SlideShare a Scribd company logo
Security Challenges in IoT
December 1, 2017
1 / 25
Outline
Introduction
Technologies used in IoT
RFID Technology
EPC Technology
Security Challenges in IoT
Solutions
Cryptographic Algorithms
Conclusion
References
2 / 25
Introduction
Definition
Intelligent interactivity between human and things to exchange
information and knowledge for new value creation
3 / 25
Introduction (Cont’d)
Smart systems and Internet of Things are driven by a
combination of
4 / 25
Introduction (Cont’d)
Sensors and Actuators
5 / 25
Introduction (Cont’d)
Connectivity
6 / 25
Introduction (Cont’d)
People and Processes
7 / 25
Introduction (Cont’d)
Applications
Smart Home
Wearables
Connected Cars
Industrial Internet
Smart Cities
IoT in agriculture
Smart Retail
Energy Engagement
IOT in Healthcare
IoT in Poultry and Farming
8 / 25
Outline
Introduction
Technologies used in IoT
RFID Technology
EPC Technology
Security Challenges in IoT
Solutions
Cryptographic Algorithms
Conclusion
References
9 / 25
Technologies used in IoT
RFID Technology
Radio Frequency Identification Technology
Use of radio waves to read and capture information stored on
a tag attached to an object
10 / 25
Technologies used in IoT (Cont’d)
Classifications for RFID tags
Class 0/class 1
basic radio frequency (RF) passive capability
tags are factory programmed
Class 2
Additional functionality - encryption and read-write RF
memory
tags are user-programmable
Class 3
Batteries are found on board that will power logic in the
computer circuit
longer range and broadband communications
11 / 25
Technologies used in IoT (Cont’d)
Classifications for RFID tags(Cont’d)
Class 4
Active tags
Peer-to-peer communications and additional sensing
Class 5
contain enough power to activate other tags
classified as a reader
12 / 25
Outline
Introduction
Technologies used in IoT
RFID Technology
EPC Technology
Security Challenges in IoT
Solutions
Cryptographic Algorithms
Conclusion
References
13 / 25
Technologies used in IoT (Cont’d)
EPC Technology
Electronics Product Code Technology
a universal identifier that provides a unique identity for every
physical object anywhere in the world, for all time
14 / 25
Technologies used in IoT (Cont’d)
Electronics Product Code - 96 bits which is divided into four
categories
15 / 25
Security Challenges in IoT
Key challenge areas are
Access control
Confidentiality
Integrity
Availability
Privacy
Standardization
Data deluge
16 / 25
Solutions
Timely updation of software
IoT devices are huge in number and it quite difficult to update
these devices one by one
High security codes
Data loss can happen if the attacker cracks the code
Devices must be connected to a central power station
But if central power station reaches its empty level
17 / 25
Outline
Introduction
Technologies used in IoT
RFID Technology
EPC Technology
Security Challenges in IoT
Solutions
Cryptographic Algorithms
Conclusion
References
18 / 25
Solutions(Cont’d)
Cryptographic Algorithms
ECC - Elliptic Curve Cryptography
public-key Cryptography
supports authenticated key exchange protocols
smaller keys, cipher text and signature
very fast key generation
fast encryption and decryption
uses less memory and CPU cycles
An elliptic curve is a plane curve defined by an equation of the
form
y2
= x3
+ ax + b
19 / 25
Solutions(Cont’d)
Cryptographic Algorithms
HMAC - Hash Based Message Authentication Code
hash function and a secret key
verify both the data integrity and the authentication of a
message
strength depends upon the cryptographic strength of the
underlying hash function, the size of its hash output, and on
the size and quality of the key.
less affected by collisions
HMAC(K, m) = H((K ⊕ opad)||H(K ⊕ ipad)||m)
20 / 25
Solutions(Cont’d)
Cryptographic Algorithms
21 / 25
Solutions(Cont’d)
Cryptographic Algorithms
22 / 25
Conclusion
Billions of devices are connected to the Internet
Companies behind these devices are not designing them with
security in mind
Leaving IoT devices unsecured, is like leaving the back door to
your house unlocked
Various solutions to security challenges were discussed
Cryptographic encrytpion techniques like ECC and HMAC can
be used to provide better protection
23 / 25
References
1. Aditya Parashar, Sachin Rishishwar Security Challanges In IoT
3rd International Conference on Advances in Electrical,
Electronics, Information, Communication and Bio-Informatics
(AEEICB17)
2. Ankush B. Pawar, Dr.Shashikant Ghumbre A survey on IoT
applications, security challenges, and counter measures 2016
International Conference on Computing, Analytics and
Security Trends (CAST)
3. Mohsen Hallaj Asghar RFID and EPC as key technology on
Internet of Things (IoT) IJCST Vol. 6, Iss ue 1, Jan - March
2015
4. Xiaolin Jia, Quanyuan Feng, Taihua Fan, Quanshui Lei1 RFID
Technology and Its Applications in Internet of Things (IOT)
978-1-4577-1415-3/12/2012 IEEE
24 / 25
25 / 25

