Privacy and Security in the Internet of Things
|
|
- Madison Andrews
- 6 years ago
- Views:
Transcription
1 Privacy and Security in the Internet of Things Innovation Forum Digitalisierung, BICC-Net München, 21. April 2015 Authors: Stefan Schmid, Joao de Sousa, Jamshid Shokrollahi, Jan Zibuschka Corporate Research Robert Bosch GmbH 1
2 Incidents in the Internet of Things In 2011 Researchers of Washington university show how vulnerabilities in automotive ECUs can be used to manipulate the vehicle through wireless communication channels 1 In 2011 researchers of Ruhr University Bochum show how vulnerabilities in smart meters can be used to remotely find out which TV channel the users are watching 2 In 2013 Doctors disabled wireless in Dick Cheney's pacemaker to thwart hacking 3 Internet of Things challenges the privacy and safety of users. Secure services in Internet of Things protect the privacy of users using sound and reliable security mechanisms!
3 Important Building Blocks Privacy Confidentiality Authentication User s trust Secure Internet of Things Integrity Secure storage Availability Reliability 3
4 Concepts for a Privacy Preserving Middleware Decentralized middleware supporting secure and asynchronous event and data streaming Services Control and transparency for disseminated information Simple user interaction External Middleware enabled Services Middleware Functional Unit Message Processing Threads Semantic Addressing and Discovery Layer Sphere Manager Middleware Message Book-keeping Records Data Access and Exchange Comms 4
5 Spheres Spheres are logical concepts which are used to define trust domains for a given purpose and most of its functionality is also available in a geographically distributed setting Home security sphere All of the devices which belong to the same sphere share a unique secret key which is used to protect the confidentiality and integrity of the data which is communicated in the sphere Users are flexible in creation and deletion of spheres of their own Home entertainment sphere 5
6 Party Use Case Alice wants to organize a party She puts all of the home entertainment devices in a sphere She gives Bob access to the sphere After the party she deletes the sphere 6
7 Pipes Pipes allow the users to control which personal information leave the spheres Users can control which sphere is connected to a pipe and which data is transferred there Choosing the sphere Choosing the data 7
8 Conclusion To provide secure services in the Internet of Things we must provide the users with easy to use tools to configure their privacy needs Successful enforcement of these configurations need sound security mechanisms which are interoperable among different device manufacturers and service providers The middleware concept which is developed at the Corporate Research of Robert Bosch GmbH provides the necessary mechanism to configure and implement users privacy needs 8
Bezirk. W3C Web of Things Interest Group. Bezirk $$ $$$ 4/15/2016. April 11, Bezirk. user-centrism and privacy
W3C Web of Things Interest Group April 11, 2016 is to the IoT what bio/organic is to agricultural products IoT that tastes better $$ $$$ mainstream business models revolve on the value of data for service
More information2.1 What are distributed systems? What are systems? Different kind of systems How to distribute systems? 2.2 Communication concepts
Chapter 2 Introduction to Distributed systems 1 Chapter 2 2.1 What are distributed systems? What are systems? Different kind of systems How to distribute systems? 2.2 Communication concepts Client-Server
More informationFujitsu World Tour 2018
Fujitsu World Tour 2018 May 30, 2018 #FujitsuWorldTour 1 Copyright 2018 FUJITSU Security and Privacy of Big Data A NIST Perspective Arnab Roy Fujitsu Laboratories of America Co-Chair, NIST Big Data WG:
More informationSEGRID storyline. Workshop SEGRID November 14 th, 2016, Barcelona, Spain
Workshop SEGRID November 14 th, 2016, Barcelona, Spain SEGRID storyline This project has received funding from the European Union s Seventh Framework Programme for research, technological development and
More informationCSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT
CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT The Market and the Trend Cyber security market (2020): USD 170.21 billion, CAGR ~10% Storage market (2020): USD 18.28 billion, CAGR 22% Tons of data to
More informationNIS Platform Working Group 3 Individuals Digital Rights and Capabilities. Dr. Gisela Meister April
NIS Platform Working Group 3 Individuals Digital Rights and Capabilities Dr. Gisela Meister April 08-2014 AoI 1: Individuals Digital Rights and Capabilities AoI 1 s vision is that individuals needs and
More informationLanguage-Based Security on Android (call for participation) Avik Chaudhuri
+ Language-Based Security on Android (call for participation) Avik Chaudhuri + What is Android? Open-source platform for mobile devices Designed to be a complete software stack Operating system Middleware
More informationAutomotive Cyber Security
Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18
