SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Chintan Patel
Research Scholar
Pandit Deendayal Petroleum University, Gandhinagar Gujarat
BEFORE
LUNCH SESSION
AFTER
LUNCH SESSION
LUNCH SESSION
IoT Security SESSION
FINITE STATE AUTOMETA OF WORKSHOP SESSION
List of cards…
Internet
of
Things
Octagon
of
IoT
Security
Authentication
In
Cryptography
Authentication
In
Internet
Paradigm
Authentication
In
IoT Paradigm
Authentication
Internet
vs.
IoT
Major challenges
in
IoT
Authentication
Internet of Things
N number of definitions available………..
• Def. 1 : “Internet of things is network of interconnected
networks which are build by interconnected “objects” or
“things” ”
• Def. 2 : Internet of things is connecting “Any things, Any time
and Any where ”
• Def. 3 : IoT enables physical objects to see, hear, think and
perform jobs by having them “talk” together, to share
information and to coordinate decision.
• IoT smart objects : Expected to reach 212 billion entities deployed by 2020
• M2M traffic will cover more than 45% of Internet traffic by 2020
• Mckinsey reported that number of machines grow 300% over in last 5 years.
• $2.7 to 6.3 trillion economy by 2025
PERCEPTION LAYER
PHYSICAL LAYER
OBJECT LAYER
USER LAYER
APPLICATION LAYER
DATA PROCESSING
SERVICE LAYER
NETWORK LAYER
COMMUNICATION
LAYER
S
E
C
U
R
I
T
Y
INTERNET OF THINGS
LAYERED ARCHITECTURE
PERCEPTION LAYER
PHYSICAL LAYER
OBJECT LAYER
USER LAYER
APPLICATION LAYER
DATA PROCESSING
SERVICE LAYER
NETWORK LAYER
COMMUNICATION
LAYER
S
E
C
U
R
I
T
Y
INTERNET OF THINGS
LAYERED ARCHITECTURE
• Identification:
– EPC (Electronic Product code)
– uCode (ubiquitous code)
– RFID tagid
– IPv6 (6LoWPaN)
• Sensing:
– Gathering the data
– Sending to data warehouse or cloud via gateway or fog device.
– Sensors can be simple sensor, actuator, wearable device, mobile
device.
– Examples: Temperature sensors, Smart boards with integrated sensors
like Arduino, Raspberry PI.
• Communication:
– Goal: Connecting heterogeneous devices together to deliver specific service.
– Protocols: Wi-Fi, Bluetooth, IEEE 802.15.4, Z-Wave, RFID and Ultra wide
bandwidth.
– RFID Tag : 10 cm to 200 m range
– NFC: High frequency band in 10 cm range.
– Wi-Fi: 100 m range
– Bluetooth 4.1: Low energy Bluetooth (BLE)
– LTE: Long term evolution
• Computation:
– Processing units and Applications
– Processing units like Micro controllers, Micro processors.
– Examples: Arduino, Intel Galileo, Raspberry PI, Gadgeteer, WiSense and so
on.
– Real time operating systems like contiki with cooja simulator, tiny OS, LiteOS,
Riot OS.
• Services:
– Identity Aware service : Object identification
– Information aggregation service: Collecting and summarizing row data
– Collaborative aware service: Any time, Any one, Any where
– Ubiquitous service:
• Semantics:
– Knowledge extraction : Recognizing and analysing data to make sense of
right decision to provide exact service.
– Use of semantic web technologies like resource description frame work, web
ontology network, Efficient XML interchange.
IoT QoS Criteria and security challenges
Availability
Reliability
Mobility
Performance
Management
Scalability
Inter-
operability
Security
and
Privacy
Fog computing: An IoT “Smart” Edge
FOG DEVICES
CLOUD / BIG DATA
STORAGE/INFORMATION
MINING
SENSOR DEVICES
[COMMUNICATION LAVEL – 1]
[0 – 100 m]
[COMMUNICATION LAVEL – 2 ]
[100-1000 m]
[COMMUNICATION LAVEL – 3 ]
[5 km to 100 km]
• Fog computing: Bridge between smart devices and large scale cloud computing
and storage devices
• Extending cloud computing services to edge devices of network
• Cloud has massive storage and computation capability while fog has limited
storage, battery and computation capability.
• Fog services:
– Location : Batter delay performance
– Distribution: Large number of Micro small cloud services
– Scalability: Deployment of new fog device is easy
– Density of devices: Better replicated services
– Mobility:
– Real time services:
– Standardization:
– Bird eye view:
IOT
SECURITY
Octagon
NON
REPUDIATION
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
TRUST
&
PRIVACY
ACCESS CONTROL
&
AUTHENTICATION
ACCOUNTABILITY
AUDITABILITY
• Identification / Authentication:
– Object Identification
– Communication identification
– Application identification
• “Authentication is the process of confirming entity’s identity using login and
additional information to sign in such as password, PIN, smart card, digital
certificates, biometrics”
• Minimalistic cryptography:
– Cryptographic algorithm requires memory, processing and energy
capabilities.
– Light weight operations includes binary operations as XOR,AND,OR and
rotation.
• Access control:
– Who can do what on which resource
– Access control list, Role based access control, capability based access