More Related Content

What's hot (20)

PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
PPT
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
PDF
Introduction to IoT Architectures and Protocols
Abdullah Alfadhly
 
PPTX
Unit 4
Mayura shelke
 
PPTX
Introduction to IoT Security
CAS
 
PPTX
Introduction to IOT
Zubayer Al Billal Khan
 
PPTX
Zigbee Presentation
Maathu Michael
 
PPTX
security and privacy-Internet of things
sreelekha appakondappagari
 
PDF
101 Use Cases for IoT
Cisco Canada
 
PDF
Internet of Things (IOT) - Technology and Applications
Dr. Mazlan Abbas
 
PPTX
Technology Behind IoT (JNTUK - Unit - 1)
FabMinds
 
PPTX
Iot architecture
Niranjan Kumar
 
PPTX
Iot Security
MAITREYA MISRA
 
PPTX
Iot Security, Internet of Things
Bryan Len
 
PPTX
IoT
Ananth Kumar
 
PDF
Security in IoT
SKS
 
PDF
IoT Communication Protocols
Pradeep Kumar TS
 
PPT
Nano computing
manpreetgrewal
 
PDF
Wireless Network Architecture
Pawandeep Singh
 
PPTX
1. Introduction to IoT
Abhishek Das
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
Introduction to IoT Architectures and Protocols
Abdullah Alfadhly
 
Introduction to IoT Security
CAS
 
Introduction to IOT
Zubayer Al Billal Khan
 
Zigbee Presentation
Maathu Michael
 
security and privacy-Internet of things
sreelekha appakondappagari
 
101 Use Cases for IoT
Cisco Canada
 
Internet of Things (IOT) - Technology and Applications
Dr. Mazlan Abbas
 
Technology Behind IoT (JNTUK - Unit - 1)
FabMinds
 
Iot architecture
Niranjan Kumar
 
Iot Security
MAITREYA MISRA
 
Iot Security, Internet of Things
Bryan Len
 
Security in IoT
SKS
 
IoT Communication Protocols
Pradeep Kumar TS
 
Nano computing
manpreetgrewal
 
Wireless Network Architecture
Pawandeep Singh
 
1. Introduction to IoT
Abhishek Das
 

Similar to Security challenges in IoT (20)

PDF
IoT and the Role of Platforms
TiE Bangalore
 
PPTX
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
 
PDF
Overview of IoT and Security issues
Anastasios Economides
 
PDF
Track 4 session 6 - st dev con 2016 - samsung artik
ST_World
 
PDF
Secured authentication of radio-frequency identification system using PRESENT...
IJECEIAES
 
PDF
Introduction to Internet of Things (IoT)
Francesco Felicetta
 
PDF
9 th International Conference on Information Technology, Control, Chaos, Mode...
IJCSEA Journal
 
PDF
IoT Landscape and its Key Trends in Deployment
Vincent Lau
 
PPTX
1. How will the IoT help your business - cisco
MITEF México
 
PDF
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
Daniel Wachtel
 
PDF
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Anastasios Economides
 
PPTX
Security and Authentication of Internet of Things (IoT) Devices
SanjayKumarYadav58
 
PDF
Welcome to CNSA 2025! Call for Research Papers!
dannyijwest
 
PDF
IoT and IIoT - Security Challenges and Innovative Approaches
Shashi Kiran
 
PDF
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
 
PDF
CFP - 18th International Conference on Network Security & Applications (CNSA ...
IJDKP
 
PDF
The International Conference on Internet of Things (IoT)and Information Secur...
aciijournal
 
