+ All Categories
Home > Documents > Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of...

Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of...

Date post: 08-Jun-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
35
University of Montenegro, 4.-6.Nov2015 Measurable Security as Driver for the Internet of Things Ecosystem 1 http://www.IoTSec.no, #IoTSec
Transcript
Page 1: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

University of Montenegro, 4.-6.Nov2015

Measurable Security as Driver for the Internet of Things Ecosystem

1 http://www.IoTSec.no, #IoTSec

Page 2: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

Outlinel From Internet to Internet of Things (IoT)

➡ Kjeller and the Internet ➡ Autonomous systems

l From Mobile security to IoT security ➡ the challenge of trust ➡ binding IoT and social networks: Socialtainment

l Measurable security for IoT ➡ IoTSec.no - Security for Smart Grid ➡ Dependable access

l Innovation ecosystem ➡ Digital innovation ➡ Experiences from Innovation Stock Exchange

l Conclusions - Lessons learned2

Page 3: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

• Research and Education at Kjeller

• Close relation to FFI, IFE, NILU,...

• Professors from UiO (Oslo) and NTNU (Trondheim)

3

• The building where the Internet (Arpanet) came to Europe in June 1973

Source: Wikipedia

.... and the Internet

Page 4: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Josef Noll, Nov2015BasicInternet.org BasicInternet.foundation Basic Internet @Basic4all

The Internet and Scandinavia• The first connection of Arpanet outside of the USA (and Hawaii) was

to Scandinavia (Kjeller, June 1973) • List_of_Internet_pioneers [Wikipedia]

– Yngvar Lundh, Paal Spilling • Application development

– .php, OpenSource, Linux, Skype, Spotify – OperaSoftware, FAST Search – Nokia, Ericsson – Telenor, TeliaSonera

• Mobile Internet: – GSM – Adaptation – ‘

4

Page 5: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

% of people used the Internet

40

50

60

70

80

90

100

Tyrk

iaRo

man

iaH

ella

sBu

lgar

iaPo

rtuga

lKy

pros

Kroa

tiaIta

liaM

alta

Lita

uen

Pole

nU

ngar

nSp

ania

Latv

iaSl

oven

iaTs

jekk

iaIrl

and

EU s

nitt

Øst

erik

eEs

tland

Fran

krik

eBe

lgia

Slov

enia

Tysk

land

Stor

brita

nia

Finl

and

Danm

ark

Luxe

mbo

urg

Ned

erla

ndSv

erig

eN

orge

Isla

nd

Internet usage in Scandinavia

5

[Robert Madelin, Directorate-General for Information Society and Media, EU commission, Aug 2011]

* “use of IT in a proper way can increase effectiveness with 30-40%”* “we are good in technology development. But access to venture capital is bad in Europe as compared to the USA”.[Aftenposten, 3. October 2011] [email protected]

EU 73,7%

IS 95,1%

NO94,8%

SE93,2%DK

90,7%

HE47,5%

IT58,8%

Page 6: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

Internet service usage

6

0

30

60

90

Private

homes

with broad

band

Wireles

s PC

used

outside o

f home

Intern

et Ban

king

Online

conta

ct

to public

servi

ces

eCommerc

e

- boug

ht

404136

13

61717784

39

83

121663

41

GreeceNorwayEU-average

[source: EU commission, Aug2011]

Page 7: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

Discussion: - Internet usage creates welfare? - Welfare increases Internet usage?

