2
Most read
5
Most read
7
Most read
IOT Privacy and
security
PRESENTED BY : AFIFA ZAFAR & FARWA MUKHTAR
IOT (Internet of things )
 The Internet of things describes the network of
physical objects—a.k.a. "things"—that are
embedded with sensors, software, and other
technologies for the purpose of connecting
and exchanging data with other devices and
systems over the Internet.
IOT (Internet of things )
What is it And
How it Works
Risks Factors
 Security risk
 Software risk
 Network risk
 Privacy risk
Security risks
Device supply chain
Devices may be resold pre-programmed with malware.
Firmware upgrade
OTA may be abused.
Applications and services
Exposed services and end-user applications may be compromised.
Working network
User networks are hostile by definition.
Cloud service impersonation
Software risk mitigation
 Use secure development practices for the platform and
language.
 Trim and re-evaluate third-party software and libraries. (Use
sound and proven cryptographic implementations.)
 Secure the boot process.
 Authenticate OTA update sources and targets. (Have distinct
device signatures for software updates).
 Pair external devices, such as phones, securely (e.g. secure
NFC/Bluetooth).
Network risk mitigation
 Different default credentials for all devices.
 Security on the protocol level.
 Peer authentication and authorization.
 Secret sharing
 Cryptographic one-way hashing
 Zero knowledge proof
 Nodes act only as clients towards the network.
Privacy risks
 Identity disclosure
 Device may transmit personally identifiable data.
 Device transmissions may be recognizable.
 Location disclosure
 Device may transmit its explicit location.
 Device may be itself traceable through its
communications.
Privacy risk mitigation
 Identity disclosure
 Pseudonym.
 Connection anonymization.
 Location disclosure
 Pseudonym.
 Data confidentiality
• No direct access to personally identifiable data from
devices.
• Secure data center / cloud resources.
Security and privacy first
 Security and privacy are first-class
requirements.(Design from the start with them in
mind).
 Define trust boundaries(Device/gateway,
gateway/cloud)
 Imagine unlawful ways of interacting with the
system(Threat modeling)
IOT privacy and Security

More Related Content

PDF
Security challenges in IoT
PDF
IoT Security Challenges and Solutions
PPTX
Iot Security
PDF
IoT Security: Problems, Challenges and Solutions
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PPTX
security and privacy-Internet of things
PPT
IoT security (Internet of Things)
PDF
Security in IoT
Security challenges in IoT
IoT Security Challenges and Solutions
Iot Security
IoT Security: Problems, Challenges and Solutions
IoT Security, Threats and Challenges By V.P.Prabhakaran
security and privacy-Internet of things
IoT security (Internet of Things)
Security in IoT

What's hot (20)

PPTX
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
PPTX
Overview of IoT (JNTUK - UNIT 1)
PPTX
Ppt 3 - IOT logic design
PPTX
Internet of things ppt
PDF
IOT Security
PPTX
IoT security
PPTX
Sources of IoT (JNTUK - UNIT 1)
PPTX
Introduction to IoT Security
 
PDF
Introduction to IoT Architectures and Protocols
PDF
Introduction to Software Defined Networking (SDN)
PPTX
Internet of things using Raspberry Pi
PDF
Cisco Internet of Things
PDF
IoT Networking
PPTX
M2M Communication
PDF
IoT Communication Protocols
PPTX
IOT System Management with NETCONF-YANG.pptx
PPTX
M2M systems layers and designs standardizations
PDF
IoT and m2m
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
Overview of IoT (JNTUK - UNIT 1)
Ppt 3 - IOT logic design
Internet of things ppt
IOT Security
IoT security
Sources of IoT (JNTUK - UNIT 1)
Introduction to IoT Security
 
Introduction to IoT Architectures and Protocols
Introduction to Software Defined Networking (SDN)
Internet of things using Raspberry Pi
Cisco Internet of Things
IoT Networking
M2M Communication
IoT Communication Protocols
IOT System Management with NETCONF-YANG.pptx
M2M systems layers and designs standardizations
IoT and m2m
Ad