More informationInternet of secure things: issues and perspectives. Pasquale Pace Dimes - UNICAL
Internet of secure things: issues and perspectives Pasquale Pace Dimes - UNICAL ppace@dimes.unical.it Table of Contents: Inter-IoT European Project» http://www.inter-iot-project.eu/ IoT Security IoT Authentication
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationHow to return control over user data back to the user The rethink framework
How to return control over user data back to the user The rethink framework Anastasius Gavras Eurescom GmbH Online Webinar 21. June 2017 This project has received funding from the European Union s Horizon
More informationSecurity in sensors, an important requirement for embedded systems
Security in sensors, an important requirement for embedded systems Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer AISEC Institute for Applied
More informationTRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS
TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS MATTHEW SHORT SR PRODUCT LINE MANAGER DIGITAL NETWORKING MATTHEW.SHORT@NXP.COM A NEW POSITION OF STRENGTH #1 Communications Processors #1 RF Power Transistors
More informationThe Smart Home: A New Business Model. September 2014
The Smart Home: A New Business Model September 2014 What is a Smart Home? A smart home is described as a home equipped with lighting, heating, and electronic devices that can be controlled remotely by
More informationDEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy.
DEx Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy Lars Moberger Research Institutes of Sweden BUILT ENVIRONMENT ENERGY AND CIRCULAR ECONOMY
More informationCar2Car Forum Operational Security
Car2Car Forum 2012 14.11.2012 Operational Security Stefan Goetz, Continental Hervé Seudié, Bosch Working Group Security Task Force: In-vehicle Security and Trust Assurance Level 15/11/2012 C2C-CC Security
More informationAutomotive Security: Challenges and Solutions
Automotive Security: Challenges and Solutions 8 th Vector Congress 30 th November 2016 V2.01.00 2016-11-22 Agenda Introduction Services Embedded Security Mechanisms Tools Summary 2 Introduction Vehicle
More informationIntegrated Security Management Framework
Integrated Security Management Framework Critical for Securing the Future of IoT Nampuraja Enose Principal Consultant- Industry 4.0 / Industrial Internet 17 Nov 2016 Internet Of Things The Vision 2 Instrumented
More informationTechnical Disclosure Commons
Technical Disclosure Commons Defensive Publications Series April 24, 2017 Bandwidth Pooling Alok Talekar Follow this and additional works at: http://www.tdcommons.org/dpubs_series Recommended Citation
More informationAuthentication with Privacy for Connected Cars - A research perspective -
Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk
More informationINTERNET OF THINGS. Presented By Erin Bosman & Julie Park, Morrison & Foerster LLP ACC 14th ANNUAL GC ROUNDTABLE AND ALL DAY MCLE
Friday, January 27 th, 2017 INTERNET OF THINGS Presented By Erin Bosman & Julie Park, Morrison & Foerster LLP ACC 14th ANNUAL GC ROUNDTABLE AND ALL DAY MCLE This Talk s Objectives What is the Internet
More informationInternet of Things: Driving the Transformation
Internet of Things: Driving the Transformation Annabel Nickles, PhD, MBA Director, Emerging Platform Solutions Integrated Computing Research Intel Labs 1 What Are People Saying about IOT? Vol. 12345 Nr.001
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More information5G Network Architecture
5G Network Architecture A healthy balance between Evolution and Revolution Peter Merz Head of Radio Systems Technology and Innovation Nokia Networks 1 Nokia 2015 Johannesberg Summit 2015 Peter Merz NGMN
More informationEconomic and Social Council
United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization
More informationConnected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is
Press release High-performance IT security solutions protect V2X communication against cyberattacks ESCRYPT GmbH Am Hain 5, 44789 Bochum, Germany Phone: +49 234 43870-200 Press and Public Relations: Martin
More informationPRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels /
PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser CSP2015 Brussels / 29.04.2015 Challenges for future ICT Cloud computing will be at the heart of future ICT systems The
More informationJAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE
CLOUD COMPUTING WEB-SERVICES BASED DATABASE: SQL, MY-SQL, ORACLE JAVA - PROJECT TOPICS IEEE 2015 BASED 1 A Hybrid Cloud Approach for Secure Authorized Deduplication JCC1501 2 A Secure and Dynamic Multi-keyword
More informationAmbient Service Space
Ambient Service Space Dr. Stefan Arbanowski Fraunhofer FOKUS Institute for Open Communication Systems Berlin, Germany 02.08.2004 1 Developing Next Generation Services Strategic
More informationCisco Smart+Connected Communities
Brochure Cisco Smart+Connected Communities Helping Cities on Their Digital Journey Cities worldwide are becoming digital or are evaluating strategies for doing so in order to make use of the unprecedented
