Blockchain Role in Smart Cities/IoT Security A Cryptographic Perspective!

Similar documents
Blockchain: A revolutionary change or not?

OpenBank - banking platform for e-money management based on blockchain technology (version 0.2)

Second Generation of Bitcoin

currencies face. We will also articulate the roadmap how it will be used by masses for all of their payment need. 2. Introduction to MCX Coin

SWISSCOIN Whitepaper

(Draft version 2.0) The blockchain is an undeniably ingenious invention the brainchild of a person or group of people

Version 3:

X12 Coin Whitepaper 1 / 18

A Highly Customizable Blockchain Infrastructure

5 ways blockchain is transforming Financial Services

CryptoBank WHITEPAPER v. 0.1

MIT GLOBAL ENTREPRENEURSHIP BOOTCAMP MARCH 26-31, 2017 BRISBANE, AUSTRALIA

Advanced Blockchain and Digital Currency Technology This course is presented in London on: 07 February 2018, 11 June 2018

Bitcoin White Paper Made Simple. A guide to understanding the Bitcoin white paper for people without an advanced degree in computer geekery

Ignition Coin and The Ignition Network Engineered for Value, Sustainability, and Growth

Distributed ledger technologies services. Distributed ledger technologies services Using the power of blockchain

OLYMPIC COIN IT CHANGES EVERYTHING

HISTORY... 3 EVOLUTION OF OTHER PAYMENT METHODS... 5 THE TECHNOLOGY... 8 WHAT IS BLOCKCHAIN ADVANTAGES OF JUST PAY COIN HOW IS JUST PAY

Bitcoin Risk Analysis

Bitcoin- An innovation. By - Rajitha Devabhaktuni - Ravali Chennamneni

Utilizing CipherShare within Pharmaceutical and Biotechnology Industries

Kcash Digital Currency Wallet Whitepaper V4.0

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks

CryptoCarbon (CCRB):

Money Back Coin [MNBK] Whitepaper 2018 ProjectMoneyBack.org

LOOKREV. A Winning Solution For Creativity. Grace Tang LOOKREV WHITEPAPER V2.2

Cyber Security - a New Challenge for Production (Management) Heiko Wolf, Manager R&D Program PSImetals FutureLab

Bitcoin: Back to the Future

BLOCKCHAIN CLOUD SERVICE. Integrate Your Business Network with the Blockchain Platform

Blockchain Unleashed: Petrochemical Industry Impact

Trusted Bitcoin Ecosystem White Paper

Digital Fiat Currency. The true alternative to physical currency

PROJECT PAI TECHNICAL WHITEPAPER OVERVIEW PAI BLOCKCHAIN PROTOCOL: A DECENTRALIZED ARTIFICIAL INTELLIGENCE NETWORK. October 2017 ProjectPAI.

Making the Case for Governance IoT Data

WHITE PAPER UNICOIN. the first decentralized unicorn. ever.

STENEUM. The unique Saving program Of Cryptocurrency

Bitcoin (Part 2) Ken Calvert Keeping Current Seminar 12 February Keeping Current 1

Jetstream Certification and Testing

SOLUTION BRIEF CA MANAGEMENT CLOUD FOR MOBILITY. Overview of CA Management Cloud for Mobility

Digital Currencies. Virtual Currencies Cryptocurrencies

CHAPTER 3 CLASSIFICATION AND REQUIREMENTS OF ELECTRONIC PAYMENT SYSTEM

IoT Onboarding A DEVICE MANUFACTURER S PERSPECTIVE

Hyperledger Fabric. the architecture of the permissioned ledger. Artem Barger

Lequa's four principles for digital communication. Overview

How DLTs might impact the financial sector

Principals and Practice of Cryptocurrencies

Vote Coin. Anonymous Crypto Democracy

The Future of Blockchain in Quality Measurement. Jason C. Goldwater, MA, MPA Senior Director

Bitcoin Growth Bot Whitepaper

BITCOIN FORENSICS. Peter Theobald

Corda Solution Guide. The Corda Platform Q3 2017

Developing Connected Products - What s needed? Driven to enable your success!

Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader

Samsung SDS Nexledger. A Blockchain Platform and Solution

THE BITCOIN PROJECT AND THE FREE MARKET

Decentralization and Incoordination

Copyright 2018 PornX. All right reserved.

