SlideShare a Scribd company logo
1 of 60
Yves Goeleven
#IoT: Privacy and security considerations
Thanks to
Yves Goeleven
• Founder of MessageHandler.net
– Shipping software since 2001
– Windows Azure MVP
– Developer on NServiceBus
2
Exhibition theater @ kinepolis
Agenda
• Why this talk?
• What are the dangers?
• Security options
• Privacy options
4
Agenda
Why this talk?
5
6
7
You might just leave this session
with more questions than answers
Talk!
Let’s start a conversation!
11
Challenge!
I challenge anyone to do a follow up session
with your own questions and ideas.
12
Agenda
What are the dangers?
13
14
Internet of Things
15
What are the dangers?
Personal
17
& invisible
White lies are the
common decency
holding us together
20
Agenda
What can we do?
22
Security options
• Prevent physical access
– Behind locked doors
– Secure casing
– Do not expose physical ports (usb, ethernet, ...)
24
Security options
• Prevent virtual access
– Do not open inbound ports
– Design without ’listeners’ or ‘servers’ on the devices
– Instead use ‘workers’ or ‘agents’ and remote queues
with outbound connections only
25
26
Security options
• Prevent physical tampering
– Seals, markers
– Alarms
– Camera’s
27
Security options
• Prevent virtual tampering
– Bootloader in chip or ROM, checks firmware origin
before loading into RAM
– Note: Updating (incl. security fixes) now just got a lot
harder though
28
Security options
• Keep track of device identity
– Let devices register themselves/call home
– Do this on boot & periodically
30
Security options
• Analyze device behavior
– Include device specific & variable information
– Analyze it server side to detect hacked or spoofed
devices
31
Security options
• Block compromised devices
– Access control lists
– Protocol/package filtering
– Signal Jamming
– Unplug the power
– On the device, or a specialized device
32
Security options
• Many low-power devices cannot encrypt data
using standard encryption techniques
– Not enough memory
– Drains battery too fast
34
Security options
• Do not store unencrypted data
– On publicly accessible devices
– Better send it elsewhere, unencrypted if needed, to
store it safely
35
Security options
• Do not send unencrypted data over long
distances
– Use a local ‘gateway’, a powerfull local device to
encrypt it on behalf of dumb devices
36
Security options
• Use alternative encryption & data mangling
strategies
– Signed at the foundry, if you can live with lock-in
– Ciphers, hashes & arithmetic algorithms
37
Security options
• Audit your physical environment
– Know which devices are ‘smart’
– And how they communicate
– Include all technologies (IR, RF, Bluetooth)
39
Security options
• Spy on your things
– Intercept communication between your ‘things’
– Analyze the communication & detect anomalies
40
Security options
• Physical canary
– Apply ‘social control’ amongst devices
– Let devices report that other devices are talking to
them inappropriately
41
Internet of things, reference architecture
42
Privacy options
• There are privacy laws
– Make sure not to break these!
– Do not store, send or process information that you’re
not allowed to
– http://en.wikipedia.org/wiki/Data_Protection_Directiv
e
44
Privacy options
• Is it clear what laws apply when?
– Multinationals spread across different countries
– Difference in laws where data is collected vs data is
processed or stored
– US vs EU: direct conflict
45
Privacy options
• Trust is paramount for adoption of IoT
– Make it your policy not to break it
– People may choose not to buy products from
violators
48
Privacy options
• Question is: is this really true?
– Facebook is huge, yet no one trusts them (I hope)
– Will convenience win over privacy concerns for
majority of people?
49
Privacy options
• Build trust by asking for user consent
– On data collection devices
– Oauth great for this!?
– But how about devices without a screen?
50
Privacy options
• And how about exchanging and correlating
information with 3rd parties in backend?
– Need for federated authorization?
– With context?
– F.e. I allow you to analyse my energy consumption,
send the results to government, but not to utility?
52
55
Loyalty plan
Give me your address and
you'll get 10% off on your
next pair of jeans…
Other things we can do?
There’s a lot we can do
56
Other things we can do?
Also a lot of open questions
57
Other things we can do?
But maybe consumers just don’t care
(aren’t prepared to pay for it?)
58
Other things we can do?
What do you think?
59
60
A big thank you to our sponsors
Gold Partners
Silver & Track Partners
Platinum Partners

