SlideShare a Scribd company logo
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Enhancing IoT Security and
Privacy with Distributed Ledgers
Paul Fremantle[1], Benjamin Aziz[1], Tom Kirkham[2]
[1]School of Computing, University of Portsmouth
{paul.fremantle, benjamin.aziz}@port.ac.uk,
[2] Science and Technology Facilities Council
tom.kirkham@stfc.ac.uk
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
One Minute Overview
Problem:
The Internet of Things is insecure
Mirai
620+Gbps attack
Devices are tied to vendors,
No heterogeneous interop,
No shared governance
New
Transaction
Le
d
g
er
Le
d
g
er
Le
d
g
er
Le
d
g
er
Le
d
g
er
Entered into
Block Consensus
Ledgers
are updated
Next Block
Distributed Ledgers provide
shared governance
Typical IoT devices are too small
to run consensus algorithms
Intel SGX enclave!
!
!
!
!
!
!
!
Blockchain!
processor!
Pythia API!
OpenSourcecode
IoT!
Devic
e!
Attestation
Interaction
withBlockchain
We propose a new
model called Pythia
that enables IoT devices
to trust Dist Ledgers
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Challenges for IoT Security and
Privacy
•  October 2016 Mirai Botnet
–  100,000 devices compromised
–  620Gbps DDOS attack
–  In reality there are millions of compromisable
devices (Checkpoint study 2014)
–  Mirai was based on a dictionary attack and weak
passwords
•  Also attacks on cars, houses, medical
devices, etc
–  A survey of secure middleware for the Internet of Things,
Fremantle and Scott, PeerJ, accepted for publication
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
IoT security and privacy
•  Updates are difficult and there is no
economic incentive for manufacturers
•  Lack of clear ownership and registration
models
•  Poor identity models
•  Leakage of data and metadata
•  Use of IoT devices as attack vectors
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
The real challenge
IoT is not heterogeneous, hence no choices for users
Low economic and evolutionary pressures
Chrome
Firefox
Safari
Internet Explorer
Dropbox
Google Drive
FTP, NAS,
etc
HTTP, TLS
HTTP/2
UDP, DTLS,
FTPS, XMPP,
etc
Fitbit Server
Fitbit
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Distributed Ledger Technologies
N1 N2 Nn
New
Transaction
Ledger Ledger Ledger Ledger Ledger
Entered
into
Block
Consensus
Ledgers
are
updated
Next Block
Ledger uses a Merkle Tree to ensure that each record guarantees all previous records
to create an immutable chain
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Consensus algorithms
•  Bitcoin: Proof of Work
– Miners perform hashing, competing to be
the first to finalise the block, with a reward
– The longest chain becomes the master
– No requirement to know or trust the other
participants
– Expensive, low transaction rate, slow to
come to consensus
– Proven to be resilient at global scale
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Alternative consensus models
•  Arbitrary participants
– Proof of storage
•  Calculations based on stored data
– Proof of stake
•  Based on ownership of existing coins
•  Known participants
– Byzantine Failure Tolerant algorithms
– E.g. Paxos
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
What can DLT do for IoT
•  Three main concepts
–  Distributed Ledger
•  A single, agreed source of truth
–  Cryptocurrency
•  Economic models to create value for security and privacy
–  Smart Contracts
•  Flexible transaction models that allow new transactions to
be scripted
•  An environment where there can be trust,
privacy and effective contracts between parties
without reliance on a single vendor.
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
User Sphere:
Fully in control
of user
e.g. Laptop
Joint Sphere:
Appears to
be in user control
e.g. GMail
Three Tier Privacy Model
Spierkermann and Cranor
Spiekermann, Sarah, and Lorrie Faith Cranor. "Engineering privacy." IEEE
Transactions on software engineering 35.1 (2009): 67-82.
Recipient Sphere:
Fully in control of
Data recipient
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Approaches / Use cases
Identity
Ownership
Registration
Updates
Consent Contracts
Consent Logs