MASTER S THESIS. An implementation of the Millicent micro-payment protocol and its application in a pay-per-view business model

External Supplier Control Obligations. Information Security

Accounts Payable on Campus: An Update

DECENTRALIZED NETWORK FOR DATA EXCHANGE AND STORAGE "MASTERCHAIN" Version 1.1 WHITEPAPER

Multi-Level µtesla: A Broadcast Authentication System for Distributed Sensor Networks

Cryptography lecture 12

Global Partner Summit 2017: Competing to Win

ICT Security Certification 2017

WORLD WI-FI BOARD AND & ADVISORS FREE DECENTRALIZED WI-FI NETWORK TOKEN SALE STARTS ON 18 APRIL 2018 ILYA YASHIN YAN SEPIASHVILI FRED LEDBETTER

The future of finance: Coming technologies

IOT Analytics and business assurance. Ericsson-wedo perspectives October 2017

The Internet of Things Platform

Security Analysis of Bitcoin

Beyond Bitcoin: What to do with Blockchain?

INTRODUCING BIT4G. Bitcoin is Digital Gold Bit4G is Digital Growth Fund

IOTA. Decentralized Economy of Things platform A Distributed Ledger Technology

Connectivity key to efficient, safe, and convenient mobility

Digital Manufacturing Services

Global Trade Digitalization

THE KAICOIN WHITE PAPER

Blockchain aus 2 Sichten

WHITEPAPER. Art of Code-Free Blockchain Platform

DONCOIN (DCNX) Whitepaper

Frequently Asked Questions

Seven Ways to Create an Unbeatable Enterprise Mobility Strategy

Course Syllabus. Mode of Delivery Work Placement Corequisites Distance Learning N/A None

WHITE PAPER. Assuring success in blockchain implementations by engineering quality in validation

RFID and Privacy Impact Assessment (PIA)

Contractnet. The global exchange for IoT data. contractnet.com

SIMPLE FUND 360: AN AUDITORS GUIDE. Australia s leading cloud SMSF admin solution AN AUDITORS GUIDE.

IoT Business Brief Industrial Manufacturing Business

Supplier Security Directives

Our Mission... Strategic management consulting for competitive advantage in global markets

Introduction. What is Cryptocurrency?

Trade Digitization. Client Advisory Board Treasury and Trade Solutions

A Secured Mutual Authentication Protocol For RFID System

Believe in a higher level of IT Security SECUDE Business White Paper. How to Improve Business Results through Secure Single Sign-on to SAP

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.

LINDACOIN WHITEPAPER

LECTURE NOTES. Bitcoins. 1. What is Bitcoin? METROPOLITAN STATE UNIVERSITY OF DENVER INTERMEDIATE MACROECONOMICS

Digital Industries Apprenticeship: Occupational Brief. Unified Communications Trouble Shooter. March 2016

BUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and Getting Started with Multi-factor Authentication Solutions

WE ARE PART OF THE GLOBAL PAYMENT REVOLUTION

Transcription:

SESSION ID: CCS-T08 Blockchain Role in Smart Cities/IoT Security A Cryptographic Perspective! Dr. Hilal Houssain hilal.hussein@gmail.com

Agenda Internet of Things (IoT) IoT Security Requirements IoT Security Issues Blockchain Technology Blockchain for Securing IoT Way forward and Conclusion 2

Internet of Things (IoT) 3

Internet of Things (IoT) The Term IoT was first coined by Kevin Ashton in 1999 Network of devices able to: Configure themselves automatically, Generate, process, and exchange data as we as Request a service or start an action without human intervention at many levels. 4

Important Areas of Research for IoT Smart devices, sensors in real-time, Energy Saving WiFi, Bluetooth, ZigBee, etc Big-data, Machine learning, Predictive analytics, Security/Privacy, Trust, Authenticity/Identity, Anonymity, 5

Security Requirements for IoT Devices 6

Security Requirements for IoT Devices IoT adoption is set to rise exponentially in the coming years, but security, and a lack of in-house skills to manage that security risk, still feature at the top of business leaders concerns. IoT devices can generate, process, and exchange vast amounts of critical data as well as privacy-sensitive information, and hence are appealing targets of various cyber attacks. The IoT devices interact with each other and connected systems and infrastructures in a secure manner. 7

Security Requirements for IoT Devices Authentication & Data integrity Confidentiality (Encryption) is a NOT always required! Secure against node(s) key leakage 8

Security Issues for IoT Devices 9

Security Issues for IoT Devices Can be lost and stolen (security difficult ) Not reachable (mostly disconnected) Finite life (Credentials tied to lifetime) Resource Constrained (no processing power for crypto) 10

Security Issues for IoT Devices Studies Reveal 70% Of IOT Devices Are Vulnerable To Attack. Majority of IoT devices had the following security issues: Privacy concerns Lacked encryption (processed/exchanged data and Firmware upgrades) Insecure updates Lack of mutual authentication (device, gateway) 11

Security Issues for IoT Devices IoT Network Security More challenging than traditional network security. A wider range of communication protocols, standards, and device capabilities. Pose significant issues and increased complexity! 12

