SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Enhancing IoT Security and
Privacy with Distributed Ledgers
Paul Fremantle[1], Benjamin Aziz[1], Tom Kirkham[2]
[1]School of Computing, University of Portsmouth
{paul.fremantle, benjamin.aziz}@port.ac.uk,
[2] Science and Technology Facilities Council
tom.kirkham@stfc.ac.uk
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
One Minute Overview
Problem:
The Internet of Things is insecure
Mirai
620+Gbps attack
Devices are tied to vendors,
No heterogeneous interop,
No shared governance
New
Transaction
Le
d
g
er
Le
d
g
er
Le
d
g
er
Le
d
g
er
Le
d
g
er
Entered into
Block Consensus
Ledgers
are updated
Next Block
Distributed Ledgers provide
shared governance
Typical IoT devices are too small
to run consensus algorithms
Intel SGX enclave!
!
!
!
!
!
!
!
Blockchain!
processor!
Pythia API!
OpenSourcecode
IoT!
Devic
e!
Attestation
Interaction
withBlockchain
We propose a new
model called Pythia
that enables IoT devices
to trust Dist Ledgers
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Challenges for IoT Security and
Privacy
•  October 2016 Mirai Botnet
–  100,000 devices compromised
–  620Gbps DDOS attack
–  In reality there are millions of compromisable
devices (Checkpoint study 2014)
–  Mirai was based on a dictionary attack and weak
passwords
•  Also attacks on cars, houses, medical
devices, etc
–  A survey of secure middleware for the Internet of Things,
Fremantle and Scott, PeerJ, accepted for publication
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
IoT security and privacy
•  Updates are difficult and there is no
economic incentive for manufacturers
•  Lack of clear ownership and registration
models
•  Poor identity models
•  Leakage of data and metadata
•  Use of IoT devices as attack vectors
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
The real challenge
IoT is not heterogeneous, hence no choices for users
Low economic and evolutionary pressures
Chrome
Firefox
Safari
Internet Explorer
Dropbox
Google Drive
FTP, NAS,
etc
HTTP, TLS
HTTP/2
UDP, DTLS,
FTPS, XMPP,
etc
Fitbit Server
Fitbit
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Distributed Ledger Technologies
N1 N2 Nn
New
Transaction
Ledger Ledger Ledger Ledger Ledger
Entered
into
Block
Consensus
Ledgers
are
updated
Next Block
Ledger uses a Merkle Tree to ensure that each record guarantees all previous records
to create an immutable chain
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Consensus algorithms
•  Bitcoin: Proof of Work
– Miners perform hashing, competing to be
the first to finalise the block, with a reward
– The longest chain becomes the master
– No requirement to know or trust the other
participants
– Expensive, low transaction rate, slow to
come to consensus
– Proven to be resilient at global scale
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Alternative consensus models
•  Arbitrary participants
– Proof of storage
•  Calculations based on stored data
– Proof of stake
•  Based on ownership of existing coins
•  Known participants
– Byzantine Failure Tolerant algorithms
– E.g. Paxos
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
What can DLT do for IoT
•  Three main concepts
–  Distributed Ledger
•  A single, agreed source of truth
–  Cryptocurrency
•  Economic models to create value for security and privacy
–  Smart Contracts
•  Flexible transaction models that allow new transactions to
be scripted
•  An environment where there can be trust,
privacy and effective contracts between parties
without reliance on a single vendor.
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
User Sphere:
Fully in control
of user
e.g. Laptop
Joint Sphere:
Appears to
be in user control
e.g. GMail
Three Tier Privacy Model
Spierkermann and Cranor
Spiekermann, Sarah, and Lorrie Faith Cranor. "Engineering privacy." IEEE
Transactions on software engineering 35.1 (2009): 67-82.
Recipient Sphere:
Fully in control of
Data recipient
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Approaches / Use cases
Identity
Ownership
Registration
Updates
Consent Contracts
Consent Logs
