Enabling Autonomous Communications between Machines, Humans ...

0 downloads 106 Views 3MB Size Report
Jun 12, 2015 - [email protected]. Enabling Autonomous Communications ... Wireless Sensor. Networks. Communication ...
Enabling Autonomous Communications  between Machines, Humans, and Things Jesús Alonso-Zárate, PhD Head of M2M Department Senior Researcher [email protected]

Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems IEEE ICC, 2015, London, UK, 12th June 2015. http://conta.uom.gr/IoTCPSsecurity2015/

201506

CPS and the IoT

A cyber-physical system (CPS) is a system of collaborating computational elements controlling physical entities. Today, a precursor generation of cyber-physical systems can be found in areas as diverse as aerospace, automotive, chemical processes, civil infrastructure, energy, healthcare, manufacturing, transportation, entertainment, and consumer appliances. Source: wikipedia

J. Alonso-Zarate, June 2015

2

Just a vision… Communication Networks

Wireless Sensor Networks Batteries Devices

Sensors & Actuators Cyber-Physical Systems The Internet of Things

J. Alonso-Zarate, June 2015

3

What is the Internet of Things?

J. Alonso-Zarate, June 2015

4

Source: IoT World Forum 2014, Wim Elfrink, Cisco’s Executive Vice President Keynote J. Alonso-Zarate, June 2015

5

Source: IoT World Forum 2014, Wim Elfrink, Cisco’s Executive Vice President Keynote

J. Alonso-Zarate, June 2015

6

Source: IoT World Forum 2014, Wim Elfrink, Cisco’s Executive Vice President Keynote J. Alonso-Zarate, June 2015

7

Source: IoT World Forum 2014, Wim Elfrink, Cisco’s Executive Vice President Keynote J. Alonso-Zarate, June 2015

8

Source: IoT World Forum 2014, Wim Elfrink, Cisco’s Executive Vice President Keynote J. Alonso-Zarate, June 2015

9

Source: IoT World Forum 2014, Wim Elfrink, Cisco’s Executive Vice President Keynote J. Alonso-Zarate, June 2015

10

Source: IoT World Forum 2014, Wim Elfrink, Cisco’s Executive Vice President Keynote J. Alonso-Zarate, June 2015

11

The Third Industrial Revolution 1st: 1800s Industrial Revolution 2nd: 1990 The World Wide Web (www)  1 billion connected devices 3rd: 2000 Mobile Internet  From 2 to 6 billion devices 4th: 2020 The Internet of Things (Everything)  2013: 10 billion  October 2014 (IoT World Forum): 13,7 billion  Predictions: 28-50 billion devices

J. Alonso-Zarate, June 2015

12

Why now?  Progress in technology makes it possible  Miniaturization  Low Cost

 Saturation of human-based markets  Opportunity to connect lots of devices  Huge Market Opportunity (despite low ARPU)

 Potential  Improve existing and create new business  Enhance processes (efficiency)  Create new jobs  Boost well-being

J. Alonso-Zarate, June 2015

13

From industry to individuals

http://www.gereports.com/new_industrial_internet_service_ technologies_from_ge_could_eliminate_150_billion_in_waste/

J. Alonso-Zarate, June 2015

14

Key IoT Verticals BANKING

PUBLIC SAFETY WEARABLES CONNECTED HOMES

FUTURE DRIVING (V2X) SMART CITIES TRANSPORTATION LOGISTICS RETAIL & VENDING

SMART GRID

INDUSTRY

HEALTH CARE

J. Alonso-Zarate, June 2015

15

IoT Platforms Machine-to-Machine

Sensor Streams (Real Time)

BIG DATA Analytics

Improve Efficiency

Human-to-Machine

Crowdsourcing

W

Offer New Services

KNW Information-to-Machine

Internet (Open Data)

