SlideShare a Scribd company logo
1 of 44
Download to read offline
SRGE 2018 Internet of Things workshop – Cairo University, 12 July 2018
1
The Shift from Social Network Security to
the Social IOT Security
Presented By
Dr. Mohamed Torky
PHD in Computer Science (2018), Faculty of Science, Menoufyia University, Egypt.
Member in Scientific Research Group in Egypt (SRGE)
Agenda
2
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
Agenda
3
1
• Introduction.
2
• Privacy Protection in Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
7/13/2018
1- Introduction
Internet of People (IOP) Attacks
5
(IOP)
Agenda
6
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
7/13/2018
2- Privacy Protection of Internet of People (IOP)
Hacking Privacy of IOP
Fake Profiles Attacks Social Bot Attacks
2.1. IOP Privacy Protection against Fake Profile Attacks
(Fake Profile Recognizer (FPR) Model)
8
9
Users’ Identity Generator (UIG) Model
2.1. IOP Privacy Protection against Fake Profile Attacks
(Fake Profile Recognizer (FPR) Model)
10
Identity Verifier Machine (IVM) Model
2.1. IOP Privacy Protection against Fake Profile Attacks
(Fake Profile Recognizer (FPR) Model)
7/13/2018
2-4 Results
Intelligent system and it's application, FCI, Sat 3-12-2016
12
AccuracyF-MeasureRecallPrecisionDataset
03.9501.9594.5395.49Facebook
94.7794.4794.2795.22Google+
94.9394.928.9495.05Twitter
94.9194.8994.5395.25AVG
AUCFNRFall-OutSpecificityDataset
06.9547.547.453.95Facebook
94.785.734.7395.27Google+
94.955.24.9395.07Twitter
94.935.474.7195.29AVG
Results
13
Fig 1 Fig 2
Comparison Results
14
Fig 1 Fig 2
15
16
2.2. IOP Privacy Protection against Social Bot Attacks
(Necklace CAPTCHA Mechanism)
Classical Necklace Graph Modified Necklace Graph
Social Bot
CAPTCHA
17
2.2. IOP Privacy Protection against Social Bot Attacks
(Necklace CAPTCHA Mechanism)
7/13/2018
3-2 Usability Results
19
Effectiveness Results Solution Time Results
3-3 Security Results
20
Fig 1 Fig 2
3-4 Comparison Results
21
3-4 Comparison Results
22
23
24
From IOP to Internet of Things (IOT) !!
IOP IOT
Agenda
25
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
26
According to The Social Internet of Things (SIOT)–
when social networks meet the IOT: Concept,
architecture and network characterization, the term
SIOT (Social internet of Things) has a different
definition from what you might expect. In short, it
doesn’t refer to smart objects that are connected to
social networks,, but rather to intelligent devices that
are able to create social relationships among them,
fact that leads to social networks of their own.
3. Social Internet of Things (SIOT) is the Next Technology.
27
(1) Parental Object Relationship (POR):
is typically established among homogenous
objects - same generation devices made by
the same manufacturer.
3.1 Types of SIOT Relationships
28
(2) Co-location Object Relationship (C-LOR)
Established among heterogeneous or homogenous
objects that share the same environment or goal.
3.1 Types of SIOT Relationships
29
(3) Co-work Object Relationship (C-WOR):
Established between two or more devices whose
functionalities are combined to accomplish a
common goal. This type of relationship occurs
between objects that either need to touch each other
to achieve that goal, or need to be in close proximity
of one another
3.1 Types of SIOT Relationships
30
(4) Ownership Object Relationship (OOR):
Occur between the smart devices of the same user
(smartphones, portable media players, video game
consoles, etc.)
3.1 Types of SIOT Relationships
31
(4) Social Object Relationship (SOR):