control, Trust based access control (Experience, Knowledge and
Recommendations)
M E D
KPUB
C = E[KPUB,M]
KPUB
KPRB
KPRB
M = D[KPRB,C]
CONFIDENTIALITY
M E D
KPRA
C = E[KPRA,M]
KPRA
KPUA
KPRA
M = D[KPUA,C]
AUTHENTICATION
CONFIDENTIALITY AND AUTHENTICATION
Light weight cryptography
• In IoT, Billions of small device deployment created huge heterogeneity of
devices and complexity of designing.
• Challenge: Applying conventional cryptography to small and tiny resource
constrained devices.
• Lightweight cryptography: To provide cryptographic solutions for the resource
constrained devices.
• Conventional cryptography: Computers, servers, smart phones and tablets.
• Light weight cryptography: Embedded systems, RFID and sensor network,
micro controllers, micro processors.
• Micro controllers: 4 bit, 8 bit, 16 bit, 32 bit processing capabilities can
consume very huge battery power to implement DES, and AES.
• RFID: No battery power, so requires cryptographic algorithms which requires
small amount of gate equivalent and also meet timing and power requirement
• Light weight cryptography needs to implement at ground level and upper level
also for the support. So need to think about complete system.
• If one device is resource constrained, Every one need to implement light
weight cryptography.
Performance Metrics
• Five major system metrics:
– Power consumption :
• Major parameter in the battery operated devices, Battery recharging and
replacing is very critical point.
• Power consumption depends on algorithm, threshold voltage, clock
frequency and technology used.
– Resource consumption:
• Gate area, Gate equivalent, or logic blocks [Hardware]
• Registers, RAM and ROM.
– Latency:
• Requirement is low latency
• Example: Patient oxygen supply or automotive application.
• Encryption latency is time between the initial request for encryption of a
plain text and the reply that returns corresponding cipher text
– Throughput:
• Rate at which new output like cipher text is generated.
– Device costs:
• Lower device cost
• “It is not difficult to secure IoT, but actual difficulty is maintaining balance
between security, Performance and resource requirements.”
• Hardware specific metrics:
– Field programmable logic blocks: Basic reconfigurable unit that contains
number of look up tables, flip-flops, multiplexers.
– Gate Equivalent: Area that is required by two input NAND gate. Very from
technology to technology so direct comparison is not possible.
– RFID have total 1000 to 10000 gates, out of which only 200 to 2000 may be
used for security purposes.
• Software specific metrics:
– Resource requirement can be measured using numbers of registers, number
of bytes of RAM and ROM required.
Lightweight Block Cipher
• AES 128: Advanced encryption standard 128 bit
– 128 bit block size
– 128 bit key size
– 8 cycles or 10 Cycle of repetitions
• PRESENT : First light weight block cipher
– Substitution – permutation network
– 64 bit block size
– 80 bit or 128 bit key size
– 31 Regular rounds
• Performance Advantages:
– Smaller block sizes
– Smaller key sizes
– Simple rounds : 4 bit S-box preferred over 8 bit S-box
– Simple key schedule: Use key derivation Function
– Minimal Implementation: Only encryption or decryption based on
requirement
PRESENT Algorithm
S-Box computation
P-Box computation
Light weight Hash function and Light weight MAC
• Hash function:
– Message digest to maintain integrity
– Hash function applied to message assures Integrity
– Light weight Hash function examples: PHOTON, Quark, SONGENT, Lesamnta-
LW.
– Goal: smaller internal state and smaller input - output size.
– Requirement: Pre-image resistant, second pre-image resistant, and Collision
attack.
• MAC Functions:
– Generating tag from message and secret key to ensure authenticity and
integrity.
– MAC function applied to message assures Integrity
– MAC function applied to identity assures authentication
– Lightweight MAC Function examples: Chaskey, TuLP, LightMAC.
Authentication In Internet vs. IoT
What?
Why?How?
DEVICE TO DEVICE AUTHENTICATION [SHORT RANGE APPROACH]
Wired or direct
Wireless or
indirect
GLOBAL IOT AUTHENTICATION [LONG RANGE APPROACH]
Symmetric Key
Algorithms
Diffie-Hellman and
Digital signature
RSA ECC
80
KPUB : 1024
KPR : 160
1024 160-223
112
KPUB : 2048
KPR : 224
2048 224-255
128
KPUB : 3072
KPR : 256
3072 256-383
192
KPUB : 7680
KPR : 384
7680 384-511
256
KPUB : 15,360
KPR : 512
15360 512
Elliptic Curve cryptography and Its role in IoT
P
-P
P + -P = O
P
P
2P
P + P = 2P
Q
P + Q= R
X3 + X + 1
POINT
NEGATIVE
POINT
SUMMATION
POINT
DOUBLING
POLYNOMIAL
CURVE
• Elliptic curve message encoding and decoding
• Elliptic curve Diffie Hellman problem
• Elliptic curve discrete logarithm problem
1 importance of light weight authentication in iot