J. Alonso-Zarate, June 2015

INFO

Applications

DATA

16

Technical Challenges ahead

Device Domain

Network Domain M2M Communications Applications Domain

J. Alonso-Zarate, June 2015

17

Key challenges ahead • Lack of experience in M2M systems • Implementation costs / risks • Maintenance of M2M Solutions • Lack of standards and common legal framework • Interoperability between different technologies • Need to educate customers • Security and Privacy risks • CIA: Confidentiality, Integrity, Availability

J. Alonso-Zarate, June 2015

18

Security and Privacy Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share common themes. The domain of privacy partially overlaps security, which can include the concepts of appropriate use, as well as protection of information. Source: wikipedia

J. Alonso-Zarate, June 2015

19

What is new in IoT? • Longevity of devices (hard to update firmware) • Size of devices (limited resources) • Lack of human supervision (no inputs for authentication) • Typically highly personal data or critical data • The mindset • IoT manufacturers do not think too much about security • Embedded devices use existing chips with no security

Source: “Securing the Internet of Things”, Paul Fremantle, March 2014.

J. Alonso-Zarate, June 2015

20

Making things simple Big Data 44 ZB by 2020 44,000,000,000,000 GB Heterogeneous wireless techs

M2M  Platform

Device Device Device

Gateway

Device 50 billions by 2020

J. Alonso-Zarate, June 2015

Virtualized Core Network

Device

Apps

21

Many holes… Access Hole

1010101010…. Data Holes

M2M  Platform

Device

Platform Hole

Device Device

Gateway

Device Device Hole

Network Hole

Device

Apps

User Hole J. Alonso-Zarate, June 2015

22

Some examples of vulnerabilities •

Physical manipulation of devices



Various simultaneous connections (some not secure)



Information leakage



Poor password security



Outdated firmware or OS



Clear-text API calls



Unencrypted stored data



Hardcoded credentials to accelerate access



Lack of authentication

J. Alonso-Zarate, June 2015

23

Things are getting personalized • 40% of all generated data is private • Google • Facebook, Twitter, Linkedin, Instagram, … • Youtube, Netflix, … • Whatsapp, Telegram, … (instant messaging) • Smart Banking • Smart House • Medical Data • …

J. Alonso-Zarate, June 2015

24

Example: Pseudo-Anonymity •

Example presented by Felix Bauer (https://www.youtube.com/watch?v=iKvFSIYlmSQ) • CODE_n Conference, March 2015 • CEO & founder of Aircloak.



Example of releasing public data of TAXIS in NYC •

Routes in NYC, stops, money they make, etc.



Anonymize data via hash function to generate unique identifiers.



DANGER!!! Pseudo-anonymity is not anonymity.



Reason: we have pre-knowledge of the data (data format)



The IoT is about having tons of data!!!



IoT is in danger because of this.

J. Alonso-Zarate, June 2015

25

Key security concerns for the IoT •

Interconnection of many vulnerable devices •

Ex: If-This-Then-That (IFTT) supports over 80 platforms, services, and devices



Pseudo-anonymity (not direct personal data)



Need to ensure continuity and availability



Data privacy



Trustful authentication (avoid unlawful actions)



Different applicable laws in every country.



Start-ups will probably not have the expertise / time



Widespread of easy-programmable devices and open source code •

One bug could affect many, many, many products

J. Alonso-Zarate, June 2015

26

Summarizing

1) ADVOCACY  No one is protecting your data.

2) AWARENESS  People are not aware of security and privacy issues.

3) VISIBILITY  It is difficult to know what exactly is happening to your data.

J. Alonso-Zarate, June 2015

27

3. Real World Problems

J. Alonso-Zarate, June 2015

28

Some IoT Security Fails •

TRENDnet: January 2012 • Various IP Camera Products would allow anyone with a generic URL to access the camera’s live feed without requiring authentication



Belkin, July 2012 • The WeMo Switch allows for UPnP actions (e.g. power cycle) that did not require authentication to be performed to do so



Philips, August 2013 • The Hue Lighting System utilized the MD5 hash of the MAC address of an authorized system as a “secret token” to control the platform.

