Towards a Secure Internet of Things. Stanford University Philip Levis (representing many contributors)

Size: px
Start display at page:

Download "Towards a Secure Internet of Things. Stanford University Philip Levis (representing many contributors)"

Transcription

1 Towards a Secure Internet of Things University Philip Levis (representing many contributors) 1

2 The Internet of Things (IoT) 2

3 A Security Disaster A 2014 HP security analysis of IoT devices 1 found 80% had privacy concerns 80% had poor passwords 70% lacked encryption 60% had vulnerabilities in UI 60% had insecure updates 1 3

4 Securing the Internet of Things Secure Internet of Things Project 5 year project (just started second year) 12 faculty collaborators 3 universities:, Berkeley, and Michigan Rethink IoT systems, software, and applications from the ground up Make a secure IoT application as easy as a modern web application 4

5 Team Philip Levis Embedded Systems Mark Horowitz Hardware Christopher Ré Data Analytics Dan Boneh Cryptography Dawson Engler Software Keith Winstein Networks Peter Bailis Database Systems David Mazières Security Björn Hartmann Berkeley Prototyping Raluca Ada Popa Berkeley Security Prabal Dutta Berkeley/Michigan Embedded Hardware David Culler Berkeley Low Power Systems Steve Eglash Executive Director Philip Levis Faculty Director 5

6 This Talk Technology trends: why today? Security: why is it so hard? Research: what we re doing Architectural principles Tock: a secure embedded OS TLS-RaR: network auditing Tethys: a sample application 6

7 The EmNets Vision Information technology (IT) is on the verge of another revolution The use of EmNets [embedded networks] throughout society could well dwarf previous milestones. 1 The motes [EmNet nodes] preview a future pervaded by networks of wireless batterypowered sensors that monitor our environment, our machines, and even us. 2 1 National Research Council. Embedded, Everywhere, MIT Technology Review. 10 Technologies That Will Change the World, iii.2005 Interview Talk 2 7

8 Example Part: nrf51822 Cortex M0+ with integrated 2.4GHz transceiver Supports Bluetooth Low Energy Two models: 32kB/256kB or 16kB/128kB DigiKey cost for 25,000: $1.99 8

9 This Talk Technology trends: why today? Security: why is it so hard? Research: what we re doing Architectural principles Tock: a secure embedded OS TLS-RaR: network auditing Macrobase: sifting through data 9

10 Internet(s) of Things Industrial Automation Home Area Networks Personal Area Networks Networked Devices Thousands/person Controlled Environment High reliability Control networks Industrial requirements Hundreds/person Uncontrolled Environment Unlicensed spectrum Convenience Consumer requirements Tens/person Personal environment Unlicensed spectrum Instrumentation Fashion vs. function Tens/person Uncontrolled Environment Unlicensed spectrum Convenience Powered WirelessHART, tsch, RPL IEEE/IIC/IETF ZigBee, Z-Wave 6lowpan, RPL IETF/ZigBee/private Bluetooth, BLE 3G/LTE 3GPP/IEEE WiFi/ TCP/IP IEEE/IETF 10

11 IoT: MGC Architecture embedded devices 6lowpan, ZigBee, ZWave, Bluetooth, WiFi, WirelessHART Gateways Cloud 3G/4G, TCP/IP End application 11

12 IoT Security is Hard Complex, distributed systems differences in resources across tiers Many languages, OSes, and networks Specialized hardware Just developing applications is hard Securing them is even harder Enormous attack surface embedded C (ARM, avr, msp430) ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Ruby/Rails, Python/Django, J2EE, PHP, Node.js Obj-C/C++, Java, Swift, Javascript/HTML Secure Internet of Things 23 Reasoning across hardware, software, languages, devices, etc. What are the threats and attack models? Valuable data: personal, location, presence Rush to development + hard avoid, deal later 12

13 This Talk Technology trends: why today? Security: why is it so hard? Research: what we re doing Architectural principles Tock: a secure embedded OS TLS-RaR: network auditing Tethys: a sample application 13

14 Architectural Principles Longevity: these systems will last for up to 20 years and their security must too. Transparency: we must be able to observe what our devices are saying about us. End-to-end: consider security holistically, from data generation to end-user display. 14

15 Architectural Principles Longevity: these systems will last for up to 20 years and their security must too. Transparency: we must be able to observe what our devices are saying about us. End-to-end: consider security holistically, from data generation to end-user display. 15

16 16

17 Tock Operating System Safe, multi-tasking operating system for memoryconstrained devices Core kernel written in Rust, a safe systems language Small amount of trusted code (can do unsafe things) - Rust bindings for memory-mapped I/O - Core scheduler, context switches Core kernel can be extended with capsules Safe, written in Rust Run inside kernel Processes can be written in any language (asm, C) Leverage Cortex-M memory protection unit (MPU) User-level, traps to kernel with system calls 17