PDF
Industrial IoT and OT/IT Convergence
Michelle Holley
 
PDF
IoT-Enabled Predictive Maintenance Infobite
Equinix
 
PDF
ICC Networking Data Security
International Communications Corporation
 
IoT and the Role of Platforms
TiE Bangalore
 
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
 
Overview of IoT and Security issues
Anastasios Economides
 
Track 4 session 6 - st dev con 2016 - samsung artik
ST_World
 
Secured authentication of radio-frequency identification system using PRESENT...
IJECEIAES
 
Introduction to Internet of Things (IoT)
Francesco Felicetta
 
9 th International Conference on Information Technology, Control, Chaos, Mode...
IJCSEA Journal
 
IoT Landscape and its Key Trends in Deployment
Vincent Lau
 
1. How will the IoT help your business - cisco
MITEF México
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
Daniel Wachtel
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Anastasios Economides
 
Security and Authentication of Internet of Things (IoT) Devices
SanjayKumarYadav58
 
Welcome to CNSA 2025! Call for Research Papers!
dannyijwest
 
IoT and IIoT - Security Challenges and Innovative Approaches
Shashi Kiran
 
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
 
CFP - 18th International Conference on Network Security & Applications (CNSA ...
IJDKP
 
The International Conference on Internet of Things (IoT)and Information Secur...
aciijournal
 
Industrial IoT and OT/IT Convergence
Michelle Holley
 
IoT-Enabled Predictive Maintenance Infobite
Equinix
 
ICC Networking Data Security
International Communications Corporation
 
Ad

More from Vishnupriya T H (7)

PDF
Computer graphics - colour crt and flat-panel displays
Vishnupriya T H
 
PDF
Apache HBase
Vishnupriya T H
 
PPTX
Security auditing architecture
Vishnupriya T H
 
PPTX
A comparative review of various approaches for feature extraction in Face rec...
Vishnupriya T H
 
PPTX
Sampling design, sampling errors, sample size determination
Vishnupriya T H
 
PDF
Halstead's software science - ananalytical technique
Vishnupriya T H
 
PPTX
Introduction to Triz (TIPS)
Vishnupriya T H
 
Computer graphics - colour crt and flat-panel displays
Vishnupriya T H
 
Apache HBase
Vishnupriya T H
 
Security auditing architecture
Vishnupriya T H
 
A comparative review of various approaches for feature extraction in Face rec...
Vishnupriya T H
 
Sampling design, sampling errors, sample size determination
Vishnupriya T H
 
Halstead's software science - ananalytical technique
Vishnupriya T H
 
Introduction to Triz (TIPS)
Vishnupriya T H
 
Ad

Recently uploaded (20)

PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Digital Professionalism and Interpersonal Competence
rutvikgediya1
 
PPTX
Introduction to Probability(basic) .pptx
purohitanuj034
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PPTX
Cybersecurity: How to Protect your Digital World from Hackers
vaidikpanda4
 
PPTX
Applied-Statistics-1.pptx hardiba zalaaa
hardizala899
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
PDF
My Thoughts On Q&A- A Novel By Vikas Swarup
Niharika
 
PDF
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
PDF
John Keats introduction and list of his important works
vatsalacpr
 
PPTX
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
PPTX
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PPTX
Top 10 AI Tools, Like ChatGPT. You Must Learn In 2025
Digilearnings
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPT
DRUGS USED IN THERAPY OF SHOCK, Shock Therapy, Treatment or management of shock
Rajshri Ghogare
 
PPTX
Rules and Regulations of Madhya Pradesh Library Part-I
SantoshKumarKori2
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
Digital Professionalism and Interpersonal Competence
rutvikgediya1
 
Introduction to Probability(basic) .pptx
purohitanuj034
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Cybersecurity: How to Protect your Digital World from Hackers
vaidikpanda4
 
Applied-Statistics-1.pptx hardiba zalaaa
hardizala899
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
My Thoughts On Q&A- A Novel By Vikas Swarup
Niharika
 
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
John Keats introduction and list of his important works
vatsalacpr
 
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Top 10 AI Tools, Like ChatGPT. You Must Learn In 2025
Digilearnings
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
DRUGS USED IN THERAPY OF SHOCK, Shock Therapy, Treatment or management of shock
Rajshri Ghogare
 