Source: “The Internet of Things: We’ve Got to Chat”, Mark Stanislav, February 2014 J. Alonso-Zarate, June 2015

29

Some IoT Security Fails •

IZON: October 2013 • Video clips of “alerts” were saved in an AWS S3 bucket unencrypted, with no access control preventing someone from viewing the file



Redacted, December 2013 • API call to purchase in-app credits for service was done without purchase verification and via clear-text HTTTP calls



Belkin, February 2014 • The WeMo Home Automation API allowed XML injection (XXE) allowing for the potential revealing of filesystem contents

Source: “The Internet of Things: We’ve Got to Chat”, Mark Stanislav, February 2014 J. Alonso-Zarate, June 2015

30

The (wireless) access hole J. Alonso-Zarate, June 2015

31

The Alphabet Soup…

J. Alonso-Zarate, June 2015

32

Clarifying concepts

J. Alonso-Zarate, June 2015

33

Application Layer Protocols 

AllJoyn    

Open-Source project Promoted by the Allseen Alliance (part of the Linux Foundation) Some Partners: Qualcomm, LG, Panasonic, Sharp, ATT, Cisco, HTC, … Multi-platform: Linux, Windows, Android, OS/X, etc.



COAP – Constrained Application Protocol  SWAP  MQTT – Message Queuing Telemetry Transport   



Originally developed by IBM Small code footprint  suitable for low-cost devices Large number of messages

REST (Constrained HTTP)

J. Alonso-Zarate, June 2015

34

How does everything work?

J. Alonso-Zarate, June 2015

35

A General View (Wireless) Data Transmission Rate ( Delay! Energy! Reliability! … !) Gbps

VLC LTE, LTE-A, beyond

Mbps

WIFI

2G, 3G, 3G+

Kbps Zigbee bps RFID

LPWA- M2M Low Throughput Networks (LTN)

Bluetooth LE 10m

J. Alonso-Zarate, June 2015

100m

1km

10km

36

Prime Business Criteria Availability

Standardized Cellular Proprietary Cellular Low Power WLAN

Reliability

Bluetooth LE

Zigbee-like

Wired M2M

Availability = coverage, roaming, mobility, critical mass in rollout, etc. Reliability = resilience to interference, throughput guarantees, low outages, etc. (Total Cost of Ownership = CAPEX, OPEX.) J. Alonso-Zarate, June 2015

37

Limitations of ZigBee Interference in ISM

No Global Infrastructure

2bn Wifi Devices

Lack of Interoperability

Higher Total Cost

WPA2/PSK/TLS/SSL J. Alonso-Zarate, June 2015

38

Advantages of WiFi Ubiquitous Infrastructure

Vibrant Standard

300 members Source: Wireless Broadband Access (WBA), Informa, Nov. 2011

Low Cost

J. Alonso-Zarate, June 2015

Sound Security

WPA2/PSK/TLS/SSL

39

Limitations of WiFi Crowded ISM Band

Lack of Network Planning

Limited Power

Still using CSMA/CA!!!

WPA2/PSK/TLS/SSL J. Alonso-Zarate, June 2015

40

LP-Wifi vs ZigBee Capillary M2M

7x © IEEE, from “Feasibility of Wi-Fi Enabled Sensors for Internet of Things,” by Serbulent Tozlu (2011)

“Low-power Wi-Fi provides a significant improvement over typical Wi-Fi on both latency and energy consumption counts.” “LP-Wifi consumes approx the same as 6LoWPAN for small packets but is much better for large packets.”

