12
UNIK4750 - Measurable Security for the Internet of Things L6 – Technology Mapping http://cwi.unik.no/wiki/UNIK4750, #IoTSec, #IoTSecNO György Kálmán, Mnemonic/CCIS/UNIK [email protected] Josef Noll UiO/UNIK [email protected]

UNIK4750-L6 technology mapping - its-wiki.no...UNIK4750, Measurable Security for IoT - #IoTSec Jan 2016, György Kálmán, Josef Noll Overview l Recap: two weeks ago talked about QoS

  • Upload
    others

  • View
    13

  • Download
    0

Embed Size (px)

Citation preview

Page 1: UNIK4750-L6 technology mapping - its-wiki.no...UNIK4750, Measurable Security for IoT - #IoTSec Jan 2016, György Kálmán, Josef Noll Overview l Recap: two weeks ago talked about QoS

UNIK4750 - Measurable Security for the Internet of Things

L6 – Technology Mapping

http://cwi.unik.no/wiki/UNIK4750, #IoTSec, #IoTSecNO

György Kálmán,Mnemonic/CCIS/UNIK

[email protected]

Josef NollUiO/UNIK

[email protected]

Page 2: UNIK4750-L6 technology mapping - its-wiki.no...UNIK4750, Measurable Security for IoT - #IoTSec Jan 2016, György Kálmán, Josef Noll Overview l Recap: two weeks ago talked about QoS

Jan 2016, György Kálmán, Josef NollUNIK4750, Measurable Security for IoT - #IoTSec

Overview

l Recap: two weeks ago talked about QoS – Security is also part of QoS

l System componentsl QoS in LAN and WANl Challenges ➡ Performance monitoring➡ Forwarding control➡ Security measures

l Examplesl Conversion, operating envelopel Conclusion

2

Page 3: UNIK4750-L6 technology mapping - its-wiki.no...UNIK4750, Measurable Security for IoT - #IoTSec Jan 2016, György Kálmán, Josef Noll Overview l Recap: two weeks ago talked about QoS

Jan 2016, György Kálmán, Josef NollUNIK4750, Measurable Security for IoT - #IoTSec

System components

l Functional components ➡ input component (sensors, keyboard, mouse,..)➡ output component (alarm, screen, actuator,..)➡ processing component➡ Storing component (data base, files, )➡ Connection (wireless connection, wired connection)

l Security, Privacy, Dependability (SPD) components:➡ Encryption: Encryption algorithm, keys,..➡ Protocols➡ Authentication( mechanism (fingerprint, password,

password complexity,..…) .➡ Authorization (privileges, ..)

l Management components (OS, Web server, data server)

l Human component (admin, user, ..).l Physical component, car being a component in a car

factory. (if treated as “sub-system)

IntelligenceOverlay

Sensors, Embedded Systems

Network

Cloud services

- Match between components and Architecture?

Page 4: UNIK4750-L6 technology mapping - its-wiki.no...UNIK4750, Measurable Security for IoT - #IoTSec Jan 2016, György Kálmán, Josef Noll Overview l Recap: two weeks ago talked about QoS

Jan 2016, György Kálmán, Josef NollUNIK4750, Measurable Security for IoT - #IoTSec

QoS in LAN and WAN

l Communication metrics: bandwidth, delay, jitter, burstiness, redundancy

l Automation metrics: sampling frequency, delay, jitter, redundancy

l LAN-WAN

l Time synchronizationl Security focus on integrity and authenticityl Availability

sub-system 2(s,p,d)

Comp. 1 Comp. 2 Comp. 3

Multi-MetricsMM

M

sub-system 1(s,p,d)

system(s,p,d)

Multi-Metrics (weighted subsystems)

Page 5: UNIK4750-L6 technology mapping - its-wiki.no...UNIK4750, Measurable Security for IoT - #IoTSec Jan 2016, György Kálmán, Josef Noll Overview l Recap: two weeks ago talked about QoS

Jan 2016, György Kálmán, Josef NollUNIK4750, Measurable Security for IoT - #IoTSec

Performance monitoring and forwarding control

l Performance monitoring➡ Life-cycle support➡More important in the WAN case

l Forwarding control➡ IEEE 802.1 TSN - SPB

Page 6: UNIK4750-L6 technology mapping - its-wiki.no...UNIK4750, Measurable Security for IoT - #IoTSec Jan 2016, György Kálmán, Josef Noll Overview l Recap: two weeks ago talked about QoS

