SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
SECURING LOW POWER DEVICE COMMUNICATION IN
CRITICAL INFRASTRUCTURE MANAGEMENT
Paul-Emmanuel BRUN, Airbus CyberSecurity SAS
June 3, 20203rd Workshop on IoT Security and Privacy
2
OVERVIEW OF THREATS IN IOT
VectorTarget Weapon
2017
Casino fish tank
temperature sensor
cyberattack
2017
Dallas Emergency
Sirens cyberattack
2016 - 2019
Mirai Botnet
June 3, 20203rd Workshop on IoT Security and Privacy
3
INDUSTRIAL IOT CONSIDERATIONS
Potential effects of cyber-incidents involving Industrial IoT:
Business impacts:
• Production / service downtime, resulting in overcosts, delays
and reputation
• Quality deficiencies, resulting financial / reputational
damages
• Reputational damages, subsequent loss of opportunities
Physical damages:
• Equipment damages, recovery costs, impact on production
• Human safety, operator / user / society endangered
Damages to intangible assets:
• Intellectual Property (IP) theft and loss of competitive
advantages
• Private data leakage resulting in legal and reputational
damages
4
IOT SYSTEM ARCHITECTURE & THREATS
Device operating
system
Connectivity
Application
Gateway
operating system
Connectivity
Network
infrastructure
Cloud
Application
Devices Edge Network
/ Gateway
Network
provider
Application &
services
IoT platform
concentrator
HUB
IoT Platform
Iot Platform
Edge
application
Hardware
side channel
& dumping
Device spoofing
on untrusted
protocols
Network provider
backend spying
& spoofing
Platform
database
corruption
Fake data
spoofing
Example from SHODAN with a widely used IoT protocol,
MQTT:
à 74 000 fully open backend
Many types of data, such as GPS position,
temperatures, actuators, …
THREATS - EXAMPLE
Network / IoT service
provider backend
spying & spoofing
Location, DD/MM/YYYYPresentation Title
6
INDUSTRIAL IOT COMPLEXITY
Heterogeneous
protocols
Protocols and hardware
come from mass market
Heterogenous
constraints and massive
deployments
The high level of heterogeneity of protocols (network
& applicative), make it difficult to validate the overall
system and ensure end-to-end security
Hardware and protocols are facing new challenges to
reduce costs and increase autonomy. Those
challenges are not compatible with state of the art
security mechanisms
From industry 4.0 to connected transportation and
smart city, IoT use cases are broad, and hardware
heterogeneity leads to complex validation processes
for embedded softwares
June 3, 20203rd Workshop on IoT Security and Privacy
7
THE END-TO-END SECURITY PARADIGM
Device operating
system
Connectivity
Application
Gateway
operating system
Connectivity
Network
infrastructure
Cloud
Application
Devices Edge Network
/ Gateway
Network
provider
Application &
services
IoT platform
concentrator
HUB
IoT Platform
Iot Platform
Edge
application
Ensure privacy and security of data through all third parties
8
END-TO-END SECURITY – STATE OF THE ART
Encryption supporting
Low Power IoT
constraint
Authentication
supporting Low Power
IoT constraint
End-to-end secure over
heterogeneous dataflow
TLS No No No
EDHOC + TLS Yes Yes No
SCHC + TLS Yes Yes
Partial
(no applicative disruption possible /
data overhead)
OSCORE Yes Yes
Partial
(limited to CoAP - no applicative
disruption possible)
As no security layers supports security over multi-applicative protocols (e.g: LoRaWAN ->
MQTT -> HTTP), state of the art solution relies on hop-to-hop security, leading to
potential leaks in third party components
9
END-TO-END SECURITY – A WATER MANAGEMENT USE CASE
(FROM BRAIN-IOT H2020 PROJECT)
IoT network
IoT network Brain-IoT Fabric
Security management
End-to-end authentication over LPWAN networks (Sigfox & LoRaWAN)
Hardened security:
Protection against attacks on third
parties (network provider)
Low impact on energy
consumption:
Impact on device lifetime: 0,25%
(30 messages / hour)
Low impact on device bandwidth :
5 bytes for security metadata
MQTTHTTP
Fully encrypted &
authenticated payloads
BRAIN-IoT
node
Public
LoRaWAN
Network
June 3, 20203rd Workshop on IoT Security and Privacy
10
END-TO-END SECURITY – A WATER MANAGEMENT USE CASE
(FROM BRAIN-IOT H2020 PROJECT)
« on the field »
Cloud
On premiseHTTP
Security
Manager
BRAIN-IoT Node
Cloud GW
Security
Module
TLS
June 3, 20203rd Workshop on IoT Security and Privacy
11
• 2 pillars of cyber secured systems :
– Cyber protection
– Cyber detection
• IoT brings news challenges for cyber
monitoring because of :
– Big amount of data
– Decentralized architecture
Artificial intelligence is a key technology to
enable reliable cyber monitoring in IoT
contexts
TO CONCLUDE
CONTACTS
This project has received funding from the European Union’s Horizon 2020 research
and innovation programme under grant agreement No 780089.
IoT System Security Expert
Airbus CyberSecurity SAS
+33 1 61 38 68 02
paul-emmanuel.brun@airbus.com / https://airbus-cyber-security.com
CONTACTS
PAUL-EMMANUEL BRUN
Public
LoRaWAN
Network
June 3, 20203rd Workshop on IoT Security and Privacy
13
END-TO-END SECURITY – A WATER MANAGEMENT USE CASE
(FROM BRAIN-IOT H2020 PROJECT)
« on the field »
Cloud
On premiseHTTP
Security
Manager
BRAIN-IoT Node
Cloud GW
Security
Module
TLS
1. Send join requet 3. Receive Join Accept
4. Send runtime key request (encrypted
and authenticated using Device
Management Key)
5. If runtime key request is valid, add to
Manager and send back the runtime key
(encrypted and authenticated using Device
Management Key)
6. Receive runtime key store it securely using device
fingerprint
2. Add automatically device (using
APPEUI and APPKey)