Towards Internet of Things - The role of security and privacy

7

Page 8: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

IoT Application & Socialtainmentl From Entertainment

to Socialtainment l Social mobility

through inclusion ofsocial networks

l Answering the need of CO2 reduction in transport l (SAP 45% - 2009)

8

peopletraffic

SocialMobility

vehicles

Pool

charging

warningparking

micro-coordination

social

IoT

tour

smart gridwww

info

musicmaps

energycontrol

CO2

Corporate travelCorporate carsCommutingFlightsEnergy & Logistics

Page 9: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

Paradigm change for The Internet of the Real World and IoT

l Trust related privacy-> Representing the user adequately

l Connecting to sensors, devices and services-> Provide privacy and ensure trust relations

l An ever increasing complexity in the digital environment-> Hiding the complexity from the use

Context

Roles

Preferences

IdentitiesTopic

My trust network

0.90.9

0.7

0.5

0.30.9

Thanks to Vladimir Oleshchuk for ideas and discussions

4. PR OPOSE D F R A M E W O R K

This chapter elaborates the proposed cloud based Internet of Things framework. Figure 2 illustrates the

proposed framework that contains the following four layers: Node layer, Network layer, Middleware

layer and Application layer. A brief overview of each layer is as follows.

Node layer Node layer contains hundreds of nodes such as devices, sensors and actuators distributed

over the whole railway infrastructure. Some of them are very small in size having limited battery capacity

and are used for collect and forward data only, e.g. the temperature sensors. Some of the devices can

aggregate and filter data. The nodes deliver collected data to the middleware layer and some of them

receive feedback or suggestions from the middleware layer and thereby can perform actions, e.g. actuate a

mechanical device.

Network layer In order to communicate, each node is equipped with one or multiple communication

interfaces. Some of the nodes work alone, while some other work in a group. Nodes working in a group

may form a network within themselves and such network can be permanent or ad-hoc one. The

middleware layer may supervise the formation of the network by defining its characteristics for example

its topology, interconnectivity etc.

Middleware layer It contains computing machines containing powerful hardware and software

components. The middleware layer communicated with application interfaces. Depending on the

F igure 2. The layered representation of the proposed framework.

4. PR OPOSE D F R A M E W O R K

This chapter elaborates the proposed cloud based Internet of Things framework. Figure 2 illustrates the

proposed framework that contains the following four layers: Node layer, Network layer, Middleware

layer and Application layer. A brief overview of each layer is as follows.

Node layer Node layer contains hundreds of nodes such as devices, sensors and actuators distributed

over the whole railway infrastructure. Some of them are very small in size having limited battery capacity

and are used for collect and forward data only, e.g. the temperature sensors. Some of the devices can

aggregate and filter data. The nodes deliver collected data to the middleware layer and some of them

receive feedback or suggestions from the middleware layer and thereby can perform actions, e.g. actuate a

mechanical device.

Network layer In order to communicate, each node is equipped with one or multiple communication

interfaces. Some of the nodes work alone, while some other work in a group. Nodes working in a group

may form a network within themselves and such network can be permanent or ad-hoc one. The

middleware layer may supervise the formation of the network by defining its characteristics for example

its topology, interconnectivity etc.

Middleware layer It contains computing machines containing powerful hardware and software

components. The middleware layer communicated with application interfaces. Depending on the

F igure 2. The layered representation of the proposed framework.

4. PR OPOSE D F R A M E W O R K

This chapter elaborates the proposed cloud based Internet of Things framework. Figure 2 illustrates the

proposed framework that contains the following four layers: Node layer, Network layer, Middleware

layer and Application layer. A brief overview of each layer is as follows.

Node layer Node layer contains hundreds of nodes such as devices, sensors and actuators distributed

over the whole railway infrastructure. Some of them are very small in size having limited battery capacity

and are used for collect and forward data only, e.g. the temperature sensors. Some of the devices can

aggregate and filter data. The nodes deliver collected data to the middleware layer and some of them

receive feedback or suggestions from the middleware layer and thereby can perform actions, e.g. actuate a

mechanical device.

Network layer In order to communicate, each node is equipped with one or multiple communication

interfaces. Some of the nodes work alone, while some other work in a group. Nodes working in a group

may form a network within themselves and such network can be permanent or ad-hoc one. The

middleware layer may supervise the formation of the network by defining its characteristics for example

its topology, interconnectivity etc.