18 Tock: Secure Embedded OS grant grant Processes (Any language) heap stack data RAM heap stack data Process Accessible Memory text Flash text Kernel (Rust) SPI I2C UART Console GPIO Timer HAL Scheduler Config Capsules (Untrusted) Core kernel (Trusted) 18

19 Architectural Principles Longevity: these systems will last for up to 20 years and their security must too. Transparency: we must be able to observe what our devices are saying about us. End-to-end: consider security holistically, from data generation to end-user display. 19

20 Model Today Transport-layer security (TLS) between devices and cloud services Internet applications: we control one end point Can install new certificates, observe data IoT applications: we are a transit network Can t see or control what happens on either end 20

21 TLS-RaR: Rotate and Release (joint work with Keith Winstein and Dan Boneh) 21

22 Device to Cloud TLS Time Handshake AES-GCM Encrypted Session Begin TCP Connection Enter TLS Session 22

23 Device to Cloud TLS Time Handshake AES-GCM Handshake AES-GCM Begin TCP Connection Enter TLS Session TLS 1.2: Renegotiate or Resume TLS 1.3: KeyUpdate 23

24 Device to Cloud TLS With a Twist Time Handshake AES-GCM Rotate Keys Reconnect, Renegotiate, Resume or KeyUpdate AES-GCM Epoch 0 Epoch 1 24

25 Device to Cloud TLS With a Twist Time Handshake AES-GCM Rotate Keys Reconnect, Renegotiate, Resume or KeyUpdate AES-GCM Epoch 0 Epoch 1 Release Previous Epoch (0) Key 25

26 Nice Properties Can audit IoT data streams Audit box's decryption yields the same stream of data as endpoints' SSL_read() calls, but delayed Audit matches what was received Format of TLS on the wire is not changed Easy to reason about security of the protocol, easy to adopt For some existing servers no change is necessary Really easy to adopt Minimal change to OpenSSL on the device Easy to reason about security of the implementation Easy to adopt 26

27 Architectural Principles Longevity: these systems will last for up to 20 years and their security must too. Transparency: we must be able to observe what our devices are saying about us. End-to-end: consider security holistically, from data generation to end-user display. 27

28 28

29 Water Use (joint work with Noah Diffenbaugh and Mark Horowitz) 29

30 Network Architecture (joint work with Noah Diffenbaugh and Mark Horowitz) ios gateway cloud embedded BLE/GATT Android gateway HTTP/REST 30 Energy harvester

31 Security/Privacy Shower data has privacy implications Streaming data: shower 5 is being used right now! Data overall has IRB/privacy implications Gateways are untrusted Owned by students, other participants May download data, never forward to cloud Network encrypts all data end-to-end between sensors and cloud Gateways cannot see data Sensors do not clean log until receiving end-to-end acknowledgement from cloud Cloud issues block acknowledgements to gateways 31

32 This Talk Technology trends: why today? Security: why is it so hard? Research: what we re doing Architectural principles Tock: a secure embedded OS TLS-RaR: network auditing Tethys: a sample application 32

33 Why Now? Technology has just reached the tipping point BLE, ibeacon Cortex M series Sensors, harvesting circuits We've been waiting Leaders in prototyping, cryptographic computation, IoT networking, secure systems, analytics, and hardware design But it's still early enough Most big applications haven't been thought of yet Let's not repeat the web (as good as it is for publications) Very interested in collaborating with industry, to help find and solve hard research problems 33

34 Securing the Internet of Things Secure Internet of Things Project 5 year project (just started second year) 12 faculty collaborators 3 universities:, Berkeley, and Michigan Rethink IoT systems, software, and applications from the ground up Make a secure IoT application as easy as a modern web application 34

35 Thank you! Philip Levis Embedded Systems Mark Horowitz Hardware Christopher Ré Data Analytics Dan Boneh Cryptography Dawson Engler Software Keith Winstein Networks Peter Bailis Database Systems David Mazières Security Björn Hartmann Berkeley Prototyping Raluca Ada Popa Berkeley Security Prabal Dutta Berkeley/Michigan Embedded Hardware David Culler Berkeley Low Power Systems Steve Eglash Executive Director Philip Levis Faculty Director 35

Towards a Secure Internet of Things

Towards a Secure Internet of Things Towards a Secure Internet of Things Philip Levis Stanford University Keynote Talk IEEE International Conference on Pervasive Computing and Communication March 20, 2018 1 The Internet of Things (IoT) 2

More information

Safely and Efficiently Programming a 64kB Computer

Safely and Efficiently Programming a 64kB Computer Safely and Efficiently Programming a 64kB Computer Amit Levy a, Branden Ghena b, Bradford Campbell b, Pat Pannuto b, Prabal Dutta b, Philip Levis a MSR UW Summer Institute August 2, 2017 a University b

