Top Banner
Identity- defined Privacy & Security for the Internet of Things Paul Madsen @paulmadsen Ping Identity
38
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Identity-Defined Privacay & Security for Internet of Things

Identity- defined Privacy & Security for the Internet of

ThingsPaul Madsen@paulmadsenPing Identity

Page 2: Identity-Defined Privacay & Security for Internet of Things

2

Page 3: Identity-Defined Privacay & Security for Internet of Things

The Internet of Things connects people and physical objects together through applications

Page 4: Identity-Defined Privacay & Security for Internet of Things

What’s driving IoT• The sensor legacy. Sensors and remote monitoring tools have

existed for decades, in a field known as machine-to-machine (M2M) communications, monitoring, and control.

• Broadening connectivity. Mainstreaming of home wifi, 4G mobile, low-power wireless standards such as Bluetooth and ZigBee are enabling just about everything to be connected together.

• The cloud and big data. Cloud computing and big data allow the massive data created by things to be sifted, processed, and acted upon

• APIs.  Distributed, loosely coupled, transactional approaches in software design are allowing things to exist and communicate autonomously alongside internet-based services

Page 5: Identity-Defined Privacay & Security for Internet of Things

Market

• Market size for IoT will be $290 billion by 2017, and growing at 30 percent per year (MarketsandMarkets)

• 31 billion internet-connected devices will exist by 2020 (Intel)

• A family of four will move from having 10 connected devices in 2012 to 25 in 2017 to 50 in 2022 (Intel)

Page 6: Identity-Defined Privacay & Security for Internet of Things

Privacy & Security ChallengeMost of the devices in the Internet of

Things will be used in two broad areas:– Critical Infrastructure - power

production/generation/distribution, manufacturing, transportation, etc.

– Personal "infrastructure" - personal medical devices, automobiles, home entertainment and device control, wearables, etc

Demandssecurity

Demandsprivacy

Page 7: Identity-Defined Privacay & Security for Internet of Things

Users surprised & disappointed

Security breach

Provider surprised & disappointed

Privacy breach

Page 8: Identity-Defined Privacay & Security for Internet of Things

Security requirements• Confidentiality. Protecting data from being inappropriately

accessed by unauthorized actors. Often manifests in authorization policies & encryption

• Integrity protecting data or methods from modification or deletion by unauthorized parties. Often manifests in digital signatures

• Authentication. Verifying the identities of actors as they interact with each other to ensure that malicious parties are not given inappropriate permissions

Page 9: Identity-Defined Privacay & Security for Internet of Things

Security challenges of the IoT• Life and death implications• Scale• Heterogeneity• Storage, processing, and connectivity constraints• Usability implications of screenless devices• Complex relationships between users & devices• Implications of gateways for end-to-end security

Page 10: Identity-Defined Privacay & Security for Internet of Things

Privacy requirements• Transparency helps people understand who knows what about them —

give people information on how their data is to be used, with whom it is shared with; how long is it held; etc

• Intervenability is the ability for users to view, change, correct, block, revoke consent, and delete personal data stored by providers & applications.

• Unlinkability is about the separation of informational contexts, such as work, personal, family, citizen, and social. It’s about preventing undesired linkages across different contexts.

Page 11: Identity-Defined Privacay & Security for Internet of Things

Identity

Security

Privacy

Authentication Authorization

Page 12: Identity-Defined Privacay & Security for Internet of Things

Authentication & Authorization Model

• IoT Actors authenticate by presenting security tokens on their calls/messages to each other

• Tokens represent relationship between the relevant user and the calling actor (and any consents/permissions associated with that relationship

• Upon receiving a message, an actor validates the token to verify the request is consistent with the relationship/permissions

• If consent is removed, token is revoked, and access disabled

Page 13: Identity-Defined Privacay & Security for Internet of Things

OAuth 2.0 & OpenId Connect 1.0• OAuth 2.0 is an IETF authentication & authorization framework for

securing application access to RESTful APIs• OAuth allows a Client to send an API query to a Resource Server (RS),

the application hosting the desired information, such that the RS can authenticate that the message was indeed sent by the Client.

• The Client authenticates to the RS through the inclusion of an access token on its API call—a token previously provided to the Client by an Authorization Server (AS).

• In those scenarios that the API in question protects access to a User’s identity attributes, it may be the case that the access token will only be issued by the AS after the User has explicitly given consent to the Client accessing those attributes.

• OpenID Connect 1.0 profiles and extends OAuth 2.0 to add an identity layer—creating a single framework that promises to secure APIs, mobile native applications and browser applications in a single, cohesive architecture.