Middleware layer It contains computing machines containing powerful hardware and software

components. The middleware layer communicated with application interfaces. Depending on the

F igure 2. The layered representation of the proposed framework.

4. PR OPOSE D F R A M E W O R K

This chapter elaborates the proposed cloud based Internet of Things framework. Figure 2 illustrates the

proposed framework that contains the following four layers: Node layer, Network layer, Middleware

layer and Application layer. A brief overview of each layer is as follows.

Node layer Node layer contains hundreds of nodes such as devices, sensors and actuators distributed

over the whole railway infrastructure. Some of them are very small in size having limited battery capacity

and are used for collect and forward data only, e.g. the temperature sensors. Some of the devices can

aggregate and filter data. The nodes deliver collected data to the middleware layer and some of them

receive feedback or suggestions from the middleware layer and thereby can perform actions, e.g. actuate a

mechanical device.

Network layer In order to communicate, each node is equipped with one or multiple communication

interfaces. Some of the nodes work alone, while some other work in a group. Nodes working in a group

may form a network within themselves and such network can be permanent or ad-hoc one. The

middleware layer may supervise the formation of the network by defining its characteristics for example

its topology, interconnectivity etc.

Middleware layer It contains computing machines containing powerful hardware and software

components. The middleware layer communicated with application interfaces. Depending on the

F igure 2. The layered representation of the proposed framework.

9

Page 10: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

The threat dimensionl Hollande (FR), Merkel (DE) had their mobile

being monitored l «and we believe it is not happening in Norway?

10

[source: www.rediff.com]

[source: Süddeutsche Zeitung, 18Dec2014]

Page 11: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

How come these guys didn’t think of security?

1111 ©2007 Deloitte & Touche GmbH WirtschaftsprüfungsgesellschaftWeb 2.0 Expo Berlin 2007

How come these guys didn’t think of that?

Source: http://www.michaelkaul.de/History/history.html

1973 Kjeller

Jon Postel

Steve Crocker

Vinton Cerf1972

Page 12: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

Security measures Solution oriented

l Network monitoring ➡ why does only a

mobile phone listen? ➡ every basestation

listens

l Small (Femto) Cells ➡ man in the middle ➡ My base station is 5

m away

12

[source: seminarsonly.com]

> Hello >< Hello <

> He

llo >

Page 13: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

DNV report 2013, DNV GL report 2014

Technology Outlook 2020 / Transformative Technologies

l Technology applications in Maritime, Renewables & Electricity, Health Care, Oil & Gas and Food & Water industries ➡ sensors will drive automated data

management ➡ from passive data to automated

decisions ➡ automated decision tools by 2020

l Maritime: «policy driven» l Health care: «trust» on sensor and

mobile apps13

“In any change management

process, the challenge is

communicating ris

k,” (Peter

Bjerager, DNV GL)

“Only 59% of th

e public

trust th

e energy

industry,” (

Edelman Trust

Barometer 2013)

Page 14: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

Trust-based privacyl “With whom to

collaborate?” l Share data? l Trust-based privacy l Information and your

social life

14

Context RolesIdentities

Topic

Company trust network

0.90.90.5

0.30.9

Thanks to Vladimir Oleshchuk for ideas and discussions

4. PR OPOSE D F R A M E W O R K

This chapter elaborates the proposed cloud based Internet of Things framework. Figure 2 illustrates the

proposed framework that contains the following four layers: Node layer, Network layer, Middleware

layer and Application layer. A brief overview of each layer is as follows.

Node layer Node layer contains hundreds of nodes such as devices, sensors and actuators distributed

over the whole railway infrastructure. Some of them are very small in size having limited battery capacity

and are used for collect and forward data only, e.g. the temperature sensors. Some of the devices can

aggregate and filter data. The nodes deliver collected data to the middleware layer and some of them

receive feedback or suggestions from the middleware layer and thereby can perform actions, e.g. actuate a

mechanical device.