More information

Secure Internet of Things Project Overview. Philip Levis, Faculty Director SITP 2018 Retreat Santa Cruz, CA

Secure Internet of Things Project Overview. Philip Levis, Faculty Director SITP 2018 Retreat Santa Cruz, CA Secure Internet of Things Project Overview Philip Levis, Faculty Director SITP 2018 Retreat Santa Cruz, CA Four Years Ago + = Security Disaster HP conducted a security analysis of IoT devices 1 80% had

More information

Auditing IoT Communications with TLS-RaR

Auditing IoT Communications with TLS-RaR Auditing IoT Communications with TLS-RaR Judson Wilson, Henry Corrigan-Gibbs, Riad S. Wahby, Keith Winstein, Philip Levis, Dan Boneh Stanford University Auditing Standard Devices MITM Used for: security

More information

Building a Secure Embedded Kernel in Rust

Building a Secure Embedded Kernel in Rust Building a Secure Embedded Kernel in Rust Amit Levy a, Branden Ghena b, Bradford Campbell b, Pat Pannuto b, Nicholas Matsakis c, Prabal Dutta b, Philip Levis a Platform Lab May 8, 2017 a Stanford University

More information

Beetle: Operating System Support for the Internet of Things

Beetle: Operating System Support for the Internet of Things Beetle: Operating System Support for the Internet of Things Amit Levy, James Hong, Laurynas Riliskis, Philip Levis, David Mazières, and Keith Winstein The Internet of Things Ideal Future The Internet of

More information

Safely and Efficiently Multiprogramming a 64kB Computer

Safely and Efficiently Multiprogramming a 64kB Computer Safely and Efficiently Multiprogramming a 64kB Computer Amit Levy Daniel Giffin Bradford Campbell Branden Ghena Pat Pannuto Prabal Dutta Philip Levis Niklas Adolfsson Fredrik Nilsson Josh Adkins Neal Jackson

More information

WiFröst IoT Debugging IDE

WiFröst IoT Debugging IDE WiFröst IoT Debugging IDE Instruments device code, network calls, and a local router to capture network communications and program activity Provides a time-linked data visualization and automatic checks

More information

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017 mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud

More information

ARM mbed mbed OS mbed Cloud

ARM mbed mbed OS mbed Cloud ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics

More information

BLE to Wi-Fi Gateway

BLE to Wi-Fi Gateway BLE to Wi-Fi Gateway Connect Bluetooth Smart devices to the cloud Low power and small form factor MQTT Protocol Support HTTP Configuration Over the air upgrade Integrating the BLE node to cloud with WiFi

More information

Resilient IoT Security: The end of flat security models

Resilient IoT Security: The end of flat security models Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security

More information

THE NEED FOR SMART SENSORS IN IOT. Internet. Uwe Hirsch Senior Business Development Manager

THE NEED FOR SMART SENSORS IN IOT. Internet. Uwe Hirsch Senior Business Development Manager THE NEED FOR SMART SENSORS IN IOT Internet Uwe Hirsch Senior Business Development Manager Uwe.Hirsch@Avnet-Memec.eu IOT APPLICATIONS ENABLED BY DIFFERENT SENSORS Traffic Management Up to 40% of traffic

More information

BUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS

BUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS BUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS PHILIP POULIDIS VIDEO TRANSCRIPT What is your name and what do you do? My name is Philip Poulidis and I m the VP and General Manager of Mobile and Internet

More information

The Internet of Things. Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group

The Internet of Things. Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group 1 The Internet of Things Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group Important! ٧ DREAM seminar 8 April 2014, UC Berkeley Low-Power Wireless Mesh Networks

More information

Descriptions for CIS Classes (Fall 2017)

Descriptions for CIS Classes (Fall 2017) Descriptions for CIS Classes (Fall 2017) Major Core Courses 1. CIS 1015. INTRODUCTION TO COMPUTER INFORMATION SYSTEMS. (3-3-0). This course provides students an introductory overview to basic computer

More information

Building mbed Together: An Overview of mbed OS and How To Get Involved

Building mbed Together: An Overview of mbed OS and How To Get Involved Building mbed Together: An Overview of mbed OS and How To Get Involved Hugo Vincent / Product Lead mbed OS, Paul Bakker / Product Strategy, mbed IoT Device Platform mbed Sponsored Session/ ARM Tech Con

More information

Integrating Custom Hardware into Sensor Web. Maria Porcius Carolina Fortuna Gorazd Kandus Mihael Mohorcic

Integrating Custom Hardware into Sensor Web. Maria Porcius Carolina Fortuna Gorazd Kandus Mihael Mohorcic Integrating Custom Hardware into Sensor Web Maria Porcius Carolina Fortuna Gorazd Kandus Mihael Mohorcic OUTLINE 1. Introduction 2. State of the art 3. System architecture - main components 3.1 Hardware

