+ All Categories
Home > Documents > Links between wearable devices, identity concept and...

Links between wearable devices, identity concept and...

Date post: 01-Aug-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
18
Alain RHELIMI June 2014 Journée sur l'Internet des Objets et la Cybersécurité/Cyberdéfense Links between wearable devices, identity concept and privacy by design
Transcript
Page 1: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

Alain RHELIMI

June 2014

Journée sur l'Internet des

Objets et la

Cybersécurité/Cyberdéfense

Links between wearable devices, identity

concept and privacy by design

Page 2: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

IDENTITY: What is it?

Collection of Attributes(*)

=

Identity Signature footprint (a virtual DNA)

* Most of them are referenced to the time (and the space)

316/06/2015

Page 3: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

B(t) : Biometrical Attributes

416/06/2015

(t)

Page 4: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

R(t,e): Social reference Attributes

516/06/2015

(t,e)

Page 5: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

E(t,xy): Events

616/06/2015

(t,xy)

Page 6: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

Identity: a virtual DNA

Redundant

Traceable

Cross-checkable

Recordable

Partially

Authentic

Cannot be faked

globally

716/06/2015

DNA(t)=

B(t)

R(t,e)

E (t,xy)

Page 7: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

Attributes of the identity are grouped according to contexts

Attribute

The privacy protection is a set of means which aims at preventing

the disclosing of the attributes of a sub-identity group to another

without the user’s agreement

Privacy Protection

916/06/2015

SUB-IDENTITIES

Page 8: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

WEARABLE & PORTABLE

DEVICES

We have an overview about what the

identity and the privacy are….

10Public16/06/2015

but ...

What does this means?

Page 9: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

Wearable versus Portable

Portable

Device on the user’s body but not attached to the body

No single sign-on possible

Wearable

Device attached to the user’s body

Single sign-on possible

2FA* with the user’s experience of 1FA

Aim at being YOU in the digital world

1116/06/2015

*2FA: Two Factors of Authentication

Page 10: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

Where are the links ?

1216/06/2015

Biological “You”

Wearable device

Digital “You”

Physically linked

Servers/Devices

Applications

Attributes &

Credentials

Privacy b

y D

esig

n

On

th

e w

ho

le O

SI sta

ck

eSE/TEE

eSE/TEE/HSMTra

nsactions

Page 11: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

Wearable devices: new threats against Privacy?

Identity = collection of independent sub-identities

Sub-identity = collection of attributes

B(t): Biometrical

R(t,e): Social references: sharing your events

E(t,xy): Events (time/space dependent)

Privacy = user’s control to disclose attributes from a sub-identity

to another

13Public16/06/2015

Wearable devices = the digital “YOU”

Wearable device = mobility = E(t,xy): Events (time/space dependent)

From Correlation between E(t,xy) events we may deduce all other

attributes = NO PRIVACY!

Page 12: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

The Privacy by Design : 7 Principles

1. Proactive not Reactive; Preventative not Remedial

2. Privacy as the Default Setting

3. Privacy Embedded into Design

4. Full Functionality — Positive-Sum, not Zero-Sum

5. End-to-End Security — Full Lifecycle Protection

6. Visibility and Transparency — Keep it Open

7. Respect for User Privacy — Keep it User-Centric

14Public16/06/2015

Page 13: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

Design impacts about Data Correlation

The No Traceability property: The hardest

property to support for data exchanges with:

No large constant data

No large identifier

No diversified Public key

No UUID

No static combination of small constants

(fingerprinting)

1516/06/2015

Page 14: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

Data Correlation & scoring example

1616/06/2015

WIFI MAC Address

60-67-20-F4-6C-40

5th Avenue N.Y

Payment

PAN 3479010120 002

5th Avenue N.Y

WIFI MAC Address

60-67-20-F4-6C-40

6th Avenue L.A

Payment

PAN 3479010120 002

6th Avenue L.A

WIFI MAC Address

60-67-20-F4-6C-40

Avenue Foch Paris

Payment

PAN 3479010120 002

Avenue Foch Paris

September 14th,2013

October14th,2013

September 20th,2013

60-67-20-F4-6C-40 = 3479010120 002 = John Does

Correlation

Correlation

Correlation

Corr

ela

tion

Corr

ela

tion

Corr

ela

tion

Corr

ela

tion

Scoring

Page 15: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

New challenge to support about

wearable devices

Data correlation prevention involving new protocols fast authentication protocol, non traceable and supporting open systems

Data exchanges on the whole data path appearing as random for an observer outside an application

(e.g. no static wireless MAC address)

On device generic facilities Secure synchronization between multiple devices related to a single user

User’s data disaster recovery on a blank device without specific equipments

Cloning of applications and credentials to blank devices

User’s checking for the detection of fake devices without specific equipments

Easy Initial enrolment

But supporting constraints asking for antagonist technical solutions

such as: Fast responsiveness and short transactions (e.g < 100 ms for conditional physical access)

Long autonomy (several days even weeks)

Small form factors (eg. a watch) and small battery

Low cost for matching the expectations of the consumer mass markets

Easy manufacturing within standard and non secure promesses

And shall support

National and international legal regulations

17Gemalto Restricted16/06/2015

Page 16: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

18Presentation title – Security Level (Arial 10pt)16/06/2015

What you touch is yours

What did we?

Page 17: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

The eGo project

Started in 2004 eGo Catrene program in 2010 to 2014 (www.ego-project.eu)

H20 Catrene program in 2015 to 2018

Minimal technology for a wearable device and the user’s credentials support Easy pairing (BCC) of any eGo compliant devices touched by the user

Long autonomy on several weeks

Harsh Environment support

Credentials recovery

Multi-tenants and multi-TSM

Privacy by Design authenticity, anonymity, non traceability.

Non relay attack possibility (UWB), Lost detection

Common criteria capable

User’s interface Friendly Education/age independence (natural user’s interface)

Single sign-on and strong authentication (2FA)

Automatic and programmed application termination (UWB)

On the go transaction and long transaction support

Fast (<200 ms) application setup

Implicit (pre-agreement) and explicit (post-agreement) eGo pairing

Side effect capability Accurate RTLS

1916/06/2015

Page 18: Links between wearable devices, identity concept and ...cedric.cnam.fr/workshops/iot-cybersecurite-cyberdefense/Presentation... · Data Correlation & scoring example 16/06/2015 16

THANK YOU

Questions?

20Public16/06/2015


Recommended