J. Alonso-Zarate, June 2015

41

Low-Power WiFi Eco-System [examples]

J. Alonso-Zarate, June 2015

42

Advantages of Bluetooth It is everywhere

Evolving Standard

Embedded Low Cost

WPA2/PSK/TLS/SSL J. Alonso-Zarate, June 2015

43

Limitations of Bluetooth Low Transmission Rates

Short Range

Small number of simultaneous devices

J. Alonso-Zarate, June 2015

WPA2/PSK/TLS/SSL

44

Bluetooth is good for the IoT Low Transmission Rates

Short Range

Small number of simultaneous devices

J. Alonso-Zarate, June 2015

WPA2/PSK/TLS/SSL

45

Proprietary Radio Solutions

J. Alonso-Zarate, June 2015

WPA2/PSK/TLS/SSL

46

Advantages of LPWA Large Coverage

Available Today

J. Alonso-Zarate, June 2015

Low Cost

Operator Model

47

3GPP Cellular Networks Ubiquitous Coverage

Interference Control

J. Alonso-Zarate, June 2015

Mobility & Roaming

Service Platforms

48

However… ITU-R req. for IMT-Advanced

Means to achieve higher data rates: More spectrum, more efficient RRM, smaller cells

2G

2.5G

3G

3.5G

4GExabyte = 10^185G

Source: NEC – Andreas Maeder, Feb 2012 J. Alonso-Zarate, June 2015

49

Key Technical Novelties



Cellular Networks have been designed for humans!



Accommodation of M2M requires paradigm shift:     



There will be a lot of M2M nodes More and more applications are delay-intolerant, mainly control There will be little traffic per node, and mainly in the uplink Nodes need to run autonomously for a long time Automated security & trust mechanisms

… and all this without jeopardizing current cellular services!

J. Alonso-Zarate, June 2015

50

3GPP Release 13 and beyond 

Release 12 (completed):   



Release 13: eMTC   



Category 0 Half Duplex 20 MHz Improved coverage Improved Power consumption 1,4 MHz channelization

Cellular IoT (targets Release 13) 

Brand new radio interface in GERAN (narrowband)

J. Alonso-Zarate, June 2015

51

Visible Light Communications?

SECURITY

NO MAINSTREAM TECHNOLOGY

NO RADIO EMISSIONS

COST

BANDWIDTH

RANGE

HIGH DATA RATES

J. Alonso-Zarate, June 2015

LINE OF SIGHT

52

A huge mix of all these will live together J. Alonso-Zarate, June 2015

53

End-to-End IoT Testbed

http://www.theiot.es/smartworld http://technologies.cttc.es/m2m/ J. Alonso-Zarate, June 2015

54

Integration of technologies LTE Dongle

DQ Border Router

Green Shield AP SIGFOX Eq.

(covered by Raspberry case)

Red Border Router

J. Alonso-Zarate, June 2015

55

Some pictures

J. Alonso-Zarate, June 2015

56

Current Applications • • • • •

Smart Parking Geofencing (with GPS) Indoor / Outdoor Location Security (stolen control) Presence control

Cloud Web J. Alonso-Zarate, June 2015

57

The future of IoT? Distributed Queuing (DQ)

J. Alonso-Zárate, E. Kartsakli, A. Cateura, C. Verikoukis, and L. Alonso, “A Near-Optimum Cross-Layered Distributed Queuing Protocol for Wireless LAN,” IEEE Wireless Communication Magazine. Special Issue on MAC protocols for WLAN vol. 15, no. 1, pp. 48-55, February 2008.

J. Alonso-Zarate, June 2015

58

To sum up… 

The IoT is here and is becoming bigger  More and more devices  More and more applications  More and more different technical solutions  More and more data  More and more personalized data or critical data  Need for PRIVACY and SECURITY  Need to make things simple and low cost  Need to integrate security and privacy from the beginning  Need to explore more J. Alonso-Zarate, June 2015

59

Final Take-Away Message

Henry Ford “If I had asked people what they wanted, they would have said… A FASTER HORSE!”

J. Alonso-Zarate, June 2015

60

THANKS! Jesus Alonso-Zarate, PhD Senior Researcher Head of M2M Department @CTTC Co-Editor in Chief of EAI Transactions on IoT Editor of Wiley ETT [email protected] @jalonsozarate www.jesusalonsozarate.com www.theiot.es

J. Alonso-Zarate, June 2015

61

Thanks! Jesus Alonso‐Zarate http://www.jesusalonsozarate.com http://www.theiot.es http://technologies.cttc.es/m2m/

Suggest Documents