Security challenges in Smart Lighting

Download Security challenges  in Smart Lighting

Post on 24-Feb-2016

46 views

Category:

Documents

0 download

DESCRIPTION

Security challenges in Smart Lighting. Paul Chilton NXP Semiconductors. Smart Lighting System. Application platforms. JenNet-IP Low-Power Wireless Network. Android App. JenNet-IP enabled bulb. IP Wireless Gateway H AN to 802.15.4. WiFi , Ethernet to HAN Broadband to Internet. - PowerPoint PPT Presentation

TRANSCRIPT

Security challenges in the lighting use caseSecurity challenges inSmart LightingPaul ChiltonNXP SemiconductorsSmart Lighting SystemJenNet-IP Low-PowerWireless NetworkCapacitive Touch RemoteSmart Plug - Load Control &Energy Monitoring WiFi , Ethernet to HANBroadband to InternetWeb InterfaceAndroid AppIP Wireless GatewayHAN to 802.15.4Application platformsJenNet-IP enabled bulb802.15.4 Wireless DevicesChallengesEase of commissioningEase of reconfigurationProvisioning of keys / Device AuthenticationIEEE 802.15.9 KMP transportRekeyingCostSleeping and Energy Harvesting devicesEase of commissioningEase of reconfigurationProvisioning of keys / Device AuthenticationIEEE 802.15.9 KMP transportREkeyingCostWe need to provide all the smarts in familiar devices at minimal costIf we are replacing technology (eg long life LED bulbs for incandescents) its not so badWe can hide the cost as part of the premium that a consumer will pay for a bulb that lasts 20000 hrs But if we want an internet connected toaster it can only cost a small premium over a standard toasterMy strap-line is The Internet of Things for a Dollar or lessSleeping and Energy Harvesting devicesProtection against replay attacks frame counter synchronisationIs there an easy way to do security that would allow multicast and broadcastNetwork layer security3QuestionsWhat is an appropriate level of security?What techniques provide security with smallest impact (data, code, bandwidth) ?Is privacy a concern?How many engineers does it take to change a light bulb?What is an appropriate level of security?What do we need at the application, network, link layerAccess control so we can authorise users / devices to operate our devicesWhat level of trust should we aim for? How to achieve trust without using too much memoryWhat techniques provide security with smallest impact (data, code, bandwidth) ?At the end of the day we need keys in devicesHow am I going to get them there secure in-band, less secure out-of-bandIdeal would be full power in-band transmissionIs privacy a concern?Do we need techniques to hide where data is coming fromHow many engineers does it take to change a light bulb?It had better be none - any member of the average household should be able to do it4

Recommended

View more >