Data Revocation Contracts
Policies
Policy enforcement contracts
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
User Sphere:
Device Identity
Device Ownership
and Registration
Device Updates
Joint Sphere:
Consent Management
Policies
Recipient Sphere:
Consent Tracking
Policy Enforcement
Data Revocation
Three tier privacy model for IoT
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Typical IoT footprints
ESP8266 – 32bit controller,
1Mb program, 80k RAM ~ $2 each
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Uh oh
•  How does an IoT system participate and
trust in a DLT?
– Full participation is expensive
•  Bitcoin database >80Gb
•  512MB of RAM, 1Ghz CPU minimum
– Simple Payment Verification (SPV) smaller
but still beyond IoT devices
– Fundamentally, consensus algorithms are
beyond the CPU, network, power and
memory of IoT
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Oracles
•  In blockchains, an Oracle is a system that
truthfully informs the blockchain about
events outside the ledger
Zhang, F., Cecchetti, E., Croman, K., Juels, A., and Shi, E. (2016). Town crier: An
authenticated data feed for smart contracts. In Proceedings of the 2016 ACM
SIGSAC Conference on Computer and Communications Security, pages 270–282.
ACM.
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Pythia
Lycurgus Consulting the Pythia (1835/1845), Delacroix
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
New concept - Pythia
•  We define a Pythia as the “inverse” of an
Oracle
•  Informs the outside world truthfully
about the distributed ledger
– In our case, the IoT device needs to be able
to interact with the ledger:
•  Without participating in consensus directly
•  With trust
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Intel SGX extensions
•  Provide a secure enclave
– Compare with Sandbox
•  The code within the enclave is protected
from the rest of the system
•  Remote attestation can guarantee the
codebase running is a known codebase
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Pythia
•  A proposed model to
allow IoT devices to trust
DLTs
•  An attested proxy for the
ledger
•  The Pythia truthfully
informs the world (IoT)
about the ledger
–  Without the IoT needing to
participate in consensus
Intel SGX enclave!
!
!
!
!
!
!
!
Blockchain!
processor!
Pythia API!
OpenSourcecode
IoT!
Device!
Attestation
Interaction
withBlockchain
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
OAuthing
•  Previous work on IoT privacy and security:
–  Secure device registration
–  Pseudonymous Data Sharing
–  Personal IoT middleware
–  But without DLT (so far)
•  OAuthing + DLT + Pythia:
–  Shared governance and an approach based on smart
contracts
Fremantle, P. and Aziz, B. (2016): OAuthing: privacy-enhancing
federation for the Internet of Things, 2nd International
Conference on the Cloudification of the Internet of Things
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Related Work
•  Tindall, K. (2015)
–  Bitcoin payments for IoT updates
•  Christidis and Devetsikiotis (2016)
–  Discuss IoT and Blockchains, but not specifically
privacy and security
•  Proof of Luck
–  Milutinovic et al. (2016) provide an alternative
consensus model based on SGX enclaves
•  Frey et al (2016)
–  Have demonstrated trust in Bitcoin on a mobile
phone
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Conclusions and further work
•  Position paper: still plenty of work to do
•  This is a serious issue:
–  How does the IoT trust the Blockchain without
significant overhead?
•  Pythia is one potential approach
•  Need to validate:
–  Blockchain running within SGX (128Mb
limitation)
–  Remote attestation costs on IoT devices
–  SGX challenges
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Contributions
•  A model for reasoning about how
blockchains can improve privacy and
security in IoT
•  A set of approaches for improving
security and privacy of IoT with
blockchains
•  A proposed architecture (Pythia) for
creating distributed trust in a blockchain
on low- power devices.
Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham
Thank you & Questions

