SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Dilum Bandara, PhD
Dept. of Computer Science & Engineering,
University of Moratuwa
Mobitel NB-IoT Forum, Mar 23, 2018
2
Big Data
Privacy
Security
• Huge datasets that we capture, transfer,
store, & process to reveal associations,
patterns, & trends
• Volume, Variety, Velocity, & Veracity
• Protection of computing systems &
data that they store or access
• Confidentiality, Integrity, &
Availability (CIA)• Our interest in preventing
inappropriate collection, use,
& release of PII
• Privacy of personal behavior,
communications, & data
What
do I
want?
Security & Privacy
are afterthoughts
3
Reckless Driving
Driving
Anomaly
Detection
Fault Detection
& Prediction
Tracking &
Surveillance
Fuel
Fraud
IoT
Data
Anal
ytics
Smart
Driving
4
High-end OBD2 +
GPS dongle to send
data directly to cloud
Dedicated GPS
trackers send data
directly to cloud
Low-end OBD2 dongle + App to send
data to cloud & gives real-time alerts
5
 Real-time Analysis
 Driving anomaly detection
 Fuel fraud detection
 Geo fencing
 Vehicle fault detection
 Historical Analysis
 Driver profiling – UBI
 Driver coaching
 Predicting sensor failure
 Case analysis 6
7
 Driver behavior detection
 Change of driver
 Driving under influence
 Fatigue
 Sensor failure detection
 Mass Air Flow (MAF) sensor
 Emission issues
 Check Engine Light
 Long-distance bus fitted with a GPS unit &
high-precision fuel sensor
 Could you
 explain variability in fuel consumption
 predict fuel consumption of a journey
 give tips to improve fuel consumption 8
?
• 4 months data
• Timestamp, Longitude,
Latitude, Elevation,
Distance, Speed,
Acceleration, Ignition
status, Battery voltage, Fuel
level, Fuel consumption
9
10
Actual Consumption : 84.08L
Predicted Consumption : 91.77L
Error: 9.1%
Gradient Boosting
Neural NetworkRandom Forest
11
12
www.curwsl.org
 Being set up for flood control & water
management in Metro Colombo
 Initial focus Kelani river basin
 Entirely cloud-based
 Weather Stations (9  50  100s)
 Water-Level Gauges (2  12  34)
 Controlling Flood Gates & Pumping Stations
 Solar-powered Sensors & Communication
 Reports data periodically to WSO2 IoT-Server
via HTTP over GSM
 Secured via Password or Oauth2
authentication to IoT Server
 Plans to use MQTT
13
Security Issues
 Disabling & tampering of
devices
 Unauthorized control of
sensors & actuators
 Modification of data
 Incorrect forecasts/warnings
 DoS attacks
Privacy Issues
 Use of driver profiles against
accident claims
 Driver tracking
 Business sensitive insights
 Profiling for UBI
 Flood insurance
 Exposure of socio-economic
data
14
 Massive no of DNS lookups
from 10+ millions IoT
devices infected with Mirai
malware
 IP cameras, home gateways,
DVRs, & baby monitors
 Simple attack
1. Scans for IPs
2. Try known 60 (username,
password) pairs via telnet
3. Load malware
4. Wait for commands
15
Source: TheUSBport
Credit: Joey Devilla, globalnerdy.com
# Attack Vulnerabilities
1 Insecure Web Interface Weak default credentials & no lockouts, credentials exposed in
traffic, XSS, SQL-injection, session management
2 Insufficient Authentication/
Authorization
Simple passwords, lack of role-based access control, lack of / by
passing separation of roles, no 2-factor authentication
3 Insecure Network Services Vulnerable Services - telnet, Buffer Overflow, Open Ports via UPnP
4 Lack of Transport Encryption Unencrypted Services, Poorly or Misconfigured SSL/TLS