Occur when the devices come in touch whenever
their owners meet. Smart objects belonging to
friends, classmates, coworkers and companions
could establish this type of relationship.
3.1 Types of SIOT Relationships
32
IOT is Dramatically Enlarging
the Attack Surface, So, How to
Secure SIOT Platforms, is an
Open Challenge !!
Agenda
33
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
34
4 .1. SIOT Attacks Surface
Insecure Mobile Interface
Insecure Web Interface
Lack of Encryption Protocol
Insecure Cloud Interface
Insecure Network services
Insecure Software/ Firmware
Poor Physical Security
35
4 .2. SIOT is a Popular Platforms for Attackers
Computational capabilities, Increasing capabilities
of microcomputers and Internet Connection make
IOT devices a popular attack tool to Hackers:
IOT Device can be used to:
• Send Same Messages
• Coordinate an attack against a critical
Infrastructure
• Serve a Malware
• Work as a entry point within a corporate network
36
4 .3. SIOT Attack Patterns
Botnets are already a major Threats…..
• IOT device can send a ThingBot within the
Social Internet of Things.
• Infected device can harm all connected
devices in SIOT network.
• Number of ThingBot software against smart
routers, TVs, network attached storage
devices, gaming devices are increasingly
growing.
Oops….. My refrigerator is sending Spam
Messages
37
4 .3. SIOT Attack Patterns
A Linux worm (Linux.Darlloz) and Spike Botnets is
designed to target IOT Devices through DDoS…..
• Generate random IP Addresses and attempt to
use commonly used credentials to log into the
target device in SIOT .
• It send HTTP posts requests specially crafted ,
once compromised the target device , it
downloads the worm from a remote server and
start searching other target devices in SIOT
network.
• Once the worm has compromised a device, it kills
off access to any telnet service running .
Symantec detected Linux.Darlloz attack as
the first IOT malware
38
4 .3. SIOT Attack Patterns
Hacking Smart watches…..
• Data sent between the Smart watches and an
android mobile phone can be intercepted.
• Easy to crack the authentication of smart watches
by brute force attacks as it use six digit PIN
Hacking Wearable Devices
39
4 .3. SIOT Attack Patterns
Hacking Smart Meters…..
• In Spain, millions of smart meters are susceptible to
cyber attacks due to lack of proper security controls.
• Attacker can exploit the lack of security controls to
perform fraudulent activities with smart meters in
SIOT network
• Smart meters is designed with poor protected
Credentials.
• Attackers can modify device ID to impersonate other
customer or use the smart meter to launch attacks
against power network or harm other devices in the
SIOT of the houses or firms.
Smart meters can be hacked to hit the
National power network
Agenda
40
1
• Introduction.
2
• Privacy Protection of Internet of People (IOP).
3
• Social Internet of Things (SIOT) is the Next Technology
4
• Open Security Challenges in SIOT
5
• Evolution of SIOT: Today, Tomorrow
41
 More Than 50 billion Devices by 2020.
 More Than 6 connected devices per
person.
 By 2020 IOT will be more than the size
of smart phones , PC, Tablets,
Connected Cars and wearable devices.
 We are rapidly evolving toward a world
where every thing will be connected
 Number of security attacks will increase.
 Privacy and security must be addressed
with untraditional mechanisms to secure
large SIOT networks.
 PKI-based solution can be used to
improve IOT and SIOT security.
5. Evolution of SIOT: Today, Tomorrow
42
43
Acknowledgment
44