Data Revocation Contracts
Policies
Policy enforcement contracts
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
User Sphere:
Device Identity
Device Ownership
and Registration
Device Updates
Joint Sphere:
Consent Management
Policies
Recipient Sphere:
Consent Tracking
Policy Enforcement
Data Revocation
Three tier privacy model for IoT
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Typical IoT footprints
ESP8266 – 32bit controller,
1Mb program, 80k RAM ~ $2 each
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Uh oh
•  How does an IoT system participate and
trust in a DLT?
– Full participation is expensive
•  Bitcoin database >80Gb
•  512MB of RAM, 1Ghz CPU minimum
– Simple Payment Verification (SPV) smaller
but still beyond IoT devices
– Fundamentally, consensus algorithms are
beyond the CPU, network, power and
memory of IoT
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Oracles
•  In blockchains, an Oracle is a system that
truthfully informs the blockchain about
events outside the ledger
Zhang, F., Cecchetti, E., Croman, K., Juels, A., and Shi, E. (2016). Town crier: An
authenticated data feed for smart contracts. In Proceedings of the 2016 ACM
SIGSAC Conference on Computer and Communications Security, pages 270–282.
ACM.
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Pythia
Lycurgus Consulting the Pythia (1835/1845), Delacroix
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
New concept - Pythia
•  We define a Pythia as the “inverse” of an
Oracle
•  Informs the outside world truthfully
about the distributed ledger
– In our case, the IoT device needs to be able
to interact with the ledger:
•  Without participating in consensus directly
•  With trust
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Intel SGX extensions
•  Provide a secure enclave
– Compare with Sandbox
•  The code within the enclave is protected
from the rest of the system
•  Remote attestation can guarantee the
codebase running is a known codebase
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Pythia
•  A proposed model to
allow IoT devices to trust
DLTs
•  An attested proxy for the
ledger
•  The Pythia truthfully
informs the world (IoT)
about the ledger
–  Without the IoT needing to
participate in consensus
Intel SGX enclave!
!
!
!
!
!
!
!
Blockchain!
processor!
Pythia API!
OpenSourcecode
IoT!
Device!
Attestation
Interaction
withBlockchain
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
OAuthing
•  Previous work on IoT privacy and security:
–  Secure device registration
–  Pseudonymous Data Sharing
–  Personal IoT middleware
–  But without DLT (so far)
•  OAuthing + DLT + Pythia:
–  Shared governance and an approach based on smart
contracts
Fremantle, P. and Aziz, B. (2016): OAuthing: privacy-enhancing
federation for the Internet of Things, 2nd International
Conference on the Cloudification of the Internet of Things
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Related Work
•  Tindall, K. (2015)
–  Bitcoin payments for IoT updates
•  Christidis and Devetsikiotis (2016)
–  Discuss IoT and Blockchains, but not specifically
privacy and security
•  Proof of Luck
–  Milutinovic et al. (2016) provide an alternative
consensus model based on SGX enclaves
•  Frey et al (2016)
–  Have demonstrated trust in Bitcoin on a mobile
phone
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Conclusions and further work
•  Position paper: still plenty of work to do
•  This is a serious issue:
–  How does the IoT trust the Blockchain without
significant overhead?
•  Pythia is one potential approach
•  Need to validate:
–  Blockchain running within SGX (128Mb
limitation)
–  Remote attestation costs on IoT devices
–  SGX challenges
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Contributions
•  A model for reasoning about how
blockchains can improve privacy and
security in IoT
•  A set of approaches for improving
security and privacy of IoT with
blockchains
•  A proposed architecture (Pythia) for
creating distributed trust in a blockchain
on low- power devices.
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Thank you & Questions