5 Privacy Concerns Collection of Unnecessary (Personal) Data
6 Insecure Cloud Interface Account enumeration, no account lockout, credentials exposed in
traffic, weak API keys, weak or no encryption7 Insecure Mobile Interface
8 Insufficient Security
Configurability
Lack of granular permission & password control, lack of logging &
monitoring
9 Insecure Software/Firmware No update possible, Unencrypted & unsigned update files,
firmware with sensitive information
10 Poor Physical Security Access via USB/JTAG ports, removal of storage media 16
17
Devices Network Storage & Processing
Image credit: www.ecomm.in/big-data-and-analytics.html
1. Collect only what is essential to application
2. No defaults – Accounts, passwords, services
3. Use digital certificates for authentication
4. Use role-based access control
5. Use inbuilt & encrypted device storage – No SD cards
6. Web interface / console shouldn’t be susceptible to brute-force, SQLi,
XSS, & CSRF attacks
7. Use hardware-level encryption – AES, NB-IoT supports 2048-bit RSA
8. Should support secure boot & over-the-air updates – Encrypted & signed
firmware
9. Block USB/JTAG ports
10. Use tamperproof & rugged devices 18
1. All communication must be secure – Plain text, REST API, MQTT
 Use TLS v1.1 & v1.2 (not SSL v2/v3 or TLS V1.0)
 Obtain certificates from a reliable CA – No default or self-signed certificates
2. Use secure underlying networks
 NB-IoT, LTE-M, & EC-GSM-IoT are relatively better compared to LoRaWAN &
SigFox
 Wi-Fi with WPA 2.0, ZigBee
 Avoid Bluetooth
3. Use VPN – especially for gateways
4. Use VLANs
5. Application-level payload encryption
6. Use standard encryption algorithms
19
1. Collect, process, & store only what is essential to application
2. No defaults – Accounts, passwords, services
3. Use role-based access control
4. Accounts should lockout
5. Use digital certificates for authentication & secure communication
6. Web interface / REAT API shouldn’t be susceptible to brute-force,
SQLi, XSS, & CSRF attacks
7. Use strong API keys & protect those keys
8. Strong encrypted data storage, unencrypt as you process
9. Use OAuth2 & 2-factor Authentication
10. Know your 3rd party tools & libraries
20
 Collection of Big Data is a functional requirement
 Security & Privacy are non-functional requirements
 They are often in conflict!
 Accept the fact that “You will be hacked!”
 People are starting to realize “I should worry about my privacy…”
 A bad IoT product in an extremely competitive market is a real killer
 Choose a good balance from design, development, to deployment
 Know, practice, & monitor
 Follow OWASP Top 10 attacks & guidelines for Web Applications, Mobile, & IoT
21
 Students
 Sandareka Wickramanayake (MSc)
 Shashika Muramudalige (MSc, BSc)
 Gihan Karunarathne (MSc)
 Niranda Perera (MSc)
 Thilina Madumal (MSc)
 Biman Hettiarachchi (MSc)
 Chami Keerthisinghe (MSc)
 Lasitha Petthawadu (MSc)
 Asiri Liyana Arachchi (BSc)
 Malintha Amarasinghe (BSc)
 Sasikala Kottegoda (BSc)
 Pasindu Upulwan (BSc)
 Pubudu Meththananda (BSc)
 Amila Karunathilaka (BSc)
 Gayathri Kalani (BSc)
 Harishanth Thiraviyanathan (BSc)
 Sivarajan Balakumaran (BSc)
 Sajeevan Alagendirarajah (BSc)
 Nirojan Neethirajah (BSc)
 Research partners
 Mr. Nishal Samarasekera (Dept. of
TLM, UoM)
 Prof. Srikantha Herath (UNU,
Japan)
 Data & Exposure
 Nimbus Venture (Pvt) Ltd.
 TechCERT
 VaticHub
 Many other drivers who help us
collect data
22
Big data, Security, or Privacy in IoT: Choice is Yours