Security Issues for IoT Devices IoT Authentication IoT standards are important catalysts but still need time to mature. Authentication with no human intervention. Mostly authenticating embedded sensors (deviceto-device communication). 13

Security Issues for IoT Devices IoT Encryption Encryption is an absolute must Encrypting data at rest and in transit. Limited capability to have standard encryption processes and protocols. Encryption key lifecycle management processes. Data integrity and confidentiality. 14

Security Issues for IoT Devices IoT PKI Digital certificate, and key (generation, distribution, management, and revocation). Limited ability to utilize PKI. Digital certificates securely loaded onto IoT devices at the time of manufacture or installed post-manufacture. Data integrity and confidentiality. 15

Security Issues for IoT Devices Security Incidents Visibility: Caused by the scale and scope of IoT deployments!!! Low energy and lightweight (in terms of resources) IoT devices must allocate most of their available resources to executing core application functionality. Thus, supporting security and privacy is quite challenging. 16

Security Issues for IoT Devices More IoT-specific security threats will definitely drive innovative Security Solutions mainly in new Cryptographic Primitives and Blockchain-based Approaches 17

Blockchain Technology 18

Blockchain Technology Bitcoin Whitepaper 2008.10.31* 19

Blockchain Technology What is the problem that Blockchain attempts to solve? A technology that enables moving digital assets from one node to another node. 20

Blockchain Technology Traditional way Trusted third party 21

Blockchain Technology A Blockchain is an append-only distributed ledger that stores a time-ordered set of facts, aka transactions. Transactions are grouped into blocks and form a cryptographic hashchain, hence the name Blockchain. Role of Cryptography in Blockchain!!!! Integrity of ledger (Cryptographic hash function) Authenticity of transactions (Ellitpic Curve Digital Signature Alg.) Privacy of transactions (Pseudonymity through crypto tools) Identity of participants (Cryptographic signatures) Auditability and Transparency (Cryptographic hash chain) Exploit advanced cryptographic techniques, trust in Blockchain is shifted to Technology (not in participants or nodes) 22

Blockchain Technology Digitally signing (using Elliptic Curve Digital Signature Algorithm) a hash digest of the previous transaction and the public key of the recipient. Every viable transaction is stored in a public ledger Transactions are placed in blocks, which are linked by SHA256 hashes. 23

Blockchain for Securing IoT 24

Blockchain for Securing IoT Traditional security and privacy approaches are not applicable for IoT Blockchain-based approaches provide security and privacy in peer-to-peer networks with similar topologies to IoT Computationally expensive and involve high bandwidth overhead, delays, and significant energy. Not suitable for most resource-constrained IoT devices!!!! 25

Blockchain for Securing IoT Eliminate the Proof of Work (POW) and the concept of coins. Miners, as high resource device, are routers to manage communication between Private and Public Blockchain network. As a result: Traffic volume, processing time and energy consumption reduced noticeably. Security is preserved!!!,,, but what about IoT device authentication? 26

Blockchain for Securing IoT Combining Blockchain and Physical Unclonable Function (PUF) technology PUF Technology to: Authenticate an IoT device and Register that IoT device (including its ownership information) on the Blockchain,,, but still PKI is needed for securing IoT devices!!! 27

Blockchain for Securing IoT Reply PKI Digital Signature with Hash based signatures (or other Merkle tree schemes),,, anonymous IoT devices Joining & Leaving the network!!! 28

Blockchain for Securing IoT Group signatures using one or multiple pre shared group Key. This will remove anonymity in the IoT network.,,, what about secure firmware update for IoT devices? 29

Blockchain for Securing IoT Management all the updates in terms of integrity and source authenticity using blockchain. This is in addition to managing the IoT devices standardization and compliances auditing, device and cryptographic key management, etc IoT devices will need to freely (also securely with lowcost) buy, sell and trade their digital assets using Blockchain technology. 30

Way Forward and Conclusion A Standardized Lightweight Cryptographic Primitive is Needed for recourse constrained IoT devices. As blockchain-based solutions and technology become widespread, expect to see sophisticated attacks on Blockchain using weaknesses in its cryptographic primitives (design & implementation) Example, collision in hash, solution to increase the hash bit length! 31

Apply What You Have Learned Today First, have a better understanding of the Bitcoin Blockchain Technology, i.e., mastering the Satoshi while paper Bitcoin: A Peer-to-Peer Electronic Cash System. Then Conduct a survey of the Lightweight Cryptographic Primitive suitable for recourse constrained IoT devices. Finally, select three to five IoT applications, and review its security issues, and then assess the implication of deploying lightweight cryptosystem with Blockchain technology to secure these IoT applications. 32

Q & A Thank You 33