More Related Content

What's hot

ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
John Intindolo
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalists
Jillian York
 

What's hot (19)

[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors
 
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]
 
The Internet of Things and You
The Internet of Things and YouThe Internet of Things and You
The Internet of Things and You
 
Information technology Vs Information security
Information technology Vs Information securityInformation technology Vs Information security
Information technology Vs Information security
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunities
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information security
 
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
 
Open Access: Data Protection, Storage and Sharing
Open Access: Data Protection, Storage and SharingOpen Access: Data Protection, Storage and Sharing
Open Access: Data Protection, Storage and Sharing
 
Codebits 2011
Codebits 2011Codebits 2011
Codebits 2011
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hacking
HackingHacking
Hacking
 
OSINT
OSINTOSINT
OSINT
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
 
Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalists
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Viewers also liked

Key Data Management Requirements for the IoT
Key Data Management Requirements for the IoTKey Data Management Requirements for the IoT
Key Data Management Requirements for the IoT
MongoDB
 
Internet of Things and Big Data: Vision and Concrete Use Cases
Internet of Things and Big Data: Vision and Concrete Use CasesInternet of Things and Big Data: Vision and Concrete Use Cases
Internet of Things and Big Data: Vision and Concrete Use Cases
MongoDB
 

Viewers also liked (20)

Data Ownership & Trust in the IoT
Data Ownership & Trust in the IoTData Ownership & Trust in the IoT
Data Ownership & Trust in the IoT
 
[IoT Tech Expo] Smart Cities – Leveraging Messaging from Project to City to ...
[IoT Tech Expo] Smart Cities – Leveraging Messaging from Project to City to ...[IoT Tech Expo] Smart Cities – Leveraging Messaging from Project to City to ...
[IoT Tech Expo] Smart Cities – Leveraging Messaging from Project to City to ...
 
The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas
 
HP Iot platform and solution plans
HP Iot platform and solution plansHP Iot platform and solution plans
HP Iot platform and solution plans
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
Key Data Management Requirements for the IoT
Key Data Management Requirements for the IoTKey Data Management Requirements for the IoT
Key Data Management Requirements for the IoT
 
IOT Factory - Open IOT Platform & Startup Studio
IOT Factory - Open IOT Platform & Startup StudioIOT Factory - Open IOT Platform & Startup Studio
IOT Factory - Open IOT Platform & Startup Studio
 
Big data and value creation
Big data and value creationBig data and value creation
Big data and value creation
 
Importance of IoT in Retail
Importance of IoT in RetailImportance of IoT in Retail
Importance of IoT in Retail
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Big Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsBig Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of Things
 
Webinar: IoT in Healthcare - An Overview
Webinar: IoT in Healthcare - An OverviewWebinar: IoT in Healthcare - An Overview
Webinar: IoT in Healthcare - An Overview
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things and Big Data: Vision and Concrete Use Cases
Internet of Things and Big Data: Vision and Concrete Use CasesInternet of Things and Big Data: Vision and Concrete Use Cases
Internet of Things and Big Data: Vision and Concrete Use Cases
 
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaistIot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
 

Similar to Io t privacy and security considerations

A balanced perspective on RFID
A balanced perspective on RFIDA balanced perspective on RFID
A balanced perspective on RFID
Considerati
 

Similar to Io t privacy and security considerations (20)

Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Open Source IoT- Timm McShane
Open Source IoT- Timm McShaneOpen Source IoT- Timm McShane
Open Source IoT- Timm McShane
 