More information

WG5 IoT security, privacy, policy

WG5 IoT security, privacy, policy WG5 IoT security, privacy, policy L Jean Camp Ivan Evtimov Earlence Fernandes Tadayoshi Kohno Philip Levis

More information

PERFORMANCE ANALYSIS USING NXP S I.MX RT1050 CROSSOVER PROCESSOR AND THE ZEPHYR OS

PERFORMANCE ANALYSIS USING NXP S I.MX RT1050 CROSSOVER PROCESSOR AND THE ZEPHYR OS PERFORMANCE ANALYSIS USING NXP S I.MX RT1050 CROSSOVER PROCESSOR AND THE ZEPHYR OS MAUREEN HELM LEOTESCU FLORIN MARIUS CRISTIAN VLAD BENCHMARKING TEAM AGENDA Zephyr Project introduction Analysis scope

More information

Beetle: Many-to-many communication in Bluetooth LE. Amit Levy, Laurynas Riliskis, Philip Levis, David Mazières, and Keith Winstein

Beetle: Many-to-many communication in Bluetooth LE. Amit Levy, Laurynas Riliskis, Philip Levis, David Mazières, and Keith Winstein Beetle: Many-to-many communication in Bluetooth LE Amit Levy, Laurynas Riliskis, Philip Levis, David Mazières, and Keith Winstein The ideal Internet of Things The Internet of Things today It's Not An

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

Internet-of-Things Conference. Andrew Bickley Technology Marketing Director

Internet-of-Things Conference. Andrew Bickley Technology Marketing Director Internet-of-Things Conference Andrew Bickley Technology Marketing Director Presentation today The IoT node market Technology and architecture challenges Node architectures Internet of Things Wireless Up

More information

Building secure devices on the intelligent edge with Azure Sphere. Paul Foster, Microsoft Dr Hassan Harb, E.On

Building secure devices on the intelligent edge with Azure Sphere. Paul Foster, Microsoft Dr Hassan Harb, E.On Building secure devices on the intelligent edge with Azure Sphere Paul Foster, Microsoft Dr Hassan Harb, E.On Microcontrollers (MCUs) low-cost, single chip computers 9 BILLION new MCU devices built and

More information

Alternative Designs and Decision Making for Top Design Selection

Alternative Designs and Decision Making for Top Design Selection Alternative Designs and Decision Making for Top Design Selection 1 Step 1. Generation of Alternatives (>2 Conceptual Designs) Multiple Alternative conceptual designs Optimal Solution (by balanced capability,

More information

High-Performance, Highly Secure Networking for Industrial and IoT Applications

High-Performance, Highly Secure Networking for Industrial and IoT Applications High-Performance, Highly Secure Networking for Industrial and IoT Applications Table of Contents 2 Introduction 2 Communication Accelerators 3 Enterprise Network Lineage Features 5 Example applications

More information

HOW TO INTEGRATE NFC FRONTENDS IN LINUX

HOW TO INTEGRATE NFC FRONTENDS IN LINUX HOW TO INTEGRATE NFC FRONTENDS IN LINUX JORDI JOFRE NFC READERS NFC EVERYWHERE 14/09/2017 WEBINAR SERIES: NFC SOFTWARE INTEGRATION PUBLIC Agenda NFC software integration webinar series Session I, 14th

More information

Wireless-Tag WT51822-S1

Wireless-Tag WT51822-S1 Wireless-Tag WT51822-S1 Bluetooth Low Energy 4.1 Module DATASHEET Description Bluetooth Low Energy (BLE) module of WT51822-S1 is the next generation BLE4.1(Compatible With BLE4.0) module released by Wireless-Tag

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work on the part

More information

Bark: Default-Off Networking and Access Control for the IoT. James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University

Bark: Default-Off Networking and Access Control for the IoT. James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University Bark: Default-Off Networking and Access Control for the IoT James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University The IoT is everywhere So are the attacks... 1. Devices easily compromised

More information

Firmware Updates for Internet of Things Devices

Firmware Updates for Internet of Things Devices Firmware Updates for Internet of Things Devices Brendan Moran, Milosch Meriac, Hannes Tschofenig Drafts: draft-moran-suit-architecture draft-moran-suit-manifest 1 WHY DO WE CARE? 2 IoT needs a firmware

More information

ARM mbed Technical Overview

ARM mbed Technical Overview ARM mbed Technical Overview Jerry Wang, FAE, ISG ARM Tech Forum Taipei July 4 th 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application

More information

Arm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited

Arm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited Arm Mbed Edge Shiv Ramamurthi Arm Arm Tech Symposia 2017 IoT increasing efficiency, yield, and convenience Commercial buildings Better energy & space utilization Precision farming and connected sites Increased