More Related Content

What's hot

Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
 
Review on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT SecurityReview on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT Securityijtsrd
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoTJinia Bhowmik
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Dr. Michael Agbaje
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoTExosite
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTBarcoding, Inc.
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of ThingsTushar Sharma
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmIJSRED
 

What's hot (19)

Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 
Review on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT SecurityReview on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT Security
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoT
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of Things
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
Iot Market Readiness
Iot Market ReadinessIot Market Readiness
Iot Market Readiness
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 

Similar to The shift from social network security to the social iot security

A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfImXaib
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...AIRCC Publishing Corporation
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...AIRCC Publishing Corporation
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsDodi Saputra
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon Bob Snyder
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksIJECEIAES
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
 

Similar to The shift from social network security to the social iot security (20)

mypresentation.pdf
mypresentation.pdfmypresentation.pdf
mypresentation.pdf
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Internet of Things.
Internet of Things.Internet of Things.
Internet of Things.
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
 

More from Aboul Ella Hassanien

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdfAboul Ella Hassanien
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...Aboul Ella Hassanien
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...Aboul Ella Hassanien
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...Aboul Ella Hassanien
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxAboul Ella Hassanien
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdfAboul Ella Hassanien
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات Aboul Ella Hassanien
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي Aboul Ella Hassanien
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى Aboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنيةAboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنيةAboul Ella Hassanien
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفالAboul Ella Hassanien
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالAboul Ella Hassanien
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىAboul Ella Hassanien
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية Aboul Ella Hassanien
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...Aboul Ella Hassanien
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةAboul Ella Hassanien
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى Aboul Ella Hassanien
 

More from Aboul Ella Hassanien (20)

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptx
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdf
 
SRGE photo.pdf
SRGE photo.pdfSRGE photo.pdf
SRGE photo.pdf
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفال
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفال
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
 
