Io t privacy and security considerations

60
Yves Goeleven #IoT: Privacy and security considerations Thanks to

description

In this session I discuss some of my thoughts on privacy and security considerations that threathen and are raised by the upcoming internet of things. Warning, you may leave with more questions than answers

Transcript of Io t privacy and security considerations

Page 1: Io t   privacy and security considerations

Yves Goeleven

#IoT: Privacy and security considerations

Thanks to

Page 2: Io t   privacy and security considerations

2

Yves Goeleven

• Founder of MessageHandler.net– Shipping software since 2001– Windows Azure MVP– Developer on NServiceBus

Page 3: Io t   privacy and security considerations

Exhibition theater @ kinepolis

Page 4: Io t   privacy and security considerations

4

Agenda

• Why this talk?• What are the dangers?• Security options• Privacy options

Page 5: Io t   privacy and security considerations

5

Agenda

Why this talk?

Page 6: Io t   privacy and security considerations
Page 7: Io t   privacy and security considerations
Page 8: Io t   privacy and security considerations
Page 9: Io t   privacy and security considerations
Page 10: Io t   privacy and security considerations

You might just leave this session with more questions than answers

Page 11: Io t   privacy and security considerations

11

Talk!

Let’s start a conversation!

Page 12: Io t   privacy and security considerations

12

Challenge!

I challenge anyone to do a follow up session with your own questions and ideas.

Page 13: Io t   privacy and security considerations

13

Agenda

What are the dangers?

Page 14: Io t   privacy and security considerations

Internet of Things

Page 15: Io t   privacy and security considerations
Page 16: Io t   privacy and security considerations
Page 17: Io t   privacy and security considerations

What are the dangers?Personal

Page 18: Io t   privacy and security considerations

& invisible

Page 19: Io t   privacy and security considerations
Page 20: Io t   privacy and security considerations

White lies are the common decency

holding us together

Page 21: Io t   privacy and security considerations
Page 22: Io t   privacy and security considerations

22

Agenda

What can we do?

Page 23: Io t   privacy and security considerations
Page 24: Io t   privacy and security considerations

24

Security options

• Prevent physical access– Behind locked doors– Secure casing– Do not expose physical ports (usb, ethernet, ...)

Page 25: Io t   privacy and security considerations

25

Security options

• Prevent virtual access– Do not open inbound ports– Design without ’listeners’ or ‘servers’ on the devices– Instead use ‘workers’ or ‘agents’ and remote queues

with outbound connections only

Page 26: Io t   privacy and security considerations
Page 27: Io t   privacy and security considerations

27

Security options

• Prevent physical tampering– Seals, markers– Alarms– Camera’s

Page 28: Io t   privacy and security considerations

28

Security options

• Prevent virtual tampering– Bootloader in chip or ROM, checks firmware origin

before loading into RAM

– Note: Updating (incl. security fixes) now just got a lot harder though

Page 29: Io t   privacy and security considerations
Page 30: Io t   privacy and security considerations

30

Security options

• Keep track of device identity– Let devices register themselves/call home– Do this on boot & periodically

Page 31: Io t   privacy and security considerations

31

Security options

• Analyze device behavior– Include device specific & variable information– Analyze it server side to detect hacked or spoofed

devices

Page 32: Io t   privacy and security considerations

32

Security options

• Block compromised devices– Access control lists– Protocol/package filtering– Signal Jamming– Unplug the power– On the device, or a specialized device

Page 33: Io t   privacy and security considerations
Page 34: Io t   privacy and security considerations

34

Security options

• Many low-power devices cannot encrypt data using standard encryption techniques– Not enough memory– Drains battery too fast

Page 35: Io t   privacy and security considerations

35

Security options

• Do not store unencrypted data– On publicly accessible devices– Better send it elsewhere, unencrypted if needed, to

store it safely

Page 36: Io t   privacy and security considerations

36

Security options

• Do not send unencrypted data over long distances– Use a local ‘gateway’, a powerfull local device to

encrypt it on behalf of dumb devices

Page 37: Io t   privacy and security considerations

37

Security options

• Use alternative encryption & data mangling strategies– Signed at the foundry, if you can live with lock-in– Ciphers, hashes & arithmetic algorithms

Page 38: Io t   privacy and security considerations
Page 39: Io t   privacy and security considerations

39

Security options

• Audit your physical environment– Know which devices are ‘smart’– And how they communicate– Include all technologies (IR, RF, Bluetooth)

Page 40: Io t   privacy and security considerations

40

Security options

• Spy on your things– Intercept communication between your ‘things’– Analyze the communication & detect anomalies

Page 41: Io t   privacy and security considerations

41

Security options

• Physical canary– Apply ‘social control’ amongst devices– Let devices report that other devices are talking to

them inappropriately

Page 42: Io t   privacy and security considerations

42

Internet of things, reference architecture

Page 43: Io t   privacy and security considerations
Page 44: Io t   privacy and security considerations

44

Privacy options

• There are privacy laws– Make sure not to break these!– Do not store, send or process information that you’re

not allowed to

– http://en.wikipedia.org/wiki/Data_Protection_Directive

Page 45: Io t   privacy and security considerations

45

Privacy options

• Is it clear what laws apply when?– Multinationals spread across different countries– Difference in laws where data is collected vs data is

processed or stored

– US vs EU: direct conflict

Page 46: Io t   privacy and security considerations
Page 47: Io t   privacy and security considerations
Page 48: Io t   privacy and security considerations

48

Privacy options

• Trust is paramount for adoption of IoT– Make it your policy not to break it– People may choose not to buy products from

violators

Page 49: Io t   privacy and security considerations

49

Privacy options

• Question is: is this really true?– Facebook is huge, yet no one trusts them (I hope)– Will convenience win over privacy concerns for

majority of people?

Page 50: Io t   privacy and security considerations

50

Privacy options

• Build trust by asking for user consent– On data collection devices– Oauth great for this!?– But how about devices without a screen?

Page 51: Io t   privacy and security considerations
Page 52: Io t   privacy and security considerations

52

Privacy options

• And how about exchanging and correlating information with 3rd parties in backend?– Need for federated authorization?– With context?– F.e. I allow you to analyse my energy consumption,

send the results to government, but not to utility?

Page 53: Io t   privacy and security considerations
Page 54: Io t   privacy and security considerations
Page 55: Io t   privacy and security considerations

Loyalty plan

Give me your address and you'll get 10% off on your next pair of jeans…

Page 56: Io t   privacy and security considerations

56

Other things we can do?

There’s a lot we can do

Page 57: Io t   privacy and security considerations

57

Other things we can do?

Also a lot of open questions

Page 58: Io t   privacy and security considerations

58

Other things we can do?

But maybe consumers just don’t care

(aren’t prepared to pay for it?)

Page 59: Io t   privacy and security considerations

59

Other things we can do?

What do you think?

Page 60: Io t   privacy and security considerations

60

A big thank you to our sponsors

Gold Partners

Silver & Track Partners

Platinum Partners