Network Security
Network SecurityNetwork Security
Network Security
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Information Security
Information SecurityInformation Security
Information Security
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
A balanced perspective on RFID
A balanced perspective on RFIDA balanced perspective on RFID
A balanced perspective on RFID
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 
IoT PPT Deck
IoT PPT DeckIoT PPT Deck
IoT PPT Deck
 
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfAttacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdf
 
Big Data LDN 2018: AI VS. GDPR
Big Data LDN 2018: AI VS. GDPRBig Data LDN 2018: AI VS. GDPR
Big Data LDN 2018: AI VS. GDPR
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider Threats
 
Securing IoT medical devices
Securing IoT medical devicesSecuring IoT medical devices
Securing IoT medical devices
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 

More from Yves Goeleven (10)

Back to the 90s' - Revenge of the static website
Back to the 90s' - Revenge of the static websiteBack to the 90s' - Revenge of the static website
Back to the 90s' - Revenge of the static website
 
Azure storage deep dive
Azure storage deep diveAzure storage deep dive
Azure storage deep dive
 
Connecting your app to the real world
Connecting your app to the real worldConnecting your app to the real world
Connecting your app to the real world
 
Madn - connecting things with people
Madn - connecting things with peopleMadn - connecting things with people
Madn - connecting things with people
 
Message handler customer deck
Message handler customer deckMessage handler customer deck
Message handler customer deck
 
Cloudbrew - Internet Of Things
Cloudbrew - Internet Of ThingsCloudbrew - Internet Of Things
Cloudbrew - Internet Of Things
 
Windows azure storage services
Windows azure storage servicesWindows azure storage services
Windows azure storage services
 
Azug - successfully breeding rabits
Azug - successfully breeding rabitsAzug - successfully breeding rabits
Azug - successfully breeding rabits
 
Eda on the azure services platform
Eda on the azure services platformEda on the azure services platform
Eda on the azure services platform
 
Sql Azure
Sql AzureSql Azure
Sql Azure
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Io t privacy and security considerations