More Related Content

What's hot (20)

PDF
Fog computing security and privacy issues, open challenges, and blockchain so...
IJECEIAES
 
PDF
Control of Communication and Energy Networks Final Project - Service Function...
Biagio Botticelli
 
PPTX
Applicability of Machine learning in computer networks
Chetan Kumar S
 
PDF
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET Journal
 
PDF
Blockchain Technology In IOT
Stacey Roberts
 
PDF
IoT on Blockchain Solution Overview
Provide Technologies
 
PDF
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
 
PDF
IoT Malware Detection through Threshold Random Walks
Biagio Botticelli
 
PDF
How blockchain will defend iot
Hitesh Malviya
 
PDF
Secure and Smart IoT using Blockchain and AI
Ahmed Banafa
 
PPSX
Unit 1.1
Chintan Patel
 
PDF
Blockchain for IoT
Federico Tenga
 
PDF
2 cyber security challenges in io t
Chintan Patel
 
PPTX
Second line of defense for cybersecurity : Blockchain
Ahmed Banafa
 
PPTX
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
Ahmed Banafa
 
PDF
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
eraser Juan José Calderón
 
PPTX
Secure and Smart IoT
Ahmed Banafa
 
PPTX
Internet of Things (IoT) two-factor authentication using blockchain
David Wood
 
PPTX
blockchain and iot: Opportunities and Challanges
Chetan Kumar S
 
PPTX
BaaS for IoT
Isuru Nuwanthilaka
 
Fog computing security and privacy issues, open challenges, and blockchain so...
IJECEIAES
 
Control of Communication and Energy Networks Final Project - Service Function...
Biagio Botticelli
 
Applicability of Machine learning in computer networks
Chetan Kumar S
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET Journal
 
Blockchain Technology In IOT
Stacey Roberts
 
IoT on Blockchain Solution Overview
Provide Technologies
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
 
IoT Malware Detection through Threshold Random Walks
Biagio Botticelli
 
How blockchain will defend iot
Hitesh Malviya
 
Secure and Smart IoT using Blockchain and AI
Ahmed Banafa
 
Unit 1.1
Chintan Patel
 
Blockchain for IoT
Federico Tenga
 
2 cyber security challenges in io t
Chintan Patel
 
Second line of defense for cybersecurity : Blockchain
Ahmed Banafa
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
Ahmed Banafa
 
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
eraser Juan José Calderón
 
Secure and Smart IoT
Ahmed Banafa
 
Internet of Things (IoT) two-factor authentication using blockchain
David Wood
 
blockchain and iot: Opportunities and Challanges
Chetan Kumar S
 
BaaS for IoT
Isuru Nuwanthilaka
 

Similar to IoT and Blockchains - enhancing security and privacy (20)

PDF
final.pdf
ishantpatil1
 
PDF
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
 
PPTX
IoT and Blockchain Convergence
Ahmed Banafa
 
PPTX
IoT Security and Data Privacy Concerns.pptx
Brian Frerichs
 
PPTX
220943-RSP.pptx
INDHUJALV
 
PDF
The Role of Blockchain in Securing IoT Devices (www.kiu.ac.ug)
publication11
 
PPTX
Secure-IoT-with-Blockchain-presentation.pptx
DineshK56007
 
PDF
Internet of things and blockchain integration for security and privacy
IAESIJAI
 
PDF
Blockchain IoT Security Why do we need it.pdf
Rosalie Lauren
 
PDF
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET Journal
 
PDF
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
David Bess
 
PDF
Blockchain for the internet of things a systematic literature review
eraser Juan José Calderón
 
PDF
Blockchain technology and internet of things: review, challenge and security...
IJECEIAES
 
PDF
Io t security_review_blockchain_solutions
Shyam Goyal
 
PDF
IoT summit - Building flexible & secure IoT solutions
Eric Larcheveque
 
PPTX
IoT and Blockchain Challenges and Risks
Ahmed Banafa
 
PPTX
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctr
vaishnavishitole195
 
PDF
Build Secure IoT Solutions Using... Blockchain - Geeta Chauhan
WithTheBest
 
PDF
Build Secure IOT Solutions using Blockchain
geetachauhan
 
PDF
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
 
final.pdf
ishantpatil1
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
 
IoT and Blockchain Convergence
Ahmed Banafa
 
IoT Security and Data Privacy Concerns.pptx
Brian Frerichs
 
220943-RSP.pptx
INDHUJALV
 
The Role of Blockchain in Securing IoT Devices (www.kiu.ac.ug)
publication11
 
Secure-IoT-with-Blockchain-presentation.pptx
DineshK56007
 
Internet of things and blockchain integration for security and privacy
IAESIJAI
 
Blockchain IoT Security Why do we need it.pdf
Rosalie Lauren
 
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET Journal
 
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
David Bess
 
Blockchain for the internet of things a systematic literature review
eraser Juan José Calderón
 
Blockchain technology and internet of things: review, challenge and security...
IJECEIAES
 
Io t security_review_blockchain_solutions
Shyam Goyal
 
IoT summit - Building flexible & secure IoT solutions
Eric Larcheveque
 
IoT and Blockchain Challenges and Risks
Ahmed Banafa
 
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctr
vaishnavishitole195
 
Build Secure IoT Solutions Using... Blockchain - Geeta Chauhan
WithTheBest
 
Build Secure IOT Solutions using Blockchain
geetachauhan
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
 