Jan 2016, György Kálmán, Josef NollUNIK4750, Measurable Security for IoT - #IoTSec

https://www.yokogawa.com/rd/pdf/TR/rd-te-r05702-008.pdf

Integrity – Authenticity – (Confidentiality)

l Endpoint security in control systemsl Identifying security risks in automation networksl Countermeasures:➡ IDS/IPS➡Firewall➡Automatic updates➡Application black/whitelisting➡Backup

l Integrity➡Safety is not protecting from sabotage➡ In general, no sabotage protection

l Availability➡Alarms

Page 7: UNIK4750-L6 technology mapping - its-wiki.no...UNIK4750, Measurable Security for IoT - #IoTSec Jan 2016, György Kálmán, Josef Noll Overview l Recap: two weeks ago talked about QoS

Jan 2016, György Kálmán, Josef NollUNIK4750, Measurable Security for IoT - #IoTSec

Availability

l Main objective of Control System security:To maintain the integrity of its production process and the availabilityof its components

l Maps to:➡Network redundancy➡Software and hardware requirements➡Device redundancy

l Shodan browser IoT

http://www2.emersonprocess.com/siteadmincenter/PM%20Articles/InTech_MayJune2014_TopTenDiff.pdf

Page 8: UNIK4750-L6 technology mapping - its-wiki.no...UNIK4750, Measurable Security for IoT - #IoTSec Jan 2016, György Kálmán, Josef Noll Overview l Recap: two weeks ago talked about QoS

Jan 2016, György Kálmán, Josef NollUNIK4750, Measurable Security for IoT - #IoTSec

Example

l IEC 61850 in smart grid scenariol AMS consists of reader (AMR), aggregator,

communications, storage, user accesl AMR consists of power monitor, processing unit,

communication unit l AMR communication contains of a baseband

processing, antenna, wireless link

l Requirements traceabilityl Relevance for the whole

communication path

http://www.tandfonline.com/doi/pdf/10.1080/23317000.2015.1043475

Page 9: UNIK4750-L6 technology mapping - its-wiki.no...UNIK4750, Measurable Security for IoT - #IoTSec Jan 2016, György Kálmán, Josef Noll Overview l Recap: two weeks ago talked about QoS

Jan 2016, György Kálmán, Josef NollUNIK4750, Measurable Security for IoT - #IoTSec

Example

l From the Siemens SINAMIC example library:l SINAMICS S: Safety-control of a S120 using S7-

300/400 (STEP 7 V5) with PROFINET (Shared Device) and Safety Integrated (via PROFIsafe)

Page 10: UNIK4750-L6 technology mapping - its-wiki.no...UNIK4750, Measurable Security for IoT - #IoTSec Jan 2016, György Kálmán, Josef Noll Overview l Recap: two weeks ago talked about QoS

Jan 2016, György Kálmán, Josef NollUNIK4750, Measurable Security for IoT - #IoTSec

Identifying QoS metrics for security

l Risk analysis to identify attack surfacel Integrity – Authenticity – Confidentialityl Data validity and reaction possibilitiesl Phyisical securityl Whole communication path should be evaluated

10

Page 11: UNIK4750-L6 technology mapping - its-wiki.no...UNIK4750, Measurable Security for IoT - #IoTSec Jan 2016, György Kálmán, Josef Noll Overview l Recap: two weeks ago talked about QoS

Jan 2016, György Kálmán, Josef NollUNIK4750, Measurable Security for IoT - #IoTSec

Selecting technologies

11http://www.javamex.com/tutorials/cryptography/hash_functions_algorithms.shtml

l Select by mapping requirements to technology properties:➡Hash: integrity requirement, stream speed, latency, size➡Cipher: security requirement (includes already data validity and generic risk

evaluation), delay, size – optimized ciper suites are available

https://www.odva.org/Portals/0/Library/Conference/2015_ODVA_Conference_Woods_Practical-applications-of-Lightweight-Block%20Ciphers-FINAL-PPT.pdf

Page 12: UNIK4750-L6 technology mapping - its-wiki.no...UNIK4750, Measurable Security for IoT - #IoTSec Jan 2016, György Kálmán, Josef Noll Overview l Recap: two weeks ago talked about QoS

Jan 2016, György Kálmán, Josef NollUNIK4750 #IoTSecNO

L6 Conclusions

l Services in IoT have an implication typically in the communication and security domain of ITl Main challenge is the lack of understandingl Sub-challenges are life-cycle management, status monitoring, continous evaluation of QoSl Don’t believe in the IOT explosion?

Consider this: – How many MAC Addresses did you use in 1998? Typically less than 5: • Work computer, home computer, a laptop. . . Move to 2014. Now how many MAC Addresses do you use? Typically 10 to 15: • Cell phone, IP phone, laptop (2 – 1 for wired, 1 for wireless), laser printer (2 – same reason), set top box (2), TV, BluRay player, tablet, computer at home (2), wireless AP

12

https://www.odva.org/Portals/0/Library/Conference/2015_ODVA_Conference_Woods_Practical-applications-of-Lightweight-Block%20Ciphers-FINAL-PPT.pdf