Más contenido relacionado

La actualidad más candente

Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4
Ecwaytech
 
Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4
Ecway Technologies
 
Ima an integrated monitoring architecture with sensor networks
Ima an integrated monitoring architecture with sensor networksIma an integrated monitoring architecture with sensor networks
Ima an integrated monitoring architecture with sensor networks
sudhakar5472
 
Location Based System For Mobile Devices Using Rfid
Location Based System For Mobile Devices Using RfidLocation Based System For Mobile Devices Using Rfid
Location Based System For Mobile Devices Using Rfid
vein
 

La actualidad más candente (18)

Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
Cottage village
Cottage villageCottage village
Cottage village
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)
 
Iot m2m
Iot m2mIot m2m
Iot m2m
 
IoT Home monitoring system
IoT Home monitoring system IoT Home monitoring system
IoT Home monitoring system
 
Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4
 
Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4
 
Ima an integrated monitoring architecture with sensor networks
Ima an integrated monitoring architecture with sensor networksIma an integrated monitoring architecture with sensor networks
Ima an integrated monitoring architecture with sensor networks
 
352 356
352 356352 356
352 356
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architectures
 
Case studies in io t smart-home
Case studies in io t  smart-homeCase studies in io t  smart-home
Case studies in io t smart-home
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Bio stamp
Bio stampBio stamp
Bio stamp
 
IoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & ChallengesIoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & Challenges
 
IoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical IssuesIoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical Issues
 
Location Based System For Mobile Devices Using Rfid
Location Based System For Mobile Devices Using RfidLocation Based System For Mobile Devices Using Rfid
Location Based System For Mobile Devices Using Rfid
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 

Similar a SAM-IoT: Securing low power device communication in critical infrastructure management