Page 14: Identity-Defined Privacay & Security for Internet of Things

Representative IoT architecture• Fitbit makes the Aria smart

scale• Scale syncs through home Wifi

to Fitbit cloud for display & analysis through web & native applications

• 3rd party services can access weight data to provide additional analysis

Page 15: Identity-Defined Privacay & Security for Internet of Things

Architecture

FitBit

Proprietary

Page 16: Identity-Defined Privacay & Security for Internet of Things

Architecture

FitBit

Proprietary

Page 17: Identity-Defined Privacay & Security for Internet of Things

Architecture

FitBit 3rd partyservices

REST APIProprietary

Page 18: Identity-Defined Privacay & Security for Internet of Things

Security & privacy requirements• Confidentiality

• Integrity

• Authentication

• Transparency

• Intervenability

• Unlinkability

Page 19: Identity-Defined Privacay & Security for Internet of Things

Security & privacy requirements• Confidentiality

• Integrity

• Authentication

• Transparency

• Intervenability

• Unlinkability

Page 20: Identity-Defined Privacay & Security for Internet of Things

Confidentiality & Integrity

• Weight data must be secured both on servers & in-transit– Encryption & access control ensures

confidentiality on Fitbit & 3rd party servers– TLS ensures confidentiality in-transit– TLS protects against modifications in-transit

• Both OAuth & Connect mandate TLS for over-the-network messages

Page 21: Identity-Defined Privacay & Security for Internet of Things

Security & privacy requirements• Confidentiality

• Integrity

• Authentication

• Transparency

• Intervenability

• Unlinkability

Page 22: Identity-Defined Privacay & Security for Internet of Things

Native application authenticationFitBit 3rd party

servicesREST APIProprietary

Page 23: Identity-Defined Privacay & Security for Internet of Things

Native Application authentication• Users can view their weight

data & trends from Fitbit ioS & Android native applications

• Native apps pull data from Fitbit cloud REST endpoints

• Native applications can use OAuth to authenticate their API calls as being on behalf of particular user

Page 24: Identity-Defined Privacay & Security for Internet of Things

3rd party application authenticationFitBit 3rd party

servicesREST APIProprietary

Page 25: Identity-Defined Privacay & Security for Internet of Things

3rd party application authentication• TrendWeight offers additional

insight & analysis of weight data

• Pulls weight data from Fitbit cloud REST endpoints

• TrendWeight uses OAuth to authenticate to Fitbit as acting on behalf of particular user

• The token represents the relationship between TrendWeight and that user

Page 26: Identity-Defined Privacay & Security for Internet of Things

Cloud to Cloud

Copyright © 2014 Ping Identity Corp. All rights reserved.26

Login & consent

Weight data

Login & consent

Weight data

Access token delivery

Page 27: Identity-Defined Privacay & Security for Internet of Things

Device authenticationFitBit 3rd party

servicesREST APIProprietary

Page 28: Identity-Defined Privacay & Security for Internet of Things

Copyright © 2014 Ping Identity Corp. All rights reserved.28

• Devices communicate with each other and the gateway via the local network— sharing data, sending control messages, etc.

• These local interactions may not use HTTP, but instead a application protocol more optimized to the constraints (CPU size, battery, etc.) of devices.

• Such application protocols include XMPP, MQTT and CoAP.

• Work has begun in exploring how to bind OAuth & Connect to such IoT optimized protocols, e.g. ACE effort in IETF

Device authentication

Page 29: Identity-Defined Privacay & Security for Internet of Things

Security & privacy requirements• Confidentiality

• Integrity

• Authentication

• Transparency

• Intervenability

• Unlinkability

Page 30: Identity-Defined Privacay & Security for Internet of Things

Transparency• Users actively mediate

the issuance of tokens to native applications & 3rd parties

• Provides opportunity for an explicit consent step

• In theory can enable granular consent, ie view only weight data but not step data

Page 31: Identity-Defined Privacay & Security for Internet of Things

Security & privacy requirements• Confidentiality

• Integrity

• Authentication

• Transparency

• Intervenability

• Unlinkability

Page 32: Identity-Defined Privacay & Security for Internet of Things

Intervenability

User can revoke permissions assigned to 3rd parties

Page 33: Identity-Defined Privacay & Security for Internet of Things

Security & privacy requirements• Confidentiality

• Integrity

• Authentication

• Transparency

• Intervenability

• Unlinkability

Page 34: Identity-Defined Privacay & Security for Internet of Things

Unlinkability

• Authenticating to Fitbit or sharing weight data to 3rd party services should not directly enable inappropriate correlation at some other party , eg Facebook

• Linkages must be explicit and consensual, as in that established between FitBit & TrendWeight

Page 35: Identity-Defined Privacay & Security for Internet of Things

It will be relationships between users, devices, and applications that will be fundamental

Page 36: Identity-Defined Privacay & Security for Internet of Things
Page 37: Identity-Defined Privacay & Security for Internet of Things

THANKS

Page 38: Identity-Defined Privacay & Security for Internet of Things

Conclusion• Authentication & authorization of actors is

fundamental to enabling IoT security & privacy• Mechanisms must be secure, scalable and privacy

respecting• OAuth & Connect promise to provide important

pieces of authentication & authorization framework for IoT