Similar to IOT privacy and Security (20)

PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PDF
IoT Security and Privacy Concerns: Safeguarding Your Connected Devices
PPTX
Presentation on IOT SECURITY
PDF
mypresentation.pdf
PPTX
Internet & iot security
PPTX
IOT presentation.pptx
PPTX
Security of iot device
PPTX
BMI.pptx
PPTX
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
PDF
Securing the Internet of Things
PPTX
Introduction to IOT security
PPTX
IOT.pptx
PPTX
Security challenges for internet of things
PPTX
Internet Of Things(IoT).pptx
PDF
This Time, It’s Personal: Why Security and the IoT Is Different
PPTX
Internet of Things security basics.pptx
PDF
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
PPTX
Assign 1_8812814ctm.pptx
PDF
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
PDF
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
IoT Security and Privacy Concerns: Safeguarding Your Connected Devices
Presentation on IOT SECURITY
mypresentation.pdf
Internet & iot security
IOT presentation.pptx
Security of iot device
BMI.pptx
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
Securing the Internet of Things
Introduction to IOT security
IOT.pptx
Security challenges for internet of things
Internet Of Things(IoT).pptx
This Time, It’s Personal: Why Security and the IoT Is Different
Internet of Things security basics.pptx
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
Assign 1_8812814ctm.pptx
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
Ad

Recently uploaded (20)

PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Hybrid model detection and classification of lung cancer
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Unlock new opportunities with location data.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
A comparative study of natural language inference in Swahili using monolingua...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Chapter 5: Probability Theory and Statistics
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Developing a website for English-speaking practice to English as a foreign la...
DP Operators-handbook-extract for the Mautical Institute
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Hybrid model detection and classification of lung cancer
1 - Historical Antecedents, Social Consideration.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
WOOl fibre morphology and structure.pdf for textiles
Final SEM Unit 1 for mit wpu at pune .pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Tartificialntelligence_presentation.pptx
Assigned Numbers - 2025 - Bluetooth® Document
CloudStack 4.21: First Look Webinar slides
Unlock new opportunities with location data.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game

IOT privacy and Security

  • 1. IOT Privacy and security PRESENTED BY : AFIFA ZAFAR & FARWA MUKHTAR
  • 2. IOT (Internet of things )  The Internet of things describes the network of physical objects—a.k.a. "things"—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the Internet.
  • 3. IOT (Internet of things ) What is it And How it Works
  • 4. Risks Factors  Security risk  Software risk  Network risk  Privacy risk
  • 5. Security risks Device supply chain Devices may be resold pre-programmed with malware. Firmware upgrade OTA may be abused. Applications and services Exposed services and end-user applications may be compromised. Working network User networks are hostile by definition. Cloud service impersonation
  • 6. Software risk mitigation  Use secure development practices for the platform and language.  Trim and re-evaluate third-party software and libraries. (Use sound and proven cryptographic implementations.)  Secure the boot process.  Authenticate OTA update sources and targets. (Have distinct device signatures for software updates).  Pair external devices, such as phones, securely (e.g. secure NFC/Bluetooth).
  • 7. Network risk mitigation  Different default credentials for all devices.  Security on the protocol level.  Peer authentication and authorization.  Secret sharing  Cryptographic one-way hashing  Zero knowledge proof  Nodes act only as clients towards the network.
  • 8. Privacy risks  Identity disclosure  Device may transmit personally identifiable data.  Device transmissions may be recognizable.  Location disclosure  Device may transmit its explicit location.  Device may be itself traceable through its communications.
  • 9. Privacy risk mitigation  Identity disclosure  Pseudonym.  Connection anonymization.  Location disclosure  Pseudonym.  Data confidentiality • No direct access to personally identifiable data from devices. • Secure data center / cloud resources.
  • 10. Security and privacy first  Security and privacy are first-class requirements.(Design from the start with them in mind).  Define trust boundaries(Device/gateway, gateway/cloud)  Imagine unlawful ways of interacting with the system(Threat modeling)