Mais conteúdo relacionado

Mais procurados

Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
 
Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...Biagio Botticelli
 
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networksChetan Kumar S
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
 
Blockchain Technology In IOT
Blockchain Technology In IOTBlockchain Technology In IOT
Blockchain Technology In IOTStacey Roberts
 
IoT on Blockchain Solution Overview
IoT on Blockchain Solution OverviewIoT on Blockchain Solution Overview
IoT on Blockchain Solution OverviewProvide Technologies
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 
IoT Malware Detection through Threshold Random Walks
IoT Malware Detection through Threshold Random WalksIoT Malware Detection through Threshold Random Walks
IoT Malware Detection through Threshold Random WalksBiagio Botticelli
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AIAhmed Banafa
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io tChintan Patel
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
 
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...eraser Juan José Calderón
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT Ahmed Banafa
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
 
blockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and Challangesblockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and ChallangesChetan Kumar S
 

Mais procurados (20)

Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
 
Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...
 
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networks
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
 
Blockchain Technology In IOT
Blockchain Technology In IOTBlockchain Technology In IOT
Blockchain Technology In IOT
 
IoT on Blockchain Solution Overview
IoT on Blockchain Solution OverviewIoT on Blockchain Solution Overview
IoT on Blockchain Solution Overview
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
IoT Malware Detection through Threshold Random Walks
IoT Malware Detection through Threshold Random WalksIoT Malware Detection through Threshold Random Walks
IoT Malware Detection through Threshold Random Walks
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
 
Unit 1.1
Unit   1.1Unit   1.1
Unit 1.1
 
Blockchain for IoT
Blockchain for IoTBlockchain for IoT
Blockchain for IoT
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io t
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
blockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and Challangesblockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and Challanges
 
BaaS for IoT
BaaS for IoTBaaS for IoT
BaaS for IoT
 

Semelhante a IoT and Blockchains - enhancing security and privacy

Presentation on Implementing Blockchain (IOTA) Technology into Smart Home
Presentation on Implementing Blockchain (IOTA) Technology into Smart HomePresentation on Implementing Blockchain (IOTA) Technology into Smart Home
Presentation on Implementing Blockchain (IOTA) Technology into Smart HomeASADULLAHPRANTO
 
Blockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewBlockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewGokul Alex
 
Роман Кравченко “Blockchain-Powered Internet of Things” {R0boCamp}
Роман Кравченко “Blockchain-Powered Internet of Things” {R0boCamp} Роман Кравченко “Blockchain-Powered Internet of Things” {R0boCamp}
Роман Кравченко “Blockchain-Powered Internet of Things” {R0boCamp} Lviv Startup Club
 
Blockchain - Beyond the Hype
Blockchain - Beyond the HypeBlockchain - Beyond the Hype
Blockchain - Beyond the HypeSalman Baset
 
Blockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsTim Lackey
 
Blockchain Security and Privacy
Blockchain Security and PrivacyBlockchain Security and Privacy
Blockchain Security and PrivacyAnil John
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introductionInitio
 
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...AlAtfat
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptxchWaqasZahid
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
Silicon Valley Code Camp Blockchain Oct 2017
Silicon Valley Code Camp Blockchain Oct 2017Silicon Valley Code Camp Blockchain Oct 2017
Silicon Valley Code Camp Blockchain Oct 2017Nelson Petracek
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsSaad Zaher
 
Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Tomoaki Sato
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationDr. Mohamed Torky
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)Saurabh Yadav
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 

Semelhante a IoT and Blockchains - enhancing security and privacy (20)

Presentation on Implementing Blockchain (IOTA) Technology into Smart Home
Presentation on Implementing Blockchain (IOTA) Technology into Smart HomePresentation on Implementing Blockchain (IOTA) Technology into Smart Home
Presentation on Implementing Blockchain (IOTA) Technology into Smart Home
 
Blockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewBlockchain based Security Architectures - A Review
Blockchain based Security Architectures - A Review
 
Роман Кравченко “Blockchain-Powered Internet of Things” {R0boCamp}
Роман Кравченко “Blockchain-Powered Internet of Things” {R0boCamp} Роман Кравченко “Blockchain-Powered Internet of Things” {R0boCamp}
Роман Кравченко “Blockchain-Powered Internet of Things” {R0boCamp}
 
Blockchain - Beyond the Hype
Blockchain - Beyond the HypeBlockchain - Beyond the Hype
Blockchain - Beyond the Hype
 
Blockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable Things
 
Blockchain Security and Privacy
Blockchain Security and PrivacyBlockchain Security and Privacy
Blockchain Security and Privacy
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptx
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
eMsecure
eMsecureeMsecure
eMsecure
 
Silicon Valley Code Camp Blockchain Oct 2017
Silicon Valley Code Camp Blockchain Oct 2017Silicon Valley Code Camp Blockchain Oct 2017
Silicon Valley Code Camp Blockchain Oct 2017
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital Transformation
 
Internet Of Things(IoT).pptx
Internet Of Things(IoT).pptxInternet Of Things(IoT).pptx
Internet Of Things(IoT).pptx
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 

Mais de Paul Fremantle

Web API Management meets the Internet of Things
Web API Management meets the Internet of ThingsWeb API Management meets the Internet of Things
Web API Management meets the Internet of ThingsPaul Fremantle
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecturePaul Fremantle
 