Network layer In order to communicate, each node is equipped with one or multiple communication

interfaces. Some of the nodes work alone, while some other work in a group. Nodes working in a group

may form a network within themselves and such network can be permanent or ad-hoc one. The

middleware layer may supervise the formation of the network by defining its characteristics for example

its topology, interconnectivity etc.

Middleware layer It contains computing machines containing powerful hardware and software

components. The middleware layer communicated with application interfaces. Depending on the

F igure 2. The layered representation of the proposed framework.

4. PR OPOSE D F R A M E W O R K

This chapter elaborates the proposed cloud based Internet of Things framework. Figure 2 illustrates the

proposed framework that contains the following four layers: Node layer, Network layer, Middleware

layer and Application layer. A brief overview of each layer is as follows.

Node layer Node layer contains hundreds of nodes such as devices, sensors and actuators distributed

over the whole railway infrastructure. Some of them are very small in size having limited battery capacity

and are used for collect and forward data only, e.g. the temperature sensors. Some of the devices can

aggregate and filter data. The nodes deliver collected data to the middleware layer and some of them

receive feedback or suggestions from the middleware layer and thereby can perform actions, e.g. actuate a

mechanical device.

Network layer In order to communicate, each node is equipped with one or multiple communication

interfaces. Some of the nodes work alone, while some other work in a group. Nodes working in a group

may form a network within themselves and such network can be permanent or ad-hoc one. The

middleware layer may supervise the formation of the network by defining its characteristics for example

its topology, interconnectivity etc.

Middleware layer It contains computing machines containing powerful hardware and software

components. The middleware layer communicated with application interfaces. Depending on the

F igure 2. The layered representation of the proposed framework.

A

B C

D

E

FG

• Measurable trust? Transient Trust? • Value chains: from sensors to systems

Page 15: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollIoTSec.no

Internet of Things Security

15

Page 16: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec 16

http://www.scmagazine.com/iot-security-forcing-business-model-changes-panel-says/article/448668/

Page 17: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec 17

Page 18: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

Discussion on Threat Scenario in IoT - Automated processes - How to protect values?

Towards IoT Ecosystem - Example: IoTSec initiative - Measurable Security and Privacy

18

Page 19: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollIoTSec.no

The Smart Grid in the close futurel Smart grid with prosumers l various control mechanisms l attack scenarios l critical infrastructure

19

Wind farm

Solar farm

Energystorage Distribution

substation

Industrialcustomer

Residential customers

Microgrid

Smart data

control &

management

Energyagent

battery

Intrusionprotection

Page 20: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollIoTSec.no

IoTSec.no facts

l Research Initiative: Security in IoT for Smart Grids – applicable for Internet of Things (IoT) – focussed on Smart Grid security

l Facts – 1Oct2015 - 30Sep2020, 25 MNOK budget – 10 founding partners, – 18 partners (Aug2015)

l Main outcome – Research in Security for Smart Grid – Industrial Smart Grid Security Centre

20

Page 21: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollIoTSec.no

Partners

21

KjellerOslo

Gjøvik

Halden

l Founding partners ➡ University of Oslo (UiO) through the

Institute for Informatics (Ifi) and the University Graduate Centre (UNIK),

➡ Norwegian Computing Centre (NR) ➡ Simula Research Laboratory (SRL) ➡ Gjøvik University College ➡ NCE Smart Energy Markets (NCE Smart) ➡ eSmart Systems (eSmart) ➡ Frederikstad Energi (FEN) ➡ EB Nett (EB) ➡ Movation (MOV)

l Associated Academic Members ➡ Mondragon Unibersitatea, Spain ➡ University of Victoria, Canada ➡ Universidad Carlos III de Madrid, Spain ➡ University of Roma La Sapienza, Italy

l Associated Industrial Members ➡ Mondragon Unibersitatea, Spain ➡ Fredrikstad kommune ➡ EyeSaaS ➡ Nimbeo

l H2020 and ECSEL projects l COINS Academic Research School

Page 22: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollIoTSec.no

Research Topicsl Tailoring «security challenges» to

targeted research l Measurable Security, Privacy and

Dependability l Semantic modelling and provability l Adaptive security l Security in IoT Ecosystem

