iot world - creating a secure robust iot reference architecture

39
Paul Fremantle CTO, WSO2 ([email protected] ) PhD researcher, Portsmouth University ([email protected] ) @pzfreo #wso2 A reference architecture for IoT: How to create a resilient, secure IoT cloud

Upload: paul-fremantle

Post on 09-Jul-2015

756 views

Category:

Internet


1 download

DESCRIPTION

My

TRANSCRIPT

Page 1: IoT World - creating a secure robust IoT reference architecture

Paul FremantleCTO, WSO2 ([email protected])PhD researcher, Portsmouth

University([email protected])

@pzfreo #wso2

A reference architecture for IoT: How to create a resilient, secure IoT cloud

Page 2: IoT World - creating a secure robust IoT reference architecture

Firstly, does security even matter?

Page 3: IoT World - creating a secure robust IoT reference architecture
Page 4: IoT World - creating a secure robust IoT reference architecture
Page 5: IoT World - creating a secure robust IoT reference architecture

My three rules for IoT security

• 1. Don’t be stupid

• 2. Be smart

• 3. Think about what’s different

Page 6: IoT World - creating a secure robust IoT reference architecture

My three rules for IoT security

• 1. Don’t be stupid

– The basics of Internet security haven’t gone away

• 2. Be smart

– Use the best practice from the Internet

• 3. Think about what’s different

– What are the unique challenges of your device?

Page 7: IoT World - creating a secure robust IoT reference architecture

http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/

Page 8: IoT World - creating a secure robust IoT reference architecture

So what is different about IoT?

• The longevity of the device– Updates are harder (or impossible)

• The size of the device– Capabilities are limited – especially around crypto

• The fact there is a device– Usually no UI for entering userids and passwords

• The data– Often highly personal

• The mindset– Appliance manufacturers don’t think like security experts– Embedded systems are often developed by grabbing existing

chips, designs, etc

Page 9: IoT World - creating a secure robust IoT reference architecture

Physical Hacks

A Practical Attack on the MIFARE Classic: http://www.cs.ru.nl/~flaviog/publications/Attack.MIFARE.pdfKarsten Nohl and Henryk Plotz. MIFARE, Little Security, Despite Obscurity

Page 10: IoT World - creating a secure robust IoT reference architecture
Page 11: IoT World - creating a secure robust IoT reference architecture

Or try this at home?http://freo.me/1g15BiG

Page 12: IoT World - creating a secure robust IoT reference architecture

Hardware recommendations

• Don’t rely on obscurity

Page 13: IoT World - creating a secure robust IoT reference architecture

Hardware recommendations

• Don’t rely on obscurity

• Don’t rely on obscurity

• Don’t rely on obscurity

• Don’t rely on obscurity

• Don’t rely on obscurity

• Don’t rely on obscurity

• Don’t rely on obscurity

Page 14: IoT World - creating a secure robust IoT reference architecture

Hardware Recommendation #2

• Unlocking a single device should risk only that device’s data

Page 15: IoT World - creating a secure robust IoT reference architecture

The Network

Page 16: IoT World - creating a secure robust IoT reference architecture

Direct network vs Gateway model

Page 17: IoT World - creating a secure robust IoT reference architecture

Crypto on small devices

• Practical Considerations and Implementation Experiences in Securing Smart Object Networks

– http://tools.ietf.org/html/draft-aks-crypto-sensors-02

Page 18: IoT World - creating a secure robust IoT reference architecture

Key distribution

Page 19: IoT World - creating a secure robust IoT reference architecture

Ubertooth

http://ubertooth.sourceforge.net/

https://www.usenix.org/conference/woot13/workshop-program/presentation/ryan

Page 20: IoT World - creating a secure robust IoT reference architecture
Page 21: IoT World - creating a secure robust IoT reference architecture

IDENTITY IS THE NEW PERIMETER

Page 22: IoT World - creating a secure robust IoT reference architecture

Passwords

• Passwords suck for humans

• They suck even more for devices

Page 23: IoT World - creating a secure robust IoT reference architecture
Page 24: IoT World - creating a secure robust IoT reference architecture

Why Federated Identity for IoT?

• Can enable a meaningful consent mechanism for sharing of device data

• Giving a device a token to use on API calls better than giving it a password– Revokable

– Granular

• May be relevant for both– Device to cloud

– Cloud to app

Page 25: IoT World - creating a secure robust IoT reference architecture

More informationhttp://pzf.fremantle.org/2013/11/using-oauth-20-with-mqtt.html

http://siot-workshop.org/

Page 26: IoT World - creating a secure robust IoT reference architecture
Page 27: IoT World - creating a secure robust IoT reference architecture

Reference Architecture for the Internet of Things http://freo.me/iotra

Page 28: IoT World - creating a secure robust IoT reference architecture

Re-active vs Realtime Pro-Active

Web Architecture

• Re-active

• 10k-100k connections

• Pull-based

• Human interactions

• Some APIs

• Creating Big Data

IoT Architecture

• Push-based

• 100k-1m connections

• No human interaction

• Autonomic

• API driven

• Creating even bigger datasets

Page 29: IoT World - creating a secure robust IoT reference architecture

Real time stream processing

1 million events/s on 4 servers in Amazon EC2

Page 30: IoT World - creating a secure robust IoT reference architecture

30

Analytics

Page 31: IoT World - creating a secure robust IoT reference architecture

Identity Management

Page 32: IoT World - creating a secure robust IoT reference architecture

Device Management (Generally available Q1/2015)

Page 33: IoT World - creating a secure robust IoT reference architecture

APIs and API Management

eBay handles 6 billion messages a day through WSO2 That is 4 million a minute

Page 34: IoT World - creating a secure robust IoT reference architecture

*

Public WSO2Cloud

Hybrid/PrivatePaaS

On-Premise

Develop Once – Deploy Everywhere

Managed Cloud

On AWS

Page 35: IoT World - creating a secure robust IoT reference architecture

DOESN’T EVERYONE SAY “JUST USE MY OPEN PLATFORM”?

Page 36: IoT World - creating a secure robust IoT reference architecture

Really Actually Open

• 100% Open Source (no bait and switch!)

• Heterogenous

• Polyglot

• Interoperable

• Modular and based on OSGi

• Extensible

• API-driven

https://www.flickr.com/photos/jmarty/

Page 37: IoT World - creating a secure robust IoT reference architecture

Summary

• Think about security from the start

• Build a federated and secure model of Identity for Things

• Create Autonomic models that deliver value that surprises and delights customers

• Use Big Data Analytics and the Lambda Architecture to understand your customers

• Be Open!

Page 38: IoT World - creating a secure robust IoT reference architecture
Page 39: IoT World - creating a secure robust IoT reference architecture