More informationEnabling Agility through Modularity and Microservices TM Forum Middle East Jan 2018
Enabling Agility through Modularity and Microservices TM Forum Middle East Jan 2018 Joann O Brien VP APIs & Ecosystems, TM Forum 2017 TM Forum 1 5G open ecosystems represent a $582bn opportunity as other
More informationIDACCS Wireless Integrity protection in a smart grid environment for wireless access of smart meters
IDACCS Wireless 2014 Integrity protection in a smart grid environment for wireless access of smart meters Prof- Dr.-Ing. Kai-Oliver Detken DECOIT GmbH Fahrenheitstraße 9 D-28359 Bremen URL: http://www.decoit.de
More informationStandards for V2X Communication and Implications for OEMs and ITS
Standards for V2X Communication and Implications for OEMs and ITS FISITA Jürgen Daunis London Nov. 12, 2015 PACE OF CHANGE >50 billion connected devices Connections (billion) 25 years 5 billion connected
More informationIntroducing Hardware Security Modules to Embedded Systems
Introducing Hardware Security Modules to Embedded Systems for Electric Vehicles charging according to ISO/IEC 15118 V1.0 2017-03-17 Agenda Hardware Trust Anchors - General Introduction Hardware Trust Anchors
More informationWeVe: When Smart Wearables Meet Intelligent Vehicles
WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet
More information5G in Manufacturing. 5G in Manufacturing. Dr. Andreas Mueller Robert Bosch GmbH
5G in Manufacturing Dr. Andreas Mueller Robert Bosch GmbH Image: Bosch 5G Key Technologies for the Factories of the Future Potential 5G Killer Applications Consumer Automotive Manufacturing Smart Cities...
More informationAUTOSAR proofs to be THE automotive software platform for intelligent mobility
AUTOSAR proofs to be THE automotive software platform for intelligent mobility Dr.-Ing. Thomas Scharnhorst AUTOSAR Spokesperson Simon Fürst, BMW AG Stefan Rathgeber, Continental Corporation Lorenz Slansky,
More informationHolistic view on security as foundation for trust and innovation in new energy markets
Smart Energy Demand Coalition Holistic view on security as foundation for trust and innovation in new energy markets CEER workshop on Meter Data Management Brussels, 19 April 2012 Thomas Weisshaupt UPLOAD
More informationIT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA
IT Security Mandatory Solutions Andris Soroka 2nd of July, 2014 @LPS, RIGA Data Security Solutions business card Specialization IT Security IT Security services (consulting, audit, pen-testing, market
More informationA Survey on Secure Sharing In Cloud Computing
A Survey on Secure Sharing In Cloud Computing Aakanksha maliye, Sarita Patil Department of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India ABSTRACT: Cloud computing
More informationSecurity for smart Electricity GRIDs
Security for smart Electricity GRIDs Project type: Collaborative project small or medium scale focused research project Grant agreement no: 607109 Thematic Priority: FP7-SEC-2013-1 Start date of project:
More informationPromoting Open Standards for Digital Repository. case study examples and challenges
Promoting Open Standards for Digital Repository Infrastructures: case study examples and challenges Flavia Donno CERN P. Fuhrmann, DESY, E. Ronchieri, INFN-CNAF OGF-Europe Community Outreach Seminar Digital
More informationTrustworthy user authentication, authorization, data integrity AND consent management
RapidQube Solutions Trustworthy user authentication, authorization, data integrity AND consent management I D E N T I T Y A N D A CC E S S M A N A G E M E N T S O L U T I O N RapidQube Solutions 2 IDENTITY
More informationPENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017
PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT
More informationASC Chairman. Best Practice In Data Security In The Cloud. Speaker Name Dr. Eng. Bahaa Hasan
Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Best Practice In Data Security
More informationMetadata, Chief technicolor
Metadata, the future of home entertainment Christophe Diot Christophe Diot Chief Scientist @ technicolor 2 2011-09-26 What is a metadata? Metadata taxonomy Usage metadata Consumption (number of views,
More informationGerman OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer
German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer Daimler Business Units German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer
More informationGEMOM Genetic Message Oriented Secure Middleware Significant and Measureable Progress beyond the State of the Art
GEMOM Genetic Message Oriented Secure Middleware Significant and Measureable Progress beyond the State of the Art Habtamu Abie, Ilesh Dattani,, Milan Novkovic,, John Bigham,, Shaun Topham,, and Reijo Savola
More informationEnabling Smart Cities Through a Cognitive Management Framework for the Internet of Things
Enabling Smart Cities Through a Cognitive Management Framework for the Internet of Things Panagiotis Vlacheas 1, Vera Stavroulaki 1, Toon Norp 2, Gianmarco Baldini 3, Raffaele Giaffreda 4, Panagiotis Demestichas
More informationTehnika revolutsioon: uudsed targad lahendused, mis viivad interneti lõpptarbijani!