Ad

More from Paul Fremantle (18)

PPTX
Web API Management meets the Internet of Things
Paul Fremantle
 
PPTX
IoT World - creating a secure robust IoT reference architecture
Paul Fremantle
 
PPTX
Apache Stratos - Building a PaaS using OSGi and Equinox
Paul Fremantle
 
PPTX
Securing the Internet of Things
Paul Fremantle
 
PDF
Federated Identity for IoT with OAuth2
Paul Fremantle
 
PDF
Beyond Economics - Cloud as a Business Enabler
Paul Fremantle
 
PDF
Evolution of PaaS
Paul Fremantle
 
PDF
The Evolution of Integration
Paul Fremantle
 
PPTX
High Volume Web API Management with the WSO2 ESB
Paul Fremantle
 
PDF
Stratos Open PaaS OSCON 2011
Paul Fremantle
 
PPT
Stratos and PaaS for London Java Community
Paul Fremantle
 
PPT
Understanding Platform as a Service
Paul Fremantle
 
PPT
Making Apache Tomcat Multi-tenant, Elastic and Metered
Paul Fremantle
 
PPT
Building Cloud Native Software
Paul Fremantle
 
PPT
Building Innovation with Open Source Approaches
Paul Fremantle
 
PPT
Three SOA Case Studies
Paul Fremantle
 
PPT
Fast SOA with Apache Synapse
Paul Fremantle
 
PPT
REST vs WS-*: Myths Facts and Lies
Paul Fremantle
 
Web API Management meets the Internet of Things
Paul Fremantle
 
IoT World - creating a secure robust IoT reference architecture
Paul Fremantle
 
Apache Stratos - Building a PaaS using OSGi and Equinox
Paul Fremantle
 
Securing the Internet of Things
Paul Fremantle
 
Federated Identity for IoT with OAuth2
Paul Fremantle
 
Beyond Economics - Cloud as a Business Enabler
Paul Fremantle
 
Evolution of PaaS
Paul Fremantle
 
The Evolution of Integration
Paul Fremantle
 
High Volume Web API Management with the WSO2 ESB
Paul Fremantle
 
Stratos Open PaaS OSCON 2011
Paul Fremantle
 
Stratos and PaaS for London Java Community
Paul Fremantle
 
Understanding Platform as a Service
Paul Fremantle
 
Making Apache Tomcat Multi-tenant, Elastic and Metered
Paul Fremantle
 
Building Cloud Native Software
Paul Fremantle
 
Building Innovation with Open Source Approaches
Paul Fremantle
 
Three SOA Case Studies
Paul Fremantle
 
Fast SOA with Apache Synapse
Paul Fremantle
 
REST vs WS-*: Myths Facts and Lies
Paul Fremantle
 
Ad

Recently uploaded (20)

PDF
Internet Governance and its role in Global economy presentation By Shreedeep ...
Shreedeep Rayamajhi
 
PPTX
英国学位证(RCM毕业证书)皇家音乐学院毕业证书如何办理
Taqyea
 
PDF
How to Fix Error Code 16 in Adobe Photoshop A Step-by-Step Guide.pdf
Becky Lean
 
PPTX
ZARA-Case.pptx djdkkdjnddkdoodkdxjidjdnhdjjdjx
RonnelPineda2
 
PDF
Technical Guide to Build a Successful Shopify Marketplace from Scratch.pdf
CartCoders
 
PDF
The Complete Guide to Chrome Net Internals DNS – 2025
Orage Technologies
 
PPTX
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 
PDF
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
PDF
123546568reb2024-Linux-remote-logging.pdf
lafinedelcinghiale
 
PPTX
Random Presentation By Fuhran Khalil uio
maniieiish
 
PPT
Computer Securityyyyyyyy - Chapter 2.ppt
SolomonSB
 
PDF
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
PDF
Pas45789-Energs-Efficient-Craigg1ing.pdf
lafinedelcinghiale
 
PDF
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
PPTX
Cost_of_Quality_Presentation_Software_Engineering.pptx
farispalayi
 
PPTX
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
PPTX
unit 2_2 copy right fdrgfdgfai and sm.pptx
nepmithibai2024
 
PPT
introduction to networking with basics coverage
RamananMuthukrishnan
 
PDF
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
PPTX
ipv6 very very very very vvoverview.pptx
eyala75
 