Weitere ähnliche Inhalte

Was ist angesagt?

Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay KumarOWASP Delhi
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital VaultBlock Armour
 
Jak nie dać się podejść... - Ochrona przed atakami wewnętrznymi na przykładzi...
Jak nie dać się podejść... - Ochrona przed atakami wewnętrznymi na przykładzi...Jak nie dać się podejść... - Ochrona przed atakami wewnętrznymi na przykładzi...
Jak nie dać się podejść... - Ochrona przed atakami wewnętrznymi na przykładzi...Biznes to Rozmowy
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESManisha Luthra
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 

Was ist angesagt? (20)

Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
3 steps security
3 steps security3 steps security
3 steps security
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
OWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-DiveOWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-Dive
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital Vault
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
IoT Security Challenges
IoT Security ChallengesIoT Security Challenges
IoT Security Challenges
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Jak nie dać się podejść... - Ochrona przed atakami wewnętrznymi na przykładzi...
Jak nie dać się podejść... - Ochrona przed atakami wewnętrznymi na przykładzi...Jak nie dać się podejść... - Ochrona przed atakami wewnętrznymi na przykładzi...
Jak nie dać się podejść... - Ochrona przed atakami wewnętrznymi na przykładzi...
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Bank security
Bank securityBank security
Bank security
 

Ähnlich wie Big data, Security, or Privacy in IoT: Choice is Yours

IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Vikalp Sharma
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
 
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, ArduinoParis Open Source Summit
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsBeyondTrust
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantVladimir Jirasek
 
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Brian Bissett
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating thingsArpan Pal
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture Vrince Vimal
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)sandhibhide
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxInfosectrain3
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Mahmud Hossain
 

Ähnlich wie Big data, Security, or Privacy in IoT: Choice is Yours (20)

IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
itmsday2.pptx
itmsday2.pptxitmsday2.pptx
itmsday2.pptx
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
 

Mehr von Dilum Bandara

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningDilum Bandara
 
Time Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in PracticeTime Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in PracticeDilum Bandara
 
Introduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCAIntroduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCADilum Bandara
 
Introduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive AnalyticsIntroduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive AnalyticsDilum Bandara
 
Introduction to Concurrent Data Structures
Introduction to Concurrent Data StructuresIntroduction to Concurrent Data Structures
Introduction to Concurrent Data StructuresDilum Bandara
 
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-MatrixHard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-MatrixDilum Bandara
 
Introduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with HadoopIntroduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with HadoopDilum Bandara
 
Embarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel ProblemsEmbarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel ProblemsDilum Bandara
 
Introduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersIntroduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersDilum Bandara
 
Introduction to Thread Level Parallelism
Introduction to Thread Level ParallelismIntroduction to Thread Level Parallelism
Introduction to Thread Level ParallelismDilum Bandara
 
CPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching TechniquesCPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching TechniquesDilum Bandara
 
Data-Level Parallelism in Microprocessors
Data-Level Parallelism in MicroprocessorsData-Level Parallelism in Microprocessors
Data-Level Parallelism in MicroprocessorsDilum Bandara
 
Instruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware TechniquesInstruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware TechniquesDilum Bandara
 
Instruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler TechniquesInstruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler TechniquesDilum Bandara
 
CPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An IntroductionCPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An IntroductionDilum Bandara
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPDilum Bandara
 
Introduction to Content Delivery Networks
Introduction to Content Delivery NetworksIntroduction to Content Delivery Networks
Introduction to Content Delivery NetworksDilum Bandara
 
Peer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingPeer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingDilum Bandara
 

Mehr von Dilum Bandara (20)

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Time Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in PracticeTime Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in Practice
 
Introduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCAIntroduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCA
 
Introduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive AnalyticsIntroduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive Analytics
 
Introduction to Concurrent Data Structures
Introduction to Concurrent Data StructuresIntroduction to Concurrent Data Structures
Introduction to Concurrent Data Structures
 
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-MatrixHard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
 
Introduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with HadoopIntroduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with Hadoop
 
Embarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel ProblemsEmbarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel Problems
 
Introduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersIntroduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale Computers
 
Introduction to Thread Level Parallelism
Introduction to Thread Level ParallelismIntroduction to Thread Level Parallelism
Introduction to Thread Level Parallelism
 
CPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching TechniquesCPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching Techniques
 
Data-Level Parallelism in Microprocessors
Data-Level Parallelism in MicroprocessorsData-Level Parallelism in Microprocessors
Data-Level Parallelism in Microprocessors
 
Instruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware TechniquesInstruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware Techniques
 
Instruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler TechniquesInstruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler Techniques
 
CPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An IntroductionCPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An Introduction
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
 
Introduction to Content Delivery Networks
Introduction to Content Delivery NetworksIntroduction to Content Delivery Networks
Introduction to Content Delivery Networks
 
Peer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingPeer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and Streaming
 
Mobile Services
Mobile ServicesMobile Services
Mobile Services
 

Kürzlich hochgeladen

Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 

Kürzlich hochgeladen (20)

Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 

Big data, Security, or Privacy in IoT: Choice is Yours

  • 1. Dilum Bandara, PhD Dept. of Computer Science & Engineering, University of Moratuwa Mobitel NB-IoT Forum, Mar 23, 2018
  • 2. 2 Big Data Privacy Security • Huge datasets that we capture, transfer, store, & process to reveal associations, patterns, & trends • Volume, Variety, Velocity, & Veracity • Protection of computing systems & data that they store or access • Confidentiality, Integrity, & Availability (CIA)• Our interest in preventing inappropriate collection, use, & release of PII • Privacy of personal behavior, communications, & data What do I want? Security & Privacy are afterthoughts
  • 3. 3 Reckless Driving Driving Anomaly Detection Fault Detection & Prediction Tracking & Surveillance Fuel Fraud IoT Data Anal ytics Smart Driving
  • 4. 4 High-end OBD2 + GPS dongle to send data directly to cloud Dedicated GPS trackers send data directly to cloud Low-end OBD2 dongle + App to send data to cloud & gives real-time alerts
  • 5. 5
  • 6.  Real-time Analysis  Driving anomaly detection  Fuel fraud detection  Geo fencing  Vehicle fault detection  Historical Analysis  Driver profiling – UBI  Driver coaching  Predicting sensor failure  Case analysis 6
  • 7. 7  Driver behavior detection  Change of driver  Driving under influence  Fatigue  Sensor failure detection  Mass Air Flow (MAF) sensor  Emission issues  Check Engine Light
  • 8.  Long-distance bus fitted with a GPS unit & high-precision fuel sensor  Could you  explain variability in fuel consumption  predict fuel consumption of a journey  give tips to improve fuel consumption 8 ? • 4 months data • Timestamp, Longitude, Latitude, Elevation, Distance, Speed, Acceleration, Ignition status, Battery voltage, Fuel level, Fuel consumption
  • 9. 9
  • 10. 10 Actual Consumption : 84.08L Predicted Consumption : 91.77L Error: 9.1% Gradient Boosting Neural NetworkRandom Forest
  • 11. 11
  • 13.  Being set up for flood control & water management in Metro Colombo  Initial focus Kelani river basin  Entirely cloud-based  Weather Stations (9  50  100s)  Water-Level Gauges (2  12  34)  Controlling Flood Gates & Pumping Stations  Solar-powered Sensors & Communication  Reports data periodically to WSO2 IoT-Server via HTTP over GSM  Secured via Password or Oauth2 authentication to IoT Server  Plans to use MQTT 13
  • 14. Security Issues  Disabling & tampering of devices  Unauthorized control of sensors & actuators  Modification of data  Incorrect forecasts/warnings  DoS attacks Privacy Issues  Use of driver profiles against accident claims  Driver tracking  Business sensitive insights  Profiling for UBI  Flood insurance  Exposure of socio-economic data 14
  • 15.  Massive no of DNS lookups from 10+ millions IoT devices infected with Mirai malware  IP cameras, home gateways, DVRs, & baby monitors  Simple attack 1. Scans for IPs 2. Try known 60 (username, password) pairs via telnet 3. Load malware 4. Wait for commands 15 Source: TheUSBport Credit: Joey Devilla, globalnerdy.com
  • 16. # Attack Vulnerabilities 1 Insecure Web Interface Weak default credentials & no lockouts, credentials exposed in traffic, XSS, SQL-injection, session management 2 Insufficient Authentication/ Authorization Simple passwords, lack of role-based access control, lack of / by passing separation of roles, no 2-factor authentication 3 Insecure Network Services Vulnerable Services - telnet, Buffer Overflow, Open Ports via UPnP 4 Lack of Transport Encryption Unencrypted Services, Poorly or Misconfigured SSL/TLS 5 Privacy Concerns Collection of Unnecessary (Personal) Data 6 Insecure Cloud Interface Account enumeration, no account lockout, credentials exposed in traffic, weak API keys, weak or no encryption7 Insecure Mobile Interface 8 Insufficient Security Configurability Lack of granular permission & password control, lack of logging & monitoring 9 Insecure Software/Firmware No update possible, Unencrypted & unsigned update files, firmware with sensitive information 10 Poor Physical Security Access via USB/JTAG ports, removal of storage media 16