Apache Stratos - Building a PaaS using OSGi and Equinox
Apache Stratos - Building a PaaS using OSGi and EquinoxApache Stratos - Building a PaaS using OSGi and Equinox
Apache Stratos - Building a PaaS using OSGi and EquinoxPaul Fremantle
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsPaul Fremantle
 
Federated Identity for IoT with OAuth2
Federated Identity for IoT with OAuth2Federated Identity for IoT with OAuth2
Federated Identity for IoT with OAuth2Paul Fremantle
 
Beyond Economics - Cloud as a Business Enabler
Beyond Economics - Cloud as a Business EnablerBeyond Economics - Cloud as a Business Enabler
Beyond Economics - Cloud as a Business EnablerPaul Fremantle
 
The Evolution of Integration
The Evolution of IntegrationThe Evolution of Integration
The Evolution of IntegrationPaul Fremantle
 
High Volume Web API Management with the WSO2 ESB
High Volume Web API Management with the WSO2 ESBHigh Volume Web API Management with the WSO2 ESB
High Volume Web API Management with the WSO2 ESBPaul Fremantle
 
Stratos Open PaaS OSCON 2011
Stratos Open PaaS OSCON 2011Stratos Open PaaS OSCON 2011
Stratos Open PaaS OSCON 2011Paul Fremantle
 
Stratos and PaaS for London Java Community
Stratos and PaaS for London Java CommunityStratos and PaaS for London Java Community
Stratos and PaaS for London Java CommunityPaul Fremantle
 
Understanding Platform as a Service
Understanding Platform as a ServiceUnderstanding Platform as a Service
Understanding Platform as a ServicePaul Fremantle
 
Making Apache Tomcat Multi-tenant, Elastic and Metered
Making Apache Tomcat Multi-tenant, Elastic and MeteredMaking Apache Tomcat Multi-tenant, Elastic and Metered
Making Apache Tomcat Multi-tenant, Elastic and MeteredPaul Fremantle
 
Building Cloud Native Software
Building Cloud Native SoftwareBuilding Cloud Native Software
Building Cloud Native SoftwarePaul Fremantle
 
Building Innovation with Open Source Approaches
Building Innovation with Open Source ApproachesBuilding Innovation with Open Source Approaches
Building Innovation with Open Source ApproachesPaul Fremantle
 
Three SOA Case Studies
Three SOA Case StudiesThree SOA Case Studies
Three SOA Case StudiesPaul Fremantle
 
Fast SOA with Apache Synapse
Fast SOA with Apache SynapseFast SOA with Apache Synapse
Fast SOA with Apache SynapsePaul Fremantle
 
REST vs WS-*: Myths Facts and Lies
REST vs WS-*: Myths Facts and LiesREST vs WS-*: Myths Facts and Lies
REST vs WS-*: Myths Facts and LiesPaul Fremantle
 

Mais de Paul Fremantle (18)

Web API Management meets the Internet of Things
Web API Management meets the Internet of ThingsWeb API Management meets the Internet of Things
Web API Management meets the Internet of Things
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
Apache Stratos - Building a PaaS using OSGi and Equinox
Apache Stratos - Building a PaaS using OSGi and EquinoxApache Stratos - Building a PaaS using OSGi and Equinox
Apache Stratos - Building a PaaS using OSGi and Equinox
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Federated Identity for IoT with OAuth2
Federated Identity for IoT with OAuth2Federated Identity for IoT with OAuth2
Federated Identity for IoT with OAuth2
 
Beyond Economics - Cloud as a Business Enabler
Beyond Economics - Cloud as a Business EnablerBeyond Economics - Cloud as a Business Enabler
Beyond Economics - Cloud as a Business Enabler
 
Evolution of PaaS
Evolution of PaaSEvolution of PaaS
Evolution of PaaS
 
The Evolution of Integration
The Evolution of IntegrationThe Evolution of Integration
The Evolution of Integration
 
High Volume Web API Management with the WSO2 ESB
High Volume Web API Management with the WSO2 ESBHigh Volume Web API Management with the WSO2 ESB
High Volume Web API Management with the WSO2 ESB
 
Stratos Open PaaS OSCON 2011
Stratos Open PaaS OSCON 2011Stratos Open PaaS OSCON 2011
Stratos Open PaaS OSCON 2011
 