More information

Security and the Internet of Things

Security and the Internet of Things Security and the Internet of Things Prashant Krishnamurthy Department of Informatics and Networked Systems School of Computing and Information University of Pittsburgh 1 About Faculty member in the School

More information

Securing IoT with the ARM mbed ecosystem

Securing IoT with the ARM mbed ecosystem Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

Amit Levy SITP Retreat, June 22, Tock: A Secure Operating System for Microcontrollers

Amit Levy SITP Retreat, June 22, Tock: A Secure Operating System for Microcontrollers Amit Levy SITP Retreat, June 22, 2018 Tock: A Secure Operating System for Microcontrollers Limitations of Microcontroller Sofware Low memory: ~64 kb RAM No virtual memory Can t use Linux! No isolation

More information

CONNECTING SERVICES IN IOT DESIGN

CONNECTING SERVICES IN IOT DESIGN CONNECTING SERVICES IN IOT DESIGN RELOC s.r.l. Conference Lake Garda, 7-8 April 2016 Internet-of-Things Evolution of the Internet in which everyday physical objects are seamlessly integrated into the information

More information

BLE MODULE SPECIFICATIONS

BLE MODULE SPECIFICATIONS WIRELESS-TAG BLE MODULE SPECIFICATIONS nrf51-01/02/dk Bluetooth Low Energy (BLE) module of nrf51-01/02 is the next generation BLE module released by SEMITRION electronics. The modules use nrf51822 from

More information

WAVE: A Decentralized Authorization Framework with Transitive Delegation

WAVE: A Decentralized Authorization Framework with Transitive Delegation WAVE: A Decentralized Authorization Framework with Transitive Delegation Michael P Andersen, Sam Kumar, H y u n g-sin Kim, John Kolb, Kaifei C h e n, Moustafa AbdelBaky, Gabe Fierro, David E. Culler, R

More information

The challenge with IoT

The challenge with IoT 1 Agenda The challenge with IoT Sensor to Cloud solution Sensor to Cloud system details SimpleLink Sub-1GHz hardware & software solution Getting started 2 The challenge with IoT We are trying to connect

More information

Resilient IoT Security: The end of flat security models. Milosch Meriac IoT Security Engineer

Resilient IoT Security: The end of flat security models. Milosch Meriac IoT Security Engineer Resilient IoT Security: The end of flat security models Milosch Meriac IoT Security Engineer milosch.meriac@arm.com Securing a computer system has traditionally been a battle of wits: the penetrator tries

More information

Medical Device Safety in a Connected World

Medical Device Safety in a Connected World Mr. Clark Fortney Senior Software Engineer Medical Device Safety in a Connected World IoT Expo June 6-8 2017 1 Clark Fortney My Background 20 years designing systems & software for medical devices at Battelle.

More information

Azure Sphere Transformation. Patrick Ward, Principal Solutions Specialist

Azure Sphere Transformation. Patrick Ward, Principal Solutions Specialist Azure Sphere Transformation Patrick Ward, Principal Solutions Specialist IoT @_pdubya pward@microsoft.com Microcontrollers (MCUs) LOW-COST, SINGLE CHIP COMPUTERS TMS1100: 300 KHz core, 2KB ROM, 64B RAM,

More information

SafeBricks: Shielding Network Functions in the Cloud

SafeBricks: Shielding Network Functions in the Cloud SafeBricks: Shielding Network Functions in the Cloud Rishabh Poddar, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy UC Berkeley Network Functions (NFs) in the cloud Clients 2 Enterprise Destination Network

More information

Experiences from a Decade Development

Experiences from a Decade Development Experiences from a Decade of Development Philip Levis Stanford University @OSDI 2012 1 2 Back to 1999... Information technology (IT) is on the verge of another revolution The use of EmNets [embedded networks]

More information

The IoT and Thread in PHYTEC Nodes. Jonas Remmert July 15th, 2016

The IoT and Thread in PHYTEC Nodes. Jonas Remmert July 15th, 2016 The IoT and Thread in PHYTEC Nodes Jonas Remmert July 15th, 2016 Company Introduction PHYTEC Hardware Manufacturer headquartered in Mainz, Germany more than 200 employees worldwide Hardware Single Board

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Practical real-time operating system security for the masses

Practical real-time operating system security for the masses Practical real-time operating system security for the masses Milosch Meriac Principal Security Engineer github.com/armmbed/uvisor ARM TechCon 25 th October 2016 Why is microcontroller security so hard?