  • 17. 17 Devices Network Storage & Processing Image credit: www.ecomm.in/big-data-and-analytics.html
  • 18. 1. Collect only what is essential to application 2. No defaults – Accounts, passwords, services 3. Use digital certificates for authentication 4. Use role-based access control 5. Use inbuilt & encrypted device storage – No SD cards 6. Web interface / console shouldn’t be susceptible to brute-force, SQLi, XSS, & CSRF attacks 7. Use hardware-level encryption – AES, NB-IoT supports 2048-bit RSA 8. Should support secure boot & over-the-air updates – Encrypted & signed firmware 9. Block USB/JTAG ports 10. Use tamperproof & rugged devices 18
  • 19. 1. All communication must be secure – Plain text, REST API, MQTT  Use TLS v1.1 & v1.2 (not SSL v2/v3 or TLS V1.0)  Obtain certificates from a reliable CA – No default or self-signed certificates 2. Use secure underlying networks  NB-IoT, LTE-M, & EC-GSM-IoT are relatively better compared to LoRaWAN & SigFox  Wi-Fi with WPA 2.0, ZigBee  Avoid Bluetooth 3. Use VPN – especially for gateways 4. Use VLANs 5. Application-level payload encryption 6. Use standard encryption algorithms 19
  • 20. 1. Collect, process, & store only what is essential to application 2. No defaults – Accounts, passwords, services 3. Use role-based access control 4. Accounts should lockout 5. Use digital certificates for authentication & secure communication 6. Web interface / REAT API shouldn’t be susceptible to brute-force, SQLi, XSS, & CSRF attacks 7. Use strong API keys & protect those keys 8. Strong encrypted data storage, unencrypt as you process 9. Use OAuth2 & 2-factor Authentication 10. Know your 3rd party tools & libraries 20
  • 21.  Collection of Big Data is a functional requirement  Security & Privacy are non-functional requirements  They are often in conflict!  Accept the fact that “You will be hacked!”  People are starting to realize “I should worry about my privacy…”  A bad IoT product in an extremely competitive market is a real killer  Choose a good balance from design, development, to deployment  Know, practice, & monitor  Follow OWASP Top 10 attacks & guidelines for Web Applications, Mobile, & IoT 21
  • 22.  Students  Sandareka Wickramanayake (MSc)  Shashika Muramudalige (MSc, BSc)  Gihan Karunarathne (MSc)  Niranda Perera (MSc)  Thilina Madumal (MSc)  Biman Hettiarachchi (MSc)  Chami Keerthisinghe (MSc)  Lasitha Petthawadu (MSc)  Asiri Liyana Arachchi (BSc)  Malintha Amarasinghe (BSc)  Sasikala Kottegoda (BSc)  Pasindu Upulwan (BSc)  Pubudu Meththananda (BSc)  Amila Karunathilaka (BSc)  Gayathri Kalani (BSc)  Harishanth Thiraviyanathan (BSc)  Sivarajan Balakumaran (BSc)  Sajeevan Alagendirarajah (BSc)  Nirojan Neethirajah (BSc)  Research partners  Mr. Nishal Samarasekera (Dept. of TLM, UoM)  Prof. Srikantha Herath (UNU, Japan)  Data & Exposure  Nimbus Venture (Pvt) Ltd.  TechCERT  VaticHub  Many other drivers who help us collect data 22

Hinweis der Redaktion

  1. Figure source - https://mic.lk/nbiot/ Volume – Amount of data Variety – Different forms of data Velocity – Speed at which they come Veracity – Uncertainty associated with data CIA triad – We want to achieve these 3 goals PII - Personally Identifiable Information – where we are, what we do, who we love, what we buy Privacy vs Security: Movement wanting to know & control what appear on FB Cambridge Analytica - personal data to change election results
  2. 40K, 20K, 2K
  3. Mirai – The Future (Japanese)
  4. OWASP – Open Web Application Security Project OWASP Web Application & Mobile Top 10 XSS – Cross Site Scripting UPnP - Universal Plug and Play JTAG - used for debugging, programming and testing on virtually ALL embedded devices
  5. Hardware encryption - Secure, faster, & energy efficient
  6. 62% of users said privacy is my biggest worry in IoT