Internet of things - 4/4. Providing Security

11
Cyber Physical Systems – Solutions for Design Challenges Part 2- Security Sumanth Bhat 23 rd July 2015

Transcript of Internet of things - 4/4. Providing Security

Cyber Physical Systems – Solutions for Design

Challenges Part 2- SecuritySumanth Bhat23rd July 2015

Recap : Service Oriented Architecture

Security in CPS

• STUXNET Case – Industrial Case

• WAR Driving – A highly likely scenario

Current Approaches

• GAME Theory applied to CPS Security

• Infineon approach

• UC Berkeley approach

• TCS Innovation Labs – Embedded Security for IoT

UCB : Challenges for security

• Adversary Models / Potential attackers –1. Cybercriminals2. Disgruntled Employees3. Terrorists / Organized 4. Nation States

Top 5 modes of attack

1. Sniffer Attack2. Denial of service attack3. Compromised-Key Attack4. Password-Based Attack5. Man-in-the-Middle Attack

Counter Measures

Prevention Detection and Recovery Resilience Deterrence

TCS Innovation labs

• Need is for CONFIDENTIALITY of data. • Encryption protocols are bulky,

need DSP processors to run• How do we achieve trusted

computing?

TCS Innovation labs: Trusted Computing1. Hardware compartmentalized Secure Processor2. Secure Code and Data Memory 3. Secure Booting

TCS Innovation Labs : TrustZone architecture

THANK YOU !!