Operational requirements l Operational security l Forecast mechanisms l Operation Centre (from Smart Grid to

Smart City)

22

Page 23: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollIoTSec.no

Example of research: Semantic access control

23

Descriptivelogic

reasoning

Define home energy systemthrough ontologies

Home energy access

Home

consumer producerprosumer

infrastructureontology

Define access to home energy system

energy access

reading manage

accessontology

Battery- storageSize: 400 kWh- loadLevel: 40%- maxCurrent: 64 A/h

...

.........

...

......... Statistics

- maxProvision: 82 A/h- totalProvision/d: 1.2 kW- maxCurrent: 64 A

...

...Regulate- HeatPump: off for 1h- drainBattery: down 20%- carCharge: off

semantic access criteria

Role- memberOf: string- roleContext: string

semantic access control

SecurityToken- issueTo: Person- withAttributes: ...

Context- hasLocation: lat/lon- networkDevice: phone

Semantic access policiesService requirements

requireSecurityToken(?service,?token)∩ withHold(?token,?attributes) → hasAttributes(?service,?attributes)User tokencanOwn(?person,?attributes)∩ withHold(?token,?attributes)∩ Person(?person)→ SecurityTokenIssueTo(?token,?person)

Policies

Home energy system

Criteria

Service readMaxProvision readTotalProvision switchOffHeatPump drainBattery chargeBattery

Token authenticatedPerson authenticatedPerson owner energyAgent, owner energyAgent, owner

Token authenticatedPerson owner energyAgent

Person Bob Alice, George Carol

Page 24: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollIoTSec.no

Example of Research: Multi-Metricsv2 - system composition

l System consists of sub-systems consists of components l security l privacy l dependability

24

sub-system 2(s,p,d)

Comp. 1 Comp. 2 Comp. 3

Multi-MetricsMM

M

sub-system 1(s,p,d)

system(s,p,d)

Multi-Metrics (weighted subsystems)

ideal

good accep.

critical

failure

criticality

Page 25: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollIoTSec.no

Main expected Outcome of IoTSecl Robust research community

➡ after 2 years 7 international projects, 2 succeeded l PhD education

➡ 15 ongoing PhDs l International involvement

➡ workshops with international partners/1 conference l Industrial impact, Security Centre @ NCE Smart

➡ Security analyses of existing smart grid infrastructure and technologies

➡ Simulations of cyber-attacks ➡ Security systems of protecting smart grid against cyber-

attack

25

Page 26: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

Conclusions for Security in IoT

l Paradigm chance in the Internet of Things (IoT) – Automated processes by 2020 – measures of criticality – Industrial Applicability

l Trust, Security, Privacy in the IoT – No trust without privacy – Novel privacy paradigm

l Measurable Security&Privacy – Trust entities – Methods for Measurable

Security – Innovation through

Measurable Security26

[Source: Monique Morrow, Cisco]

ideal

good accep.

critical

failure

criticality

Page 27: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollIoTSec.no

Discussion on Measurable Security - Can you measure security? - Units of security?