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Hash Function
Hash FunctionHash Function
Hash Function
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Ipsec
IpsecIpsec
Ipsec
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 
Design Principles for Connected Devices
Design Principles for Connected DevicesDesign Principles for Connected Devices
Design Principles for Connected Devices
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
Encryption
EncryptionEncryption
Encryption
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
IPV6 INTRODUCTION
IPV6 INTRODUCTIONIPV6 INTRODUCTION
IPV6 INTRODUCTION
 
M2M technology in IOT
M2M technology in IOTM2M technology in IOT
M2M technology in IOT
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
IPv6 header
IPv6 headerIPv6 header
IPv6 header
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Cryptography
CryptographyCryptography
Cryptography
 

Ähnlich wie 1 importance of light weight authentication in iot

From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...Rick G. Garibay
 
Atal io t introduction
Atal io t introductionAtal io t introduction
Atal io t introductionYadvendra bedi
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerRick G. Garibay
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoTKiran Kumar Pattanaik
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research DirectionsRavindra Dastikop
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enableneelamsanjeevkumar
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io tChintan Patel
 
Internet of Things Architecture / Topology
Internet of Things Architecture / TopologyInternet of Things Architecture / Topology
Internet of Things Architecture / TopologyNEEVEE Technologies
 
GDG Meetup Jakarta - Low Power IoT
GDG Meetup Jakarta - Low Power IoTGDG Meetup Jakarta - Low Power IoT
GDG Meetup Jakarta - Low Power IoTAlwin Arrasyid
 
System design of multiprotocol iot
System design of multiprotocol iotSystem design of multiprotocol iot
System design of multiprotocol iotDev Bhattacharya
 
Copy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfCopy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfSeynji
 
Nodemcu and IOT.pptx
Nodemcu and IOT.pptxNodemcu and IOT.pptx
Nodemcu and IOT.pptxDixonSunny2
 

Ähnlich wie 1 importance of light weight authentication in iot (20)

Internet of things
Internet of thingsInternet of things
Internet of things
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
Atal io t introduction
Atal io t introductionAtal io t introduction
Atal io t introduction
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's Primer
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research Directions
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enable
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io t
 
Internet of Things Architecture / Topology
Internet of Things Architecture / TopologyInternet of Things Architecture / Topology
Internet of Things Architecture / Topology
 
GDG Meetup Jakarta - Low Power IoT
GDG Meetup Jakarta - Low Power IoTGDG Meetup Jakarta - Low Power IoT
GDG Meetup Jakarta - Low Power IoT
 
IoT/M2M Security
IoT/M2M SecurityIoT/M2M Security
IoT/M2M Security
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
System design of multiprotocol iot
System design of multiprotocol iotSystem design of multiprotocol iot
System design of multiprotocol iot
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Copy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfCopy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdf
 
Nodemcu and IOT.pptx
Nodemcu and IOT.pptxNodemcu and IOT.pptx
Nodemcu and IOT.pptx
 

