Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT...

14
Dr. Josef Haid Lead Principal, Infineon Technologies AG Security Challenges in IoT UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24 th 2018

Transcript of Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT...

Page 1: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT

Dr. Josef HaidLead Principal, Infineon Technologies AG

Security Challenges in IoTUN/CEFACT Conference –IoT for Trade Facilitation on Apr 24th 2018

Page 2: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT

The definition of IoT

“A world where physical objects are seamlessly integratedinto the information network.” SAP

MOBILITY

DEVICES

GRIDS

LOGISTICS

BUILDINGS

INTELLIGENTFACTORY

22018-04-15 Copyright © Infineon Technologies AG 2018. All rights reserved.

Page 3: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT

IoT security is a focus topic in the industry

The IoT is expected to create significant value across industries

IoT security needs to protect this value

30 billion devices by 2020

ABI

547 millionIoT security spending

in 2018Gartner

32018-04-15 Copyright © Infineon Technologies AG 2018. All rights reserved.

Page 4: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT

IoT devices used to support reliable and trusted manufacturing and delivery of goods

Asset trackingthrough the whole manufacturing and

delivering cycle

Fleet manage-ment to optimize

transportation resources

Environment sensing to monitor sensitive

goods to avoid damage or loss

42018-04-15 Copyright © Infineon Technologies AG 2018. All rights reserved.

Page 5: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT

Applications are increasingly exploiting the potential of IoT devices

Applications

Smart Factory/Industry 4.0

Smart Home

Connected cars

Use cases

Environmental monitoring and sensing (temperature, pressure, speed…)

Remote control of actuators (motors, lights, machines, supplies…)

Cloud-based services (automated building control, traffic control…)

52018-04-15 Copyright © Infineon Technologies AG 2018. All rights reserved.

Page 6: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT

Security concerns customers

Identity Protection against Fake Devices

Protection against illegal Update of Firmware

Protection against the Manipulation of the Data

Protection against Eavesdropping

62018-04-15 Copyright © Infineon Technologies AG 2018. All rights reserved.

Page 7: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT

IoT Abstract Architecture - Conceptual Layers

Reliably convey data and commands

Send and receive data and commands

Gather data; analyzeand send commands

72018-04-15 Copyright © Infineon Technologies AG 2018. All rights reserved.

Page 8: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT

Security threats for IoT

Each Layer can be Attacked

An Eavesdropper listening in on data or commands can reveal confidential information about the operation of the infrastructure. A Bad Device injecting

fake measurements can disrupt the control processes and cause them to react inappropriately or dangerously, or can be used to mask physical attacks.

A Bad Server sending incorrect commands can be used to trigger unplanned events, to send some physical resource (water, oil, electricity, etc.) to an unplanned destination, and so forth.

Bad Server

Bad Device

82018-04-15 Copyright © Infineon Technologies AG 2018. All rights reserved.

Page 9: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT

Three effective measures in IoT Security

Authentication to establish a trusted connection between device

and service

Secured communication to protect from eavesdropping

Secured Firmware Update to reduce risk of corrupted software to be

uploaded

92018-04-15 Copyright © Infineon Technologies AG 2018. All rights reserved.

Page 10: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT

IoTdevice

Protecting IoT edge device architectures is essential – Using Hardware Root of Trusts

Connectivity

Sensors

Actuators

Power supply

Applicationprocessor

Low(un-)securedSecured

.config .config

102018-04-15 Copyright © Infineon Technologies AG 2018. All rights reserved.

Page 11: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT

Low (un-)secured

IoTdevice

Authenticate device

Authentication – identities must be protected in Hardware Root of Trusts

Secured

Connectivity

Sensors

Actuators

sign()...

verify()...

Authenticate cloud

Power supply

Applicationprocessor

challenge

response

112018-04-15 Copyright © Infineon Technologies AG 2018. All rights reserved.

Page 12: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT

Secured IoT Devices can revolutionize industries

Authentication to the control center

Secured, encrypted communication to the

control centerSecured firmware update

Hardware Root of Trust

122018-04-15 Copyright © Infineon Technologies AG 2018. All rights reserved.

Page 13: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT

Hardware Root of Trust adds value by protecting business and enabling growth

Implementation of sustainable and secured IoT-systems

Implementation of reliable, efficient and trusted supply chains

132018-04-15 Copyright © Infineon Technologies AG 2018. All rights reserved.

Page 14: Security Challenges in IoT - unece.org · 15/04/2018  · Security Challenges in IoT. UN/CEFACT Conference – IoT for Trade Facilitation on Apr 24. th. 2018. The definition of IoT