Tehnika revolutsioon: uudsed targad lahendused, mis viivad interneti lõpptarbijani! Kasutades 5G mobiilsidet Urmas Ruuto Ericsson Eesti AS 29.11.2018 5G is use case driven Massive MTC Critical MTC LOGISTICS
More informationIntelligent Transportation Systems (ITS) for Critical Infrastructure Protection
Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection Presented at the Transportation Research Board January 2002 Annual Meeting Washington DC, USA HAMED BENOUAR Executive Director
More informationCybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No
More informationIBM Identity Mixer. Introduction Deployment Use Cases Blockchain More Features
Introduction Deployment Use Cases Blockchain More Features IBM Identity Mixer Privacy-preserving identity management and authentication for Blockchain and beyond Dr. Maria Dubovitskaya IBM Research Zurich
More informationThe HUMANE roadmaps towards future human-machine networks Oxford, UK 21 March 2017
The HUMANE roadmaps towards future human-machine networks Oxford, UK 21 March 2017 Eva Jaho, ATC e.jaho@atc.gr 1 Outline HMNs Trends: How are HMNs evolving? The need for future-thinking and roadmaps of
More informationPublic Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA
Public Key Cryptography, OpenPGP, and Enigmail Cryptography is the art and science of transforming (encrypting) a message so only the intended recipient can read it Symmetric Cryptography shared secret
More informationCONIKS: Bringing Key Transparency to End Users
CONIKS: Bringing Key Transparency to End Users Morris Yau 1 Introduction Public keys must be distributed securely even in the presence of attackers. This is known as the Public Key Infrastructure problem
More informationDISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON.
DISTRIBUTED SYSTEMS 121r itac itple TAYAdiets Second Edition Andrew S. Tanenbaum Maarten Van Steen Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON Prentice Hall Upper Saddle River, NJ 07458 CONTENTS
More informationSecure automotive on-board networks
Secure automotive on-board networks Basis for secure vehicle-to-x communication Dr.-Ing. Olaf Henniger Fraunhofer SIT / Darmstadt 2 December 2010 Presentation overview EVITA project overview Security challenges
More informationSupports for Identity Management in Ambient Environments The HYDRA Approach
Supports for Identity Management in Ambient Environments The HYDRA Approach ICentric Hasan Akram (MSc.Inform.) Researcher Fraunhofer Institute for Secure Information Technology Mario Hoffmann (Dipl.Inform.)