Similar a SAM-IoT: Securing low power device communication in critical infrastructure management (20)

IoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative ApproachesIoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative Approaches
 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptx
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Brain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overviewBrain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overview
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
A Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingA Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog Computing
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
 
IxorTalk IoT Convention 2018
IxorTalk IoT Convention 2018IxorTalk IoT Convention 2018
IxorTalk IoT Convention 2018
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
IoT challenges for Smart Manufacturing
IoT challenges for Smart ManufacturingIoT challenges for Smart Manufacturing
IoT challenges for Smart Manufacturing
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
Research Topics in Network Security for PhD
Research Topics in Network Security for PhDResearch Topics in Network Security for PhD
Research Topics in Network Security for PhD
 

Más de Brain IoT Project

Más de Brain IoT Project (7)

Virtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges AheadVirtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges Ahead
 
Statistical model checking bip tool
Statistical model checking bip toolStatistical model checking bip tool
Statistical model checking bip tool
 
Rigorous system design the bip framework
Rigorous system design the bip frameworkRigorous system design the bip framework
Rigorous system design the bip framework
 
IMB Brokerage day - EMALCSA: SICA platform and BRAIN-IoT
IMB Brokerage day -  EMALCSA: SICA platform and BRAIN-IoTIMB Brokerage day -  EMALCSA: SICA platform and BRAIN-IoT
IMB Brokerage day - EMALCSA: SICA platform and BRAIN-IoT
 
ROBOT PATH FINDER Case Study
ROBOT PATH FINDER Case StudyROBOT PATH FINDER Case Study
ROBOT PATH FINDER Case Study
 
Overview of the WP4 of BRAIN-IoT
Overview of the WP4 of BRAIN-IoTOverview of the WP4 of BRAIN-IoT
Overview of the WP4 of BRAIN-IoT
 
Using Eclipse technologies to develop the BRAIN-IoT model-based framework for...
Using Eclipse technologies to develop the BRAIN-IoT model-based framework for...Using Eclipse technologies to develop the BRAIN-IoT model-based framework for...
Using Eclipse technologies to develop the BRAIN-IoT model-based framework for...
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

SAM-IoT: Securing low power device communication in critical infrastructure management

