Internet of things - 4/4. Providing Security
-
Upload
sumanth-bhat -
Category
Internet
-
view
17 -
download
0
Transcript of Internet of things - 4/4. Providing Security
Current Approaches
• GAME Theory applied to CPS Security
• Infineon approach
• UC Berkeley approach
• TCS Innovation Labs – Embedded Security for IoT
UCB : Challenges for security
• Adversary Models / Potential attackers –1. Cybercriminals2. Disgruntled Employees3. Terrorists / Organized 4. Nation States
Top 5 modes of attack
1. Sniffer Attack2. Denial of service attack3. Compromised-Key Attack4. Password-Based Attack5. Man-in-the-Middle Attack
TCS Innovation labs
• Need is for CONFIDENTIALITY of data. • Encryption protocols are bulky,
need DSP processors to run• How do we achieve trusted
computing?
TCS Innovation labs: Trusted Computing1. Hardware compartmentalized Secure Processor2. Secure Code and Data Memory 3. Secure Booting