More informationTIES for Microsoft CityNext Next-Generation Situational Awareness
BROCHURE A CLOSER LOOK AT! TIES for Microsoft CityNext Next-Generation Situational Awareness INTRODUCTION! TIES for Microsoft CityNext (TMCN) is an all-hazard threat monitoring and situation awareness
More informationCognitive Radio Networks at WINLAB: Networking and Security Research
Cognitive Radio Networks at WINLAB: Networking and Security WINLAB Rutgers, The State University of New Jersey www.winlab.rutgers.edu Contact: Professor Wade Trappe, Associate Director trappe@winlab.rutgers.edu
More informationCryptography and Network Security
Security Sixth Edition Chapter 1 Introduction Dr. Ahmed Y. Mahmoud Background Information Security requirements have changed in recent times traditionally provided by physical and administrative mechanisms
More informationQualifying exam: operating systems, 1/6/2014
Qualifying exam: operating systems, 1/6/2014 Your name please: Part 1. Fun with forks (a) What is the output generated by this program? In fact the output is not uniquely defined, i.e., it is not always
More informationThe power of Blockchain: Smart Contracts. Foteini Baldimtsi
The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave
More informationAvygdor Moise, Ph.D. Future DOS Research & Development Inc. Enablers of plug & play AMI solutions that work
Integration of the ANSI standard in the SmartGrid system design Presented by Avygdor Moise, Ph.D. Future DOS Research & Development Inc. Enablers of plug & play AMI solutions that work 303-6707 Elbow Drive
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #4 Wireless Systems II Project proposals: Announcements Written proposal due in 1 week Presentation in class in 1 week Contact me to discuss
More information정형기법을활용한 AUTOSAR SWC 의구현확인및정적분석
정형기법을활용한 AUTOSAR SWC 의구현확인및정적분석 Develop high quality embedded software 이영준 Principal Application Engineer 2015 The MathWorks, Inc. 1 Agendas Unit-proving of AUTOSAR Component and Runtime error Secure Coding
More informationZero-Knowledge Proofs of Knowledge
Zero-Knowledge Proofs of Knowledge Stéphanie Delaune September 6, 2013 Stéphanie Delaune () Proofs of Knowledge September 6, 2013 1 / 16 Proofs of knowledge Proof of knowledge are often used to prove one
More informationSmart Grid Security: Current and Future Issues
Smart Grid Security: Current and Future Issues ISGT 2014 - Panel on Smart Grid Security February 21 st 2014, Washington DC, USA Florian Skopik Senior Project Manager, ICT Security Safety & Security Department
More informationPretty Good Privacy (PGP)
Pretty Good Privacy (PGP) -- PGP services -- PGP key management (c) Levente Buttyán (buttyan@crysys.hu) What is PGP? general purpose application to protect (encrypt and/or sign) files can be used to protect
More informationP 5 : A Protocol for Scalable Anonymous Communications
P 5 : A Protocol for Scalable Anonymous Communications 1 P 5 : A Protocol for Scalable Anonymous Communications Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan University of Maryland, College Park
More informationSMART CITY Planning SMART Sustainable Cities 22 nd October, 2013 Robert Moyser. Buro Happold
SMART CITY Planning SMART Sustainable Cities 22 nd October, 2013 Robert Moyser Agenda Introduction to SMART City Definition SMART City Planning SMART City Market SMART City Technology Further Considerations
More informationInternet 3.0: The Next Generation Internet
Internet 3.0: The Next Generation Internet Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Boeing Brown Bag Seminar, January 22, 2009 These slides and Audio/Video recordings
More informationThe Future of the Internet
The Future of the Internet CERNET 10 th Anniversary 25 December 2004 Douglas Van Houweling, President & CEO Internet2 Congratulations! China has been an important contributor to the global high performance
More informationInternet of Things and M2M
Internet of Things and M2M Pedram Radmand, Ph.D. Wireless Sensor Network Research Newracom Inc Wireless Technology and IoT newracom.com Direct 949-390-7111 pedrad@gmail.com pedram.radmand@newracom.com
More informationMAIN MENU. Access to the main sections of the app 3 different parts : Views and sharing Health record sections Menu bar
(EN) MAIN MENU 1 1 2 3 Access to the main sections of the app 3 different parts : 1. 2. 3. Views and sharing Health record sections Menu bar MAIN MENU- Views and sharing 1 1 The section view displays sections
More informationSoftware Architecture for Secure ECUs. Rudolf Grave EB TechDay-June 2015
Software Architecture for Secure ECUs Rudolf Grave EB TechDay-June 2015 Agenda No safety without security and vice versa Established Safety Concepts Safety Analysis Methods for Security Analysis Secure
More informationPanel 1 Service Platform and Network Infrastructure for Ubiquitous Services
Panel 1 Platform and Network Infrastructure for Ubiquitous s Wolfgang Kellerer DoCoMo Euro-Labs Munich, Germany WWRF WG2 ( Architecture) Vice Chair DoCoMo Communications Landsberger Str. 312 80687 Munich
More informationWeb and Automotive W3C Workshop. Renault - DREAM Nov 2012 RENAULT PROPERTY
Web and Automotive W3C Workshop SUMMARY 01 Car 02 Technical 03 Web displays are special Challenges technologies and standards can help 2 01 Car displays are special 3 Cars are specifics A TV set is an