Kürzlich hochgeladen

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

1 importance of light weight authentication in iot

  • 1. Chintan Patel Research Scholar Pandit Deendayal Petroleum University, Gandhinagar Gujarat
  • 2. BEFORE LUNCH SESSION AFTER LUNCH SESSION LUNCH SESSION IoT Security SESSION FINITE STATE AUTOMETA OF WORKSHOP SESSION
  • 4. Internet of Things N number of definitions available……….. • Def. 1 : “Internet of things is network of interconnected networks which are build by interconnected “objects” or “things” ” • Def. 2 : Internet of things is connecting “Any things, Any time and Any where ” • Def. 3 : IoT enables physical objects to see, hear, think and perform jobs by having them “talk” together, to share information and to coordinate decision.
  • 5. • IoT smart objects : Expected to reach 212 billion entities deployed by 2020 • M2M traffic will cover more than 45% of Internet traffic by 2020 • Mckinsey reported that number of machines grow 300% over in last 5 years. • $2.7 to 6.3 trillion economy by 2025
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. PERCEPTION LAYER PHYSICAL LAYER OBJECT LAYER USER LAYER APPLICATION LAYER DATA PROCESSING SERVICE LAYER NETWORK LAYER COMMUNICATION LAYER S E C U R I T Y INTERNET OF THINGS LAYERED ARCHITECTURE
  • 11. PERCEPTION LAYER PHYSICAL LAYER OBJECT LAYER USER LAYER APPLICATION LAYER DATA PROCESSING SERVICE LAYER NETWORK LAYER COMMUNICATION LAYER S E C U R I T Y INTERNET OF THINGS LAYERED ARCHITECTURE
  • 12. • Identification: – EPC (Electronic Product code) – uCode (ubiquitous code) – RFID tagid – IPv6 (6LoWPaN) • Sensing: – Gathering the data – Sending to data warehouse or cloud via gateway or fog device. – Sensors can be simple sensor, actuator, wearable device, mobile device. – Examples: Temperature sensors, Smart boards with integrated sensors like Arduino, Raspberry PI.
  • 13. • Communication: – Goal: Connecting heterogeneous devices together to deliver specific service. – Protocols: Wi-Fi, Bluetooth, IEEE 802.15.4, Z-Wave, RFID and Ultra wide bandwidth. – RFID Tag : 10 cm to 200 m range – NFC: High frequency band in 10 cm range. – Wi-Fi: 100 m range – Bluetooth 4.1: Low energy Bluetooth (BLE) – LTE: Long term evolution • Computation: – Processing units and Applications – Processing units like Micro controllers, Micro processors. – Examples: Arduino, Intel Galileo, Raspberry PI, Gadgeteer, WiSense and so on. – Real time operating systems like contiki with cooja simulator, tiny OS, LiteOS, Riot OS.
  • 14. • Services: – Identity Aware service : Object identification – Information aggregation service: Collecting and summarizing row data – Collaborative aware service: Any time, Any one, Any where – Ubiquitous service: • Semantics: – Knowledge extraction : Recognizing and analysing data to make sense of right decision to provide exact service. – Use of semantic web technologies like resource description frame work, web ontology network, Efficient XML interchange.
  • 15. IoT QoS Criteria and security challenges Availability Reliability Mobility Performance Management Scalability Inter- operability Security and Privacy
  • 16. Fog computing: An IoT “Smart” Edge FOG DEVICES CLOUD / BIG DATA STORAGE/INFORMATION MINING SENSOR DEVICES [COMMUNICATION LAVEL – 1] [0 – 100 m] [COMMUNICATION LAVEL – 2 ] [100-1000 m] [COMMUNICATION LAVEL – 3 ] [5 km to 100 km]
  • 17. • Fog computing: Bridge between smart devices and large scale cloud computing and storage devices • Extending cloud computing services to edge devices of network • Cloud has massive storage and computation capability while fog has limited storage, battery and computation capability. • Fog services: – Location : Batter delay performance – Distribution: Large number of Micro small cloud services – Scalability: Deployment of new fog device is easy – Density of devices: Better replicated services – Mobility: – Real time services: – Standardization: – Bird eye view:
  • 19. • Identification / Authentication: – Object Identification – Communication identification – Application identification • “Authentication is the process of confirming entity’s identity using login and additional information to sign in such as password, PIN, smart card, digital certificates, biometrics” • Minimalistic cryptography: – Cryptographic algorithm requires memory, processing and energy capabilities. – Light weight operations includes binary operations as XOR,AND,OR and rotation. • Access control: – Who can do what on which resource – Access control list, Role based access control, capability based access control, Trust based access control (Experience, Knowledge and Recommendations)
