+ All Categories
Home > Documents > Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A...

Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A...

Date post: 09-Oct-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
19
www.usask.ca/ict 1 www.usask.ca/ict Cryptographic Modules for the Internet of Things May 20 th 2016 Dr. Lawrence G Dobranski P.Eng. University of Saskatchewan Carol Cantlon, CISSP EWA-Canada
Transcript
Page 1: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

1

www.usask.ca/ict

Cryptographic Modules for the Internet of ThingsMay 20th 2016

Dr. Lawrence G Dobranski P.Eng.University of Saskatchewan

Carol Cantlon, CISSPEWA-Canada

Page 2: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

2

Let’s set the stage• Proliferation of mobile, cloud,

and Internet of Things technologies

• Smart Homes, Smart Automobiles are here today

• At the University of Saskatchewan:

– 16,000 plus mobile users

– 1.7 devices per user

– Increasing every term

Page 3: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

3

Technology Disruptors

A disruptive technology is one that displaces an established technology and shakes up the industry.

– Harvard Business School Professor Clayton M. Christensen, 1995.

• More importantly: disrupts society

Page 4: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

4

The 4th Industrial Revolution

Revolution Year Technology Disruptor

1 1784Steam, water, mechanical production equipment

2 1870Division of labour, electricity, mass production

3 1969Electronics, IT, automatedproduction

4 2016Cyber-physical systems, Internet of Things, Mobile & Cloud Computing

Page 5: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

5

Evidence of Disruption

AirbnbThe world’s largest accommodation provider owns no real estate

Alibaba The world’s largest retailer has no inventory

FacebookThe world’s most popular media company creates no content

UberThe world’s largest taxi company owns no vehicles

ClassPassThe world’s largest source for group fitness owns no studios

Page 6: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

6

Internet of Things is here, today• A proliferation of devices

– From home thermostats

– To bathroom scales

– To surveillance cameras

– To garage door controls

– To smart door locks

– To medical devices

– To Raspberry PIs controlling …

Page 7: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

7

The number of stakeholders are multiplying

Carriers 3rd Parties Apps Environments

Page 8: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

8

BYOD & Cloud & IoT – Represents a Multi-Dimensional Risk Problem

• Not just a technology problem it not just a business problem, it is a societal disruption

• Risk involves:– Confidentiality, Integrity, Availability of information & services– Personally-identifiable information (aka Privacy)– Business survivability (disaster recovery & business continuity)– All stakeholders (users, clients, 3rd parties, CxOs,…)– Data mining extracting value

• ATraditional IT approaches do not acknowledge:– ‘de-perimeterisation’ or ‘context of use’

An information problem, an access problem.

Page 9: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

9

Mobile, Cloud, & IoT as a disruptive revolution are represented by the eradication of boundaries

De-perimeterisation

Page 10: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

10

De-perimeterisation• Mobile, Cloud, & IoT Services means that the boundaries of

the organization have changed or do not exist

• It is de-perimeterisied

• Changes in boundaries are a mark of the societal disruption –where you are no longer matters.

Now not just who is accessing the information, but who, where, how, and

with what.

Page 11: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

11

Context of Use

• The context of the mobile device and the service provided must be reflected in the authorizations granted to the authenticated user

• Information is the asset; authorization is the key

Contextof Use

Where

Who

What

When

Why

How

Page 12: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

12

To be effective for the IoT INFOSEC has to evolve to be information and device centric

• Proactive monitoring

• Continuous compliance

• Application firewalls

• Data firewalls

• Adaptive authentication

• Information availability, integrity, and confidentiality

• Best solution to:

– Authenticate and authorize the device

– Protected the information

• Is Cryptography

• Delivered by a validated cryptographic module

The new perimeter is the information boundary

Page 13: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

13

IoT Reference Architecture

By WSO2.COM © 2015

Page 14: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

14

IoT Reference Architecture

• IoT Reference Architecture by WSO2.COM © 2015

• Crypto Additions Dobranski/Cantlon © 2016

Embedded Cryptographic Module

CA

AS

–C

ryp

to a

s a

Serv

ice

Page 15: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

15

Reference Implementation• Apple IoS 9 Security Architecture

• ‘Secure Enclave’ built on a ‘Crypto Engine’

• Secure Enclave a core component of the IoS 9 Kernel – separate from the OS and User Partitions

• Implements Application Sandboxes

Page 16: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

16

IoT Security: Cryptographic Module PrimitivesBi-Directional Authentication aka Secure Phone Home

• Phone Home to a Cloud Based Server Architecture– Usually multiple destinations

– Needs to be done securely to destinations that are trusted, with a degree of assurance

• Authentication needs to be bi-directional:– Cloud Based Servers need to authenticate

the IoT device

– IoT devices should only accept connections for authenticated Cloud Based Servers

Trusted Software Distribution

• Software loads need to be:– Trusted, i.e., originate from the

manufacture

– Digital signed to validate that they are coming from the manufacture

– Validated so if the load fails the device does not become a ‘brick’

Page 17: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

17

IoT Security: Cryptographic Module Primitives IIMandatory Access Control

• Cryptographically binding label to asset

• Reference monitor permits access to assets only if the labels match

• User or malware cannot change meta data with label attached or subvert enforcement of access

Object Reuse

• All data segments are encrypted

• Follow on process cannot read previous data stored

• Object can be freely re-used without risk of data leakage occurring

Page 18: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

18

Three layer IoT Security Model• Three layers

– Management

– Signalling

– Media

• Successful security model applied to embedded multi-media systems, i.e, VoIP

• Secure Management of the device first, then signalling to the device, then the media delivered from/to the device

Management

Media

Signalling

Page 19: Cryptographic Modules for the Internet of Things · 2017. 9. 6. · Technology Disruptors A disruptive technology is one that displaces an established technology and shakes up the

© 2016. All Rights Reserved. Information and Communications Technology

www.usask.ca/ict

19

Thank You!

Thank you!

[email protected](306) 966-7177branski(306) 966-7177

[email protected](613) 295-3488


Recommended