  • 1. SECURING LOW POWER DEVICE COMMUNICATION IN CRITICAL INFRASTRUCTURE MANAGEMENT Paul-Emmanuel BRUN, Airbus CyberSecurity SAS
  • 2. June 3, 20203rd Workshop on IoT Security and Privacy 2 OVERVIEW OF THREATS IN IOT VectorTarget Weapon 2017 Casino fish tank temperature sensor cyberattack 2017 Dallas Emergency Sirens cyberattack 2016 - 2019 Mirai Botnet
  • 3. June 3, 20203rd Workshop on IoT Security and Privacy 3 INDUSTRIAL IOT CONSIDERATIONS Potential effects of cyber-incidents involving Industrial IoT: Business impacts: • Production / service downtime, resulting in overcosts, delays and reputation • Quality deficiencies, resulting financial / reputational damages • Reputational damages, subsequent loss of opportunities Physical damages: • Equipment damages, recovery costs, impact on production • Human safety, operator / user / society endangered Damages to intangible assets: • Intellectual Property (IP) theft and loss of competitive advantages • Private data leakage resulting in legal and reputational damages
  • 4. 4 IOT SYSTEM ARCHITECTURE & THREATS Device operating system Connectivity Application Gateway operating system Connectivity Network infrastructure Cloud Application Devices Edge Network / Gateway Network provider Application & services IoT platform concentrator HUB IoT Platform Iot Platform Edge application Hardware side channel & dumping Device spoofing on untrusted protocols Network provider backend spying & spoofing Platform database corruption Fake data spoofing
  • 5. Example from SHODAN with a widely used IoT protocol, MQTT: à 74 000 fully open backend Many types of data, such as GPS position, temperatures, actuators, … THREATS - EXAMPLE Network / IoT service provider backend spying & spoofing
  • 6. Location, DD/MM/YYYYPresentation Title 6 INDUSTRIAL IOT COMPLEXITY Heterogeneous protocols Protocols and hardware come from mass market Heterogenous constraints and massive deployments The high level of heterogeneity of protocols (network & applicative), make it difficult to validate the overall system and ensure end-to-end security Hardware and protocols are facing new challenges to reduce costs and increase autonomy. Those challenges are not compatible with state of the art security mechanisms From industry 4.0 to connected transportation and smart city, IoT use cases are broad, and hardware heterogeneity leads to complex validation processes for embedded softwares
  • 7. June 3, 20203rd Workshop on IoT Security and Privacy 7 THE END-TO-END SECURITY PARADIGM Device operating system Connectivity Application Gateway operating system Connectivity Network infrastructure Cloud Application Devices Edge Network / Gateway Network provider Application & services IoT platform concentrator HUB IoT Platform Iot Platform Edge application Ensure privacy and security of data through all third parties
  • 8. 8 END-TO-END SECURITY – STATE OF THE ART Encryption supporting Low Power IoT constraint Authentication supporting Low Power IoT constraint End-to-end secure over heterogeneous dataflow TLS No No No EDHOC + TLS Yes Yes No SCHC + TLS Yes Yes Partial (no applicative disruption possible / data overhead) OSCORE Yes Yes Partial (limited to CoAP - no applicative disruption possible) As no security layers supports security over multi-applicative protocols (e.g: LoRaWAN -> MQTT -> HTTP), state of the art solution relies on hop-to-hop security, leading to potential leaks in third party components
  • 9. 9 END-TO-END SECURITY – A WATER MANAGEMENT USE CASE (FROM BRAIN-IOT H2020 PROJECT) IoT network IoT network Brain-IoT Fabric Security management End-to-end authentication over LPWAN networks (Sigfox & LoRaWAN) Hardened security: Protection against attacks on third parties (network provider) Low impact on energy consumption: Impact on device lifetime: 0,25% (30 messages / hour) Low impact on device bandwidth : 5 bytes for security metadata MQTTHTTP Fully encrypted & authenticated payloads BRAIN-IoT node
  • 10. Public LoRaWAN Network June 3, 20203rd Workshop on IoT Security and Privacy 10 END-TO-END SECURITY – A WATER MANAGEMENT USE CASE (FROM BRAIN-IOT H2020 PROJECT) « on the field » Cloud On premiseHTTP Security Manager BRAIN-IoT Node Cloud GW Security Module TLS
  • 11. June 3, 20203rd Workshop on IoT Security and Privacy 11 • 2 pillars of cyber secured systems : – Cyber protection – Cyber detection • IoT brings news challenges for cyber monitoring because of : – Big amount of data – Decentralized architecture Artificial intelligence is a key technology to enable reliable cyber monitoring in IoT contexts TO CONCLUDE
  • 12. CONTACTS This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 780089. IoT System Security Expert Airbus CyberSecurity SAS +33 1 61 38 68 02 paul-emmanuel.brun@airbus.com / https://airbus-cyber-security.com CONTACTS PAUL-EMMANUEL BRUN
  • 13. Public LoRaWAN Network June 3, 20203rd Workshop on IoT Security and Privacy 13 END-TO-END SECURITY – A WATER MANAGEMENT USE CASE (FROM BRAIN-IOT H2020 PROJECT) « on the field » Cloud On premiseHTTP Security Manager BRAIN-IoT Node Cloud GW Security Module TLS 1. Send join requet 3. Receive Join Accept 4. Send runtime key request (encrypted and authenticated using Device Management Key) 5. If runtime key request is valid, add to Manager and send back the runtime key (encrypted and authenticated using Device Management Key) 6. Receive runtime key store it securely using device fingerprint 2. Add automatically device (using APPEUI and APPKey)