More information

UNCLASSIFIED//FOR OFFICIAL USE ONLY INDUSTRIAL CONTROL SYSTEMS CYBER EMERGENCY RESPONSE TEAM

UNCLASSIFIED//FOR OFFICIAL USE ONLY INDUSTRIAL CONTROL SYSTEMS CYBER EMERGENCY RESPONSE TEAM ADVISORY ICSA-10-019-01 ZIGBEE PSEUDORANDOM NUMBER GENERATOR VULNERABILITY January 19, 2010 OVERVIEW On January 09, 2010, a security researcher published an attack on a ChipCon (CC) implementation of ZigBee

More information

ARM mbed Reference Designs

ARM mbed Reference Designs ARM mbed Reference Designs Steve Ogborne Senior Engineer Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 Contents Intro Smart City Sub-GHz Reference Design Wi-Fi Reference

More information

Provisioning secure Identity for Microcontroller based IoT Devices

Provisioning secure Identity for Microcontroller based IoT Devices Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May

More information

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Industrial IoT Trends: WSN, LPWAN & Cloud Platforms

Industrial IoT Trends: WSN, LPWAN & Cloud Platforms Industrial IoT Trends: WSN, LPWAN & Cloud Platforms Wireless sensor networks (WSN), low power wide area networks (LPWAN) and cloud-based platforms are driving growth for the industrial Internet of Things

More information

A Developer's Guide to Security on Cortex-M based MCUs

A Developer's Guide to Security on Cortex-M based MCUs A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone

More information

TI SimpleLink dual-band CC1350 wireless MCU

TI SimpleLink dual-band CC1350 wireless MCU TI SimpleLink dual-band CC1350 wireless MCU Sub-1 GHz and Bluetooth low energy in a single-chip Presenter Low-Power Connectivity Solutions 1 SimpleLink ultra-low power platform CC2640: Bluetooth low energy

More information

Clouds and Things. Implications of the Cloud and Internet-of-Things for SCADA/ICS. April 25, 2018

Clouds and Things. Implications of the Cloud and Internet-of-Things for SCADA/ICS. April 25, 2018 Clouds and Things Implications of the Cloud and Internet-of-Things for SCADA/ICS April 25, 2018 Agenda for this presentation Overview of the Cloud, Fog & Internet-of-Things IoT device capabilities IoT

More information

Towards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things

Towards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things Towards Trustworthy Internet of Things for Mission-Critical Applications Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things Internet of Things is a game changer Organizations are benefiting from

More information

Build the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM

Build the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM Build the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM Agenda Linaro Linaro s IoT efforts Demo Business Models Design and sell x86 chips 2016 $59.5Bn Revenue Sells

More information

HOW TO INTEGRATE NFC CONTROLLERS IN LINUX

HOW TO INTEGRATE NFC CONTROLLERS IN LINUX HOW TO INTEGRATE NFC CONTROLLERS IN LINUX JORDI JOFRE NFC READERS NFC EVERYWHERE 28/09/2017 WEBINAR SERIES: NFC SOFTWARE INTEGRATION PUBLIC Agenda NFC software integration webinar series Session I, 14th

More information

ETSI M2M workshop Nov 2013

ETSI M2M workshop Nov 2013 Promoting the use of IP in networks of Smart Objects ETSI M2M workshop Nov 2013 Patrick Wetterwald IPSO President pwetterw@cisco.com IPSO Alliance use only @2013 Enabling the Internet of Things The IPSO

More information

Omar Alrawi. Security Evaluation of Home-based IoT Deployments

Omar Alrawi. Security Evaluation of Home-based IoT Deployments Omar Alrawi Security Evaluation of Home-based IoT Deployments About Us Astrolavos Research Lab at Georgia Tech We specialize in Network Security Measurements Work is presented on behalf of my team Omar

More information

ARM TrustZone for ARMv8-M for software engineers

ARM TrustZone for ARMv8-M for software engineers ARM TrustZone for ARMv8-M for software engineers Ashok Bhat Product Manager, HPC and Server tools ARM Tech Symposia India December 7th 2016 The need for security Communication protection Cryptography,

More information

Jonas Green, Björn Otterdahl HMS Industrial Networks AB. February 22, 2017

Jonas Green, Björn Otterdahl HMS Industrial Networks AB. February 22, 2017 Resource-constrained Industrial Things Proposal for the Adaptation of CoAP to EtherNet/IP Jonas Green, Björn Otterdahl HMS Industrial Networks AB February 22, 2017 Connect all devices in a factory to EtherNet/IP

More information

An Incubator Project in the Apache Software Foundation. 13 July 2016

An Incubator Project in the Apache Software Foundation.  13 July 2016 An Incubator Project in the Apache Software Foundation http://mynewt.apache.org/ 13 July 2016 Apache Mynewt Open Source OS for Constrained IoT MCU / Hardware independent ARM Cortex-M*, AVR, MIPS, more...