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants
More informationC2X Security. Introduction and overview (focus to European standard only) Cryptovision s Mindshare V
C2X Security Introduction and overview (focus to European standard only) Cryptovision s Mindshare 2015-06-24 V1.00 2015-06-24 Agenda What is Car2x Communication? Standards Security concepts C2X-PKI 2/30
More informationGIAN Course on Distributed Network Algorithms. Distributed Objects
GIAN Course on Distributed Network Algorithms Distributed Objects Stefan Schmid @ T-Labs, 2011 GIAN Course on Distributed Network Algorithms Distributed Objects How to access and manipulate data in an
More information2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results. October
2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results October 2013 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Carina Bustamente,
More informationWireless Network Security
Wireless Network Security Wireless LAN Security Slide from 2 nd book 1 802.11 Wireless LAN Security Stations in LAN are connected physically while in WLAN any station in the radio range is connected, so
More informationSmart Energy. Neil Pennington, Director of Smart Innovation
Smart Energy Neil Pennington, Director of Smart Innovation 1 Standard disclaimer I will not > Provide a party political broadcast on behalf of the npower party!! > Seek to score political points all Suppliers
More informationBluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002
Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),
More information716 West Ave Austin, TX USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud
More informationIntroduction. Distributed Systems IT332
Introduction Distributed Systems IT332 2 Outline Definition of A Distributed System Goals of Distributed Systems Types of Distributed Systems 3 Definition of A Distributed System A distributed systems
More informationBOSCH CASE STUDY. How Bosch Has Benefited from GENIVI Adoption
February 2016 BOSCH CASE STUDY How Bosch Has Benefited from GENIVI Adoption Overview The GENIVI Alliance was launched with a mission of driving the broad adoption of open source, In-Vehicle Infotainment
More informationCPSC 481/681 SPRING 2006 QUIZ #1 7 MAR 2006 NAME:
CPSC 481/681 SPRING 2006 QUIZ #1 7 MAR 2006 NAME: There are 6 questions on this quiz. Each question is individually weighted. If you do not understand the question, please ask for clarification. 1 I. (24
More informationThe Expanding Role of Bluetooth in Smart Buildings. Chuck Sabin Senior Director, Business Strategy
The Expanding Role of Bluetooth in Smart Buildings Chuck Sabin Senior Director, Business Strategy 1 use solution Bluetooth driving waves of innovation May 30, 2018 Bluetooth SIG Proprietary 2 use solution
More information2013 ISACA IT Risk/Reward Barometer India Consumer Results. October
ISACA IT Risk/Reward Barometer India Consumer Results October www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Rachel D souza, Ketchum Sampark,
More information2013 ISACA IT Risk/Reward Barometer US Consumer Results. October
2013 ISACA IT Risk/Reward Barometer US Consumer Results October 2013 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Aaron Berger, Ketchum,
More informationChallenges. Distribution. Discovery. Security. Usability. Governance. Unreliable messaging. Physical objects. Dealing with places.
Unreliable messaging Distribution Discovery Physical objects Asynchrony Dealing with places Delay tolerance Challenges Power source? Data services Security Identifying Integrity Autonomy Usability Provenance
More informationUNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)
UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) Koji NAKAO, NICT, Japan (Expert of UNECE WP29/TFCS) General Flow of works in WP29/TFCS and OTA Data protection
More informationDevelopment of an autonomous driving ECU platform for streamlining the development of autonomous driving vehicle applications
FOR IMMEDIATE RELEASE Development of an autonomous driving ECU platform for streamlining the development of autonomous driving vehicle applications Tokyo, October 17, 2016 ---Hitachi Automotive Systems,
More informationArchitectural Styles and Non- Functional Requirements
Architectural Styles and Non- Functional Requirements Jan Bosch. Design and Use of Software Architectures. Addison-Wesley, May 19, 2000. 5/18/2007 2007, Spencer Rugaber 1 Performance That attribute of
More informationICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification
ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification Hossen Asiful Mustafa Introduction Entity Authentication is a technique designed to let one party prove the identity of another
More informationEnd-to-End Connectivity Design with Automotive Ethernet & Service-Oriented Architecture
End-to-End Connectivity Design with Automotive Ethernet & -Oriented Architecture Wonseon Sim Hyundai Motor Group Seung Jun Lee AirPlug, Inc. Contents -Oriented Architecture Background Benefits End-to-End
More informationL13. Reviews. Rocky K. C. Chang, April 10, 2015
L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing
More information