Business Ecosystem

27

Page 28: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Josef Noll, Nov2015BasicInternet.org BasicInternet.foundation Basic Internet @Basic4all

Internet-driven services• App economy

– «All services» come through mobile devices

– from «parts» to services • Ambient Assisted Living

(AAL) – Sensors supporting care

information – Proactive Health professionals

• call if you have not taken your medicine

• call if your blood pressure is too high

• Hospital access – BasicInternet at 5 hospitals

• Producing sensors vs analysing data

– sensor producers don’t see the use of their sensors

• Information providers (Google)

– become industry suppliers

28

«Free basic access for low

capacity services»

The Basic Internet Vision @Basic4all

Page 29: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

MIT and the global GDPl 50% of U.S. economic growth after 1945 attributed to

technological innovation

MIT alumni startups (2011 numbers) l 25,800 active companies l 3.3 million people employed l $2 trillion gross domestic product l 10th world rank in GDP l 19% higher per capita income than

California (27% higher than USA)

Role of education l 75% of the world’s GDP growth in developing countries

29

25 largest economiesby GDP (PPP) in 2015 in Billions

Page 30: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

Human perspective inThe IoT ecosystem• Creating business

– openness, competitive – climate for innovation

• Public authorities – trust, confidence – demand

• Consumers – (early) adapters – education

• Infrastructure – broadband, mobile – competition

30

Academiaresearch,education

PublicAuthoritiesdemand

Entrepreneursideas

Consumersadaptation Business

climate:market

Sensor providers

IoT - Business Ecosystem

infrastructure: broadband,

mobile

Creativeprogrammers

software

Page 31: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Josef Noll, Nov2015BasicInternet.org BasicInternet.foundation Basic Internet @Basic4all

Industrie 4.0 vision

31

Sou

rce:

Tru

mpf

/ Fo

rsch

ungs

unio

n W

irtsc

haft

& W

isse

nsch

aft

Page 32: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Josef Noll, Nov2015BasicInternet.org BasicInternet.foundation Basic Internet @Basic4all

EU Commission activities• Four focus areas for Industrie 4.0

– Digital Innovation Hubs – Leadership in digital platforms – Closing the digital divide gap – Providing framework conditions

• Collaboration with regional/structural funds (ESIF) and Juncker package (EPIF)

• Connectivity is the challenge both in terms of – Availability/Security and – Affordability

32

Page 33: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollIoTSec.no

Experiences from the Innovation Stock Exchange - innobors.no (see: Presentation on InnoBors Experiences)

33

Page 34: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

Conclusionsl Internet of Things (IoT) is a game changer

➡ Unfair advantage in the Nordics ➡ Autonomous systems, Critical Infrastructure

l Collaborative approach for a (more) secure society

➡ trust is not enough, need for measurable ➡ partnership for security: threats, measures,

counter activities l Measurable Security and Privacy for IoT

➡ IoTSec.no - Security for Smart Grid ➡ Dependable access ➡ Industrial impact: Security Centre for Smart

Grid l Innovation ecosystem

➡ Digital innovation ➡ Experiences from Innovation Stock Exchange

34

[Source: Monique Morrow, Cisco]

ideal

good accep.

critical

failure

criticality

Aca

Publ

Entre

ConsBusi

Sen

IoT -

infrast

Creati

Page 35: Measurable Security as Driver for the Internet of Things ... · l From Internet to Internet of Things (IoT) Kjeller and the Internet Autonomous systems l From Mobile security to IoT

Nov 2015, Josef NollSecurity for IoT - #IoTSec

My special thanks to lSilica Pejanovic-Djurisic for the

opportunity to present lPer Anders Johansen, Andreas

Bakke Foss and Aftenposten for putting their effort into security

lRune Rækken and my colleagues from Telenor for the education in 2G, 3G and beyond

lHans Christian Haugli for the focus on Internet of Things (IoT)

lAndrea Fiaschetti for the invitation to SHIELD - measurable security

lJU Artemis and the Research Councils (Trond Espeli) for support

lPrzemyslaw Osocha and Cecilia Coveri for running the SHIELD projects

lSarfraz Alam, Zahid Iqbal and Mushfiq Chowdhury (UNIK) for the semantics and demos

lHabtamu Abbie (NR) for the good discussions on measurable security

l Iñaki Garitano and Seraj Fayyad for the papers on measurable security

land all those I have forgotten to mention

35


Recommended