Stratos and PaaS for London Java Community
Stratos and PaaS for London Java CommunityStratos and PaaS for London Java Community
Stratos and PaaS for London Java Community
 
Understanding Platform as a Service
Understanding Platform as a ServiceUnderstanding Platform as a Service
Understanding Platform as a Service
 
Making Apache Tomcat Multi-tenant, Elastic and Metered
Making Apache Tomcat Multi-tenant, Elastic and MeteredMaking Apache Tomcat Multi-tenant, Elastic and Metered
Making Apache Tomcat Multi-tenant, Elastic and Metered
 
Building Cloud Native Software
Building Cloud Native SoftwareBuilding Cloud Native Software
Building Cloud Native Software
 
Building Innovation with Open Source Approaches
Building Innovation with Open Source ApproachesBuilding Innovation with Open Source Approaches
Building Innovation with Open Source Approaches
 
Three SOA Case Studies
Three SOA Case StudiesThree SOA Case Studies
Three SOA Case Studies
 
Fast SOA with Apache Synapse
Fast SOA with Apache SynapseFast SOA with Apache Synapse
Fast SOA with Apache Synapse
 
REST vs WS-*: Myths Facts and Lies
REST vs WS-*: Myths Facts and LiesREST vs WS-*: Myths Facts and Lies
REST vs WS-*: Myths Facts and Lies
 

Último

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 

Último (9)