Internet Governance and its role in Global economy presentation By Shreedeep ...
Shreedeep Rayamajhi
 
英国学位证(RCM毕业证书)皇家音乐学院毕业证书如何办理
Taqyea
 
How to Fix Error Code 16 in Adobe Photoshop A Step-by-Step Guide.pdf
Becky Lean
 
ZARA-Case.pptx djdkkdjnddkdoodkdxjidjdnhdjjdjx
RonnelPineda2
 
Technical Guide to Build a Successful Shopify Marketplace from Scratch.pdf
CartCoders
 
The Complete Guide to Chrome Net Internals DNS – 2025
Orage Technologies
 
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
123546568reb2024-Linux-remote-logging.pdf
lafinedelcinghiale
 
Random Presentation By Fuhran Khalil uio
maniieiish
 
Computer Securityyyyyyyy - Chapter 2.ppt
SolomonSB
 
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
Pas45789-Energs-Efficient-Craigg1ing.pdf
lafinedelcinghiale
 
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
Cost_of_Quality_Presentation_Software_Engineering.pptx
farispalayi
 
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
unit 2_2 copy right fdrgfdgfai and sm.pptx
nepmithibai2024
 
introduction to networking with basics coverage
RamananMuthukrishnan
 
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
ipv6 very very very very vvoverview.pptx
eyala75
 