More information

The case for ubiquitous transport-level encryption

The case for ubiquitous transport-level encryption 1/25 The case for ubiquitous transport-level encryption Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, and Dan Boneh Stanford and UCL November 18, 2010 Goals 2/25 What would it take to encrypt

More information

Operating Systems Design Exam 3 Review: Spring 2011

Operating Systems Design Exam 3 Review: Spring 2011 Operating Systems Design Exam 3 Review: Spring 2011 Paul Krzyzanowski pxk@cs.rutgers.edu 1 1. Why does an IP driver need to use ARP, the address resolution protocol? IP is a logical network. An IP address

More information

Transform your data estate with cloud, data and AI

Transform your data estate with cloud, data and AI Transform your data estate with cloud, data and AI The world is changing Data will grow to 44 ZB in 2020 Today, 80% of organizations adopt cloud-first strategies AI investment increased by 300% in 2017

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

Wireless Home Control System

Wireless Home Control System WHCS UCF 1 Wireless Home Control System Project members Jimmy Campbell Computer Engineer Grant Hernandez Computer Engineer Joseph Love Electrical Engineer For Senior Design I at the University of Central

More information

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Exam : Title : Security Solutions for Systems Engineers. Version : Demo Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized

More information

Weak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann

Weak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann Weak Spots Enterprise Mobility Management Dr. Johannes Hoffmann Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dr. Johannes Hoffmann IT Security Business Security & Privacy Main focus: Mobile

More information

TRAINING CURRICULUM 2017 Q2

TRAINING CURRICULUM 2017 Q2 TRAINING CURRICULUM 2017 Q2 Index 3 Why Security Compass? 4 Discover Role Based Training 6 SSP Suites 7 CSSLP Training 8 Course Catalogue 14 What Can We Do For You? Why Security Compass? Role-Based Training

More information

Embedded WiFi Module for M2M and IOT

Embedded WiFi Module for M2M and IOT INGICS TECHNOLOGY SPECIFICATION Ver. 1C iwm021 Feb, 2015 Embedded WiFi Module for M2M and IOT size 20mmX15mm INGICS TECHNOLOGY CO., LTD. SUPPORT@INGICS.COM WWW.INGICS.COM 1 Contents Contents Introduction

More information

The Internet of Things and Security

The Internet of Things and Security INTERNAL USE ONLY The Internet of Things and Security Chuck DePalma CISSP CISM Network and Cloud Security Architect The Internet of Things 1998 Adoption of Mosaic Browsers 0ver 250 Millions of Internet

More information

Creating the Complete Trusted Computing Ecosystem:

Creating the Complete Trusted Computing Ecosystem: FEBRUARY 2018 Creating the Complete Trusted Computing Ecosystem: An Overview of the Trusted Software Stack (TSS) 2.0 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97003 Tel (503) 619-0562 Fax

More information

3 Software Stacks for IoT Solutions. Ian Skerrett Eclipse

3 Software Stacks for IoT Solutions. Ian Skerrett Eclipse 3 Software Stacks for IoT Solutions Ian Skerrett Eclipse Foundation @ianskerrett Copyright 2016 The Eclipse Foundation. All Rights Reserved Eclipse Foundation Not-for-profit open source foundation responsible

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 24 April 16, 2012 CPSC 467b, Lecture 24 1/33 Kerberos Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management

More information

Hello [again] from the mbed Team!

Hello [again] from the mbed Team! 1 Hello, Japan! n Hello [again] from the mbed Team! Simon Chris Dan Mihail Steve Sam Bogdan David Watarai-san And since then 2 Since the last time we welcomed Przemek Jonny Damien Martin Rohit Phew!!!

More information

M2MD Communications Gateway: fast, secure, efficient

M2MD Communications Gateway: fast, secure, efficient Solution Brief M2MD Communications Gateway: fast, secure, efficient G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity.

More information

NETWORKING 3.0. Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING. Remarkably Simple

NETWORKING 3.0. Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING. Remarkably Simple NETWORKING 3.0 Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING Highly Available Remarkably Simple Radically Secure IP complexity is holding your business back As

More information

Neopost Security Datasheet DS-40i/64i/75i/85i/90i/95i Your security, our commitment!

Neopost Security Datasheet DS-40i/64i/75i/85i/90i/95i Your security, our commitment! Neopost Security Datasheet /64i/75i/85i/90i/95i Your security, our commitment! [- 1 -] Preface In a world where security and information integrity are playing a key role in businesses, it is important

More information

TLS 1.1 Security fixes and TLS extensions RFC4346

TLS 1.1 Security fixes and TLS extensions RFC4346 F5 Networks, Inc 2 SSL1 and SSL2 Created by Netscape and contained significant flaws SSL3 Created by Netscape to address SSL2 flaws TLS 1.0 Standardized SSL3 with almost no changes RFC2246 TLS 1.1 Security

More information

Avnu Alliance Introduction

Avnu Alliance Introduction Avnu Alliance Introduction Announcing a Liaison between Edge Computing Consortium and Avnu Alliance + What is Avnu Alliance? Creating a certified ecosystem to bring precise timing, reliability and compatibility

More information

Progressively Securing RIOT-OS!