  • 20. M E D KPUB C = E[KPUB,M] KPUB KPRB KPRB M = D[KPRB,C] CONFIDENTIALITY M E D KPRA C = E[KPRA,M] KPRA KPUA KPRA M = D[KPUA,C] AUTHENTICATION
  • 22. Light weight cryptography • In IoT, Billions of small device deployment created huge heterogeneity of devices and complexity of designing. • Challenge: Applying conventional cryptography to small and tiny resource constrained devices. • Lightweight cryptography: To provide cryptographic solutions for the resource constrained devices. • Conventional cryptography: Computers, servers, smart phones and tablets. • Light weight cryptography: Embedded systems, RFID and sensor network, micro controllers, micro processors. • Micro controllers: 4 bit, 8 bit, 16 bit, 32 bit processing capabilities can consume very huge battery power to implement DES, and AES. • RFID: No battery power, so requires cryptographic algorithms which requires small amount of gate equivalent and also meet timing and power requirement • Light weight cryptography needs to implement at ground level and upper level also for the support. So need to think about complete system. • If one device is resource constrained, Every one need to implement light weight cryptography.
  • 23. Performance Metrics • Five major system metrics: – Power consumption : • Major parameter in the battery operated devices, Battery recharging and replacing is very critical point. • Power consumption depends on algorithm, threshold voltage, clock frequency and technology used. – Resource consumption: • Gate area, Gate equivalent, or logic blocks [Hardware] • Registers, RAM and ROM. – Latency: • Requirement is low latency • Example: Patient oxygen supply or automotive application. • Encryption latency is time between the initial request for encryption of a plain text and the reply that returns corresponding cipher text – Throughput: • Rate at which new output like cipher text is generated. – Device costs: • Lower device cost
  • 24. • “It is not difficult to secure IoT, but actual difficulty is maintaining balance between security, Performance and resource requirements.” • Hardware specific metrics: – Field programmable logic blocks: Basic reconfigurable unit that contains number of look up tables, flip-flops, multiplexers. – Gate Equivalent: Area that is required by two input NAND gate. Very from technology to technology so direct comparison is not possible. – RFID have total 1000 to 10000 gates, out of which only 200 to 2000 may be used for security purposes. • Software specific metrics: – Resource requirement can be measured using numbers of registers, number of bytes of RAM and ROM required.
  • 25. Lightweight Block Cipher • AES 128: Advanced encryption standard 128 bit – 128 bit block size – 128 bit key size – 8 cycles or 10 Cycle of repetitions • PRESENT : First light weight block cipher – Substitution – permutation network – 64 bit block size – 80 bit or 128 bit key size – 31 Regular rounds • Performance Advantages: – Smaller block sizes – Smaller key sizes – Simple rounds : 4 bit S-box preferred over 8 bit S-box – Simple key schedule: Use key derivation Function – Minimal Implementation: Only encryption or decryption based on requirement
  • 28. Light weight Hash function and Light weight MAC • Hash function: – Message digest to maintain integrity – Hash function applied to message assures Integrity – Light weight Hash function examples: PHOTON, Quark, SONGENT, Lesamnta- LW. – Goal: smaller internal state and smaller input - output size. – Requirement: Pre-image resistant, second pre-image resistant, and Collision attack. • MAC Functions: – Generating tag from message and secret key to ensure authenticity and integrity. – MAC function applied to message assures Integrity – MAC function applied to identity assures authentication – Lightweight MAC Function examples: Chaskey, TuLP, LightMAC.
  • 29.
  • 30.
  • 31. Authentication In Internet vs. IoT What? Why?How?
  • 32. DEVICE TO DEVICE AUTHENTICATION [SHORT RANGE APPROACH] Wired or direct Wireless or indirect
  • 33. GLOBAL IOT AUTHENTICATION [LONG RANGE APPROACH]
  • 34. Symmetric Key Algorithms Diffie-Hellman and Digital signature RSA ECC 80 KPUB : 1024 KPR : 160 1024 160-223 112 KPUB : 2048 KPR : 224 2048 224-255 128 KPUB : 3072 KPR : 256 3072 256-383 192 KPUB : 7680 KPR : 384 7680 384-511 256 KPUB : 15,360 KPR : 512 15360 512
  • 35. Elliptic Curve cryptography and Its role in IoT
  • 36. P -P P + -P = O P P 2P P + P = 2P Q P + Q= R X3 + X + 1 POINT NEGATIVE POINT SUMMATION POINT DOUBLING POLYNOMIAL CURVE
  • 37. • Elliptic curve message encoding and decoding • Elliptic curve Diffie Hellman problem • Elliptic curve discrete logarithm problem