IoT and Blockchains - enhancing security and privacy

  • 1. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Enhancing IoT Security and Privacy with Distributed Ledgers Paul Fremantle[1], Benjamin Aziz[1], Tom Kirkham[2] [1]School of Computing, University of Portsmouth {paul.fremantle, benjamin.aziz}@port.ac.uk, [2] Science and Technology Facilities Council [email protected]
  • 2. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham One Minute Overview Problem: The Internet of Things is insecure Mirai 620+Gbps attack Devices are tied to vendors, No heterogeneous interop, No shared governance New Transaction Le d g er Le d g er Le d g er Le d g er Le d g er Entered into Block Consensus Ledgers are updated Next Block Distributed Ledgers provide shared governance Typical IoT devices are too small to run consensus algorithms Intel SGX enclave! ! ! ! ! ! ! ! Blockchain! processor! Pythia API! OpenSourcecode IoT! Devic e! Attestation Interaction withBlockchain We propose a new model called Pythia that enables IoT devices to trust Dist Ledgers
  • 3. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Challenges for IoT Security and Privacy •  October 2016 Mirai Botnet –  100,000 devices compromised –  620Gbps DDOS attack –  In reality there are millions of compromisable devices (Checkpoint study 2014) –  Mirai was based on a dictionary attack and weak passwords •  Also attacks on cars, houses, medical devices, etc –  A survey of secure middleware for the Internet of Things, Fremantle and Scott, PeerJ, accepted for publication
  • 4. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham IoT security and privacy •  Updates are difficult and there is no economic incentive for manufacturers •  Lack of clear ownership and registration models •  Poor identity models •  Leakage of data and metadata •  Use of IoT devices as attack vectors
  • 5. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham The real challenge IoT is not heterogeneous, hence no choices for users Low economic and evolutionary pressures Chrome Firefox Safari Internet Explorer Dropbox Google Drive FTP, NAS, etc HTTP, TLS HTTP/2 UDP, DTLS, FTPS, XMPP, etc Fitbit Server Fitbit
  • 6. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Distributed Ledger Technologies N1 N2 Nn New Transaction Ledger Ledger Ledger Ledger Ledger Entered into Block Consensus Ledgers are updated Next Block Ledger uses a Merkle Tree to ensure that each record guarantees all previous records to create an immutable chain
  • 7. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Consensus algorithms •  Bitcoin: Proof of Work – Miners perform hashing, competing to be the first to finalise the block, with a reward – The longest chain becomes the master – No requirement to know or trust the other participants – Expensive, low transaction rate, slow to come to consensus – Proven to be resilient at global scale
  • 8. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Alternative consensus models •  Arbitrary participants – Proof of storage •  Calculations based on stored data – Proof of stake •  Based on ownership of existing coins •  Known participants – Byzantine Failure Tolerant algorithms – E.g. Paxos
  • 9. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham What can DLT do for IoT •  Three main concepts –  Distributed Ledger •  A single, agreed source of truth –  Cryptocurrency •  Economic models to create value for security and privacy –  Smart Contracts •  Flexible transaction models that allow new transactions to be scripted •  An environment where there can be trust, privacy and effective contracts between parties without reliance on a single vendor.
  • 10. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham User Sphere: Fully in control of user e.g. Laptop Joint Sphere: Appears to be in user control e.g. GMail Three Tier Privacy Model Spierkermann and Cranor Spiekermann, Sarah, and Lorrie Faith Cranor. "Engineering privacy." IEEE Transactions on software engineering 35.1 (2009): 67-82. Recipient Sphere: Fully in control of Data recipient
  • 11. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Approaches / Use cases Identity Ownership Registration Updates Consent Contracts Consent Logs Data Revocation Contracts Policies Policy enforcement contracts
  • 12. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham User Sphere: Device Identity Device Ownership and Registration Device Updates Joint Sphere: Consent Management Policies Recipient Sphere: Consent Tracking Policy Enforcement Data Revocation Three tier privacy model for IoT
  • 13. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Typical IoT footprints ESP8266 – 32bit controller, 1Mb program, 80k RAM ~ $2 each
  • 14. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Uh oh •  How does an IoT system participate and trust in a DLT? – Full participation is expensive •  Bitcoin database >80Gb •  512MB of RAM, 1Ghz CPU minimum – Simple Payment Verification (SPV) smaller but still beyond IoT devices – Fundamentally, consensus algorithms are beyond the CPU, network, power and memory of IoT
  • 15. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Oracles •  In blockchains, an Oracle is a system that truthfully informs the blockchain about events outside the ledger Zhang, F., Cecchetti, E., Croman, K., Juels, A., and Shi, E. (2016). Town crier: An authenticated data feed for smart contracts. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 270–282. ACM.
  • 16. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Pythia Lycurgus Consulting the Pythia (1835/1845), Delacroix
  • 17. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham New concept - Pythia •  We define a Pythia as the “inverse” of an Oracle •  Informs the outside world truthfully about the distributed ledger – In our case, the IoT device needs to be able to interact with the ledger: •  Without participating in consensus directly •  With trust
  • 18. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Intel SGX extensions •  Provide a secure enclave – Compare with Sandbox •  The code within the enclave is protected from the rest of the system •  Remote attestation can guarantee the codebase running is a known codebase
  • 19. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Pythia •  A proposed model to allow IoT devices to trust DLTs •  An attested proxy for the ledger •  The Pythia truthfully informs the world (IoT) about the ledger –  Without the IoT needing to participate in consensus Intel SGX enclave! ! ! ! ! ! ! ! Blockchain! processor! Pythia API! OpenSourcecode IoT! Device! Attestation Interaction withBlockchain
  • 20. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham OAuthing •  Previous work on IoT privacy and security: –  Secure device registration –  Pseudonymous Data Sharing –  Personal IoT middleware –  But without DLT (so far) •  OAuthing + DLT + Pythia: –  Shared governance and an approach based on smart contracts Fremantle, P. and Aziz, B. (2016): OAuthing: privacy-enhancing federation for the Internet of Things, 2nd International Conference on the Cloudification of the Internet of Things
  • 21. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Related Work •  Tindall, K. (2015) –  Bitcoin payments for IoT updates •  Christidis and Devetsikiotis (2016) –  Discuss IoT and Blockchains, but not specifically privacy and security •  Proof of Luck –  Milutinovic et al. (2016) provide an alternative consensus model based on SGX enclaves •  Frey et al (2016) –  Have demonstrated trust in Bitcoin on a mobile phone
  • 22. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Conclusions and further work •  Position paper: still plenty of work to do •  This is a serious issue: –  How does the IoT trust the Blockchain without significant overhead? •  Pythia is one potential approach •  Need to validate: –  Blockchain running within SGX (128Mb limitation) –  Remote attestation costs on IoT devices –  SGX challenges
  • 23. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Contributions •  A model for reasoning about how blockchains can improve privacy and security in IoT •  A set of approaches for improving security and privacy of IoT with blockchains •  A proposed architecture (Pythia) for creating distributed trust in a blockchain on low- power devices.
  • 24. Enhancing IoT Privacy and Security with Distributed Ledgers, Fremantle, Aziz, Kirkham Thank you & Questions