اقتصاد ميتافيرس
اقتصاد ميتافيرساقتصاد ميتافيرس
اقتصاد ميتافيرس
 

Recently uploaded

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

The shift from social network security to the social iot security

  • 1. SRGE 2018 Internet of Things workshop – Cairo University, 12 July 2018 1 The Shift from Social Network Security to the Social IOT Security Presented By Dr. Mohamed Torky PHD in Computer Science (2018), Faculty of Science, Menoufyia University, Egypt. Member in Scientific Research Group in Egypt (SRGE)
  • 2. Agenda 2 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 3. Agenda 3 1 • Introduction. 2 • Privacy Protection in Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 5. Internet of People (IOP) Attacks 5 (IOP)
  • 6. Agenda 6 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 7. 7/13/2018 2- Privacy Protection of Internet of People (IOP) Hacking Privacy of IOP Fake Profiles Attacks Social Bot Attacks
  • 8. 2.1. IOP Privacy Protection against Fake Profile Attacks (Fake Profile Recognizer (FPR) Model) 8
  • 9. 9 Users’ Identity Generator (UIG) Model 2.1. IOP Privacy Protection against Fake Profile Attacks (Fake Profile Recognizer (FPR) Model)
  • 10. 10 Identity Verifier Machine (IVM) Model 2.1. IOP Privacy Protection against Fake Profile Attacks (Fake Profile Recognizer (FPR) Model)
  • 12. 2-4 Results Intelligent system and it's application, FCI, Sat 3-12-2016 12 AccuracyF-MeasureRecallPrecisionDataset 03.9501.9594.5395.49Facebook 94.7794.4794.2795.22Google+ 94.9394.928.9495.05Twitter 94.9194.8994.5395.25AVG AUCFNRFall-OutSpecificityDataset 06.9547.547.453.95Facebook 94.785.734.7395.27Google+ 94.955.24.9395.07Twitter 94.935.474.7195.29AVG
  • 15. 15
  • 16. 16 2.2. IOP Privacy Protection against Social Bot Attacks (Necklace CAPTCHA Mechanism) Classical Necklace Graph Modified Necklace Graph Social Bot CAPTCHA
  • 17. 17 2.2. IOP Privacy Protection against Social Bot Attacks (Necklace CAPTCHA Mechanism)
  • 19. 3-2 Usability Results 19 Effectiveness Results Solution Time Results
  • 23. 23
  • 24. 24 From IOP to Internet of Things (IOT) !! IOP IOT
  • 25. Agenda 25 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 26. 26 According to The Social Internet of Things (SIOT)– when social networks meet the IOT: Concept, architecture and network characterization, the term SIOT (Social internet of Things) has a different definition from what you might expect. In short, it doesn’t refer to smart objects that are connected to social networks,, but rather to intelligent devices that are able to create social relationships among them, fact that leads to social networks of their own. 3. Social Internet of Things (SIOT) is the Next Technology.
  • 27. 27 (1) Parental Object Relationship (POR): is typically established among homogenous objects - same generation devices made by the same manufacturer. 3.1 Types of SIOT Relationships
  • 28. 28 (2) Co-location Object Relationship (C-LOR) Established among heterogeneous or homogenous objects that share the same environment or goal. 3.1 Types of SIOT Relationships
  • 29. 29 (3) Co-work Object Relationship (C-WOR): Established between two or more devices whose functionalities are combined to accomplish a common goal. This type of relationship occurs between objects that either need to touch each other to achieve that goal, or need to be in close proximity of one another 3.1 Types of SIOT Relationships
  • 30. 30 (4) Ownership Object Relationship (OOR): Occur between the smart devices of the same user (smartphones, portable media players, video game consoles, etc.) 3.1 Types of SIOT Relationships
  • 31. 31 (4) Social Object Relationship (SOR): Occur when the devices come in touch whenever their owners meet. Smart objects belonging to friends, classmates, coworkers and companions could establish this type of relationship. 3.1 Types of SIOT Relationships
  • 32. 32 IOT is Dramatically Enlarging the Attack Surface, So, How to Secure SIOT Platforms, is an Open Challenge !!
  • 33. Agenda 33 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 34. 34 4 .1. SIOT Attacks Surface Insecure Mobile Interface Insecure Web Interface Lack of Encryption Protocol Insecure Cloud Interface Insecure Network services Insecure Software/ Firmware Poor Physical Security
  • 35. 35 4 .2. SIOT is a Popular Platforms for Attackers Computational capabilities, Increasing capabilities of microcomputers and Internet Connection make IOT devices a popular attack tool to Hackers: IOT Device can be used to: • Send Same Messages • Coordinate an attack against a critical Infrastructure • Serve a Malware • Work as a entry point within a corporate network
  • 36. 36 4 .3. SIOT Attack Patterns Botnets are already a major Threats….. • IOT device can send a ThingBot within the Social Internet of Things. • Infected device can harm all connected devices in SIOT network. • Number of ThingBot software against smart routers, TVs, network attached storage devices, gaming devices are increasingly growing. Oops….. My refrigerator is sending Spam Messages
  • 37. 37 4 .3. SIOT Attack Patterns A Linux worm (Linux.Darlloz) and Spike Botnets is designed to target IOT Devices through DDoS….. • Generate random IP Addresses and attempt to use commonly used credentials to log into the target device in SIOT . • It send HTTP posts requests specially crafted , once compromised the target device , it downloads the worm from a remote server and start searching other target devices in SIOT network. • Once the worm has compromised a device, it kills off access to any telnet service running . Symantec detected Linux.Darlloz attack as the first IOT malware
  • 38. 38 4 .3. SIOT Attack Patterns Hacking Smart watches….. • Data sent between the Smart watches and an android mobile phone can be intercepted. • Easy to crack the authentication of smart watches by brute force attacks as it use six digit PIN Hacking Wearable Devices
  • 39. 39 4 .3. SIOT Attack Patterns Hacking Smart Meters….. • In Spain, millions of smart meters are susceptible to cyber attacks due to lack of proper security controls. • Attacker can exploit the lack of security controls to perform fraudulent activities with smart meters in SIOT network • Smart meters is designed with poor protected Credentials. • Attackers can modify device ID to impersonate other customer or use the smart meter to launch attacks against power network or harm other devices in the SIOT of the houses or firms. Smart meters can be hacked to hit the National power network
  • 40. Agenda 40 1 • Introduction. 2 • Privacy Protection of Internet of People (IOP). 3 • Social Internet of Things (SIOT) is the Next Technology 4 • Open Security Challenges in SIOT 5 • Evolution of SIOT: Today, Tomorrow
  • 41. 41  More Than 50 billion Devices by 2020.  More Than 6 connected devices per person.  By 2020 IOT will be more than the size of smart phones , PC, Tablets, Connected Cars and wearable devices.  We are rapidly evolving toward a world where every thing will be connected  Number of security attacks will increase.  Privacy and security must be addressed with untraditional mechanisms to secure large SIOT networks.  PKI-based solution can be used to improve IOT and SIOT security. 5. Evolution of SIOT: Today, Tomorrow
  • 42. 42
  • 44. 44