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 

IoT and Blockchains - enhancing security and privacy

  • 1. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Enhancing IoT Security and Privacy with Distributed Ledgers Paul Fremantle[1], Benjamin Aziz[1], Tom Kirkham[2] [1]School of Computing, University of Portsmouth {paul.fremantle, benjamin.aziz}@port.ac.uk, [2] Science and Technology Facilities Council tom.kirkham@stfc.ac.uk
  • 2. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham One Minute Overview Problem: The Internet of Things is insecure Mirai 620+Gbps attack Devices are tied to vendors, No heterogeneous interop, No shared governance New Transaction Le d g er Le d g er Le d g er Le d g er Le d g er Entered into Block Consensus Ledgers are updated Next Block Distributed Ledgers provide shared governance Typical IoT devices are too small to run consensus algorithms Intel SGX enclave! ! ! ! ! ! ! ! Blockchain! processor! Pythia API! OpenSourcecode IoT! Devic e! Attestation Interaction withBlockchain We propose a new model called Pythia that enables IoT devices to trust Dist Ledgers
  • 3. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Challenges for IoT Security and Privacy •  October 2016 Mirai Botnet –  100,000 devices compromised –  620Gbps DDOS attack –  In reality there are millions of compromisable devices (Checkpoint study 2014) –  Mirai was based on a dictionary attack and weak passwords •  Also attacks on cars, houses, medical devices, etc –  A survey of secure middleware for the Internet of Things, Fremantle and Scott, PeerJ, accepted for publication
  • 4. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham IoT security and privacy •  Updates are difficult and there is no economic incentive for manufacturers •  Lack of clear ownership and registration models •  Poor identity models •  Leakage of data and metadata •  Use of IoT devices as attack vectors
  • 5. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham The real challenge IoT is not heterogeneous, hence no choices for users Low economic and evolutionary pressures Chrome Firefox Safari Internet Explorer Dropbox Google Drive FTP, NAS, etc HTTP, TLS HTTP/2 UDP, DTLS, FTPS, XMPP, etc Fitbit Server Fitbit
  • 6. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Distributed Ledger Technologies N1 N2 Nn New Transaction Ledger Ledger Ledger Ledger Ledger Entered into Block Consensus Ledgers are updated Next Block Ledger uses a Merkle Tree to ensure that each record guarantees all previous records to create an immutable chain
  • 7. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Consensus algorithms •  Bitcoin: Proof of Work – Miners perform hashing, competing to be the first to finalise the block, with a reward – The longest chain becomes the master – No requirement to know or trust the other participants – Expensive, low transaction rate, slow to come to consensus – Proven to be resilient at global scale
  • 8. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Alternative consensus models •  Arbitrary participants – Proof of storage •  Calculations based on stored data – Proof of stake •  Based on ownership of existing coins •  Known participants – Byzantine Failure Tolerant algorithms – E.g. Paxos
  • 9. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham What can DLT do for IoT •  Three main concepts –  Distributed Ledger •  A single, agreed source of truth –  Cryptocurrency •  Economic models to create value for security and privacy –  Smart Contracts •  Flexible transaction models that allow new transactions to be scripted •  An environment where there can be trust, privacy and effective contracts between parties without reliance on a single vendor.
  • 10. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham User Sphere: Fully in control of user e.g. Laptop Joint Sphere: Appears to be in user control e.g. GMail Three Tier Privacy Model Spierkermann and Cranor Spiekermann, Sarah, and Lorrie Faith Cranor. "Engineering privacy." IEEE Transactions on software engineering 35.1 (2009): 67-82. Recipient Sphere: Fully in control of Data recipient
  • 11. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Approaches / Use cases Identity Ownership Registration Updates Consent Contracts Consent Logs Data Revocation Contracts Policies Policy enforcement contracts
  • 12. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham User Sphere: Device Identity Device Ownership and Registration Device Updates Joint Sphere: Consent Management Policies Recipient Sphere: Consent Tracking Policy Enforcement Data Revocation Three tier privacy model for IoT
  • 13. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Typical IoT footprints ESP8266 – 32bit controller, 1Mb program, 80k RAM ~ $2 each
  • 14. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Uh oh •  How does an IoT system participate and trust in a DLT? – Full participation is expensive •  Bitcoin database >80Gb •  512MB of RAM, 1Ghz CPU minimum – Simple Payment Verification (SPV) smaller but still beyond IoT devices – Fundamentally, consensus algorithms are beyond the CPU, network, power and memory of IoT
  • 15. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Oracles •  In blockchains, an Oracle is a system that truthfully informs the blockchain about events outside the ledger Zhang, F., Cecchetti, E., Croman, K., Juels, A., and Shi, E. (2016). Town crier: An authenticated data feed for smart contracts. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 270–282. ACM.
  • 16. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Pythia Lycurgus Consulting the Pythia (1835/1845), Delacroix
  • 17. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham New concept - Pythia •  We define a Pythia as the “inverse” of an Oracle •  Informs the outside world truthfully about the distributed ledger – In our case, the IoT device needs to be able to interact with the ledger: •  Without participating in consensus directly •  With trust
  • 18. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Intel SGX extensions •  Provide a secure enclave – Compare with Sandbox •  The code within the enclave is protected from the rest of the system •  Remote attestation can guarantee the codebase running is a known codebase
  • 19. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Pythia •  A proposed model to allow IoT devices to trust DLTs •  An attested proxy for the ledger •  The Pythia truthfully informs the world (IoT) about the ledger –  Without the IoT needing to participate in consensus Intel SGX enclave! ! ! ! ! ! ! ! Blockchain! processor! Pythia API! OpenSourcecode IoT! Device! Attestation Interaction withBlockchain
  • 20. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham OAuthing •  Previous work on IoT privacy and security: –  Secure device registration –  Pseudonymous Data Sharing –  Personal IoT middleware –  But without DLT (so far) •  OAuthing + DLT + Pythia: –  Shared governance and an approach based on smart contracts Fremantle, P. and Aziz, B. (2016): OAuthing: privacy-enhancing federation for the Internet of Things, 2nd International Conference on the Cloudification of the Internet of Things
  • 21. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Related Work •  Tindall, K. (2015) –  Bitcoin payments for IoT updates •  Christidis and Devetsikiotis (2016) –  Discuss IoT and Blockchains, but not specifically privacy and security •  Proof of Luck –  Milutinovic et al. (2016) provide an alternative consensus model based on SGX enclaves •  Frey et al (2016) –  Have demonstrated trust in Bitcoin on a mobile phone
  • 22. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Conclusions and further work •  Position paper: still plenty of work to do •  This is a serious issue: –  How does the IoT trust the Blockchain without significant overhead? •  Pythia is one potential approach •  Need to validate: –  Blockchain running within SGX (128Mb limitation) –  Remote attestation costs on IoT devices –  SGX challenges
  • 23. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Contributions •  A model for reasoning about how blockchains can improve privacy and security in IoT •  A set of approaches for improving security and privacy of IoT with blockchains •  A proposed architecture (Pythia) for creating distributed trust in a blockchain on low- power devices.
  • 24. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Thank you & Questions