Azam Supervisor : Prof. Raj Jain

Slides:



Advertisements
Similar presentations
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Authentication In Mobile Internet Protocol version 6 Liu Ping Supervisor: professor Jorma Jormakka.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Cryptography and Network Security Chapter 17
WEB SECURITY. WEB ATTACK TYPES Buffer OverflowsXML InjectionsSession Hijacking Attacks WEB Attack Types.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 8 Web Security.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (SSL)
Chapter 21 Public-Key Cryptography and Message Authentication.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Cryptography and Network Security (CS435) Part One (Introduction)
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
National Chi Nan University
An Analysis of IPv6 Security CmpE-209: Team Research Paper Presentation CmpE-209 / Spring Presented by: Dedicated Instructor: Hiteshkumar Thakker.
Potential vulnerabilities of IPsec-based VPN
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Security of the Internet of Things: perspectives and challenges
Cryptography CSS 329 Lecture 13:SSL.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Cryptography and Network Security
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Secure Sockets Layer (SSL)
Algorithms for Big Data Delivery over the Internet of Things
Cryptography and Network Security
Cryptography and Network Security Chapter 16
Cryptography and Network Security
The Secure Sockets Layer (SSL) Protocol
Outline Using cryptography in networks IPSec SSL and TLS.
Cryptography and Network Security
Cryptography and Network Security
Lecture 36.
Lecture 36.
Presentation transcript:

Azam Supervisor : Prof. Raj Jain Survey on IoT Security Azam Supervisor : Prof. Raj Jain

Outline Introduction Why Cyber Security Matters in IoT Security Goals of IoT Protocols Threats in IoT IoT Protocols (WirelessHART, 6LoWPAN, IPSec, IEEE 802.15.4) Summary

Introduction What is IoT? The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. For example, sensors on the roadway electronically alert cars to potential hazards, and the smart grid sends dynamic electricity pricing data to home appliances in order to optimize power consumption.

Why Cyber Security matters in IoT?   Current Internet security protocols rely on a well-known and widely trusted suite of cryptographic algorithms: The Advanced Encryption Standard (AES) block cipher for confidentiality The Rivest-Shamir-Adelman (RSA) asymmetric algorithm for digital signatures and key transport The Diffie-Hellman (DH) asymmetric key agreement algorithm; and the SHA-1 and SHA-256 secure hash algorithms.

But.. Securing an IoT system is a challenge because of many vulnerabilities. The applicability of these cryptographic techniques to the IoT is unclear, and requires further analysis to ensure that algorithms can be successfully implemented given the constrained memory and processor speed expected in the IoT. Until to date, security and interconnectivity issues amongst the IoT devices remain as open discussions.

Security Goals of IoT Protocols

Types of Threats Skimming: Read w/o knowledge of owner Eavesdropping or sniffing: Man-in-the-middle Data Tampering: Erasing or changing data Spoofing: Mimic another source Cloning: Making a copy of data Malicious Code: Insertion of executable virus code Denial of Service: Overwhelm the receiver’s capacity Killing: Disable Jamming: Interfere with a strong signal Shielding: Mechanically prevent reading

IoT Protocols WirelessHART 6LoWPan IPSec IEEE 802.15.4

WirelessHART Currently the only WSN standard. It designed primarily for industrial process automation and control. payload is encrypted and all messages are authenticated. All devices are provisioned with a secret Join key as well as a Network id in order to join the network. Master key, Session key, and Link key. The network key is shared between all devices

6LoWPAN 6LowPAN works on the IPv6 protocol suite based on IEEE 802.15.4 standard. Hence it has the characteristics of low-cost, low-rate and low-power deployment. AES (Advanced Encryption System) IPsec (Internet Protocol Security) Research done by several researchers has shown that exchanging key is another problem that should be considered.

6LoWPAN Cryptography cannot detect attackers with legal keys that behave maliciously. There is a need for implementing IDS to monitor any malicious behavior of the network to prevent security attacks to decrease its effects.

Rank Attack

IPSec In IoT, security at the network layer is provided by the IP Security (IPsec) protocol suite. It can be used with any transport layer protocol including TCP, UDP, HTTP, and CoAP. However, being mandatory in IPv6, IPsec is one of the most suitable options for E2E security in the IoT.

IEEE 802.15.4 The original IEEE 802.15.4 standard was released in 2003. The original version supported two physical layers, one of them working in the 868 and 915 MHz frequency bands and the other working in the 2.4GHz band. Later on, there was another revision released in 2006, which improved the transfer speeds. Additional bands were added in the subsequent revisions.

IEEE 802.15.4 MAC Frame

Summary In summary, the security challenges for the IoT still are daunting. The link layer, the network layer, as well as the transport layer have distinct security requirements and communication patterns. In particular, security protocols should further take into account the resource-constrained nature of things and heterogeneous communication models. Hopefully, this survey can motivate more future works to cope with security concerns in the deployment of IoT.

Thank you for your kind attention !