: Requirements and Use Cases Paul Chilton, NXP: Security challenges in the lighting use case (10 min) http://www.tschofenig.priv.at/sos-papers/slides/Paul.pptxhttp://www.tschofenig.priv.at/sos-papers/slides/Paul.pptx Rudolf van der Berg, OECD: Open interfaces, identifier spaces, and economic challenges (10 min) http://www.tschofenig.priv.at/sos-papers/slides/Rudolf.pptx Discussion: What are the core security requirements? What has the industry already deployed, and what are they struggling with? How to design for choice considering economics, and competition for smart object security? 10:30 - 10:40: Break

10 Agenda, cont. 10:40 - 12:30: Implementation experience Carsten Bormann, Universitaet Bremen: Light-weight COAP & DTLS implementations (10 min) Hannes Tschofenig, Nokia Siemens Networks: TLS and Raw Public Keys Implementation (5 min) http://www.tschofenig.priv.at/sos-papers/slides/Hannes.pptx Mohit Sethi, Ericsson/Aalto: Public Key Crypto Implementation Experience (5 min) http://www.tschofenig.priv.at/sos-papers/slides/Jari.pdf Discussion: What is our experience with implementing some of these protocols? What worked and what didn't? What advice can be given? Where is further research, standardization, and implementation work needed? 12:30 - 13:30: Lunch Break

11 Agenda, cont. 13:30 - 15:30: Authorization and Role-based Access Control Richard Barnes, BBN: Beyond COMSEC (10 min) Jan Janak, Columbia University: On Access Control (10 min) Discussion: What is the interaction between business processes (such as installation, change of ownership; including non-business processes such as home admin), the roles we have to manage in the system as a result of that, and the crypto we can do to implement those roles? 15:30 - 16:00: Coffee Break

12 Agenda, cont. 16:00 - 17:30: Provisioning Johannes Gilger, RTWH Aachen: Secure pairing (10 min) Cullen Jennings, Cisco: A deployment model (10 min) Discussion: What are practical deployment models, and corresponding protocols? 17:30 - 18:30: Summary Evening: Dinner for those who want (self-organized)


Download ppt "Smart Object Security Workshop 23 rd March 2012, Paris."

Similar presentations


Ads by Google