  • 1. Yves Goeleven #IoT: Privacy and security considerations Thanks to
  • 2. Yves Goeleven • Founder of MessageHandler.net – Shipping software since 2001 – Windows Azure MVP – Developer on NServiceBus 2
  • 4. Agenda • Why this talk? • What are the dangers? • Security options • Privacy options 4
  • 6. 6
  • 7. 7
  • 8.
  • 9.
  • 10. You might just leave this session with more questions than answers
  • 11. Talk! Let’s start a conversation! 11
  • 12. Challenge! I challenge anyone to do a follow up session with your own questions and ideas. 12
  • 13. Agenda What are the dangers? 13
  • 15. 15
  • 16.
  • 17. What are the dangers? Personal 17
  • 19.
  • 20. White lies are the common decency holding us together 20
  • 21.
  • 23.
  • 24. Security options • Prevent physical access – Behind locked doors – Secure casing – Do not expose physical ports (usb, ethernet, ...) 24
  • 25. Security options • Prevent virtual access – Do not open inbound ports – Design without ’listeners’ or ‘servers’ on the devices – Instead use ‘workers’ or ‘agents’ and remote queues with outbound connections only 25
  • 26. 26
  • 27. Security options • Prevent physical tampering – Seals, markers – Alarms – Camera’s 27
  • 28. Security options • Prevent virtual tampering – Bootloader in chip or ROM, checks firmware origin before loading into RAM – Note: Updating (incl. security fixes) now just got a lot harder though 28
  • 29.
  • 30. Security options • Keep track of device identity – Let devices register themselves/call home – Do this on boot & periodically 30
  • 31. Security options • Analyze device behavior – Include device specific & variable information – Analyze it server side to detect hacked or spoofed devices 31
  • 32. Security options • Block compromised devices – Access control lists – Protocol/package filtering – Signal Jamming – Unplug the power – On the device, or a specialized device 32
  • 33.
  • 34. Security options • Many low-power devices cannot encrypt data using standard encryption techniques – Not enough memory – Drains battery too fast 34
  • 35. Security options • Do not store unencrypted data – On publicly accessible devices – Better send it elsewhere, unencrypted if needed, to store it safely 35
  • 36. Security options • Do not send unencrypted data over long distances – Use a local ‘gateway’, a powerfull local device to encrypt it on behalf of dumb devices 36
  • 37. Security options • Use alternative encryption & data mangling strategies – Signed at the foundry, if you can live with lock-in – Ciphers, hashes & arithmetic algorithms 37
  • 38.
  • 39. Security options • Audit your physical environment – Know which devices are ‘smart’ – And how they communicate – Include all technologies (IR, RF, Bluetooth) 39
  • 40. Security options • Spy on your things – Intercept communication between your ‘things’ – Analyze the communication & detect anomalies 40
  • 41. Security options • Physical canary – Apply ‘social control’ amongst devices – Let devices report that other devices are talking to them inappropriately 41
  • 42. Internet of things, reference architecture 42
  • 43.
  • 44. Privacy options • There are privacy laws – Make sure not to break these! – Do not store, send or process information that you’re not allowed to – http://en.wikipedia.org/wiki/Data_Protection_Directiv e 44
  • 45. Privacy options • Is it clear what laws apply when? – Multinationals spread across different countries – Difference in laws where data is collected vs data is processed or stored – US vs EU: direct conflict 45
  • 46.
  • 47.
  • 48. Privacy options • Trust is paramount for adoption of IoT – Make it your policy not to break it – People may choose not to buy products from violators 48
  • 49. Privacy options • Question is: is this really true? – Facebook is huge, yet no one trusts them (I hope) – Will convenience win over privacy concerns for majority of people? 49
  • 50. Privacy options • Build trust by asking for user consent – On data collection devices – Oauth great for this!? – But how about devices without a screen? 50
  • 51.
  • 52. Privacy options • And how about exchanging and correlating information with 3rd parties in backend? – Need for federated authorization? – With context? – F.e. I allow you to analyse my energy consumption, send the results to government, but not to utility? 52
  • 53.
  • 54.
  • 55. 55 Loyalty plan Give me your address and you'll get 10% off on your next pair of jeans…
  • 56. Other things we can do? There’s a lot we can do 56
  • 57. Other things we can do? Also a lot of open questions 57
  • 58. Other things we can do? But maybe consumers just don’t care (aren’t prepared to pay for it?) 58
  • 59. Other things we can do? What do you think? 59
  • 60. 60 A big thank you to our sponsors Gold Partners Silver & Track Partners Platinum Partners

Editor's Notes

  1. Real time message processing as a service Think of it as IFTTT for internet of things Solves today’s integration issues Scalability, data volume, multitude protocols & platforms, multitude of integration points, saas & social integration, mobile platforms, business ecosystems, ownership & centralized management, …
  2. Real and present dangers Are a threat to IOT Are caused by IOT
  3. Investigation and understanding is required
  4. Can third parties (ab)use this information? ‘Personally wellbeing’: Doctors, physicians, … ‘Social purposes’: Government, police, judges, … ‘Commercial purposes’: Insurance, lawyers, markting… ‘Pure evil’: Identity theft, extortion, …
  5. What about the small things in life? Occasional white lie <> activity/location tracking Socially unacceptable (yet totally normal) behaviour <> Sensors
  6. Prevent physical tampering Seals, marks Alarms, camera’s Prevent virtual tampering Bootloader in chip or ROM Checks firmware origin before loading into RAM Updating (incl. security fixes) now just got a lot harder though
  7. All this comes at a cost, both in time and money. And not just on the producer side Is it worth it, do people care enough? Or will convenience be more important than privacy?