Securing The Internet of Things: Mark Horowitz Stanford School of Engineering
Securing The Internet of Things: Mark Horowitz Stanford School of Engineering
Securing The Internet of Things: Mark Horowitz Stanford School of Engineering
Things
Mark Horowitz
Stanford School of Engineering
Our Goal
Embark on a 5-year research project to secure the
Internet of Things
Outline
Internet(s) of Things
Industrial
Automation
Home Area
Networks
Personal Area
Networks
Networked
Devices
Thousands/person
Controlled Environment
High reliability
Control networks
Industrial requirements
Hundreds/person
Uncontrolled Environment
Unlicensed spectrum
Convenience
Consumer requirements
Tens/person
Personal environment
Unlicensed spectrum
Instrumentation
Fashion vs. function
Tens/person
Uncontrolled Environment
Unlicensed spectrum
Convenience
Powered
WirelessHART, 802.15.4
6tsch, RPL
IEEE/IIC/IETF
ZigBee, Z-Wave
6lowpan, RPL
IETF/ZigBee/private
Bluetooth, BLE
3G/LTE
3GPP/IEEE
WiFi/802.11
TCP/IP
IEEE/IETF
Internet(s) of Things
Industrial
Automation
Home Area
Networks
Personal Area
Networks
Networked
Devices
Thousands/person
Controlled Environment
High reliability
Control networks
Industrial requirements
Hundreds/person
Uncontrolled Environment
Unlicensed spectrum
Convenience
Consumer requirements
Tens/person
Personal environment
Unlicensed spectrum
Instrumentation
Fashion vs. function
Tens/person
Uncontrolled Environment
Unlicensed spectrum
Convenience
Powered
WirelessHART, 802.15.4
6tsch, RPL
IEEE/IIC/IETF
ZigBee, Z-Wave
6lowpan, RPL
IETF/ZigBee/private
Bluetooth, BLE
3G/LTE
3GPP/IEEE
WiFi/802.11
TCP/IP
IEEE/IETF
10
Gateways
11
Gateways
3G/4G,
TCP/IP
12
Gateways
3G/4G,
TCP/IP
User device
13
3G/4G,
TCP/IP
14
3G/4G,
TCP/IP
Obj-C/C++, Java,
Swift, Javascript/HTML 15
Ruby/Rails,
Python/Django,
J2EE, PHP, Node.js
ZigBee,
ZWave,
Bluetooth,
WiFi
3G/4G,
TCP/IP
Obj-C/C++, Java,
Swift, Javascript/HTML 16
embedded C
(ARM, avr, msp430)
ZigBee,
ZWave,
Bluetooth,
WiFi
Ruby/Rails,
Python/Django,
J2EE, PHP, Node.js
3G/4G,
TCP/IP
Obj-C/C++, Java,
Swift, Javascript/HTML 23
17
18
Two Goals
1. Research and define new cryptographic
computational models for secure data analytics
and actuation on enormous streams of real-time
data from embedded systems.
19
Home occupancy
Medical data
Presence/location
eMbedded devices
Gateways
Cloud systems
End applications
20
Data Security
Security limits what you (or an attacker) can do
What do IoT applications need to do?
21
End-to-End Security
Data
ZigBee,
ZWave,
Bluetooth,
WiFi
3G/4G,
TCP/IP
22
End-to-End Security
Data
ZigBee,
ZWave,
Bluetooth,
WiFi
3G/4G,
TCP/IP
23
End-to-End Security
ZigBee,
ZWave,
Bluetooth,
WiFi
Data
3G/4G,
TCP/IP
23
End-to-End Security
ZigBee,
ZWave,
Bluetooth,
WiFi
Data
3G/4G,
TCP/IP
23
End-to-End Security
ZigBee,
ZWave,
Bluetooth,
WiFi
Data
3G/4G,
TCP/IP
23
End-to-End Security
ZigBee,
ZWave,
Bluetooth,
WiFi
Data
3G/4G,
TCP/IP
23
End-to-End Security
ZigBee,
ZWave,
Bluetooth,
WiFi
3G/4G,
TCP/IP
Data
Secure Internet of Things
23
End-to-End Security
ZigBee,
ZWave,
Bluetooth,
WiFi
3G/4G,
TCP/IP
Data
Secure Internet of Things
24
End-to-End Security
Sensing device samples data, encrypts it
Each processing stage can decrypt or operate on
data
Secure
Internet of Things
25
encrypted
encrypted
data
Homomorphic Encryption
(Gentry, 2009)
26
)DFXOW\ZRUNLQJLQWKLVDUHD
Christopher R on analytics
Dan Boneh on cryptographic computational models
27
Two Goals
1. Research and define new cryptographic
computational models for secure data analytics
and actuation on enormous streams of real-time
data from embedded systems.
28
Building an Application
Write a data processing pipeline
Gateway!
PC/Server!
App/Web!
Views!
Controllers!
Models and!
Transforms!
10Hz !
Sampling!
Recent!
History!
Recent!
History!
Long!
History!
Analytics,!
Suggestions!
Motion!
Activity!
Activity!
Behavior!
Health!
Alarm!
Schedule!
29
Code Generation
Framework generates (working) skeleton code for
entire pipeline
)DFXOW\ZRUNLQJLQWKLVDUHD
David Mazires: software abstractions for security
3KLO/HYLV: 5DYHO software V\VWHP
30
)DFXOW\ZRUNLQJLQWKLVDUHD
31
Software-defined Hardware
Hardware (boards, chips, power) is a daunting
challenge to software developers
)DFXOW\ZRUNLQJLQWKLVDUHD
32
Making It Easy
If it's hard to use, people will work around it
)DFXOW\ZRUNLQJLQWKLVDUHD
33