Rules and Regulations of Madhya Pradesh Library Part-I
SantoshKumarKori2
 

Security challenges in IoT

  • 1. Security Challenges in IoT December 1, 2017 1 / 25
  • 2. Outline Introduction Technologies used in IoT RFID Technology EPC Technology Security Challenges in IoT Solutions Cryptographic Algorithms Conclusion References 2 / 25
  • 3. Introduction Definition Intelligent interactivity between human and things to exchange information and knowledge for new value creation 3 / 25
  • 4. Introduction (Cont’d) Smart systems and Internet of Things are driven by a combination of 4 / 25
  • 8. Introduction (Cont’d) Applications Smart Home Wearables Connected Cars Industrial Internet Smart Cities IoT in agriculture Smart Retail Energy Engagement IOT in Healthcare IoT in Poultry and Farming 8 / 25
  • 9. Outline Introduction Technologies used in IoT RFID Technology EPC Technology Security Challenges in IoT Solutions Cryptographic Algorithms Conclusion References 9 / 25
  • 10. Technologies used in IoT RFID Technology Radio Frequency Identification Technology Use of radio waves to read and capture information stored on a tag attached to an object 10 / 25
  • 11. Technologies used in IoT (Cont’d) Classifications for RFID tags Class 0/class 1 basic radio frequency (RF) passive capability tags are factory programmed Class 2 Additional functionality - encryption and read-write RF memory tags are user-programmable Class 3 Batteries are found on board that will power logic in the computer circuit longer range and broadband communications 11 / 25
  • 12. Technologies used in IoT (Cont’d) Classifications for RFID tags(Cont’d) Class 4 Active tags Peer-to-peer communications and additional sensing Class 5 contain enough power to activate other tags classified as a reader 12 / 25
  • 13. Outline Introduction Technologies used in IoT RFID Technology EPC Technology Security Challenges in IoT Solutions Cryptographic Algorithms Conclusion References 13 / 25
  • 14. Technologies used in IoT (Cont’d) EPC Technology Electronics Product Code Technology a universal identifier that provides a unique identity for every physical object anywhere in the world, for all time 14 / 25
  • 15. Technologies used in IoT (Cont’d) Electronics Product Code - 96 bits which is divided into four categories 15 / 25
  • 16. Security Challenges in IoT Key challenge areas are Access control Confidentiality Integrity Availability Privacy Standardization Data deluge 16 / 25
  • 17. Solutions Timely updation of software IoT devices are huge in number and it quite difficult to update these devices one by one High security codes Data loss can happen if the attacker cracks the code Devices must be connected to a central power station But if central power station reaches its empty level 17 / 25
  • 18. Outline Introduction Technologies used in IoT RFID Technology EPC Technology Security Challenges in IoT Solutions Cryptographic Algorithms Conclusion References 18 / 25
  • 19. Solutions(Cont’d) Cryptographic Algorithms ECC - Elliptic Curve Cryptography public-key Cryptography supports authenticated key exchange protocols smaller keys, cipher text and signature very fast key generation fast encryption and decryption uses less memory and CPU cycles An elliptic curve is a plane curve defined by an equation of the form y2 = x3 + ax + b 19 / 25
  • 20. Solutions(Cont’d) Cryptographic Algorithms HMAC - Hash Based Message Authentication Code hash function and a secret key verify both the data integrity and the authentication of a message strength depends upon the cryptographic strength of the underlying hash function, the size of its hash output, and on the size and quality of the key. less affected by collisions HMAC(K, m) = H((K ⊕ opad)||H(K ⊕ ipad)||m) 20 / 25
  • 23. Conclusion Billions of devices are connected to the Internet Companies behind these devices are not designing them with security in mind Leaving IoT devices unsecured, is like leaving the back door to your house unlocked Various solutions to security challenges were discussed Cryptographic encrytpion techniques like ECC and HMAC can be used to provide better protection 23 / 25
  • 24. References 1. Aditya Parashar, Sachin Rishishwar Security Challanges In IoT 3rd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB17) 2. Ankush B. Pawar, Dr.Shashikant Ghumbre A survey on IoT applications, security challenges, and counter measures 2016 International Conference on Computing, Analytics and Security Trends (CAST) 3. Mohsen Hallaj Asghar RFID and EPC as key technology on Internet of Things (IoT) IJCST Vol. 6, Iss ue 1, Jan - March 2015 4. Xiaolin Jia, Quanyuan Feng, Taihua Fan, Quanshui Lei1 RFID Technology and Its Applications in Internet of Things (IOT) 978-1-4577-1415-3/12/2012 IEEE 24 / 25