Progressively Securing RIOT-OS! + Progressively Securing RIOT-OS! USABILITY AND NECESSITY OF SSL / TLS Slide 1 / 33 We re going to talk about: 1. Why is security important? 2. What is SSL? 3. Where is SSL being used? 4. Features: What

More information

Embedded Systems: EmNets

Embedded Systems: EmNets Embedded Systems: EmNets April 15, 2003 Class Meeting 25 Announcement CORRECTION: Reading for today should have been Chapters 1 and 2 of Embedded Everywhere!! Reading for Thursday should have been Chapter

More information

Bidirectional wireless communication between IBM Cloud and Bluetooth Low Energy peripherals through SimpleLink Wi-Fi

Bidirectional wireless communication between IBM Cloud and Bluetooth Low Energy peripherals through SimpleLink Wi-Fi Bidirectional wireless communication between IBM Cloud and Bluetooth Low Energy peripherals through SimpleLink Wi-Fi 30.7B connected devices by 2020, 75.4B by 2025 Top IoT concerns Security Complex standards

More information

IOT-GATE-iMX7 Datasheet

IOT-GATE-iMX7 Datasheet IOT-GATE-iMX7 Datasheet Industrial Internet of Things Gateway Product Specification v.1.3 Capable, compact, affordable: i.mx7 Dual IoT-Gate has been designed to answer demanding IoT application requirements

More information

Wearable Technologies

Wearable Technologies Wearable Technologies Introduction and Hardware Architecture WebValley 2015 Bojan Milosevic About Me Bojan Milosevic Researcher @ E3DA - FBK, Trento Collaborator @ Micrel Lab, DEI - University of Bologna

More information

#RSAC #RSAC Thing Thing Thing Thing Thing Thing Edge Edge Gateway Gateway Cut costs Create value Find information in data then act Maintain Things Enrol Authorized Users & Things Authentication

More information

Connect Your IoT Device: Bluetooth 5, , NB-IoT

Connect Your IoT Device: Bluetooth 5, , NB-IoT Connect Your IoT Device: Bluetooth 5, 802.15.4, NB-IoT Craig Tou Business Development Manager, Arm Arm Tech Symposia 2017, Taipei IoT Devices - Everything Connects New classes of connectivity for a new

More information

System Requirements. Network Administrator Guide

System Requirements. Network Administrator Guide System Requirements Network Administrator Guide 1 Beam Network Administrator Guide Suitable Technologies, Inc. May 2018 Beam is a comprehensive Presence System that couples high-end video, high-end audio,

More information

WP 4 T4.1 Demonstrator (1st Generation): The Safe Home

WP 4 T4.1 Demonstrator (1st Generation): The Safe Home 1 WP 4 T4.1 Demonstrator (1st Generation): The Safe Home SINTEF / Lyse / NorDan SINTEF / Lyse / NorDan 2 Why Arrowhead? To become more agile and to reuse what others have done and learn from experiences

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 24a December 2, 2013 CPSC 467, Lecture 24a 1/20 Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management and Trusted

More information

IoT Based Disaster Detection and Early Warning Device

IoT Based Disaster Detection and Early Warning Device IoT Based Disaster Detection and Early Warning Device Amjath Ali J 1, B. Thangalakshmi 2, A. Vincy Beaulah 3 1 Lecturer, Department of Electrical and Electronics Engg., Ibra college of Technology, Oman

More information

Privacy, Discovery, and Authentication for the Internet of Things

Privacy, Discovery, and Authentication for the Internet of Things Privacy, Discovery, and Authentication for the Internet of Things David J. Wu Ankur Taly Asim Shankar Dan Boneh Stanford University Google Google Stanford University The Internet of Things (IoT) Lots of

More information

Enabling IOT. IQRF Alliance Conference May Harald Weidinger Key Client Manager

Enabling IOT. IQRF Alliance Conference May Harald Weidinger Key Client Manager Enabling IOT IQRF Alliance Conference May 2016 Harald Weidinger Key Client Manager IQRF Alliance Conference, May 2016 2 Vision, Mission & Goals Vision : Make Microchip a leading provider of IoT ecosystems,

More information

Cisco Desktop Collaboration Experience DX650 Security Overview

Cisco Desktop Collaboration Experience DX650 Security Overview White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)

More information

PBLN52832 DataSheet V Copyright c 2017 Prochild.

PBLN52832 DataSheet V Copyright c 2017 Prochild. PBLN52832 DataSheet V1.2.3 Copyright c 2017 Prochild. No part of this publication and modification may be reproduced without the prior written permission of the author. Revision History No Version Date

More information